diff --git "a/results_retrieval/emb_sf_m_v2/retrieval_recursivecharacterchunker_openparsegpu.json" "b/results_retrieval/emb_sf_m_v2/retrieval_recursivecharacterchunker_openparsegpu.json" deleted file mode 100644--- "a/results_retrieval/emb_sf_m_v2/retrieval_recursivecharacterchunker_openparsegpu.json" +++ /dev/null @@ -1,22210 +0,0 @@ -[ - { - "top_k": 10, - "mrr": 0.5032367724867725, - "recall": 0.7333333333333333, - "count_empty_strings": 4 - }, - [ - { - "references": { - "source_file": "uksi_20200438_en.pdf", - "query": "What does \"new account\" mean according to the international tax compliance from 2020 ?", - "target_page": 2, - "target_passage": "“new account” means a financial account maintained by a reporting financial institution opened on or after 13th May 2020", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "(a) “new account” means a financial account maintained by a reporting financial \n\ninstitution(**a**) opened on or after 13th May 2020; \n\n(b) “pre-existing account” means— \n\n(i) a financial account maintained by a reporting financial institution as of 12th \n\nMay 2020, or \n\n(ii) a financial account within Section VIII(C)(9)(b) of Annex 1 of the DAC(**b**), \nbut in the application of that provision the references to “subparagraph \nC(9)(a)” are to be read as references to paragraph (i) of this sub-paragraph. \n\n(4) The accounts are— \n\n(a) non-registered pension arrangements where the annual contributions are limited to \n£50,000 and funds contributed cannot be accessed before the age of 55 except in \ncircumstances of serious ill health; \n\n(b) Premium Bonds issued by the UK National Savings and Investments; \n\n(c) Fixed Interest Savings Certificates issued by the UK National Savings and \n\nInvestments; and \n\n(d) Index Linked Savings Certificates issued by the UK National Savings and \nInvestments.”. \n\n(5) In Schedule 2, omit paragraphs 2, 6, 8 and 9. \n\n**Transitional provision**\n\n**3.**—(1) For the purposes of the International Tax Compliance Regulations 2015, in relation to an \naccount that by virtue of regulation 2(5) ceases to be an excluded account, the calendar year 2020 \nis treated as beginning on 13th May 2020 and ending on 31st December 2020. \n\n(2) Where in consequence of paragraph (1) it is necessary to apportion an amount for the \ncalendar year 2020 to the period ending immediately before 13th May 2020 and the period \nbeginning with that date, it is to be apportioned— \n\n(a) on a time basis according to the respective length of the periods, or \n(b) if that method would produce a result that is unjust or unreasonable, on a just and \n\nreasonable basis. \n\n*David Rutley*\n*Maggie Throup*\nTwo of the Lords Commissioners of Her Majesty’s Treasury 20th April 2020 \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those \n\n(**a**) “Financial account” and “reporting financial institution” are defined in the table in regulation 24(2) of the principal \nRegulations. \n(**b**) “The DAC” is defined in regulation 1(3)(a) of the principal Regulations.", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be \nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments. \n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts \nwhich were previously excluded accounts. \n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 \nwas published on 18th March 2015 and \nthe HMRC website at \nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- \nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the \nimpacts that apply to this instrument. \n\nis available on \n\n© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S \n\n\n \n \n \n \n [html]\n
Thenternational
ax ComDevelopment ( Accuracy expensions )ndmen
RegTableMade
.-20th Apri
0Laid beforee House of
Comm21st Apri0
\n\nThe Treasury make these Regulations in exercise of the powers conferred by section 222 of the \nFinance Act 2013(**a**): \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the International Tax Compliance (Amendment) \n\nRegulations 2020 and come into force on 13th May 2020. \n\n**Amendments to the International Tax Compliance Regulations 2015**\n\n**2.**—(1) The International Tax Compliance Regulations 2015(**b**) are amended as follows. \n(2) In regulation 1(3)(b)(i), for “16th May 2019” substitute “19th April 2020”(**c**). \n(3) In regulation 3(4A)(a), at the beginning insert “subject to regulation 24(3)”. \n(4) In regulation 24— \n\n(a) in the table in paragraph (2), in the column headed “the CRS”— \n\n(i) at the beginning of the entry for “new account” insert “subject to paragraph (3)”, and \n(ii) at the beginning of the entry for “pre-existing account” insert “subject to regulation \n\n3(4A)(a) and paragraph (3)”, and \n\n(b) after paragraph (2) insert— \n\n“(3) In respect of the accounts listed in paragraph (4)— \n\n(**a**) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not \nrelevant to these Regulations. \n(**b**) S.I. 2015/878 (referred to in these footnotes as “the principal Regulations”); relevant amending instruments are S.I. \n\n2017/598, 2018/490 and 2019/881. \nIn accordance with the common reporting standard for automatic exchange of financial account information developed by \nthe Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom \nexchanges information received from financial institutions under the principal Regulations with a territory which is a \n“Reportable Jurisdiction” under the CRS and with which the United Kingdom has entered into international exchange \narrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrc- \ninternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at \nthe offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU. \n\n(**c**)", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "future, the intra - groupthe amounts used for taxation purposes. The amount of deferred tax provided is based on the expected manner of realisation or settlement ofby the head entity from the subsidiaries in the tax - consolidation group, are recognised as amounts receivable or payable to other entities in the tax - consolidation group in conjunctionbalance is no longer regarded as part of net investment. The exchange differences for suchthe carrying amount of assets and liabilities, using tax rates enacted or substantively enactedin the tax - consolidation group in conjunction with any tax funding agreement amounts.balance previously talken directly to the foreign currency translation reserves are recognised inat the reporting date.Specificationsthe profit or loss.A deferred tax asset is recognised for unused taxarising from unused tax losses of the tax - consolid( II )Foreign operationsdifferences, to the extent that it is probable that future taxable profits will be available against which they can be utilised. Deferred tax assetsthat future taxable profits of the tax - consolidation group will be available against which the asset can be utilised.Group entities ( none of which has the currency of a hyperinflationary economy ) that have aare reviewed at each reporting date and are reduced to the extent that it is no lionger nrut at atrigitistical attending trials lieve a functional currency different from the presenta -reduced to the extent that it is no longer probable that the related tax benefit will be realised.Tax funding and sharing agreementstion currency are translated into the presenta -tion currency as follows :Deferred tax is not recognised for :I ' N INImbers of the GIX - consolidation g70. up have entered into a funding agreement that sets out the funding obligations of members of theO the assets and liabilities of the foreign opera -• temporary differences on the initial recogni -tions, including goodwill and fair value adjustments arising on acquisition, aretion of assets or liabilities in a transaction that is not a business combination and thattranslated at the year - end exchange rate ;affects neither accounting nor taxable profit≥ 3 the income and expenses of foreign operationTabletions are translated at average exchangeOral differences related to invest -by the head entity, resulting in the head entity recognising an intra - group receivable or payable in the separate financial statements of therates ( unless this is not a reasonable approximation of the cumulative effect of the ratements in subsidiaries where the Company is able to control the timing of the reversal ofphenening, or not senses, on senses, on sense, non - case income and expenses are translated at the dates of the transactions ); andthe temporary differences and it is probable that they will not reverse in the foreseeable future ; and9 foreign currency differences are recognised in other comprehensive income, and presentedX taxable temporary differences ar initial recognition of goodwill.", - "page_start": 70, - "page_end": 70, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Other than the above items, we are not aware of events or circumstances that would \ncause us to review any material long-lived assets for impairment. \n\n**Income taxes**\nWe are subject to income taxes in the United States, and in several states and \nforeign jurisdictions in which we operate. We account for income taxes according \nto Statement of Financial Accounting Standards No. 109, “Accounting for Income \nTaxes” (“SFAS 109”). SFAS 109 requires the recognition of deferred tax assets, net \nof applicable reserves, related to net operating loss carryforwards and certain \ntemporary differences. The standard requires recognition of a future tax benefit \nto the extent that realization of such benefit is more likely than not. Otherwise, \na valuation allowance is applied.", - "page_start": 43, - "page_end": 43, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]( In millions of dollars )Years ended December 31\n
20132012% Chg
Printing, legal services and commission paid on premiums for insurance
coverage$ 43$_43
\n\nWe have entered into certain transactions with our controlling \nshareholder and companies it controls. These transactions are subject to \nformal agreements approved by the Audit Committee. Total amounts \npaid to these related parties generally reflects the charges to Rogers for \noccasional business use of aircraft, net of other administrative services, \nand were less than $1 million for 2013 and 2012 combined. \n\n(cid:129)*IAS 36,*\n\n*Impairment of Asset (IAS 36)*– In May 2013, the IASB \namended IAS 36 to clarify the circumstances in which the recoverable \namount of assets or cash-generating units is required to be disclosed, \nto clarify the disclosures required, and to introduce an explicit \nrequirement \nrate used in determining \nimpairment (or reversals) where the recoverable amount (based on \nfair value less costs of disposal) is determined using a present value \ntechnique. The amendments are effective for annual periods \nbeginning on or after \nJanuary 1, 2014, with early adoption \npermitted. We early adopted this policy as of January 1, 2013 and \nmade the required disclosures. \n\nto disclose the discount \n\n**New Accounting Standards**\nWe adopted the following new accounting standards effective \nJanuary 1, 2013, of which none had a material impact on prior periods. \n(cid:129)*IFRS 10, Consolidated Financial Statements (IFRS 10) –*As a result of \nthe adoption of \nIFRS 10, we have changed our approach to \ndetermining whether we have control over and consequently whether \nwe consolidate our investees. IFRS 10 introduces a new control model \nthat is applicable to all investees. Among other things, it requires the \nconsolidation of an investee if we control the investee on the basis of \nde facto circumstances. In accordance with the transitional provisions \nof IFRS 10, we re-assessed the control conclusion for our investees at \nJanuary 1, 2013. We made no changes in the current or comparative \nperiod as a result of this assessment. \n\n**Recent Accounting Pronouncements**\nWe are required to adopt the following revised accounting standards on \nor after January 1, 2014. We are assessing the impact of adopting these \nrevised standards on our 2014 interim and consolidated financial \nstatements. \n(cid:129)*IAS 32, Financial*\n\n*Instruments: Presentation (IAS 32)*– In December \n2011, the IASB amended IAS 32 to clarify the meaning of when an \nentity has a current \nset-off. The \namendments are effective for annual periods beginning on or after \nJanuary 1, 2014 and are required to be applied retrospectively. We \ndo not expect this to have a significant impact on our consolidated \nfinancial statements. \n\nlegally enforceable right of \n\n(cid:129)*IFRS 11, Joint Arrangements (IFRS 11) –*As a result of the adoption of \nIFRS 11, we have changed how we evaluate our interests in joint \narrangements. Under IFRS 11, we classify our interests in joint \narrangements as either joint operations or joint ventures depending \non our right to the assets and obligations for the liabilities of the \narrangements. When making this assessment, we consider \nthe \nstructure of \nform of any separate \nvehicles, the contractual terms of the arrangements and other facts", - "page_start": 84, - "page_end": 84, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "As of January 31, 2015 and February 1, 2014, we were in compliance with this covenant. We will continue to monitor this covenant and \nbelieve that we will remain in compliance with this covenant during 2015.", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "(o) New Accounting Standards \nA new Japanese accounting standard “Impairment of Fixed Assets” \nwas issued in August 2002 that is effective for fiscal years beginning \non or after April 1, 2005. The new standard requires that tangible and \nintangible fixed assets be carried at cost less depreciation, and be \nreviewed \nin \ncircumstances indicate that the carrying amount of an asset may not \nbe recoverable. Companies would be required to recognize an \nimpairment loss in their income statement if certain indicators of \nasset impairment exist and the book value of an asset exceeds the \nundiscounted sum of future cash flows of the asset. The Company is \ncurrently assessing the impact of this new accounting standard on its \nfinancial position and operating results. (m) Derivative financial instruments \nThe Company and certain consolidated subsidiaries have entered into \nvarious derivative transactions in order to manage certain risks arising \nfrom adverse fluctuations in foreign currency exchange rates, interest \nrates, and stock and commodity prices. Derivative \nfinancial \ninstruments are carried at fair value with changes in unrealized gain \nor loss charged or credited to operations, except for those which \nmeet the criteria for deferral hedge accounting under which \nunrealized gain or loss is deferred as an asset or a liability. \nReceivables and payables hedged by qualified forward foreign \nexchange contracts are translated at the corresponding foreign \nexchange contract rates. \n\nfor impairment whenever events or changes \n\n2. ACCOUNTING CHANGES", - "page_start": 78, - "page_end": 78, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "[html]b.Foreign currency translationc. RevenueDeferred tax assets and liabilities are offset if there is a legally enforceable right to offset current tax liabilities and assets, and they relate to income taxes levied by the same tax authority on the same taxable entity.( i )Transactions and balancesRevenue is measured at the fair value of the consideration received or receivable. Sales revenue represents the net proceeds receivable from the buyer.Foreign currency transactions are translated into the respective functional currencies of the Group entities at exchange rates on the dates of the transactions. Foreign exchange gains ands resulting from the settlement of such actions and from the translation at year - exchange rates of monetary assets and thes. denominated in foreien cverses.UUU GUU STITTT SGITSthe distribution of cash dividends are recognised at the same time that the liability to pay the related dividend is recognised.reAngued in the profit or loss, except when are deferred in equity as qualifying cash hedges and qualifying net investmentcompleted. Transportation and refinery costs are expensed when incurred.Tax consolidationhedges or are attributable to part of the netd. Income taxgroup with effect from 1 July 2003 and areinvestment in a foreign operation.Income tax expense comprises current and deferred tax. Current tax and deferred tax istherefore taxed as a single entity from that date. The head entity within the tax - consolidation group is Kingsgate Consolidated Limited.Translation differences on assets and liabilities carried at fair value are reported as part of the fair value gain or loss. Translation differences on non - monetary assets and liabilities such as society.deferred tax. Current tax and deferred tax is recognised in profit or loss except to the extent that it relates to a business combination, or items recognised directly in equity or in other comprehensive income.group is Kingspate Consolidated Limited. Current tax expense or benefit, deferred assets and deferred tax liabilities arising fare recognised in profit or loss as part of the fair value gain or loss. Translation differences on non - monetary assets are included in the fair value reserve in equity.Current tax is the expected tax payable or receivable on the taxable income or loss for the year, using tax rates enacted or substantively enacted at the reporting date, and any adjusttax - consolidation group are recognised in the separate financial etatements of the members of the tax - consolidation group using the “ stand alone taxpayer ” approach by reference to the carrying amounts in the separate financial stataExchange gains and losses which arise on balances between Group entities are talen toment to tax payable in respect of previous years. Deferred tax is provided using the liabilitythe foreign currency translation reserve where the intra - group balances are in substance part of the Group ’ s net investment. Where as a result of ‘ vehous in rinvertment.’ snewinvelved wholen.method, providing for temporary differences between the carrying amounts of assets and liabilities for financial reporting purposes and1.7 ° Current tax assets or liabilities and deferred tax assets arising from unused tax losses assumeda change in circumstances, a previously designated intra - group balance is intended to be settled in the foreseeable future, the intra - groupthe amounts used for taxation purposes. The amount of deferred tax provided is based on the expected manner of realisation or settlement ofby the", - "page_start": 70, - "page_end": 70, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "The accounting pronouncements we adopted that had an impact on \nour financial results or require further explanation are explained as \nfollows: \n(cid:129)*IFRS 10, Consolidated Financial Statements (IFRS 10)*– As a result of \nthe adoption of \nIFRS 10, we have changed our approach to \ndetermining whether we have control over and consequently \nwhether we consolidate our investees. IFRS 10 introduces a new \ncontrol model that is applicable to all investees. Among other things, \nit requires the consolidation of an investee if we control the investee \non the basis of de facto circumstances. \nIn accordance with the \ntransitional provisions of \nIFRS 10, we re-assessed the control \nconclusion for our investees at January 1, 2013. We made no \nchanges in the current or comparative period as a result of this \nassessment. \n\n(cid:129)*IFRS 11, Joint Arrangements (IFRS 11)*– As a result of the adoption of \nIFRS 11, we have changed how we evaluate our interests in joint \narrangements. Under IFRS 11, we classify our interests in joint \narrangements as either joint operations or joint ventures depending \non our right to the assets and obligations for the liabilities of the \narrangements. When making this assessment, we consider \nthe \nform of any separate \nstructure of \nvehicles, the contractual terms of the arrangements and other facts \nand circumstances. We have re-evaluated our involvement in our \njoint arrangements and have accounted for these either using the \nproportionate \nequity method \ndepending on whether the investment is defined as a joint operation \nor a joint venture, respectively. The adoption of IFRS 11 was not \nmaterial to the current or comparative year. \n\nthe arrangements, the legal \n\n*Instruments: Presentation (IAS 32)*– In December \n2011, the IASB amended IAS 32 to clarify the meaning of when an \nset-off. The \nentity has a current \namendments are effective for annual periods beginning on or after \nJanuary 1, 2014 and are required to be applied retrospectively. We \ndo not expect this to have a significant impact on our consolidated \nfinancial statements. \n\nlegally enforceable right of \n\n(cid:129)*IAS 39,*\n\n*Instruments: Recognition and Measurement*\n*(IAS 39)*– In June 2013, the IASB amended IAS 39 to provide relief \nfrom discontinuing an existing hedging relationship when a novation \nthat was not contemplated in the original hedging documentation \nmeets specific criteria. The amendments are effective for annual \nperiods beginning on or after January 1, 2014 and are required to be \napplied retrospectively. We are assessing the impact of \nthis \namendment on our consolidated financial statements. \n\n*Financial*", - "page_start": 104, - "page_end": 104, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200438_en.pdf", - "query": "Under which conditions can the funds of a non-registered pension arrengements be obtained before the age of 55 ?", - "target_page": 2, - "target_passage": "non-registered pension arrangements where the annual contributions are limited to £50,000 and funds contributed cannot be accessed before the age of 55 except in circumstances of serious ill health", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "(a) “new account” means a financial account maintained by a reporting financial \n\ninstitution(**a**) opened on or after 13th May 2020; \n\n(b) “pre-existing account” means— \n\n(i) a financial account maintained by a reporting financial institution as of 12th \n\nMay 2020, or \n\n(ii) a financial account within Section VIII(C)(9)(b) of Annex 1 of the DAC(**b**), \nbut in the application of that provision the references to “subparagraph \nC(9)(a)” are to be read as references to paragraph (i) of this sub-paragraph. \n\n(4) The accounts are— \n\n(a) non-registered pension arrangements where the annual contributions are limited to \n£50,000 and funds contributed cannot be accessed before the age of 55 except in \ncircumstances of serious ill health; \n\n(b) Premium Bonds issued by the UK National Savings and Investments; \n\n(c) Fixed Interest Savings Certificates issued by the UK National Savings and \n\nInvestments; and \n\n(d) Index Linked Savings Certificates issued by the UK National Savings and \nInvestments.”. \n\n(5) In Schedule 2, omit paragraphs 2, 6, 8 and 9. \n\n**Transitional provision**\n\n**3.**—(1) For the purposes of the International Tax Compliance Regulations 2015, in relation to an \naccount that by virtue of regulation 2(5) ceases to be an excluded account, the calendar year 2020 \nis treated as beginning on 13th May 2020 and ending on 31st December 2020. \n\n(2) Where in consequence of paragraph (1) it is necessary to apportion an amount for the \ncalendar year 2020 to the period ending immediately before 13th May 2020 and the period \nbeginning with that date, it is to be apportioned— \n\n(a) on a time basis according to the respective length of the periods, or \n(b) if that method would produce a result that is unjust or unreasonable, on a just and \n\nreasonable basis. \n\n*David Rutley*\n*Maggie Throup*\nTwo of the Lords Commissioners of Her Majesty’s Treasury 20th April 2020 \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those \n\n(**a**) “Financial account” and “reporting financial institution” are defined in the table in regulation 24(2) of the principal \nRegulations. \n(**b**) “The DAC” is defined in regulation 1(3)(a) of the principal Regulations.", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "**116. Power of Commissions in relation to pensions, etc.**\n\n\n \n \n \n \n [html]\n
decide whether or not any persistens benefits shall be granted or withfrold, reduce in amcunt or suspend any such benefits that have been anded, filts shall be granted and may not be withheild, reduced in amount or unless the appropriate Co
, as the case may be, in the decision to withhold them, reduce them in amountI them.
Where the amount of any persions benefits that may be granted to any fived by lare, the amount of the benefits to be granted to him or her shall be amount for which he or she is eligible unless the appropriate Commission his or her being granted b
The appropriate Commission shall not concur under subsection ( 1 ) or ( 2 ) of this section in action taken on the ground that any person who holds or effice of a judge of the Cout of Appeal or of the High Court or the Auditor - Director of Prosecuti
In this section “ the appropriate Commission ” means the cases of benefits for which any person may be eligible in respect of the environment in the public service of a person who, immediately better he or she assed to be a public stiffican, wa
any sther case, the Public Service Commission. In this section “ persons benefit ” means ary persons, compensation, a child ” was alwances to persons in respect of their service as public officers, and appending to personal interviews. As
Solidated Fund
Prevenues or cher monitys ratioed or received for the purposes of their distaxeans ( not being reversues or other moneys that are payuble by or law into some other fund established for a specific purpose or that may by or law be retained by the
abnoredish from Gonsolidation # under other public hundships within the public human providers and expertised more assigned / use that is charged upon the Fund by the Constitution or term the supportise that is changed spon the Fund by tha
\n\n(a) \n(b) \n\n(3) If in any financial year it is found- \n\n(a) \n\nthat the amount appropriated by the Appropriation Act for the purposes included \nin any organisation of expenditure is insufficient or that a need has arisen for \nexpenditure for a purpose for which no amount has been appropriated by the \nAppropriation Act; or \nthat any moneys have been expended on any organisation of expenditure in \nexcess of the amount appropriated for the purposes included in that \norganisation by the Appropriation Act or for a purpose for which no amount has \nbeen appropriated by the Appropriation Act, \n\n(b) \n\na supplementary estimate showing the sums required or spent shall be laid before the \nNational Assembly and the organisations of expenditure shall be included in a \nsupplementary Appropriation Bill, or in a motion or motions approving such expenditure, \nwhich shall be introduced or moved in the Assembly. \n\n(4) Where any supplementary expenditure has been approved in a financial year \nby a resolution of the National Assembly in accordance with the provisions of subsection \n(3) of this section, a supplementary Appropriation Bill shall be introduced in the National \nAssembly, not later than the end of the financial year next following, providing for the \nappropriation of the sums so approved. \n**120. Authorization of expenditure in advance of appropriation**", - "page_start": 50, - "page_end": 50, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "NOTE 22: PENSIONS \n\nWe have contributory and non-contributory defined benefit pension \nplans that are made available to most of our employees. The plans \nprovide pensions based on years of service, years of contributions and \nearnings. We do not provide any non-pension post-retirement benefits. \nWe also provide unfunded supplemental pension benefits to certain \nexecutives. \n\nThe assets of the defined benefit pension plans are held in segregated \naccounts isolated from our assets. We administer the defined benefit \npension plans pursuant to applicable regulations, the Statement of \nInvestment Policies and Procedures and to the mandate of the Pension \nCommittee of the Board of Directors. The Pension Committee of the \nBoard of Directors oversees our administration of the defined benefits \npension plans, which includes the following principal areas: \n(cid:129) overseeing the funding, administration, communication and \ninvestment management of the plans \n(cid:129) selecting and monitoring the performance of all \n\nthird parties \nperforming duties in respect of the plans, including audit, actuarial \nand investment management services \n(cid:129) proposing, considering and approving amendments to the defined \nbenefit pension plans \n(cid:129) proposing, considering and approving amendments of the Statement \nof Investment Policies and Procedures \n(cid:129) reviewing management and actuarial reports prepared in respect of \nthe administration of the defined benefit pension plans \n(cid:129) reviewing and approving the audited financial statements of the \ndefined benefit pension plan funds.", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Parliament may make provision under which, if the Appropriation Act in respect \nof any financial year has not come into operation by the beginning of that financial year, \nthe President may authorize the withdrawal of moneys from the Consolidated Fund for \nthe purpose of meeting expenditure necessary to carry on the services of the \nGovernment until the expiration of four months from the beginning of that financial year \nor the coming into operation of the Appropriation Act, whichever is the earlier. \n**121. Contingencies Fund**\n\n(1) Parliament may make provision for the establishment of a Contingencies \n\nFund and for authorizing the President, if satisfied that there has arisen an urgent and \nunforeseen need for expenditure for which no other provision exists, to make advances \nfrom that Fund to meet that need. \n\n(2) Where any advance is made from the Contingencies Fund, a supplementary \nestimate shall be laid before the National Assembly as soon as possible for the purpose \nof replacing the amount so advanced.", - "page_start": 51, - "page_end": 51, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "Commission and published on the website indicated below, applicable on the day when it \nissues the payment order. \n\nThe contractor makes any conversion between the euro and another currency at the \nmonthly accounting exchange rate, established by the Commission and published on the \nwebsite indicated below, applicable on the date of the invoice. \n\nhttp://ec.europa.eu/budget/contracts_grants/info_contracts/inforeuro/inforeuro_en.cfm \n\n**II.21.4. Costs of transfer**\n\nThe costs of the transfer are borne as follows: \n\n(a) the contracting authority bears the costs of dispatch charged by its bank; \n(b) the contractor bears the costs of receipt charged by its bank; \n(c) the party causing repetition of the transfer bears the costs for repeated transfer. \n\nII.21.5. Pre-financing, performance and money retention guarantees \n\nIf, as provided for in Article I.6*,*a financial guarantee is required for the payment of pre- \nfinancing, as performance guarantee or as retention money guarantee, it must fulfil the \nfollowing conditions: \n\n(a) the financial guarantee is provided by a bank or a financial institution approved by \nthe contracting authority or, at the request of the contractor and with the \nagreement of the contracting authority, by a third party; and \n\n(b) the guarantee shall have the effect of making the bank or financial institution or the \nthird party provide irrevocable collateral security, or stand as first-call guarantor of \nthe contractor's obligations without requiring that the contracting authority has \nrecourse against the principal debtor (the contractor). \n\nThe contractor bears the cost of providing such guarantee. \n\nPre-financing guarantees must remain in force until the pre-financing is cleared against \ninterim payments or payment of the balance. Where the payment of the balance takes the \nform of a debit note, the pre-financing guarantee must remain in force for three months \nafter the debit note is sent to the contractor. The contracting authority must release the \nguarantee within the following month. \n\nPerformance guarantees cover compliance with substantial contractual obligations until the \ncontracting authority has given its final approval for the service. The performance \nguarantee must not exceed 10 % of the total price of the specific contract. The contracting \nauthority must release the guarantee fully after final approval of the service, as provided \nfor in the specific contract. \n\nRetention money guarantees cover full delivery of the service in accordance with the \nspecific contract including during the contract liability period and until its final approval by \nthe contracting authority. The retention money guarantee must not exceed 10 % of the \ntotal price of the specific contract. The contracting authority must release the guarantee \nafter the expiry of the contract liability period as provided for in the specific contract. \n\nThe contracting authority must not request a retention money guarantee for a specific \ncontract where it has requested a performance guarantee.", - "page_start": 33, - "page_end": 33, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Tenure of office of Director of Public Prosecutions \nTenure of office of Auditor-General \nPensions laws and protection of pensions rights \nPower of Commissions in relation to pensions, etc. \n\nCHAPTER VIII \nFinance \n\nConsolidated Fund \nWithdrawals from Consolidated Fund or other public funds \nAuthorization of expenditure \nAuthorization of expenditure in advance of appropriation \nContingencies Fund \nRemuneration of certain officers \nPublic debt \nAuditor-General \n\nCHAPTER IX \nMiscellaneous \n\nResignations \nReappointments and concurrent appointments \nInterpretation \n\nFirst Schedule - Election of Specially Elected Members of the National \nAssembly \nSecond Schedule - Division of Districts into regions for the purpose of \nselecting Members of Ntlo ya Dikgosi \n\nL.N. 83, 1966, \nAct 30, 1969, \nAct 43, 1969, \nAct 25, 1970, \nAct 28, 1972, \nAct 24, 1973, \nAct 28, 1978, \nS.I. 25, 1980, \nAct 32, 1982, \nAct 1, 1983, \nAct 22, 1987, \nS.I. 37, 1991, \nAct 27, 1992, \nS.I. 51, 1993, \nS.I. 119, 1993, \nAct 16, 1997, \nAct 18, 1997, \nAct 1, 1999, \nAct 2, 2002, \nAct 12, 2002, \nAct 9, 2005, \nS.I. 91, 2006.", - "page_start": 3, - "page_end": 3, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**Pension Obligations**\nOur retiree pension plans had a funding deficit of approximately $172 \nmillion at December 31, 2013. We have been making special minimum \nmonthly payments in addition to our regular contributions to eliminate \nthe pension liability. During 2013, our funding deficit was reduced by \n$162 million. \n\naccrued obligations in the future. See*Critical accounting estimates*for \nmore information. \n\n*Purchase of Annuities*\nFrom time to time we have made additional lump-sum contributions to \nour pension plans, and the pension plans have purchased annuities \nfrom insurance companies to fund the pension benefit obligations for \ncertain groups of \nretired employees in the plans. Purchasing the \nannuities relieves us of our primary responsibility for that portion of \nthe accrued benefit obligations for the retired employees and eliminates \nthe significant risk associated with the obligations. \nThe special payments, including contributions associated with benefits \npaid from the plans, were approximately $7 million in 2013. We expect \nour total estimated funding requirements to be $96 million in 2014 and \nto be adjusted annually thereafter, based on various market factors \nsuch as interest rates and expected returns and staffing assumptions. \n\nWe did not make any additional lump-sum contributions to our pension \nplans in 2013 or 2012, and the pension plans did not purchase \nadditional annuities. \nChanges in factors such as the discount rate, increase in compensation \nand the expected return on plan assets can affect the accrued benefit \nobligation, pension expense and the deficiency of plan assets over \n\n\n \n \n \n \n [html]\n
CategoriesThe risk it managesTypes of derivative instruments
Debt Derivatives• Impact of fluctuations in foreign exchange rates on principal and interest payments for US denominated long - term debt• Cross - currency interest rate exchange agreements • Forward foreign exchange agreements ( from time to time, as applicable )
Expenditure Derivatives• Impact of fluctuations in foreign exchange rates on forecasted US dollar denominated expenditures• Forward foreign exchange agreements
Equity Derivatives• Impact of fluctuations in share price on stock - based compensation expense• Total return swap agreements
\n\n*New Debt Derivatives to Hedge Senior Notes Issued In 2013*\n\nUS$ Hedging effect \n\nUS$ Principal/ \nnotional amount \n(millions) \nFixed \nhedged Cdn.$ \nCdn$ \nequivalent \n(millions) Maturity \ndate Coupon \nrate Effective date interest rate 1 \nMarch 7, 2013 US$ 500 2023 3.00% 3.60% $ 515 \nMarch 7, 2013 US$ 500 2043 4.50% 4.60% $ 515 \n\nWe also manage our exposure to fluctuating interest rates and we have \nfixed the interest rate on 95.3% of our debt including short-term \nborrowings at December 31, 2013 (2012 – 100%). \nAll of our Debt Derivatives currently outstanding have been designated \nas effective hedges against \nforeign exchange risk for accounting \npurposes as described below and in note 20 to the consolidated \nfinancial statements. \n\n**Debt Derivatives**\nWe use cross currency interest exchange agreements (Debt Derivatives), \nto hedge the foreign exchange risk on all of the principal and interest \nobligations of our US dollar denominated senior notes and debentures. \nAt December 31, 2013 we used Debt Derivatives to hedge the foreign \nexchange risk on 100% of the principal and interest obligations on all \nour US dollar denominated debt. We use Debt Derivatives for risk \nmanagement purposes only. \nSubtotal US$ 1,000 $ 1,030", - "page_start": 65, - "page_end": 65, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Significant estimates are involved in determining pension related \nbalances. Actuarial estimates are based on projections of employees’ \ncompensation levels at the time of retirement. Maximum retirement \nbenefits are primarily based on career average earnings, subject to \ncertain adjustments. The most \nrecent actuarial valuations were \ncompleted as at January 1, 2013.", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]Deferred pension liability( 33 )( 33 )\n
provide these benefits for our funded plans at December 31.2013 and 2012.2013
2012Plan assets, at fair value$
37$833
Accrued benefit obligationsTable≥ 09
1.167Deficiency of plan assets over accrued benefit obligationsEffect of asset ceiling limit( 172 )
( 334 )Net deferred pension liability$
( 181 )$( 334 )
Consists of :Deferred pension asset$
8$9
( 189 )( 343 )Net deferred pension liability
$( 181 )$
( 334 )The table below shows our pension fund assets for the years ended 2013 and 2012.2013
2012Plan αossets, January 1$
833$684
Interest income4040
Remeasurements, return on plan assets recognized in othercomprehensive income and equity65
37Contributions by employees26
22Contributions by employer101
85Benefits paid( 26 )
Administrative expenses paid from plan assets( 2 )( 2 )
Plan assets, December 31$1.037
$833The table below shows the accrued benefit obligations arising from
funded obligations for the years ended December 31.2013 and 2012.13 ar12.1
20132012Accrued benefit obligations, January 1
$67$
817Service cost71
46Interest cost52
45Benefits paid( 26 )
Contributions by employees2623
Remeasurements, recognized in other comprehensiveincome and equity( 81 )
269Accrued benefit obligations, December 31$
1.209$. 167
\n\nThe assets of the defined benefit pension plans are invested and \nmanaged following all applicable regulations and the Statement of \nInvestment Policies and Procedures, and reflect the characteristics and \nasset mix of each defined benefit pension plan. Investment and market \nreturn risk is managed by: \n(cid:129) contracting professional \n\nto execute the \ninvestment strategy following the Statement of Investment Policies \nand Procedures and regulatory requirements \n\ninvestment managers \n\n(cid:129) specifying the kinds of investments that can be held in the plans and \nmonitoring compliance \n\n(cid:129) using asset allocation and diversification strategies, and \n(cid:129) purchasing annuities from time to time. \n\nThe funded pension plans are registered with the Office of \nthe \nSuperintendent of Financial Institutions and are subject to the Federal \nPension Benefits Standards Act. The plans are also registered with the \nCanada Revenue Agency and are subject to the Canada Income Tax \nAct. The benefits provided under the plans and the contributions to the \nplans are funded and administered in accordance with all applicable \nlegislation and regulations.", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Provided that the President, acting in accordance with the advice of the Judicial \n\nService Commission, may permit a person whose appointment to act as a Justice of \nAppeal has expired or been revoked to continue to act as such a judge for such period \nas may be necessary to enable him or her to deliver judgment or to do any other thing in \nrelation to proceedings that were commenced before him or her previously thereto. \n**101. Tenure of office of judges of Court of Appeal**\n\n(1) Subject to the provisions of this section, a person holding the office of a judge \n\nof the Court of Appeal shall vacate that office on attaining the age of 70 years or such \nother age as may be prescribed by Parliament: \n\nProvided that- \n\n(i) \n\nthe President, acting in accordance with the advice of the Judicial Service \nCommission, may permit a judge who has attained that age to continue in office \nfor such period as may be necessary to enable him or her to deliver judgment \nor to do any other thing in relation to proceedings that were commenced before \nhim or her before he or she attained that age;", - "page_start": 42, - "page_end": 42, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2538.pdf", - "query": "What metrics are good indicators of the coverage of gas molecules on carbon nanotubes ?", - "target_page": 1, - "target_passage": "the bind- ing energy and scattering resistance of the molecules", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. \n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, \n“Nanotube molecular wires as \nScience 287(5453), 622 (Jan. 2000), \nK. Cho, and H. Dai, \nchemical sensors”, \ndoi:10.1126/science.287.5453.622. \n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “Ab \ninitio study of spin-dependent transport in carbon nanotubes \nwith iron and vanadium adatoms”, Phys. Rev. B 78(19), 195405 \n(Nov. 2008), doi:10.1103/PhysRevB.78.195405. \n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, \n\n“Ex- \ntreme oxygen sensitivity of electronic properties of car- \nScience 287(5459), 1801 (Mar. 2000), \nbon nanotubes”, \ndoi:10.1126/science.287.5459.1801. \n\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. \n\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, \n“Real-space grid implementation of the projector augmented \nPhys. Rev. B 71(3), 035109 (Jan. 2005), \nwave method”, \ndoi:10.1103/PhysRevB.71.035109. [7] A. R. Rocha, M. Rossi, A. Fazzio, \n\nJ. R. \n“Designing real nanotube-based gas \nsen- \nPhys. Rev. Lett. 100(17), 176803 (May 2008), \n\nand A. \n\n[23] J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized gradi- \nent approximation made simple”, Phys. Rev. Lett. 77(18), 3865 \n(Oct. 1996), doi:10.1103/PhysRevLett.77.3865. da Silva, \nsors”, \ndoi:10.1103/PhysRevLett.100.176803. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. \n\n\n \n \n \n \n [html]\n
Cancertectors ofCases
both for i [ 9 ]____________Patients
CasesPTistin errorStates
Post - rate (%)Controlits, electri
Tabletive for sthe
tionalizatPatientssidewall 1
________________________________________________________________________________________________________________________________________________________________________________________________________hP_115Pd_1Patients
the selectCancer1.10 ( 0.01 )
\n\nchange in CNT resistivity may then be obtained from the cal- \nculated coverages and single impurity conductances. \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. \n\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. \n\nIn summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. \n\nThe authors acknowledge financial support from Span- \nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados \nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF \nproject (Contract Number 211956), “Red Espa˜nola de Super- \ncomputaci´on”, NABIIT and the Danish Center for Scientific \nComputing. The Center for Atomic-scale Materials Design \n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L \nacknowledges funding from Spanish MICINN through Juan \nde la Cierva and Jos´e Castillejo programs. \n\n[16] S. H. Yang, W. H. Shin, J. W. Lee, S. Y. Kim, S. I. Woo, and \nJ. K. Kang, “Interaction of a transition metal atom with intrinsic \ndefects in single-walled carbon nanotubes”, J. Phys. Chem. B \n110(28), 13941 (Jun. 2006), doi:10.1021/jp061895q. \n\n[17] K. T. Chan, J. B. Neaton, and M. L. Cohen, “First-principles \nstudy of metal adatom adsorption on graphene”, Phys. Rev. B \n77, 235430 (Jun. 2008), doi:10.1103/PhysRevB.77.235430. \n\n∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang,", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. \n\nEform[VC] = E[VC] + nE[C] − E[NT], (2) \n\nwhere E[VC] is the total energy of the nanotube with a va- \ncancy of n atoms. \n\nis the total energy of the pristine nanotube with a physisorbed \ntransition metal atom. We have considered the monovacancy \nand two divacancies shown in Fig. 1. The energy required to \nform an empty vacancy is obtained from where E[X@M@VC] is the total energy of molecule X on \na transition metal atom occupying a vacancy, and E[X] is the \ngas phase energy of the molecule. \n\nFrom the adsorption energies plotted in Fig. 2(a), we see \nthat the earlier transition metals tend to bind the adsorbates \nstronger than the late transition metals. The latest metals in \nthe series (Cu and Zn) bind adsorbates rather weakly in the \ndivacancy structures. We also note that O2 binds significantly \nstronger than any of the three target molecules on Ti, V, Cr, \nand Mn (except for Cr in divacancy I where H2S is found to \ndissociate). Active sites containing these metals are therefore \nexpected to be completely passivated if oxygen is present in \nthe background. Further, we find H2O is rather weakly bound \nto most of the active sites. This ensures that these types of \nsensors are robust against changes in humidity. \n\nThe calculated formation energies for the 3d transition met- \nals are shown in Fig. 1. From the horizontal lines we see that \nboth divacancies are more stable than the monovacancy. This \nmay be attributed to the presence of a two-fold coordinated C \natom in the monovacancy, while all C atoms remain three-fold \ncoordinated in the divacancies. When a transition metal atom \noccupies a vacancy, the strongest bonding to the C atoms is \nthrough its d orbitals [26]. For this reason, Cu and Zn, which \nboth have filled d-bands, are rather unstable in the CNT. For \nthe remaining metals, adsorption in the monovacancies leads \nto quite stable structures. This is because the three-fold coor- \ndination of the C atoms and the CNT’s hexagonal structure are \nrecovered when the metal atom is inserted. On the other hand, \nmetal adsorption in divacancies is slightly less stable because \nof the resulting pentagon defects, see upper panel in Fig. 1. A \nsimilar behaviour has been reported by Krasheninnikov et al. \nfor transition metal atoms in graphene [21]. \n\nIn thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] − E[X] − E[M@VC], \n(3)", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "3 \n\nconductances, i.e. G = (G↑ + G↓)/2. \n\nNext, we estimate the resistance of a CNT containing sev- \neral impurities (a specific metal dopant with different molecu- \nlar adsorbates). Under the assumption that the electron phase- \ncoherence length, lφ, is smaller than the average distance be- \ntween the dopants, d, we may neglect quantum interference \nand obtain the total resistance by adding the scattering resis- \ntances due to each impurity separately. The scattering resis- \ntance due to a single impurity is given by \n\nRs(X) = 1/G(X) − 1/(2G0), (6) \n\nwhere G(X) is the Landauer conductance of the pristine CNT \nwith a single metal dopant occupied by molecule X and \n1/(2G0) is the contact resistance of a (6,6) CNT. \n\nWe may now obtain the total resistance per dopant site rel- \native to the reference background signal as a function of the \ntarget molecule concentration \n\nFIG. 3: Fractional coverage Θ in thermal equilibrium of Ni in a (a) \nmonovacancy, (b) divacancy I, (c) divacancy II and (d) change in \nresistance ∆R per dopant site as a function of CO concentration in \na background of air at room temperature and 1 bar of pressure. The \nreference concentration of CO is taken to be C0 =0.1 ppm. Note the \nchange from linear to log scale on the y-axis at ∆R =10 Ω. \n\n(7) \n\nwhere N is the number of dopants, Θ[X, C] is the fractional \ncoverage of species X at concentration C of the target and C0 \nis the reference concentration. Notice that the contact resis- \ntance drops out as we evaluate a change in resistance. \n\nFor a given background composition we may thus estimate \nthe fractional coverages for each available adsorbate for a \ngiven type of doping. As an example, Fig. 3(a)-(c) shows the \nfractional coverage of a Ni atom occupying a monovacancy, \ndivacancy I, and divacancy II, versus CO concentration in a \nbackground of air at room temperature and 1 bar of pressure. \nDue to the relatively small binding energy of N2 and H2O as \ncompared to O2 and CO, all Ni sites will be either empty or \noccupied by O2 or CO. In particular, Ni in a monovacancy \n(top panel of Fig. 3) will be completely oxidized for all rel- \nevant CO concentrations. For the Ni occupied divacancy II \nstructures we find the coverage of CO changes significantly \naround toxic concentrations (∼10 ppm). \nIn Fig. 3(d) we show the change in resistance calculated \nfrom Eq. (7) as a function of CO concentration for Ni occu- \npying the three types of vacancies. The background reference \nconcentration of CO is taken to be C0 = 0.1 ppm. For the \nmonovacancy there is very little change in resistivity. This is \nbecause most active sites are blocked by O2 at relevant CO \nconcentrations, as shown in the upper panel of Fig. 3. For Ni \nin the divacancies there is, however, a change in resistance on \nthe order of 1Ω per site. For concentrations above ∼1 ppm, \nthe CO coverage of Ni in the divacancy II increases dramati- \ncally and this leads to a significant increase in resistance.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" - }, - { - "text": "For the climate change discourse, the second-largest cluster (34%) is indicated in red and focuses \non the responsibility to tackle climate change, where several global action hashtags are included, such \nas “un”, “parisagreement”, “cop21”, and “cop24”. The theme of the third largest cluster (20%) in \nthe climate change discourse was energy (in blue). The smallest cluster (6%) in yellow sits in the \ncentral part of the network with a mixed theme composed of three highly ranked hashtags, including \n“environment” (No. 2), “climateaction” (No. 3), and “energy” (No. 6).", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "All total energy calculations and structure optimizations \nhave been performed with the real-space density functional \ntheory (DFT) code GPAW [22] which is based on the projector \naugmented wave method. We use a grid spacing of 0.2 ˚A for \nrepresenting the density and wave functions and the PBE ex- \nchange correlation functional [23]. Transport calculations for \nthe optimized structures have been performed using the non- \nequilibrium Green’s function method [24] with an electronic \nHamiltonian obtained from the SIESTA code [25] in a dou- \nble zeta polarized (DZP) basis set. Spin polarization has been \ntaken into account in all calculations. \n\nMetallic doping of a (6,6) CNT has been modeled in a su- \npercell containing six repeated minimal unit cells along the \nCNT axis (dimensions: 15 ˚A×15 ˚A×14.622 ˚A). For this size \nof supercell a Γ-point sampling of the Brillouin zone was \nfound to be sufficient. The formation energy for creating a \nvacancy (VC) occupied by a transition metal atom (M) was \ncalculated using the relation \n\nEform[M@VC] = E[M@VC] + nE[C] − E[M@NT] (1) \n\nwhere E[M@VC] is the total energy of a transition metal \natom occupying a vacancy in the nanotube, n is the number \nof carbon atoms removed to form the vacancy, E[C] is the en- \nergy per carbon atom in a pristine nanotube, and E[M@NT]", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "FIG. 4: (Colour online) Density profiles for the situation where the substrate is covered by nanoparticles \n\nwith average density ρav \n\nn = 0.3. The top row are the nanoparticle density profiles and the bottom row are \nl σ2. \nthe corresponding liquid density profiles at the times t/tl = 8 (left) and 80 (right), where tl = 1/kT M nc \n\nThe parameters are kT /εll = 0.8, εnl/εll = 0.6, εnn = 0, α = 0.4M nc \nl σ4, M c l = 0, ρl(t = 0) = 0.9 ± ξ \n\n(where ξ represents white noise of amplitude 0.05) and (µ − µcoex)/kT = −0.88, where the liquid exhibits \n\nspinodal decomposition-evaporation. \n\nalso diffuse over the substrate (conserved dynamics). The conserved part is treated along the lines \n\ndeveloped above for the nanoparticles. For the non-conserved part we assume a standard form \n\n[85], i.e., the change in time of ρl is proportional to −(µsurf(r, t) − µ) = −δF [ρn, ρl]/δρl(r) \n\nwhere µsurf(r, t) is the local chemical potential of the liquid at the point r on the surface at time t. \n\nThis gives the evolution equation for the liquid density \n(cid:21) (cid:20) \n\n∂ρl \n∂t \nδF [ρn, ρl] \nδρl δF [ρn, ρl] \nδρl \nM c − M nc = ∇ · \nl ρl∇ \n, \nl \n\nwhere we assume that the coefficients M c \nl and M nc \nl \nare constants. \n\n16", - "page_start": 15, - "page_end": 15, - "source_file": "1001.2669.pdf" - }, - { - "text": "In the global warming network, politics was the second-largest discourse cluster (20% of the \nnetwork), where “tcot”, short for “Top Conservatives on Twitter”, was the node ranked highest, \nand “p2”, short for “Progressives 2.0”, is also included. Several political figures, such as Obama and Al \nGore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster \n(16%), including both domestic efforts, such as “us”, “trump”, “climatechangeisreal”, “climateaction”, \nand “epa”, and two international items, like “china” and “india”. The fourth cluster (in blue) referred \nto emissions, including hashtags like “co2”, “green”, and “carbon”. The smallest cluster (8%) was \ncomposed of “snow”, “winter”, “heatwave”, and “summer”, referring to the temperature abnormalities \non the earth. \n\n4.3. Temporal Analysis of the Associations in the Two Discourses \n\nThe online presentations of the climate change and global warming discourses are dynamic. \nAs shown in Table 2, for the global warming discourse, 11 key concepts remained in the top 50 central \nhashtags each year for all 10 years, with 16 for the climate change”discourse. By comparing the 11 \nnodes of the global warming discourse and the 16 nodes of the climate change discourse, we found that \nthe two lists shared nine concepts. We found “pollution” and “earth” were unique to the keyword list \nof the global warming discourse, and “economy”, “water”, “china”, “coal”, “solar”, “sustainability”, \nand “food” only occurred on the critical list for the climate change discourse. \n\n**Table 2.**Hashtags that remained on the top 50 list for the climate change or the global warming \ndiscourse from 2009 to 2018. \n\n\n \n \n \n \n [html]\n
UniqueShared
# climatechangechina, solar, water, food, economy, coal, sustainabilityco2, news, carbon, green, climate,
# globalwarmingpollution, earthus, energy, science, environment
\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period, \nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies \nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary \nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more \nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of \nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the \n10 years, as shown in Figure 5.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2648.pdf", - "query": "What is the source of inaccuracy of the MSA3 model at high ionic concentrations ?", - "target_page": 3, - "target_passage": "At high concentration (about 1 mol l−1), the MSA3 overestimates the free energy", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "4 \n\nof the BIMSA3 appears to be negligible compared to the \n1. The \nreference term for concentrations less than 1 mol l− \nperturbation can then be omitted to obtain a fully ana- \nlytical theory, determined by the hard sphere diameters \nand the pair fraction given by LPT; with the free energy \nand the RDF given in terms of the BIMSA and MSA so- \nlutions, as described above. While the procedure we have \nfollowed uses two different approximations for the refer- \nence and perturbation terms (MSA vs BIMSA), these are \nknown to be accurate for the systems under consideration \nand do not appear to be inconsistent with each other. \n\nTo conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . \n\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13, [12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99, 226104 \n276 (1945). (2007). \n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical \nChemistry of Electrolyte Solutions (Springer, 1998). \n[3] L. Blum, in Theoretical Chemistry: Advances and Per- \nspectives, edited by H. Eyring and D. Henderson (Aca- \ndemic Press, 1980), vol. 5, pp. 1–66. \n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev. \nLett. 100, 258105 (2008). \n\n[14] S. Van Damme et al., J. Phys. Chem. B 113, 3105 (2009). \n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq- \n\nuids (Academic Press, 1986). \n\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79, 569 (1995). \n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109, 9873 (2005). \n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106, 1259 \n\n[16] J. C. Rasaiah and R. M. Lynden-Bell, Philos. Trans. R. \nSoc. London, Ser. A 359, 1545 (2001). \n[17] A. P. Lyubartsev and S. Marcelja, Phys. Rev. E 65, \n(2006). 041202 (2002). \n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin. \nColloid Interface Sci. 9, 1 (2004). \n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett. \n96, 147801 (2006). \n\n[18] V. M. M. Lobo, Electrolyte Solutions, Data on Thermo- \ndynamic and Transport Properties, vol. I-II (Coimbra Ed- \nitora, Lisbon, Portugal, 1984). \n[19] G. Ciccotti, P. Turq, and F. Lantelme, Chem. Phys. 88, \n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130, 134507 333 (1984). \n(2009). [20] J.-F. Dufrˆeche, T. O. White, and J.-P. Hansen, Mol. \n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110, Phys. 101, 1741 (2003). \n10878 (2006) [21] The average contact distance between a symmetric \n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52, dumbbell and an infinite plane at β = 0. \n3730 (1995).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2648.pdf" - }, - { - "text": "-0.5 \n) \n1 \n- \nPair Fraction \nL \n\n. \nl \no \nm \n-1 \n( \n0.2 \nx \ne \nv \nf \nβ \n0.1 \n\n-1.5 \n0 1 0.5 \n\n3 \n\n2 \n\n1 \n\n0 \n\n(b) \n3 \n\n2 \n\n1 \n\n0 \n\n4 8 6 10 \nr (Å) \n\nFIG. 3: Effective pair potentials derived for MSA3 and \nBIMSA3. (a) Cation anion (dashed line: without taking the \npair into account), (b) pair cation, (c) pair anion, and (d) pair \npair. The internal potential of the pair β eVint(r) is set equal \nto βV eff ij (r) for distances less than 4 ˚A. \n\n0 0.5 \n1/2 \nc \n\n(Color online) Excess free-energy density βf ex \nv \n\nFIG. 4: \nas \na function of the square root of the concentration √c. (dia- \nmond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, \n(solid) BIMSA3, (dot) DHLL, and (cross) experiments. The \ninset gives the fraction of pairs (MSA3, BIMSA3) as a func- \ntion of √c. \n\ntrapolating the original potential at the barrier separat- \ning pairs from free ions (as shown in Fig. 3). We assume \nthat the interaction potential is averaged over the rota- \ntional degrees of freedom of the CIP and thus pairwise \nadditive. Hereafter, the quantities referring to such a \nthree-component model are written with a tilda symbol. \nThe short-range potentials involving the pair can be de- \nrived, in the infinite dilution limit, from an average of \nthe contributing ion interactions. In Fourier space, \n\n3i (k) = \nV SR \n33 (k) = \nV SR \ne \ne \nwhere \n\n(k), \nw(k/2) \n1i + V SR \nV SR \n2i \n(cid:3) \n(cid:2) \nw(k/2)2 \n22 + 2V SR \n11 + V SR \nV SR \ne \n12 \n(cid:2) \ni = 1, 2 \n(k) \n\n(2a) \n\n(2b) \n(cid:3) \ne \nw(r) is the pair probability distribution \n\n\n \n \n \n \n [html]\n
TablePatientsTable1.
Parameters.FigureP
PatientsPatientsTableTable
Table=TableTable
\n\nwe have no additional information, we consider only sym- \nmetric dumbbells. Furthermore, since analytic expres- \nsions for the RDF within BIMSA are not known, we ap- \nproximate the dumbbell as a hard sphere when comput- \ning the perturbation term (this is not necessary for the \nreference term, since an expression for the free energy \nis available). Let \nσc be the diameter of the cation (an- \nion) within the dumbbell, the diameter of the hard sphere \ne \nσc[21]. \nrepresenting this dumbbell is taken to be \nthree- \ne \ncomponent MSA3 and BIMSA3, we obtain results in \nmuch better agreement with the MC simulations, as \nshown in Fig. 4. The diameters obtained for species 1, \n2, and 3 are 3.65, 4.79, and 5.76 ˚A for MSA3 and 3.69, \n4.75 and 6.19 ˚A for BIMSA3. The free ion diameters are \nsimilar for MSA2, MSA3, and BIMSA3. The pair diam- \neter is smaller when modeled as a hard sphere (MSA3) \nthan when modeled as a dumbbell (BIMSA3). At high \n1), the MSA3 overestimates \nconcentration (about 1 mol l− \nthe free energy, because the excluded volume repulsion \nbecomes too important for the pairs to be represented as \nhard spheres. The BIMSA3 model is the closest to the \nMC simulation results. It is worth noting that even at \nthe lowest concentration considered, the fraction of pairs \n(shown in the insert of Fig. 4), although less then 5%, \nhas a non-negligible effect on the thermodynamics of the \nsystem. \n\nσ3 = 4√2 \nπ \nthe Using these two reference \nsystems, \ne \n\nw(k) (1 − δij ) + \nρ3 \nw(k/2) \ng3j \nρj \ng3i + \nρi \nρ3 \ne \ne \ne \ne \n(cid:2) \nw(k/2)]2 \ng33(k) \nρ 2 \n3 [ \ne \ne \ne \ne \ne \ngij(k) \n(k) \ne \n(cid:3) \n\nρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" - }, - { - "text": "ρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne \n\nThis procedure also provides an accurate description of \nthe structure over the whole range of concentrations. A \ndevelopment similar to the one that leads to Eq. (2) de- \nrives the average unpaired RDF from the corresponding \npaired quantities: \n\nβf ex \n\nf ex \nv − \ne \n\nv = β ρ3 ln K0, (4) \n\ne \n\nwhich is due to the change in standard chemical potential \nbetween the two component and three component mod- \nels. It should be noted that the fraction of pairs is now an \nadditional parameter in the minimization scheme, which \nserves to ensure chemical equilibrium. Within this rep- \nresentation, the pair can be modeled as a hard sphere \n(MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since \n\nρiρjgij(k) = \n+ (5) \n\n+ \n\ne e e", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" - }, - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl \nsolutions \n\nJohn Jairo Molina1,2,3,∗ Jean-Fran¸cois Dufrˆeche1,2,3,† Mathieu \nSalanne1,2, Olivier Bernard1,2, Marie Jardat1,2, and Pierre Turq1,2 \n1 UPMC-Universit´e Paris 06, UMR 7195, PECSA, F-75005 Paris, France \n2 CNRS, UMR 7195, PECSA, F-75005 Paris, France \n3 Institut de Chimie S´eparative de Marcoule (ICSM), \nUMR 5257 CEA–CNRS–Universit´e Montpellier 2, Site de Marcoule, \nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C`eze Cedex, France \n\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom \ndescriptions; providing analytical expressions of the thermodynamic and structural properties of \nthe ions consistent with the underlying explicit solvent representation. Effective potentials between \nions in solution are calculated to perform perturbation theory calculations, in order to derive the \nbest possible description in terms of charged hard spheres. Applying this method to NaCl solutions \nyields excellent agreement with the all-atom model, provided ion association is taken into account. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\nSince the pioneering works of Debye, H¨uckel, and \nOnsager, electrolyte solutions have been commonly \ndescribed by continuous solvent models, \nfor which \nthe McMillan-Mayer theory [1] provides a rigorous \nstatistical-mechanical foundation. Within that level of \ndescription, simple phenomenological models such as the \nprimitive model (PM), for which the ions are assimi- \nlated to charged hard spheres [2], can lead to explicit \nformulas for the thermodynamic and structural proper- \nties (e.g., with the help of the mean spherical approxima- \ntion (MSA) [3] or the binding MSA (BIMSA) [4]). These \nmodels are the most practical to use [5], since they allow \nfor a direct link between the experimental measurements \nand the microscopic parameters of the system. Never- \ntheless, they ignore the molecular structure of the sol- \nvent. Consequently, they cannot properly account for \nthe complex specific effects of the ions, which appear in \nnumerous biological, chemical, and physical interfacial \nphenomena [6, 7], without further developments. \n\nmolecular dynamics (MD) results. Different approxima- \ntions of the PM are employed for the case of NaCl elec- \ntrolyte solutions: a two component model (MSA2), that \nonly takes free ions into account, and two different three \ncomponent models (MSA3 and BIMSA3), which include \na third species (the contact ion pair). As we proceed \nto show, LPT allows us to select the best simple model \nwhich accurately accounts for the thermodynamics and \nthe physical-chemistry of the system. \n\nThe first stage consists in calculating the McMillan- \nMayer effective ion-ion interaction potentials V eff \nij (r), by \ninverting the radial distribution functions (RDF) gij(r) \nobtained by MD. The simulations were carried out on \na box of 2000 water molecules and 48 NaCl pairs us- \ning the same interaction potentials as in reference [16]. \n1. \nThis setup corresponds to a concentration of 0.64 mol l− \nNPT ensemble sampling at standard pressure and tem- \nperature was enforced, with a time step of 1 fs and a \npressure bath coupling constant of 1 ps. An equilibration \nrun of 0.25 ns was followed by a production run of 0.6 ns \nfor five different initial configurations. The averages of \nthe resulting RDF were then used for the potential inver- \nsion via the HNC closure [15]. These effective potentials \nare assumed to be concentration independent and will be \nused for simulations at all concentrations. \n\n] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2648.pdf" - }, - { - "text": "5 \n) \nÅ \n4 \n( \nσ \n3 \n\n0 8 \nr (Å) \n\nFIG. 1: Effective McMillan-Mayer short-range pair potentials \nextracted from explicit solvent simulations using the HNC \nclosure. (a) Cation anion, (b) cation cation, (c) anion anion, \n(d) cation anion RDF obtained from explicit solvent MD and \nimplicit solvent MC simulations. \nFIG. 2: \n(Color online) (a) Osmotic coefficient Φ in the \nMcMillan-Mayer frame of reference. (diamond) MC simula- \ntions, (dot dashed) MSA2, (dot) Debye H¨uckel Limiting law \n(DHLL), (cross) experiments (Ref. [18] with the McMillan- \nMayer to Lewis Randall conversion). (b) Minimization diam- \neters. (dot dashed) MSA2 and (diamond) MSA-fit. \n\npute all ion thermodynamic properties through implicit \nsolvent MC simulations. \n\nThe second stage of our coarse-graining procedure con- \nsists in applying LPT, in order to deduce the best ana- \nlytical model of electrolyte solutions which reproduces \nthis molecular description. The principle of LPT is to \ndescribe the properties of a given system in terms of \nthose of a well known reference system, with the differ- \nence between them treated as a perturbation in the ref- \nerence potential. Assuming pairwise additive potentials, \nVij = V (0) \nij + ∆Vij , a first-order truncated expression for \nthe free energy density of the system βfv is obtained, \n\n1 \n2 \nXi,j \n\nWe first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. \n\nwhich depends only on the free-energy density f (0) \nand \nv \nRDF g(0) of the reference fluid, with β = (kBT )− \n1 and \nρi the concentration of species i. The Gibbs-Bogoliubov \ninequality [15] ensures that the right-hand side of Eq. (1) \nis actually a strict upper bound. Once a reference system \nhas been chosen, the expression on the right-hand side of \nEq. (1) must be minimized with respect to the parameters \ndefining the reference. This procedure yields the best \nfirst-order approximation to the free energy of the system \nunder consideration. \n\nFor a system of charged particles in solution, the nat- \nural reference is the PM, defined in terms of the charge \nand diameter (σi) of each species. In this case, the per- \nturbing potentials are just the short-range effective po- \ntentials computed above (∆Vij = V SR \nij ). We use the \nMSA [3] solution to the PM, since it provides analyti- \ncal expressions for both the free energy and the RDF. \nThe perturbation term is evaluated using an exponential \napproximation to the RDF obtained within the MSA, \ng(r) = exp [gMSA(r) − 1], which removes any unphysical \nnegative regions and improves the comparison with HNC \ncalculations.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "Finally, there is a third essential element that determines the \naccuracy of the inference: precision control. In predictive cod- \ning, the influence of prediction errors on inference is weighted \nby their precision, i.e. inverse variance (pink triangles in Fig. 1). \nThis weighting would ensure that very reliable sensations have \nmore impact on inference than unreliable sensations. However, \nprecision (like all other variables) needs to be estimated, but this \nmight be incorrect. An incorrect setting of precisions has been \nassociated with various psychopathological conditions, such as \npsychosis (Adams et al. 2013), eating disorders (Barca and Pezzulo \n2020), panic disorders (Maisto et al. 2021), symptom perception \n(Pezzulo et al. 2019), depression (Barrett et al. 2016), and many \nothers (Khalsa et al. 2018, Paulus et al. 2019). Intuitively, assign- \ning excessively high weight to noisy sensations yields an incorrect These simple examples of Bayesian inference illustrate two \nthings. First, sensory observations that are unpredictable given", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" - }, - { - "text": "10 \n\nout first deriving the normal state self-energy microscop- \nically (this is what we will do in the next section). The \nresults of the calculations for the modified MFLI model \nare presented in Figs. 15 and 16. We clearly see that the \nbehavior is now different and ∆WK < 0 for all Γ. This \nis the same behavior as we previously found in BCSI \nand EB models. So we argue that the ‘unconventional’ \nbehavior exhibited by the original MFLI model is most \nlikely the manifestation of a particular modeling incon- \nsistency. Still, Ref. 30 made a valid point that the fact \nthat quasiparticles behave more close to free fermions in \na SCS than in a NS, and this effect tends to reverse the \nsigns of ∆WK and of the kinetic energy 43. It just hap- \npens that in a modified MFLI model the optical integral \nis still larger in the NS. \n\nWe now turn to a more microscopic model- the CB \nmodel. The model describes fermions interacting by ex- \nchanging soft, overdamped collective bosons in a partic- \nular, near-critical, spin or charge channel31,44,45. This \ninteraction is responsible for the normal state self-energy \nand also gives rise to a superconductivity. A peculiar \nfeature of the CB model is that the propagator of a col- \nlective boson changes below Tc because this boson is not \nan independent degree of freedom (as in EB model) but \nis made out of low-energy fermions which are affected by \nsuperconductivity32. \n\n0 \n\nFIG. 15: Top – σ(ω) in the NS and the SCS in the ‘corrected’ \nMFLI model with the feedback from SC on the quasiparticle \n√−ω2+∆2 . In the SCS σ \ndamping: iΓ term transforms into \nnow begins at Ω = 2∆. The parameters are same as in Fig. \n10. Bottom – the behavior of Kubo sum with Γ. Observe \nthat W (ωc) in the NS is larger than in the SCS. \n\nΓ \n\n) \n10 \nc \nω \n( \n\nS \nN \nW \n− \n) \nc \n0 ω \n( \n\nC \nS \nW \n∆ W \nK \n\n−10 \n0.2 \n0.4 \nω \n in eV \nc \n0.6 0.8 \n\nFIG. 16: Evolution of the difference of the optical integrals \nbetween the SCS and the NS with the upper cut-off ωc for \nthe “corrected” MFLI model. Now ∆W (ωc) is negative above \nsome frequency. Parameters are same as in the Fig 15. \n\nThe most relevant point for our discussion is that this \nmodel contains the physics which we identified above as \na source of a potential sign change of ∆WK . Namely, \nat strong coupling the fermionic self-energy in the NS \nis large because there exists strong scattering between \nlow-energy fermions mediated by low-energy collective \nbosons. In the SCS, the density of low-energy fermions \ndrops and a continuum collective excitations becomes \ngaped. Both effects reduce fermionic damping and lead \nto the increase of WK in a SCS. If this increase exceeds a \nconventional loss of WK due to a gap opening, the total \n∆WK may become positive. \n\nThe CB model has been applied numerous times to the \ncuprates, most often under the assumption that near- \ncritical collective excitations are spin fluctuations with \nmomenta near Q = (π, π). This version of a CB bo- \nson is commonly known as a spin-fermion model. This \nmodel yields dx2 \ny2 superconductivity and explains in a \nquantitative way a number of measured electronic fea- \ntures of the cuprates, in particular the near-absence of \nthe quasiparticle peak in the NS of optimally doped and \nunderdoped cuprates39 and the peak-dip-hump structure \nin the ARPES profile in the SCS31,32,46,47. In our analy- \nsis we assume that a CB is a spin fluctuation. \n\n− \n\nmodel, where WK is larger in the NS for all Γ (see Fig. \nIn other words, the original MFLI model does not \n4). \nhave the BCSI theory as its limiting case. \n\nWe modified the MFLI model is a minimal way by \nΓ \nchanging the damping term in a SCS to \nω2+∆2 to be \nconsistent with BCSI model. We still use Eq. (18) for \nthe MFL term simply because this term was introduced \nin the NS on phenomenological grounds and there is no \nway to guess how it gets modified in the SCS state with- \n\n√ \n−", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0764.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210582_en.pdf", - "query": "In the health regulation regarding coronavirus, what is considered a \"device\" ?", - "target_page": 3, - "target_passage": "means an in vitro diagnostic medical device within the meaning given in regulation 2(1) of the Medical Devices Regulations 2002", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n\n \n \n \n \n [html]\n
Therapeutic and the participants with to expression
2A —( 1 ) Where the consuctive exception applies, any requirement in any of the regulations specified in paragraph ( 3 ) for action to be takes within a specified period of time or by a certain day is to be read instead as a requirement for such ac
( 2 ) The coronavimus exception apples where it is not reasonably practicable for a person to meet a requirement referred to in paragraph ( 1 ) for a reason relating to the incidence or transmission of coronavirus.
( 3 ) The following regulations are specified for the purposes of paragraphs ( 1 ) and ( 2 )—
( a ) regulation 15 ( 1 ) and ( 4 ) ( needs assessments which are not completed );
( b ) regulation 16 ( 2 ), ( 3 ) and ( 4 ) ( transfer of a kept EHC plan );
( c ) regulation I7 ( 1 ) and ( 2 ) ( restriction on disclosure of EHC plans );
( d ) regulation 19 ( requirement to consider mediation );
( e ) regulation 20 ( 1 ) and ( 2 ) ( where the appropriate person does not wish to or fails to pursue mediation );
( f ) regulation 21 ( mediation );
( g ) regulation 24 ( 1 ) and ( 3 ) ( mediation certificate under section 55 ( 5 ) of the Act );
( h ) regulation 27 ( 3 ) ( steps to be taken by a home authority );
( i ) regulation 29 ( 2 ) and ( 6 ) ( compliance with the orders of the First - tier Tribunal ); and
( j ) regulation 30 ( 3 ) and ( 6 ) ( unopposed appeals ).*.
21. In regulation 4 ( determination whether or not special educational provision may be necessary ), after paragraph ( 2 ) insert —
“( 3 ) The local authority need not comply with the time limit referred to in paragraph ( 1 ) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.”
22. In regulation 5 ( 4 ) ( decision whether or not to conduct a detained person ’ s EHC needs assessment )—
( a ) at the end of sub - paragraph ( b ) omit “ or ”; and
( b ) at the end of sub - paragraph ( c ) insert —
“, or
( d ) of a reason relating to the incidence or transmission of coronavirus *.
", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess \n\neducational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. \n\n**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "The Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984(**a**). \n\nPART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. \n\n**Interpretation and introduction of Schedules 1 to 4**\n\n**2.**—(1) In these Regulations— \n\n“category 1 arrival” means person who has arrived in England from a category 1 country or \nterritory, and has not been in a category 2 country or territory or a category 3 country or \nterritory in the period beginning with the 10th day before the date of their arrival in England; \n\n“category 1 country or territory” means a country or territory, or part of a country or territory, \nspecified in Schedule 1(**b**); \n\n“category 2 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 2(**c**); \n\n“category 3 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 3(**d**); \n\n“child” means a person under the age of 18; \n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act \n1971(**e**); \n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be \ncaused by coronavirus); \n\n“designated port” means a port designated for the purposes of Schedule 11; \n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation \n2(1) of the Medical Devices Regulations 2002(**f**); \n\n“disability” has the meaning given in the Equality Act 2010(**g**) (see section 6 of, and Schedule \n1 to, that Act); \n\n“immigration officer” means a person appointed by the Secretary of State as an immigration \nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971(**h**); \n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11; \n\n“operator” except in regulation 18, means an operator of a relevant service; \n\n(**a**) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14). \n(**b**) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories. \n(**c**) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories. \n(**d**) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories. \n(**e**) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland \nare collectively referred to in that Act as “the common travel area”. \n\n(**f**) S.I. 2002/618. \n(**g**) 2010 c. 15. \n(**h**) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I. \n1993/1813.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "United Kingdom and, if so— \n(i) the location at which they will depart from in the United Kingdom, \n(ii) their final destination country or territory, \n(iii) the operator they are travelling with or through which their booking was made for \n\ntheir onward journey, \n\n(iv) the seat number for their onward journey, \n(v) the flight number or vessel name for their onward journey, \n(vi) the coach number for their onward journey. \n\n**3.**Where the passenger is travelling with a child for whom they have responsibility— \n\n(a) the full name and date of birth of that child; \n(b) the relationship of the passenger to that child. \n\n**4.**Where the passenger is a person required by regulation 9(2) to self-isolate, and intends to \n\nundertake a test in accordance with Schedule 10 (optional tests)— \n\n(a) the name of the test provider; \n(b) the test reference number provided to them by the test provider in accordance with \nparagraph 4(d) of that Schedule. \n\n**5.**Where regulation 6 (requirement to book and undertake tests) requires a testing package— \n\n(a) the name of the test provider; \n(b) the test reference number provided to them by the test provider in accordance with \nparagraph 10(5) of Schedule 8. \n\nSCHEDULE 7 Regulation 4 \n\nTesting before arrival in England \n\n**Compliant tests**\n\n**1.**A test complies with this paragraph if— \n\n(a) it is a test for the detection of coronavirus undertaken using a device which the \n\nmanufacturer states has—", - "page_start": 55, - "page_end": 55, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**Day 2 tests: general test requirements**\n\n**6.**—(1) For the purposes of regulation 6(12)(a), a day 2 test complies with this paragraph \n\nwhere— \n\n(a) it is a test provided by a public provider; or \n(b) it is a test provided by a private provider— \n\n(i) in respect of— \n\n(aa) a non-Schedule 11 passenger, on or after 1st March 2021; \n(bb) a Schedule 11 passenger, on 1st or 2nd March 2021, \n\n(ii) where the test complies with sub-paragraph (2), and \n(iii) where the private provider complies with paragraph 7. \n\n(2) A test complies with this sub-paragraph where— \n\n(a) it is a semi-quantitative test for the detection of coronavirus which— \n\n(i) targets a minimum of two distinguishable SARS-CoV-2 genes other than the S gene \nand performance reference controls, \n\n(ii) includes routine in silico assurance against every variant of concern, and \n(iii) produces a test solution that provides extracted nucleic acid that is suitable for whole \n\ngenome sequencing using a specified method; \n\n(b) it is, in relation to a Schedule 11 passenger, a test that can be self-administered; \n(c) the manufacturer of any device used for the purposes of the test states that the device— \n\n(i) uses an established molecular detection method, \n(ii) has a specificity and a sensitivity greater than 99% (with a 95% two-sided \nconfidence interval entirely above 97%), \n\n(iii) has a limit of detection of less than or equal to 1000 SARS-CoV-2 copies per \n\nmillilitre, and \n\n(iv) is suitable for identifying every variant of concern; and \n\n(d) any device used for the purposes of the test— \n\n(i) can be put into service in accordance with Part 4 of the Medical Devices Regulations \n\n2002, other than solely by virtue of regulation 39(2) of those Regulations, and \n(ii) has been validated no more than 18 months before the test is administered or \n\nprovided to P. \n\n(3) For the purposes of sub-paragraph (2)— \n\n(a) “specified method” means a targeted sequence method specific to SARS-CoV-2 or an \n\nequivalent— \n(i) amplicon method, or \n(ii) sequence bait capture method; \n\n(b) “validated”, in relation to a device, has the meaning given by paragraph 2(2) of Schedule \n\n10; \n\n(c) “variant of concern” means a variant of SARS-CoV-2 identified in a designation made by \nthe Secretary of State for the purposes of this paragraph and published in a manner as \nappears to the Secretary of State to be appropriate.", - "page_start": 60, - "page_end": 60, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. \n\n**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. \n\nSCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**33.**—(1) Any of the following— \n(a) a person (“P”) who— \n\n(i) before travelling to the United Kingdom has made arrangements with a provider in \nthe United Kingdom to receive healthcare (or, where P is a child, on whose behalf \nsuch arrangements have been made), \n\n(ii) is in possession of written confirmation of the arrangements from the provider, \n(iii) has travelled to the United Kingdom to receive that healthcare, and \n(iv) is attending a place to receive that healthcare or is travelling directly between that \nplace and the place where they are self-isolating; \n\n(b) a person who— \n\n(i) is accompanying P for the purpose of providing necessary care or support to P in the \n\ncircumstances referred to in sub-paragraph (1)(a)(iv), or \n\n(ii) is travelling, for the purpose of so accompanying P, directly between the place where \nthey are self-isolating and either of the places referred to in sub-paragraph (1)(a)(iv), \n\nwhere that person has travelled to the United Kingdom for that purpose and is in \npossession of the confirmation referred to in sub-paragraph (1)(a)(ii) or a copy of it; \n(c) an accompanying child who is accompanying P or, where P is a child, is accompanying a \n\nperson referred to in sub-paragraph (1)(b); \n\n(d) a live donor who is attending a place for the purpose referred to in the definition of “live \ndonor” or is travelling directly between that place and the place where they are self- \nisolating. \n\n(2) For the purposes of this paragraph— \n\n(a) “accompanying child”, in relation to P, means a child who has arrived in England with P \nand for whom P has responsibility, or where P is a child, a child who has arrived in \nEngland with the person referred to in sub-paragraph (1)(b) and for whom that person has \nresponsibility; \n\n(b) “healthcare” means all forms of healthcare provided for individuals, whether relating to \n\nmental or physical health, including healthcare in connection with giving birth; \n\n(c) “live donor” means a person who— \n\n(i) has travelled to the United Kingdom for the purpose of donation of material which \nconsists of or includes their human cells pursuant to arrangements made with a \nprovider in the United Kingdom before travelling to the United Kingdom, and which \nare to be used by the provider for the purpose of providing healthcare, and \n(ii) is in possession of written confirmation of the arrangements from the provider; \n\n(d) “provider” means a provider of healthcare; \n(e) references to a place where a person is self-isolating are to a place where they are \nrequired to self-isolate, or permitted to be at, by virtue of regulation 9. \n\n**34.**—(1) A person who has travelled to the United Kingdom for the purpose of transporting \nmaterial which consists of, or includes, human cells or blood and which is to be used for the \nprovision of healthcare by a provider. \n\n(2) For the purposes of sub-paragraph (1)— \n(a) “blood” includes blood components; \n(b) “healthcare” and “provider” have the meanings given in paragraph 33(2). \n\n**35.**A person who is an “inspector” within the meaning given in regulation 8(1) of the Human \nMedicines Regulations 2012(**a**), or who has been appointed as an inspector under regulation 33 of", - "page_start": 43, - "page_end": 43, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(3) For the purposes of sub-paragraph (1)(d) and (e), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where the person who is the \noperator of the laboratory complies with the requirements of regulation 6 of the Health Protection \n(Coronavirus, Testing Requirements and Standards) (England) Regulations 2020 as if— \n\n(a) a reference to an applicable test were a reference to a day 2 test; \n(b) a reference to a test provider were a reference to a private provider. \n\n**Day 8 tests: general test requirements**\n\n**8.**—(1) For the purposes of regulation 6(12)(b), a day 8 test complies with this paragraph \n\nwhere— \n\n(a) it is a test provided by a public provider; or \n(b) it is a test provided by a private provider— \n\n(i) in respect of— \n\n(aa) a non-Schedule 11 passenger, on or after 1st March 2021; \n(bb) a Schedule 11 passenger, on 1st or 2nd March 2021, \n\n(ii) where the test complies with sub-paragraph (2), and \n(iii) where the private provider complies with paragraph 9. \n\n(2) A test complies with this sub-paragraph where— \n\n(a) it is a semi-quantitative test for the detection of coronavirus which targets a minimum of \ntwo distinguishable SARS-CoV-2 genes other than the S gene and performance reference \ncontrols; \n\n(b) it is, in relation to a Schedule 11 passenger— \n\n(i) a test which requires laboratory processing, and \n(ii) a test which can be self-administered; \n\n(c) the manufacturer of any device used for the purposes of the test states that the device— \n\n(i) uses an extracted molecular method, \n(ii) has a specificity and a sensitivity greater than 95% (with a 95% two-sided \nconfidence interval entirely above 90%), and \n\n(iii) has a limit of detection of less than or equal to 1000 SARS-CoV-2 copies per \n\nmillilitre; and \n\n(d) any device used for the purposes of the test— \n\n(i) can be put into service in accordance with Part 4 of the Medical Devices Regulations \n\n2002, other than solely by virtue of regulation 39(2) of those Regulations, and \n(ii) has been validated no more than 18 months before the test is administered or \n\nprovided to P. \n\n(3) For the purposes of sub-paragraph (2) “validated”, in relation to a device, has the meaning \n\ngiven by paragraph 2(2) of Schedule 10. \n\n**Day 8 tests: private provider requirements**\n\n**9.**—(1) For the purposes of paragraph 8(1)(b)(iii), a private provider complies with this \n\nparagraph where— \n\n(a) they comply with the requirements of paragraph 3(1)(a) and (e) to (h) of Schedule 10 as if \nany reference in those provisions to an appropriate test were a reference to a day 8 test; \n(b) if the provider is a laboratory that conducts diagnostic test evaluation for testing in \naccordance with this Schedule, they have made a declaration to the Department of Health \nand Social Care that they meet the minimum standards for private sector-provided testing \nat https://support-covid-19-testing.dhsc.gov.uk/InternationalTesting; \n\n(c) they have provided the Department of Health and Social Care with a list of all \norganisations that they work with (whether by sub-contract or otherwise) to carry out the \ntesting service or to carry out genomic sequencing, indicating the nature of the service \nthat each organisation is providing and kept that list updated as appropriate; \n\n(d) in relation to a test which requires laboratory processing— \n\n(i) the person responsible for the taking of samples meets the relevant requirements for \naccreditation to ISO standard 15189 or ISO/IEC standard 17025 in respect of the \ntaking of samples, and \n\n(ii) the laboratory used by the test provider for the processing of samples meets the \nrelevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard \n17025 in respect of the processing of samples; \n\n(e) in relation to a point of care test, they meet the relevant requirements for accreditation to \nISO Standard 15189 and ISO standard 22870; \n\n(f)", - "page_start": 62, - "page_end": 62, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210582_en.pdf", - "query": "Regarding the regulation of Enforcement of requirement to self-isolate concerning travel and coronavirus, who are considered an \"authorised persons\" ?", - "target_page": 19, - "target_passage": "For the purposes of this regulation, “authorised person” means— (a) a constable; (b) for the purposes of paragraphs (2) and (3) only, an immigration officer; or (c) a person designated by the Secretary of State for the purposes of this regulation.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "(4) In this regulation— \n\n“authorised person” means— \n(a) a constable, \n(b) the Civil Aviation Authority, \n(c) the Secretary of State, or \n(d) a person authorised by the Civil Aviation Authority or the Secretary of State under the \nAir Navigation Order 2016(**a**); \n\n\n \n \n \n \n [html]“ operator ” has the meaning given in article 4 of the Air Navigation Order 2016 ;“ pilot in command ” und “ private aircraff ” have the meanings given in the Air Navigation Order 2016 ( see Schedule 1 to that Order );“ relevant transport service ”, in relation to an operator, means a transport service provided by or on behalf of that operator ;\n
“ transport service ” means —( a ) a relevant service,
( b ) a shuttle service,( c ) a service ( other than a relevant service ) which —
( i ) is carrying passengers travelling to England from outside the common travel area ( whether for payment or valuable consideration or otherwise ), and( ii ) is provided by means of an aircraft ( other than a private aircraft ), or
( d ) a flight which —( i ) is carrying passengers travelling to England from outside the common travel area ( whether for pasment or valuable consideration or otherwise ), and
( ii ) is provided by means of a private aircraft.PART 5
Offences, proceedings and informationOffences and penalties
I9 —( 1 ) A person (“ P ”) commits an offence where —( a ) without reasonable excuse P contravenes a requirement in regulation 3 ( requirement to provide information );
( b ) without reasonable excuse P contraveness a requirement in regulation 4 ( requirement to possess notification of negative test result );( c ) without reasonable excuse P contravenes a requirement in regulation 6 ( requirement to book and undertake tests );
( d ) without reasonable excuse P contravenes a requirement in regulation 7 ( requirement to undertake workforce tests );( e ) without reasonable excuse P contravenes a requirement in regulation 8 ( requirement for offsbore installation workers to take tests );
( f ) P contravenes a requirement in regulation 9 ( requirement to self - isolate );( g ) without reasonable excuse P contraveness a requirement in or imposed under regulation 11 ( enforcement of requirement to self - isolate ) apart from paragraph ( 2 ) of that regulation ;
", - "page_start": 22, - "page_end": 22, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**16.**—(1) Any person who the relevant Department has certified as meeting the description in \n\nsub-paragraph (a), (b) or (c)— \n\n(a) a Crown servant or government contractor who is required to undertake essential policing \nor essential government work in the United Kingdom within the period during which they \nwould, but for this paragraph, have had to self-isolate in accordance with regulation 9; \n(b) a person returning from conducting essential state business outside of the United \n\nKingdom; \n\n(c) a person returning to the United Kingdom where this is necessary to facilitate the \nfunctioning of a diplomatic mission or consular post of Her Majesty or of a military or \nother official posting on behalf of Her Majesty. \n\n(2) For the purposes of sub-paragraph (1)— \n\n(a) “consular post” means any consulate-general, consulate, vice-consulate or consular \n\nagency; \n\n(b) “Crown servant” has the meaning given in section 12(1)(a) to (e) of the Official Secrets \nAct 1989(**a**); \n\n(c) “essential government work” means work which has been designated as such by the \nrelevant Department, and includes, in particular, work related to national security, the \nwork of the National Crime Agency in pursuance of its statutory functions, and work \nrelated to immigration, the coronavirus disease or any other crisis response, but does not \ninclude work of the description in paragraph 2 of this Schedule (essential work related to \nthe United Kingdom border); \n\n(d) “essential policing” means policing which has been designated as such on behalf of the \n\nrelevant chief officer or chief constable; \n\n(e) “essential state business” means activity which has been designated as essential to the \nUnited Kingdom or Her Majesty’s Government by the relevant Department, and includes, \nin particular, bilateral or multilateral discussions with another state or international \norganisation and visits to another state on behalf of the United Kingdom or Her Majesty’s \nGovernment; \n\n(f) “government contractor” has the meaning given in section 12(2) of the Official Secrets \n\nAct 1989. \n\n**17.**—(1) A person returning from undertaking essential or emergency work outside of the \nUnited Kingdom, which has been certified by the relevant Department as necessary to facilitate \nessential government work or essential state business. \n\n(2) For the purposes of sub-paragraph (1) “essential government work” and “essential state \n\nbusiness” have the same meaning as in paragraph 16. \n\n**18.**A person designated by the relevant Minister under section 5(3) of the Repatriation of \n\nPrisoners Act 1984(**b**). \n\n**19.**A person responsible for escorting a person sought for extradition pursuant to a warrant \nissued under Part 3 of the Extradition Act 2003(**c**) or sought for extradition pursuant to any other \nextradition arrangements. \n\n**20.**A representative of any territory travelling to the United Kingdom in order to take into \ncustody a person whose surrender has been ordered pursuant to any provision of the Extradition \nAct 2003. \n\n\n \n \n \n \n [html]\n
( b )1984 c. 47.
( c )2003 c. 41.
\n\n39", - "page_start": 38, - "page_end": 38, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(f) \n\nin paragraph 4, 5, 6, 7, 8, 9, 13(2)(c)(ii), 14, 18, 19, 20 or 27 of Schedule 4 and is— \n(i) ordinarily resident in the United Kingdom, P is not required to comply with this \n\nregulation, \n\n(ii) not ordinarily resident in the United Kingdom, P is not required to comply with this \nregulation while undertaking the work or activity described in the relevant paragraph \nof that Schedule; \n\n(g) in paragraph 10 of Schedule 4, is engaged in work relating to the carriage of passengers \n\nby way of the tunnel system and is— \n(i) ordinarily resident in the United Kingdom, P is not required to comply with this \n\nregulation, \n\n(ii) not ordinarily resident in the United Kingdom, P is not required to comply with this \nregulation while undertaking that work; \n\n(h) in paragraph 13(2)(c)(i) of Schedule 4 (driver of a goods vehicle) and is ordinarily \nresident in the United Kingdom, P is only required to comply with this regulation while \nundertaking the work described in that paragraph; \n\n(i) \n\nin paragraph 21, 22, 23, 24, 25, 26, 28, 29, 31, 32, 34, 35, 36, 37, 38, 39, 40, 41 or 45 of \nSchedule 4, P is not required to comply with this regulation while undertaking the work \nor activity described in the relevant paragraph of that Schedule; \n\n(j) \n\nin any other paragraph of Schedule 4, including paragraph 10 in so far as it relates to \nwork other than the carriage of passengers by way of the tunnel system, P is not required \nto comply with this regulation. \n\n(16) P ceases to be required to comply with this regulation, where P— \n\n(a) has undertaken a test in accordance with Schedule 10; and \n(b) is notified in accordance with paragraph 5(2) of that Schedule that the result of that test is \nnegative, \n\nfrom the time P is so notified. \n\n(17) The full or partial disapplication of the requirement to self-isolate under this regulation that \n\nis provided for in paragraphs (15) and (16) does not apply to person who is both— \n\n(a) described in paragraph (1)(a)(iii) of this regulation; and \n(b) described in paragraph 1(1)(a) to (h) or (k) of Schedule 4. \n\n**Further requirements on arrivals from category 3 countries or territories**\n\n**10.**—(1) This regulation applies to a person (“P”) where P is a Schedule 11 passenger. \n(2) P must remain in isolation from others in accordance with, and otherwise comply with the \n\nrequirements in, Schedule 11. \n\n(3) The address specified by P in the Passenger Locator Form pursuant to paragraph 2(a) of \nSchedule 6 must be the designated accommodation which is part of the managed self-isolation \npackage booked by or on behalf of P. \n\nPART 3 \n\nEnforcement \n\n**Enforcement of requirement to self-isolate**\n\n**11.**—(1) Where an authorised person has reasonable grounds to believe that a person (“P”) has \nleft, or is outside of, the place where P is self-isolating in contravention of regulation 9, Schedule \n8 or Schedule 11, the authorised person may— \n\n(a) direct P to return to the place where P is self-isolating; \n\n(b) where the authorised person is a constable, remove P to the place where P is self- \nisolating; \n\n(c) where the authorised person is a constable and it is not practicable or appropriate in the \ncircumstances to take the action in sub-paragraph (a) or (b), remove P to accommodation \nfacilitated by the Secretary of State for the purposes of P’s self-isolation. \n\n(2) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 \npassenger, an authorised person may do any of the following for the purpose of ensuring that P \ncomplies with the requirements in Schedule 11— \n\n(a) give a direction to P, including a direction— \n\n(i) that P remain in a particular area of a port to await transportation to accommodation \n\ndesignated for the purposes of Schedule 11, \n\n(ii) that P move to a particular place to board transportation designated for the purposes \n\nof Schedule 11,", - "page_start": 16, - "page_end": 16, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "designated for the purposes of Schedule 11, \n\n(ii) that P move to a particular place to board transportation designated for the purposes \n\nof Schedule 11, \n\n(iii) that P board transportation designated for the purposes of Schedule 11 to travel to \naccommodation designated for the purposes of Schedule 11, \n\n(iv) that P remain in the place where P is self-isolating; \n\n(b) remove P to accommodation designated for the purposes of Schedule 11. \n\n(3) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 \npassenger and that P has committed an offence under regulation 19(1)(a) or (6), the authorised \nperson may— \n\n(a) require P to produce their passport or travel document for examination; \n(b) detain P for up to three hours; \n(c) search P and any baggage belonging to P or under P’s control, or any vehicle in which P \nhas travelled, for evidence, other than items subject to legal privilege, that relates to the \npossible commission of an offence under regulation 19(6); and \n\n(d) seize and retain any document or article recovered by a search under sub-paragraph (c). \n\n(4) Paragraph (3) does not confer a power— \n\n(a) to detain or search an unaccompanied child; or \n(b) to conduct an intimate search. \n\n(5) Any search under paragraph (3) must be conducted by an authorised person of the same \n\ngender as P. \n\n(6) Paragraphs (1)(b) and (c), (2) and (3) do not apply where P is a person described in \nparagraph 1 of Schedule 4 (diplomats, members of international organisations etc). \n\n(7) An authorised person exercising the power in paragraph (1)(b) or (c), (2)(b) or (3) may use \n\nreasonable force, if necessary, in the exercise of the power. \n\n(8) Where P is a child, and has left or is outside of, the place where they are self-isolating and is \naccompanied by an individual who has responsibility for them— \n\n(a) an authorised person may direct that individual to take P to the place where P is self- \n\nisolating; and \n\n(b) that individual must, so far as reasonably practicable, ensure that P complies with any \n\ndirection given by an authorised person to P. \n\n(9) Where P is a child, and an authorised person has reasonable grounds to believe that P is \nrepeatedly failing to comply with regulation 9 or Schedule 11, the authorised person may direct \nany individual who has responsibility for P to ensure, so far as reasonably practicable, that P so \ncomplies. \n\n(10) An authorised person may only exercise a power in paragraph (1), (2), (8) or (9) if the \nauthorised person considers that it is a necessary and proportionate means of ensuring compliance \nwith regulation 9 or Schedule 11.", - "page_start": 16, - "page_end": 16, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. \n\n**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. \n\nSCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**Prosecutions**\n\n**21.**—(1) Proceedings for an offence under these Regulations, apart from an operator offence, \nmay be brought by the Crown Prosecution Service and any person designated by the Secretary of \nState. \n\n(2) Proceedings for an operator offence may be brought by an authorised person. \n(3) In this regulation— \n\n(a) “authorised person” means— \n\n(i) in relation to passengers arriving by sea, the Secretary of State for Transport, \n(ii) in relation to passengers arriving by air, the Civil Aviation Authority, \n(iii) in relation to passenger arriving by rail, the Office of Rail and Road; \n\n(b) “operator offence” means an offence— \n\n(i) under regulation 19(7), \n(ii) under regulation 19(13), \n(iii) under regulation 19(14) (obstruction) in relation to a function relating to an offence \nunder regulation 19(7), or \n\n(iv) under paragraph 2(1) or 3(1) of Schedule 13. \n\n**Power to use and disclose information**\n\n**22.**—(1) This regulation applies to a person (“A”) who holds information described in paragraph \n(2) (“relevant information”), including where A holds that information as a result of disclosure \nmade in accordance with paragraph (4). \n\n(2) The information referred to in paragraph (1) is— \n\n(a) information provided on the Passenger Locator Form; \n(b) DA information received for a purpose described in paragraph (4)(a)(i); \n(c) the result of any test undertaken in accordance with Schedule 10 and any information A \n\nobtained under paragraph 4(b) or (c) of that Schedule; \n\n(d) where a person (“P”) is required to self-isolate under these Regulations— \n\n(i) the details of any such period of self-isolation (including the start and end dates of \n\nthat period and the reason it was imposed), \n\n(ii) a copy of any notice given to P which contains information about the requirement to \nself-isolate, \n\n(iii) information generated where P books, or attempts to book, accommodation as part of \n\na managed self-isolation package, \n\n(iv) the details of any location in which P undertakes any period of managed self- \nisolation (including the name and address of the location), \n\n(v) information relating to P obtained by A in the course of providing accommodation to \nB pursuant to a managed self-isolation package (including P’s room number, the \npersonal details of any of P’s co-habitants, and the details of any absence of P, \nauthorised or otherwise, from the place where P is self-isolating), \n\n(vi) information relating to P obtained by A in the course of providing transport to a \nlocation at which P undertakes, or is due to undertake, any period of managed self- \nisolation, \n\n(vii) information relating to P obtained by A in the course of providing any service in \n\nconnection with a managed self-isolation package;", - "page_start": 27, - "page_end": 27, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "United Kingdom and, if so— \n(i) the location at which they will depart from in the United Kingdom, \n(ii) their final destination country or territory, \n(iii) the operator they are travelling with or through which their booking was made for \n\ntheir onward journey, \n\n(iv) the seat number for their onward journey, \n(v) the flight number or vessel name for their onward journey, \n(vi) the coach number for their onward journey. \n\n**3.**Where the passenger is travelling with a child for whom they have responsibility— \n\n(a) the full name and date of birth of that child; \n(b) the relationship of the passenger to that child. \n\n**4.**Where the passenger is a person required by regulation 9(2) to self-isolate, and intends to \n\nundertake a test in accordance with Schedule 10 (optional tests)— \n\n(a) the name of the test provider; \n(b) the test reference number provided to them by the test provider in accordance with \nparagraph 4(d) of that Schedule. \n\n**5.**Where regulation 6 (requirement to book and undertake tests) requires a testing package— \n\n(a) the name of the test provider; \n(b) the test reference number provided to them by the test provider in accordance with \nparagraph 10(5) of Schedule 8. \n\nSCHEDULE 7 Regulation 4 \n\nTesting before arrival in England \n\n**Compliant tests**\n\n**1.**A test complies with this paragraph if— \n\n(a) it is a test for the detection of coronavirus undertaken using a device which the \n\nmanufacturer states has—", - "page_start": 55, - "page_end": 55, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**5.**A designation by the Secretary of State of a person as a designated officer under regulation \n7(2) of the 2020 Regulations has effect as a designation of that person as a designated officer \nunder regulation 20(9)(c)(i) of these Regulation. \n\n**6.**A designation by the Secretary of State of a person as an authorised person under regulation \n7(10)(c) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder regulation 20(9)(a)(iii) of these Regulations. \n\n**7.**A designation by the Secretary of State under regulation 8 of the 2020 Regulations as a person \nwho may bring proceedings for an offence has effect as a designation under regulation 21(1) of \nthese Regulations. \n\n**8.**A confirmation from the Foreign, Commonwealth and Development Office or other UK \nGovernment Department that a person is not required to comply with Schedule B1A to the 2020 \nRegulations is treated as confirmation that a person is not required to comply with Schedule 11 of \nthese Regulations where the person arrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**9.**A booking of a managed self-isolation package made before 4.00 a.m. on 17th May 2021 \nwhich satisfies the requirements of Schedule B1A to the 2020 Regulations is treated as satisfying \nthe requirements of Schedule 11 to these Regulations where the person to whom the booking \nrelates arrives in England after 4.00 a.m. on 17th May 2021. \n\n**10.**A designation by the Secretary of State under paragraph 9 of Schedule B1A to the 2020 \nRegulations as a person who may impose a charge under that Schedule has effect as a designation \nunder paragraph 9 of Schedule 11 to these Regulations. \n\n**11.**Authorisation by the Secretary of State under paragraph 13(2)(a) of Schedule B1A to the \n2020 Regulations as a person who may give a permission under that paragraph has effect as \nauthorisation under paragraph 13(2)(a) of Schedule 11 to these Regulations. \n\n**12.**A designation by the Secretary of State of accommodation or transportation under paragraph \n15 of Schedule B1A to the 2020 Regulations has effect as designation of accommodation or \ntransportation, as the case may be, under paragraph 15 of Schedule 11 to these Regulations. \n\n**13.**Confirmation by the Secretary of State that paragraph 18 of Schedule B1A to the 2020 \nRegulations applies to a person is treated as confirmation that paragraph 18 of Schedule 11 to \nthese Regulations applies to that person where the person arrives in England after 4.00 a.m. on \n17th May 2021. \n\n**14.**Confirmation by a sponsor that paragraph 19 of Schedule B1A to the 2020 Regulations \napplies to a person is treated as confirmation that paragraph 19 of Schedule 11 to these \nRegulations applies to that person where the person arrives in England after 4.00 a.m. on 17th \nMay 2021. \n\n**15.**Confirmation by a UK Government Department under paragraph 1(1A)(d) of Schedule 2 to \nthe 2020 Regulations that a person is of the description in that paragraph, is treated as \nconfirmation that the person is of the description in paragraph 1(2)(d) of Schedule 4 to these \nRegulations where the person arrives in England after 4.00 a.m. on 17th May 2021. \n\n**16.**Certification by a UK Government Department under paragraphs 13 or 13A of Schedule 2 to \nthe 2020 Regulations that a person is of the description or is undertaking work of the description \nin those paragraphs, is treated as certification that the person is of the description or is undertaking \nwork of the description in paragraphs 16 or 17 of Schedule 4 to these Regulations where the \nperson concerned arrives in England after 4.00 a.m. on 17th May 2021 (and accordingly such a \nperson is not required to comply with regulation 4 of these Regulations).", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
“ passenger information ” has the meaning given in regulation 3 ( 1 );
“ Passenger Locator Form ” means the form published electronically by the Secretury of State for the provision of passenger information ( a );
“ port ”, except where the context otherwise requires, means —
( a ) any port ( including a seaport, airport or heliport ), or
( b ) a place which is an authorised terminal control point for international services for the purposes of sections 11 and 12 of the Channel Tumel Act 1987 / by ;
“ qualifying test ” means a test that is a qualifying test for the purposes of regulation 4 ;
“ relevant service ” means a commercial transport service carrying passengers travelling to England from outside the common travel area, other than a shuttle service ;
“ Schedule 11 passenger ” means a passenger to whom Schedule 11 ( additional measures applicable to arrivals from category 3 countries or territories ) applies ;
“ self - isolate ” has the meaning given in regulation 9 ( 2 ), and “ self - isolation ” and “ self - isolating ” are to be construed accordingly.
“ the Self - Isolation Regulations ” means the Health Protection ( Coronavirus, Restrictions ) ( Self - Isolation ) ( England ) Regulations 20206 ( t )
“ sensitivity ”, in relation to a device, means how often the device correctly generates a positive result ;
“ shuttle service ” has the meaning given in section 1 ( 9 ) of the Channel Tumnel Act 1987 ;
“ specificity ”, in relation to a device, means how often the device correctly generates a negative result ;
“ tunnel system ” has the meaning given in section 1 ( 7 ) of the Channel Tumnel Act 1987.
r2 ) For the purposes of these Regulations, an individual has responsibility for a child if the dividual —
( a ) has custody or charge of the child for the time being, or
( b ) has parental responsibility for the child within the meaning given in section 3 of the Children Act 1989 / d ).
( 3 ) For the purposes of these Regulations, a person (? P ) is not treated as departing from or unsing through a country or tertions, or part of a country or territory, if P artives in and leaves at country, territory of part thereof by air, rail o
( a ) remains on the aircraft or vessel upon which P arrived and no other passenger is permitted to be taken on board ; or
( b ) remains on the train upon which P arrived and no other passenger is permitted to be taken on bourd the carriage in which P is travelling : or
( c ) is kept separated from passengers who did not arrive on the same aircraft, train or vessel as P, and no such passengers are permitted to be taken on board the aircraft, train or vessel on which P leaves that country, termitted to be taken or
", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**Charge for managed self-isolation package**\n\n**9.**The Secretary of State or a person designated by the Secretary of State may impose a charge \nin relation to the accommodation, transport and testing package mentioned in the definition of a \n“managed self-isolation package” and the Secretary of State may recover any sum owed by P \npursuant to such a charge as a debt. \n\n**Duty to self-isolate and period of self-isolation**\n\n**10.**Unless P leaves the common travel area where P is permitted to do so under these \nRegulations, P must self-isolate in the place in the accommodation designated in the managed self- \nisolation package until whichever is the later of— \n\n(a) the end of the period of 10 days beginning with the day after P’s arrival in England; \n(b) the end of the period for which P is required to self-isolate under Schedule 8 (mandatory \n\ntesting after arrival in England). \n\n**Exceptions from duty to self-isolate**\n\n**11.**Paragraph 10 does not require P to remain in self-isolation— \n\n(a) from any person with whom they were travelling when they arrived in England and who \n\nis also self-isolating in the place where P is self-isolating; \n\n(b) from any person who is staying in the place where P is self-isolating whose assistance P \n\nreasonably requires by reason of— \n(i) P being a child, or \n(ii) any disability of P’s. \n\n**12.**Paragraph 10 does not require P to remain in self-isolation from a person (“V”) when V is at \n\nthe place where P is self-isolating in exceptional circumstances such as— \n\n(a) to provide emergency assistance; \n(b) to provide care or assistance, including relevant personal care within the meaning of \nparagraph 1(1B) or 7(3B) of Schedule 4 to the Safeguarding Vulnerable Groups Act \n2006(**a**); \n\n(c) to provide medical assistance to P or to any other person who is staying in the place \nwhere P is self-isolating where this is required urgently or on the advice of a registered \nmedical practitioner; \n\n(d) to provide veterinary services where this is required urgently or on the advice of a \n\nveterinary surgeon; \n\n(e) to provide critical public services including social services or services provided to victims \n(such as victims of crime). \n\n**Permitted reasons to leave or be outside place of self-isolation**\n\n**13.**—(1) During the period of their self-isolation P may not leave or be outside of the place \n\nwhere P is self-isolating except— \n\n(a) to travel directly to a port to leave the common travel area; \n(b) to fulfil a legal obligation, including attending court or satisfying bail conditions or to \n\nparticipate in legal proceedings; \n\n(c) to take exercise; \n\n(**a**) 2006 c. 47 paragraph 1(1B) was inserted by section 64 the Protection of Freedoms Act 2012 (c. 9) and paragraph 7(3B) was \ninserted by section 66 of that Act.", - "page_start": 76, - "page_end": 76, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210582_en.pdf", - "query": "What is the expiracy date of the regulation regarding travel during the coronavirus pandemic made in 2021 ?", - "target_page": 31, - "target_passage": "These Regulations expire at the end of 16th May 2022.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "PART 6 \n\nFinal provisions \n\n**Review of need for requirements**\n\n**24.**The Secretary of State must review the need for the requirements imposed by these \n\nRegulations by 14th June 2021 and at least once every 28 days thereafter. \n\n**Expiry of Regulations**\n\n**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. \n\n**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. \n\nSCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
TheSpecial Educational Needs and Disability ( Coronavirus ) ( Amendment ) Regulations 2020
Made--
--28th April 2020
Laid before Parliament30th April 2020Coming into force
--1st May 2020
\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) \nand 135(2) and (3) of the Children and Families Act 2014(**a**) and sections 29(3) and 569(4) of the \nEducation Act 1996(**b**). \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \n\n(**a**) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16). \n(**b**) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and \nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education \n(Wales) Measure 2009. \n(**c**) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "\n \n \n \n \n [html]2021 No. 582PUBLIC HEALTH, ENGLANDThe Health Protection ( Coronavirus, International Travel and Operator Liability ) ( England ) Regulations 2021at 2.30 p. m. on 14th May 2021Coming into force-at 4.00 a. m. on 17th May 202132.33.4.5.6.7.8.91310.1711.1712.1913.\n
Made-
--
at 10.32 a. m. on 14th May 2021Laid before Parliament
-CONTENTS
PART 1Introductory1.Citation, commencement, extent and application
Interpretation and introduction of Schedules 1 to 4PART 2
Requirements on persons arriving in EnglandRequirement on passengers to provide information
5Requirement to possess notification of negative test result
6Requirements relating to tests
7Requirement to book and undertake tests
9Requirement to undertake workforce tests
10Test requirements : offshore installation workers
12Further requirements on arrivals from category 2 countries and territories
Further requirements on arrivals from category 3 countries or territoriesPART 3
EnforcementEnforcement of requirement to self - isolate
Power of entryPART 4
Requirements on operatorsPassenger information requirement
", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "The Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984(**a**). \n\nPART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. \n\n**Interpretation and introduction of Schedules 1 to 4**\n\n**2.**—(1) In these Regulations— \n\n“category 1 arrival” means person who has arrived in England from a category 1 country or \nterritory, and has not been in a category 2 country or territory or a category 3 country or \nterritory in the period beginning with the 10th day before the date of their arrival in England; \n\n“category 1 country or territory” means a country or territory, or part of a country or territory, \nspecified in Schedule 1(**b**); \n\n“category 2 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 2(**c**); \n\n“category 3 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 3(**d**); \n\n“child” means a person under the age of 18; \n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act \n1971(**e**); \n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be \ncaused by coronavirus); \n\n“designated port” means a port designated for the purposes of Schedule 11; \n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation \n2(1) of the Medical Devices Regulations 2002(**f**); \n\n“disability” has the meaning given in the Equality Act 2010(**g**) (see section 6 of, and Schedule \n1 to, that Act); \n\n“immigration officer” means a person appointed by the Secretary of State as an immigration \nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971(**h**); \n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11; \n\n“operator” except in regulation 18, means an operator of a relevant service; \n\n(**a**) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14). \n(**b**) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories. \n(**c**) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories. \n(**d**) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories. \n(**e**) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland \nare collectively referred to in that Act as “the common travel area”. \n\n(**f**) S.I. 2002/618. \n(**g**) 2010 c. 15. \n(**h**) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I. \n1993/1813.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "If you have not had symptoms of coronavirus, you must self-isolate for 10 days from the day after \nyour test date. If you have symptoms of coronavirus, you must self-isolate for 10 days from the \nday your symptoms started, if earlier than when you took your test. \n\nYou must, by law, continue self-isolating for the remainder of your self-isolation period as an \ninternational arrival travelling to the UK from an amber-list country, territory or region. You may \nbe contacted to check that you are self-isolating. \n\nIf you want to shorten your self-isolation period you will need to take another test for international \narrivals from amber list countries, territories or regions. For more information, go to \nhttps://www.gov.uk/guidance/coronavirus-covid-19-test-to-release-for-international-travel. \n\n(4) The test provider must, on request, provide a constable or any other person employed in or \nfor the purposes of any police force, with— \n\n(a) P’s passport number, or travel document reference number (as appropriate); \n(b) P’s test result; \n(c) the date on which P undertook the test; \n(d) the date on which the test result was notified or made available to P or X in accordance \n\nwith sub-paragraphs (2) and (3). \n\n(5) Where— \n\n(a) regulation 4 or 4A of the Health Protection (Notification) Regulations 2010(**a**) applies in \nrelation to the test provider; or \n\n(b) if the test provider arranges with another person (“X”) for X to carry out any element of \nthe single end-to-end testing service on their behalf, either of those regulations applies to \nX in the carrying out of that element, \n\n(**a**) S.I. 2010/659; regulation 4 was amended by S.I. 2013/235, 2020/1175, 2020/764, 2021/150 and regulation 4A was inserted \nby S.I. 2020/1175.", - "page_start": 72, - "page_end": 72, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "United Kingdom and, if so— \n(i) the location at which they will depart from in the United Kingdom, \n(ii) their final destination country or territory, \n(iii) the operator they are travelling with or through which their booking was made for \n\ntheir onward journey, \n\n(iv) the seat number for their onward journey, \n(v) the flight number or vessel name for their onward journey, \n(vi) the coach number for their onward journey. \n\n**3.**Where the passenger is travelling with a child for whom they have responsibility— \n\n(a) the full name and date of birth of that child; \n(b) the relationship of the passenger to that child. \n\n**4.**Where the passenger is a person required by regulation 9(2) to self-isolate, and intends to \n\nundertake a test in accordance with Schedule 10 (optional tests)— \n\n(a) the name of the test provider; \n(b) the test reference number provided to them by the test provider in accordance with \nparagraph 4(d) of that Schedule. \n\n**5.**Where regulation 6 (requirement to book and undertake tests) requires a testing package— \n\n(a) the name of the test provider; \n(b) the test reference number provided to them by the test provider in accordance with \nparagraph 10(5) of Schedule 8. \n\nSCHEDULE 7 Regulation 4 \n\nTesting before arrival in England \n\n**Compliant tests**\n\n**1.**A test complies with this paragraph if— \n\n(a) it is a test for the detection of coronavirus undertaken using a device which the \n\nmanufacturer states has—", - "page_start": 55, - "page_end": 55, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**Day 2 tests: general test requirements**\n\n**6.**—(1) For the purposes of regulation 6(12)(a), a day 2 test complies with this paragraph \n\nwhere— \n\n(a) it is a test provided by a public provider; or \n(b) it is a test provided by a private provider— \n\n(i) in respect of— \n\n(aa) a non-Schedule 11 passenger, on or after 1st March 2021; \n(bb) a Schedule 11 passenger, on 1st or 2nd March 2021, \n\n(ii) where the test complies with sub-paragraph (2), and \n(iii) where the private provider complies with paragraph 7. \n\n(2) A test complies with this sub-paragraph where— \n\n(a) it is a semi-quantitative test for the detection of coronavirus which— \n\n(i) targets a minimum of two distinguishable SARS-CoV-2 genes other than the S gene \nand performance reference controls, \n\n(ii) includes routine in silico assurance against every variant of concern, and \n(iii) produces a test solution that provides extracted nucleic acid that is suitable for whole \n\ngenome sequencing using a specified method; \n\n(b) it is, in relation to a Schedule 11 passenger, a test that can be self-administered; \n(c) the manufacturer of any device used for the purposes of the test states that the device— \n\n(i) uses an established molecular detection method, \n(ii) has a specificity and a sensitivity greater than 99% (with a 95% two-sided \nconfidence interval entirely above 97%), \n\n(iii) has a limit of detection of less than or equal to 1000 SARS-CoV-2 copies per \n\nmillilitre, and \n\n(iv) is suitable for identifying every variant of concern; and \n\n(d) any device used for the purposes of the test— \n\n(i) can be put into service in accordance with Part 4 of the Medical Devices Regulations \n\n2002, other than solely by virtue of regulation 39(2) of those Regulations, and \n(ii) has been validated no more than 18 months before the test is administered or \n\nprovided to P. \n\n(3) For the purposes of sub-paragraph (2)— \n\n(a) “specified method” means a targeted sequence method specific to SARS-CoV-2 or an \n\nequivalent— \n(i) amplicon method, or \n(ii) sequence bait capture method; \n\n(b) “validated”, in relation to a device, has the meaning given by paragraph 2(2) of Schedule \n\n10; \n\n(c) “variant of concern” means a variant of SARS-CoV-2 identified in a designation made by \nthe Secretary of State for the purposes of this paragraph and published in a manner as \nappears to the Secretary of State to be appropriate.", - "page_start": 60, - "page_end": 60, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. \n\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 \n(‘the Personal Budgets Regulations 2014’). \n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as \nregulation 5 does in respect of the SEND Regulations 2014. \n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) \nRegulations 2015 (‘the Detained Persons Regulations 2015’). \n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to \nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal \nBudgets Regulations 2014 respectively. \n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax \ntime limits. \n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal \nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’). \n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to \nthose in regulations 5, 17 and 20. \n\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency \nmeasure and no significant impact on business, charities or voluntary bodies is foreseen. \n\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk. \n\n© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia2.pdf", - "query": "Who first suggested the notions of \"hard\" and \"easy\" problems regarding consciousness ?", - "target_page": 1, - "target_passage": "The terms \"hard problem\" and \"easy problems\" were coined by the philosopher David Chalmers", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
1.1 ( 1.1 )
TableStatement of completely intervention
Tablewith the
\n\n\n\nProponents of the hard problem argue that it is categorically different from the easy problems since no \nmechanistic or behavioral explanation could explain the character of an experience, not even in principle. \nEven after all the relevant functional facts are explicated, they argue, there will still remain a further \nquestion: \"why is the performance of these functions accompanied by experience?\"[1] To bolster their \ncase, proponents of the hard problem frequently turn to various philosophical thought experiments, \ninvolving philosophical zombies (which, they claim, are conceivable) or inverted qualia, or the claimed \nineffability of colour experiences, or the claimed unknowability of foreign states of consciousness, such \nas the experience of being a bat. \n\nThe terms \"hard problem\" and \"easy problems\" were \ncoined by the philosopher David Chalmers in a 1994 talk \ngiven at The Science of Consciousness conference held in \nTucson, Arizona.[4] The following year, the main talking \npoints of Chalmers' talk were published in*The Journal of*\n*Consciousness*\ngained \nsignificant attention from consciousness researchers and \nbecame the subject of a special volume of the journal,[5][6] \nwhich was later published into a book.[7] In 1996, \nChalmers published*The Conscious Mind*, a book-length \ntreatment of the hard problem, in which he elaborated on \nhis core arguments and responded to counterarguments. His \nuse of the word*easy*is \"tongue-in-cheek\".[8] As the \ncognitive psychologist Steven Pinker puts it, they are about as easy as going to Mars or curing cancer. \n\"That is, scientists more or less know what to look for, and with enough brainpower and funding, they \nwould probably crack it in this century.\"[9] \n\n*Studies*.[1] The publication \n\nChalmers on stage for an Alan Turing Year \nevent at De La Salle University, Manila, 27 \nMarch 2012 \n\nThe existence of the hard problem is disputed. It has been accepted by some philosophers of mind such as \nJoseph Levine,[10] Colin McGinn,[11] and Ned Block[12] and cognitive neuroscientists such as Francisco \nVarela,[13] Giulio Tononi,[14][15] and Christof Koch.[14][15] On the other hand, its existence is denied by \nother philosophers of mind, such as Daniel Dennett,[16] Massimo Pigliucci,[17] Thomas Metzinger, \nPatricia Churchland,[18] and Keith Frankish,[19] and by cognitive neuroscientists such as Stanislas \nDehaene,[20] Bernard Baars,[21] Anil Seth,[22] and Antonio Damasio.[23] Clinical neurologist and skeptic", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Steven Novella has dismissed it as \"the hard non-problem\".[24] According to a 2020 PhilPapers survey, a \nmajority (62.42%) of the philosophers surveyed said they believed that the hard problem is a genuine \nproblem, while 29.72% said that it does not exist.[25] \n\nThere are a number of other potential philosophical problems that are related to the Hard Problem. Ned \nBlock believes that there exists a \"Harder Problem of Consciousness\", due to the possibility of different \nphysical and functional neurological systems potentially having phenomenal overlap.[12] Another \npotential philosophical problem which is closely related to Benj Hellie's vertiginous question, dubbed \n\"The Even Harder Problem of Consciousness\", refers to why a given individual has their own particular \npersonal identity, as opposed to existing as someone else.[26] \n\n**Overview**\n\nCognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the \nproblem of consciousness\" (1995)[1] and expanded upon it in*The Conscious Mind*(1996). His works \nprovoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers \nfor his argumentative rigour and \"impeccable clarity\".[27] Pinker later said, in 2018, \"In the end I still \nthink that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a \nmeaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether \nthe same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with \nseveral other philosophers that it may be futile to hope for a solution at all, precisely because it is a \nconceptual problem, or, more accurately, a problem with our concepts.\"[28] Daniel Dennett and Patricia \nChurchland, among others, believe that the hard problem is best seen as a collection of easy problems that \nwill be solved through further analysis of the brain and behaviour.[29][30] \n\nConsciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of \nbeing awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \"*the feeling of what*\n*it is like to be something.\"*Consciousness, in this sense, is synonymous with*experience.*[31][27] \n\n**Chalmers' formulation**\n\n. . .even when we have explained the performance of all the cognitive and behavioral functions \nin the vicinity of experience—perceptual discrimination, categorization, internal access, verbal \nreport—there may still remain a further unanswered question:*Why is the performance of these*\n*functions accompanied by experience?*\n\n— David Chalmers, Facing up to the problem of consciousness \n\nThe problems of consciousness, Chalmers argues, are of two kinds: the*easy problems*and the*hard*\n*problem*. \n\n**Easy problems**\n\nThe easy problems are amenable to reductive inquiry. They are a logical consequence of lower-level facts \nabout the world, similar to how a clock's ability to tell time is a logical consequence of its clockwork and \nstructure, or a hurricane being a logical consequence of the structures and functions of certain weather", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia2.pdf" - }, - { - "text": "The philosophers Glenn Carruthers and Elizabeth Schier said in 2012 that the main arguments for the \nexistence of a hard problem—philosophical zombies, Mary's room, and Nagel's bats—are only persuasive \nif one already assumes that \"consciousness must be independent of the structure and function of mental \nstates, i.e. that there is a hard problem.\" Hence, the arguments beg the question. The authors suggest that \n\"instead of letting our conclusions on the thought experiments guide our theories of consciousness, we \nshould let our theories of consciousness guide our conclusions from the thought experiments.\"[64] \n\nThe philosopher Massimo Pigliucci argued in 2013 that the hard problem is misguided, resulting from a \n\"category mistake\".[17] He said: \"Of course an explanation isn't the same as an experience, but that's \nbecause the two are completely independent categories, like colors and triangles. It is obvious that I \ncannot experience what it is like to be you, but I can potentially have a complete explanation of how and \nwhy it is possible to be you.\"[17] \n\nIn 2017, the philosopher Marco Stango, in a paper on John Dewey's approach to the problem of \nconsciousness (which preceded Chalmers' formulation of the hard problem by over half a century), noted \nthat Dewey's approach would see the hard problem as the consequence of an unjustified assumption that \nfeelings and functional behaviors are not the same physical process: \"For the Deweyan philosopher, the \n'hard problem' of consciousness is a 'conceptual fact' only in the sense that it is a*philosophical mistake*: \nthe mistake of failing to see that the physical can be had as an episode of immediate sentiency.\"[65] \n\nThe philosopher Thomas Metzinger likens the hard problem of consciousness to vitalism, a formerly \nwidespread view in biology which was not so much solved as abandoned.[66] Brian Jonathan Garrett has \nalso argued that the hard problem suffers from flaws analogous to those of vitalism.[67] \n\nThe philosopher Peter Hacker argues that the hard problem is misguided in that it asks how consciousness \ncan emerge from matter, whereas in fact sentience emerges from the evolution of living organisms.[68] He \nstates: \"The hard problem isn’t a hard problem at all. The really hard problems are the problems the \nscientists are dealing with. [...] The philosophical problem, like all philosophical problems, is a confusion \nin the conceptual scheme.\"[68] Hacker's critique extends beyond Chalmers and the hard problem, being \ndirected against contemporary philosophy of mind and neuroscience more broadly. Along with the \nneuroscientist Max Bennett, he has argued that most of contemporary neuroscience remains implicitly \ndualistic in its conceptualizations and is predicated on the*mereological fallacy*of ascribing psychological \nconcepts to the brain that can properly be ascribed only to the person as a whole.[69] Hacker further states \nthat \"consciousness studies\", as it exists today, is \"literally a total waste of time\" and that \"the conception \nof consciousness which they have is incoherent\".[68] \n\n**Eliminative materialism / Illusionism**\n\nEliminative materialism or eliminativism is the view that many or all of the mental states used in folk \npsychology (i.e., common-sense ways of discussing the mind) do not, upon scientific examination, \ncorrespond to real brain mechanisms.[59] According the 2020 PhilPapers survey, 4.51% of philosophers \nsurveyed subscribe to eliminativism.[25] \n\nWhile Patricia Churchland and Paul Churchland have famously applied eliminative materialism to \npropositional attitudes, philosophers including Daniel Dennett, Georges Rey, and Keith Frankish have \napplied it to qualia or phenomenal consciousness (i.e., conscious experience).[59] On their view, it is \nmistaken not only to believe there is a hard problem of consciousness, but to believe phenomenal \nconsciousness exists at all.[19][61]", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia2.pdf" - }, - { - "text": "66. Harris, Sam. \"Making Sense #96\" (https://samharris.org/subscriber-extras/96-nature-conscio \nusness/).*SamHarris.org*. Sam Harris. Retrieved 27 August 2020. \"(25.45) TM:I think it will \nnot be a mystery. Life is not a mystery anymore, but a hundred and fifty years ago many \npeople thought that this is an irreducible mystery. (25:57) Harris:So you're not a fan \nanymore, if you ever were, of the framing by David Chalmers of the Hard Problem of \nConsciousness? Metzinger: No, that's so boring. I mean, that's last century. I mean, you \nknow, we all respect Dave [Chalmers], and we know he is very smart and has got a very fast \nmind, no debate about that. But conceivability arguments are just very, very weak. If you \nhave an ill-defined folk psychological umbrella term like \"consciousness\", then you can pull \noff all kinds of scenarios and zombie thought experiments. It doesn't really… It helped to \nclarify some issues in the mid 90's, but the consciousness community has listened to this \nand just moved on. I mean nobody of the serious researchers in the field thinks about this \nanymore, but it has taken on like a folkloristic life of its own. A lot of people talk about the \nHard Problem who wouldn't be able to state what it consists in now.\" \n\n67. Garrett, Brian Jonathan (May 2006). \"What the History of Vitalism Teaches Us About \n\nConsciousness and the 'Hard Problem' \".*Philosophy and Phenomenological Research*.**72**\n(3): 576–588. doi:10.1111/j.1933-1592.2006.tb00584.x (https://doi.org/10.1111%2Fj.1933-1 \n592.2006.tb00584.x). \n\n68. Hacker, Peter (2010). \"Hacker's challenge\" (http://philpapers.org/rec/HACHC).*The*\n\n*Philosophers' Magazine*.**51**(51): 23–32. doi:10.5840/tpm2010517 (https://doi.org/10.5840% \n2Ftpm2010517). \n\n69. Schaal, David W. (2005). \"Naming Our Concerns About Neuroscience: A Review of Bennett \nand Hacker's*Philosophical Foundations of Neuroscience*\" (https://www.ncbi.nlm.nih.gov/pm \nc/articles/PMC1389787).*Journal of the Experimental Analysis of Behavior*.**84**(3): 683–692. \ndoi:10.1901/jeab.2005.83-05 (https://doi.org/10.1901%2Fjeab.2005.83-05). PMC 1389787 \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1389787). PMID 16596986 (https://pubmed. \nncbi.nlm.nih.gov/16596986). \n\n70. Dennett, Daniel C. (1979). \"On the Absence of Phenomenology\". In Gustafson, Donald F.; \nTapscott, Bangs L. (eds.).*Body, Mind, and Method*. Kluwer Academic Publishers. pp. 93– \n113. \n\n71. Dennett, Daniel C. (1991).*Consciousness Explained*. Penguin Books. \n72. Dennett, Daniel C. (2003). \"Explaining the 'magic' of consciousness\".*Journal of Cultural and*\n*Evolutionary Psychology*.**1**(1): 7–19. doi:10.1556/jcep.1.2003.1.2 (https://doi.org/10.1556% \n2Fjcep.1.2003.1.2). S2CID 144560246 (https://api.semanticscholar.org/CorpusID:14456024 \n6). \n\n73. Dennett, Daniel C. (1991).*Consciousness explained*(https://archive.org/details/consciousne \n\nssexp00denn). Boston: Little, Brown and Company. ISBN 978-0316180658. \n\n74. Anthis, Jacy (2022). \"Consciousness Semanticism: A Precise Eliminativist Theory of \nConsciousness\" (https://philarchive.org/rec/ANTCSA).*Biologically Inspired Cognitive*\n*Architectures 2021*. Studies in Computational Intelligence. Vol. 1032. pp. 20–41. \ndoi:10.1007/978-3-030-96993-6_3 (https://doi.org/10.1007%2F978-3-030-96993-6_3). \nISBN 978-3-030-96992-9. Retrieved 7 August 2022. \n\n75. Irvine, Elizabeth (2013).*Consciousness as a scientific concept: a philosophy of science*\n\n*perspective*. Studies in brain and mind. Vol. 5. Dordrecht; New York: Springer-Verlag. p. 167 \n(https://books.google.com/books?id=jO4HNB7OoUgC&pg=PA167). ISBN 9789400751729. \n76. Chalmers, David (2018). \"The Meta-Problem of Consciousness\" (http://consc.net/papers/me \n\ntaproblem.pdf) (PDF).*Journal of Consciousness Studies*.**25**(9–10): 6–61. Retrieved \n6 February 2019. \n\n77. Graziano, Michael (2013).*Consciousness and the social brain*. Oxford; New York: Oxford \n\nUniversity Press. ISBN 978-0190263195.", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Today there is a strong tendency to simply*equate*consciousness with the qualia. Yet there is \nclearly something not quite right about this. The \"itchiness of itches\" and the \"hurtfulness of \npain\" are qualities we are conscious*of*. So philosophy of mind tends to treat consciousness as \nif it consisted simply of the contents of consciousness (the phenomenal qualities), while it \nreally is precisely*consciousness*of contents, the very givenness of whatever is subjectively \ngiven. And therefore the problem of consciousness does not pertain so much to some alleged \n\"mysterious, nonpublic objects\", i.e. objects that seem to be only \"visible\" to the respective \nsubject, but rather to the nature of \"seeing\" itself (and in today’s philosophy of mind \nastonishingly little is said about the latter).[129] \n\n**Relationship to scientific frameworks**\n\n\n \n \n \n \n [html]\n
SpecimensTablePatientsTableTableTableDevelopmentTableTableSinceState
\n\n\n \n \n \n \n [html]\n
Solved.StatesticsTableTableTableMaximumTemperature ( mm )TableSince 15DataAdjustedSpecies
\n\nOne can always ask why these processes of availability should give rise to consciousness in \nthe first place. As yet we cannot explain why they do so, and it may well be that full details \nabout the processes of availability will still fail to answer this question. Certainly, nothing in \nthe standard methodology I have outlined answers the question; that methodology assumes a \nrelation between availability and consciousness, and therefore does nothing to explain it. [...] \nSo the hard problem remains. But who knows: Somewhere along the line we may be led to \nthe relevant insights that show why the link is there, and the hard problem may then be \nsolved.[132] \n\nThe neuroscientist and Nobel laureate Eric Kandel wrote that locating the NCCs would not solve the hard \nproblem, but rather one of the so-called easy problems to which the hard problem is contrasted.[133] \nKandel went on to note Crick and Koch's suggestion that once the binding problem—understanding what \naccounts for the unity of experience—is solved, it will be possible to solve the hard problem \nempirically.[133] However, neuroscientist Anil Seth argued that emphasis on the so-called hard problem is \na distraction from what he calls the \"real problem\": understanding the neurobiology underlying", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia2.pdf" - }, - { - "text": "g%7CHard) \n\n5. JCS vol. 4, pp. 3-46, 1997 \n6. Chalmers, David (1997). \"Moving forward on the problem of consciousness\".*Journal of*\n\n*Consciousness Studies*.**4**(1): 3–46. \n\n7. Shear, Jonathan (1997).*Explaining Consciousness: The Hard Problem*. MIT Press. \n\nISBN 978-0262692212. \n\n8. \"Episode 83, The David Chalmers Interview (Part I - Consciousness)\" (https://thepanpsycas \n\nt.com/panpsycast2/episode83-1).*The Panpsycast Philosophy Podcast*. 19 July 2020. \nRetrieved 2020-09-05. \n\n9. Pinker, Steven (29 January 2007). \"The Brain: The Mystery of Consciousness\" (http://conten \nt.time.com/time/magazine/article/0,9171,1580394-1,00.html).*Time*. Retrieved 19 December \n2018. \n\n10. Levine, Joseph (2009-01-15). \"The Explanatory Gap\" (https://www.oxfordhandbooks.com/vi \new/10.1093/oxfordhb/9780199262618.001.0001/oxfordhb-9780199262618-e-17).*The*\n*Oxford Handbook of Philosophy of Mind*: 281–291. \ndoi:10.1093/oxfordhb/9780199262618.003.0017 (https://doi.org/10.1093%2Foxfordhb%2F9 \n780199262618.003.0017). ISBN 978-0199262618. \n\n11. McGinn, Colin (20 February 2012). \"All machine and no ghost?\" (http://www.newstatesman. \ncom/ideas/2012/02/consciousness-mind-brain).*New Statesman*. Retrieved 27 March 2012. \n12. Block, Ned (2002). \"The Harder Problem of Consciousness\" (https://philpapers.org/rec/BLO \nTHP).*The Journal of Philosophy*.**99**(8): 391–425. doi:10.2307/3655621 (https://doi.org/10. \n2307%2F3655621). JSTOR 3655621 (https://www.jstor.org/stable/3655621). \nS2CID 111383062 (https://api.semanticscholar.org/CorpusID:111383062). \n\n13. Varela, F.J. (1 April 1996). \"Neurophenomenology: a methodological remedy for the hard \n\nproblem\" (https://www.ingentaconnect.com/content/imp/jcs/1996/00000003/00000004/718). \n*Journal of Consciousness Studies*.**3**(4): 330–349.", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia2.pdf" - }, - { - "text": "patterns. A clock, a hurricane, and the easy problems, are all the sum of their parts (as are most \nthings).[27] \n\nThe easy problems relevant to consciousness concern mechanistic analysis of the neural processes that \naccompany behaviour. Examples of these include how sensory systems work, how sensory data is \nprocessed in the brain, how that data influences behaviour or verbal reports, the neural basis of thought \nand emotion, and so on. They are problems that can be analyzed through \"structures and functions\".[27] \n\n**Hard problem**\n\nThe hard problem, in contrast, is the problem of*why*and*how*those processes are accompanied by \nexperience.[1] It may further include the question of why these processes are accompanied by this or that \nparticular experience, rather than some other kind of experience. In other words, the hard problem is the \nproblem of explaining why certain mechanisms are accompanied by conscious experience.[27] For \nexample, why should neural processing in the brain lead to the felt sensations of, say, feelings of hunger? \nAnd why should those neural firings lead to feelings of hunger rather than some other feeling (such as, \nfor example, feelings of thirst)? \n\nChalmers argues that it is conceivable that the relevant behaviours associated with hunger, or any other \nfeeling, could occur even in the absence of that feeling. This suggests that experience is irreducible to \nphysical systems such as the brain. This is the topic of the next section. \n\n**How the easy and hard problems are related**\n\nChalmers believes that the hard problem is irreducible to the easy problems: solving the easy problems \nwill not lead to a solution to the hard problems. This is because the easy problems pertain to the causal \nstructure of the world while the hard problem pertains to consciousness, and facts about consciousness \ninclude facts that go beyond mere causal or structural description.[32] \n\nFor example, suppose someone were to stub their foot and yelp. In this scenario, the easy problems are \nmechanistic explanations that involve the activity of the nervous system and brain and its relation to the \nenvironment (such as the propagation of nerve signals from the toe to the brain, the processing of that \ninformation and how it leads to yelping, and so on). The hard problem is the question of why these \nmechanisms are accompanied by*the feeling of pain*, or why these feelings of pain feel the particular way \nthat they do. Chalmers argues that facts about the neural mechanisms of pain, and pain behaviours, do not \nlead to facts about conscious experience. Facts about conscious experience are, instead, further facts, not \nderivable from facts about the brain.[27][32] \n\nAn explanation for all of the relevant physical facts about neural processing would leave unexplained \nfacts about what it is like to feel pain. This is in part because functions and physical structures of any sort \ncould conceivably exist in the absence of experience. Alternatively, they could exist alongside a different \nset of experiences. For example, it is logically possible for a perfect replica of Chalmers to have no \nexperience at all, or for it to have a different set of experiences (such as an inverted visible spectrum, so \nthat the blue-yellow red-green axes of its visual field are flipped).[32] \n\nThe same cannot be said about clocks, hurricanes, or other physical things. In those cases, a structural or \nfunctional description is a complete description. A perfect replica of a clock is a clock, a perfect replica of \na hurricane is a hurricane, and so on. The difference is that physical things are nothing more than their", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia2.pdf" - }, - { - "text": "physical constituents. For example, water is nothing \nmore than H2O molecules, and understanding everything \nabout H2O molecules is to understand everything there is \nto know about water. But consciousness is not like this. \nKnowing everything there is to know about the brain, or \nany physical system, is not to know everything there is to \nknow about consciousness. Consciousness, then, must \nnot be purely physical.[27] \n\n\n\n**Implications for physicalism**\n\n\n\nThe hard problem is often illustrated by \nappealing to the logical possibility of inverted \nvisible spectra. If there is no logical \ncontradiction in supposing that one's colour \nvision could be inverted, it follows that \nmechanistic explanations of visual processing \ndo not determine facts about what it is like to \nsee colours. \n\nChalmers's \nidea contradicts physicalism, sometimes \nlabelled materialism. This is the view that everything that \nexists is a physical or material thing, so everything can \nbe reduced to microphysical things. For example, the \nrings of Saturn are a physical thing because they are \nnothing more than a complex arrangement of a large \nnumber of subatomic particles interacting in a certain way. \nAccording to physicalism, everything, including consciousness, \ncan be explained by appeal to its microphysical constituents. \nChalmers's*hard problem*presents a counterexample to this view \nand to other phenomena like swarms of birds, since it suggests that \nconsciousness, like swarms of birds, cannot be reductively \nexplained by appealing to their physical constituents. Thus, if the \nhard problem is a real problem then physicalism must be false, and \nif physicalism is true then the hard problem must not be a real \nproblem. \n\nA swarm of birds showing high \norder structure emerging from \nsimpler physical constituents \n\n**Historical precedents**\n\nThe hard problem of consciousness has scholarly antecedents considerably earlier than Chalmers. \nChalmers himself notes that \"a number of thinkers in the recent and distant past\" have \"recognised the \nparticular difficulties of explaining consciousness.\"[33] He states that all his original 1996 paper \ncontributed to the discussion was \"a catchy name, a minor reformulation of philosophically familiar \npoints\".[33] \n\nAmong others, thinkers who have made arguments similar to Chalmers' formulation of the hard problem \ninclude Isaac Newton,[34] John Locke,[35] Gottfried Wilhelm Leibniz,[36][34] John Stuart Mill,[37] and \nThomas Henry Huxley.[38][34] Likewise, Asian philosophers like Dharmakirti and Guifeng Zongmi \ndiscussed the problem of how consciousness arises from unconscious matter.[34][39][40][41]", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia2.pdf" - }, - { - "text": "In other words, the 'strong line' holds that the solution to the meta-problem would provide an explanation \nof our beliefs about consciousness that is independent of consciousness. That would debunk our beliefs \nabout consciousness, in the same way that explaining beliefs about god in evolutionary terms may \nprovide arguments against theism itself.[144] \n\n**In popular culture**\n\nTom Stoppard's play*The Hard Problem*, first produced in 2015, is named after the hard problem of \nconsciousness, which Stoppard defines as having \"subjective First Person experiences\".[145] \n\n**See also**\n\n\n \n \n \n \n [html]\n
• Animal consciousness• Binding problem •
• Blindsight • Chinese room• Cogito_ergo_sum • Cognition
• Free will • Ideasthesia • Introspection
\n\n**Notes**\n\n1. \"But, without any delusive representations of images or phantasms, I am most certain that I \nam, and that I know and delight in this. In respect to these truths I am not at all afraid of the \narguments of the Academians, who say, What if you are deceived? For if I am deceived, I \nam. For he who is not, cannot be deceived...\" \n\n2. There has been debate over how best to characterize James' position. The*Stanford*\n*Encyclopedia of Philosophy*states: \"James’s commitment to panpsychism remains \nsomewhat controversial, since he also advanced a cogent set of objections against a \nversion of the view, which he labelled the 'mind dust' theory, in chapter six of The Principles \nof Psychology ([1890] 1981). These objections are the inspiration for the so-called \n'combination problem', around which much of the twenty first century literature on \npanpsychism focuses.\"", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Attitudes towards physicalism also differ among professionals. In the 2009 PhilPapers survey, 56.5% of \nphilosophers surveyed subscribed to physicalism and 27.1% of philosophers surveyed rejected \nphysicalism. 16.4% fell into the \"other\" category.[51] In the 2020 PhilPapers survey, 51.93% of \nphilosophers surveyed indicated that they \"accept or lean towards\" physicalism and 32.08% indicated that \nthey reject physicalism. 6.23% were \"agnostic\" or \"undecided\".[25] \n\nDifferent solutions have been proposed to the hard problem of consciousness. The sections below \ntaxonomizes the various responses to the hard problem. The shape of this taxonomy was first introduced \nby Chalmers in a 2003 literature review on the topic.[52] The labelling convention of this taxonomy has \nbeen incorporated into the technical vocabulary of analytic philosophy, being used by philosophers such \nas Adrian Boutel,[53] Raamy Majeed,[54] Janet Levin,[55] Pete Mandik & Josh Weisberg,[56] Roberto \nPereira,[57] and Helen Yetter-Chappell.[58] \n\n**Type-A Materialism**\n\nType-A materialism (also known as*reductive materialism*or*a priori physicalism*) is a view characterized \nby a commitment to physicalism and a full rejection of the hard problem. By this view, the hard problem \neither does not exist or is just another easy problem, because every fact about the mind is a fact about the \nperformance of various functions or behaviours. So, once all the relevant functions and behaviours have \nbeen accounted for, there will not be any facts left over in need of explanation.[52] Thinkers who \nsubscribe to type-A materialism include Paul and Patricia Churchland, Daniel Dennett, Keith Frankish, \nand Thomas Metzinger. \n\nSome type-A materialists believe in the reality of phenomenal consciousness but believe it is nothing \nextra in addition to certain functions or behaviours. This view is sometimes referred to as*strong*\n*reductionism*.[43][52] Other type-A materialists may reject the existence of phenomenal consciousness \nentirely. This view is referred to as eliminative materialism or illusionism.[59][60][61] \n\n**Strong reductionism**\n\nMany philosophers have disputed that there is a hard problem of consciousness distinct from what \nChalmers calls the easy problems of consciousness. Some among them, who are sometimes termed*strong*\n*reductionists*, hold that phenomenal consciousness (i.e., conscious experience) does exist but that it can \nbe fully understood as reducible to the brain.[43] \n\nBroadly, strong reductionists accept that conscious experience is real but argue it can be fully understood \nin functional terms as an emergent property of the material brain.[43] In contrast to weak reductionists \n(see above), strong reductionists reject ideas used to support the existence of a hard problem (that the \nsame functional organization could exist without consciousness, or that a blind person who understood \nvision through a textbook would not know everything about sight) as simply mistaken intuitions.[43][52] \n\nA notable family of strong reductionist accounts are the higher-order theories of consciousness.[62][43] In \n2005, the philosopher Peter Carruthers wrote about \"recognitional concepts of experience\", that is, \"a \ncapacity to recognize [a] type of experience when it occurs in one's own mental life,\" and suggested that \nsuch a capacity could explain phenomenal consciousness without positing qualia.[63] On the higher-order \nview, since consciousness is a representation, and representation is fully functionally analyzable, there is \nno hard problem of consciousness.[43]", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia2.pdf", - "query": "What is David Chalmer's definition of \"consciousness\" ?", - "target_page": 2, - "target_passage": "Chalmers uses Thomas Nagel's definition of consciousness: \"the feeling of what it is like to be something.\"", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "g%7CHard) \n\n5. JCS vol. 4, pp. 3-46, 1997 \n6. Chalmers, David (1997). \"Moving forward on the problem of consciousness\".*Journal of*\n\n*Consciousness Studies*.**4**(1): 3–46. \n\n7. Shear, Jonathan (1997).*Explaining Consciousness: The Hard Problem*. MIT Press. \n\nISBN 978-0262692212. \n\n8. \"Episode 83, The David Chalmers Interview (Part I - Consciousness)\" (https://thepanpsycas \n\nt.com/panpsycast2/episode83-1).*The Panpsycast Philosophy Podcast*. 19 July 2020. \nRetrieved 2020-09-05. \n\n9. Pinker, Steven (29 January 2007). \"The Brain: The Mystery of Consciousness\" (http://conten \nt.time.com/time/magazine/article/0,9171,1580394-1,00.html).*Time*. Retrieved 19 December \n2018. \n\n10. Levine, Joseph (2009-01-15). \"The Explanatory Gap\" (https://www.oxfordhandbooks.com/vi \new/10.1093/oxfordhb/9780199262618.001.0001/oxfordhb-9780199262618-e-17).*The*\n*Oxford Handbook of Philosophy of Mind*: 281–291. \ndoi:10.1093/oxfordhb/9780199262618.003.0017 (https://doi.org/10.1093%2Foxfordhb%2F9 \n780199262618.003.0017). ISBN 978-0199262618. \n\n11. McGinn, Colin (20 February 2012). \"All machine and no ghost?\" (http://www.newstatesman. \ncom/ideas/2012/02/consciousness-mind-brain).*New Statesman*. Retrieved 27 March 2012. \n12. Block, Ned (2002). \"The Harder Problem of Consciousness\" (https://philpapers.org/rec/BLO \nTHP).*The Journal of Philosophy*.**99**(8): 391–425. doi:10.2307/3655621 (https://doi.org/10. \n2307%2F3655621). JSTOR 3655621 (https://www.jstor.org/stable/3655621). \nS2CID 111383062 (https://api.semanticscholar.org/CorpusID:111383062). \n\n13. Varela, F.J. (1 April 1996). \"Neurophenomenology: a methodological remedy for the hard \n\nproblem\" (https://www.ingentaconnect.com/content/imp/jcs/1996/00000003/00000004/718). \n*Journal of Consciousness Studies*.**3**(4): 330–349.", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Steven Novella has dismissed it as \"the hard non-problem\".[24] According to a 2020 PhilPapers survey, a \nmajority (62.42%) of the philosophers surveyed said they believed that the hard problem is a genuine \nproblem, while 29.72% said that it does not exist.[25] \n\nThere are a number of other potential philosophical problems that are related to the Hard Problem. Ned \nBlock believes that there exists a \"Harder Problem of Consciousness\", due to the possibility of different \nphysical and functional neurological systems potentially having phenomenal overlap.[12] Another \npotential philosophical problem which is closely related to Benj Hellie's vertiginous question, dubbed \n\"The Even Harder Problem of Consciousness\", refers to why a given individual has their own particular \npersonal identity, as opposed to existing as someone else.[26] \n\n**Overview**\n\nCognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the \nproblem of consciousness\" (1995)[1] and expanded upon it in*The Conscious Mind*(1996). His works \nprovoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers \nfor his argumentative rigour and \"impeccable clarity\".[27] Pinker later said, in 2018, \"In the end I still \nthink that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a \nmeaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether \nthe same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with \nseveral other philosophers that it may be futile to hope for a solution at all, precisely because it is a \nconceptual problem, or, more accurately, a problem with our concepts.\"[28] Daniel Dennett and Patricia \nChurchland, among others, believe that the hard problem is best seen as a collection of easy problems that \nwill be solved through further analysis of the brain and behaviour.[29][30] \n\nConsciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of \nbeing awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \"*the feeling of what*\n*it is like to be something.\"*Consciousness, in this sense, is synonymous with*experience.*[31][27] \n\n**Chalmers' formulation**\n\n. . .even when we have explained the performance of all the cognitive and behavioral functions \nin the vicinity of experience—perceptual discrimination, categorization, internal access, verbal \nreport—there may still remain a further unanswered question:*Why is the performance of these*\n*functions accompanied by experience?*\n\n— David Chalmers, Facing up to the problem of consciousness \n\nThe problems of consciousness, Chalmers argues, are of two kinds: the*easy problems*and the*hard*\n*problem*. \n\n**Easy problems**\n\nThe easy problems are amenable to reductive inquiry. They are a logical consequence of lower-level facts \nabout the world, similar to how a clock's ability to tell time is a logical consequence of its clockwork and \nstructure, or a hurricane being a logical consequence of the structures and functions of certain weather", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia2.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
rec ( SCAUAA - 2 ). Journal of the American Philosophical Association B [ 1 ]. 52 – 71. doit LEL1L1L1L1L1L1L1H27 / ispa - 203347 ( Potpa :// doicorga ' s31.1117962F : spaa. 2033.47 ). S2CO3 Z286727.29 ( Mpr5.57api. semanticschrobiat. organg
80. Augustine of Hippo. \" Book 11, Chapter 26 \". City of God.
81. Descartes, Rene ( 1637 ). \" 4 \". Discourse on the Method.
82. Descartes, Rene ( 1641 ), \" Second Meditation \". Meditations on First Philosophy.
83. Chalmers, David ( 2020 ), “ Debunking Argumerts for Illusionion ” ( https :// philpapers. org / ec / CHADAF - 2 ), Journal of Concousness Studies. If ( 5 – 6 ): 258 – 261.
84 Chalmers, David ( 2002 ), \" Debunking Arguments for Illusionion \" [ https :// philpapers. org / ec / CHADAF - 2 ), Journal of Corocousness Studies. ZY ( 5 – 6 )]. ZSI - 201.
85. Strawson, C - ( 20124 ), “ The Consciousness Deniers ” [ https :// www. mybooks. com / daily / 2018 / 03.3 / 39e - consciousness - demiers $). The New York Review of Books.
86. Koch, Christof ( 20159 ). The Feeling of Life itself : Why Consciousness is Everywhere But Can ’ t be Computed MIT Press. p. 2
87. Koch, Christal ( 20159 ). The Feeling of Life Itself : Why Consciousness is Everywhere But Can ’ t be Computed MIT Press. p. 3.
88. Balmer, A ( 2020 ), “ Soft - Wired Illusionism vs. the Meta - Problem of Consciousness ”,( https :// ohjlpapers. org / rec / BanLSIV ). Journal of Consoousness Studies : zf ( p - 6 ). 26 – 37.
89. Chalmers, David ( 2020 ), ' Is the Hard Problem of Consciousness Universal?\". Journal of Contoossness Studies : Zf ( 5 – 6 ): 221 – 257.
90.91 Papineau, D ( 20159, “ Response to Chalmers ” The Meta - Problem of Consciousness ” ( https :// philgapers. org / res :/ PPTC -( 5 ). Journal of Consciousness Studies : 86 ( 0 – 10 ): 170 – 121.
92... ILevine, \" Conceivability, Identity, and the Explanatory Gap \" in Stuart R. Hameroff, Affed W. Kazaniak and David Chalmers ( eds.). Towards a Science of Corsciousness III : The Third Tucson Discussions and Debates, The MIT Peess, 24
92. Gennaro, Rocco. 3 “ Consciousness ” ( https :// www. ep. utm. edu / consciou ). Internet Encyclopedia of Philosophy.
ISE, Brick, Next ’, Stabilitaker, Publishti, CDERS, Conceptual Anglobiological, Qualitary, and the Ecytopatory Color ’, PrtqcHewernyu edu / goacildeptibilitie / faculty / brock - bropers / EcoplanatoryGag adily ( PSF ), The Phitosps
94 Stallgar, Dariel ( 2005 ), “ Physicalesm and Phenomenal Concepter ”, Mind & Languager, 20 ( 5 ). 490 – 494 ( 00 : 111111111111111111110259 : 3394.33055.0029Ex ( Pitprc / l9bri. orga10.1111111942F ), 02939 :. 0094.2 : 00296.4 ).
55. Chalmers, Devid ( 2006 ), \" Phenomenal Concepts and the Explanatory Ctg /\" ( http :// corocc. ne
\n\n96. Wierzbicka, A. (2019). \"From 'Consciousness' to 'I Think, I Feel, I Know': A Commentary on \n\nDavid Chalmers\".*Journal of Consciousness Studies*.**26**(9–10): 257–269. \n\n97. Lau, Hakwan; Michel, Matthias (2019). \"A Socio-Historical Take on the Meta-Problem of \n\nConsciousness\".*Journal of Consciousness Studies*.**26**(9–10): 136–147. \n\n98. \"Is the hard problem of consciousness really that hard? | Brian Greene and Pat Churchland \nlock horns\" (https://www.youtube.com/watch?v=hru5d_wsu7g).*YouTube*. 9 July 2022. \n\n99. \"Abiogenesis\" (https://www.allaboutscience.org/abiogenesis.htm).", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia2.pdf" - }, - { - "text": "66. Harris, Sam. \"Making Sense #96\" (https://samharris.org/subscriber-extras/96-nature-conscio \nusness/).*SamHarris.org*. Sam Harris. Retrieved 27 August 2020. \"(25.45) TM:I think it will \nnot be a mystery. Life is not a mystery anymore, but a hundred and fifty years ago many \npeople thought that this is an irreducible mystery. (25:57) Harris:So you're not a fan \nanymore, if you ever were, of the framing by David Chalmers of the Hard Problem of \nConsciousness? Metzinger: No, that's so boring. I mean, that's last century. I mean, you \nknow, we all respect Dave [Chalmers], and we know he is very smart and has got a very fast \nmind, no debate about that. But conceivability arguments are just very, very weak. If you \nhave an ill-defined folk psychological umbrella term like \"consciousness\", then you can pull \noff all kinds of scenarios and zombie thought experiments. It doesn't really… It helped to \nclarify some issues in the mid 90's, but the consciousness community has listened to this \nand just moved on. I mean nobody of the serious researchers in the field thinks about this \nanymore, but it has taken on like a folkloristic life of its own. A lot of people talk about the \nHard Problem who wouldn't be able to state what it consists in now.\" \n\n67. Garrett, Brian Jonathan (May 2006). \"What the History of Vitalism Teaches Us About \n\nConsciousness and the 'Hard Problem' \".*Philosophy and Phenomenological Research*.**72**\n(3): 576–588. doi:10.1111/j.1933-1592.2006.tb00584.x (https://doi.org/10.1111%2Fj.1933-1 \n592.2006.tb00584.x). \n\n68. Hacker, Peter (2010). \"Hacker's challenge\" (http://philpapers.org/rec/HACHC).*The*\n\n*Philosophers' Magazine*.**51**(51): 23–32. doi:10.5840/tpm2010517 (https://doi.org/10.5840% \n2Ftpm2010517). \n\n69. Schaal, David W. (2005). \"Naming Our Concerns About Neuroscience: A Review of Bennett \nand Hacker's*Philosophical Foundations of Neuroscience*\" (https://www.ncbi.nlm.nih.gov/pm \nc/articles/PMC1389787).*Journal of the Experimental Analysis of Behavior*.**84**(3): 683–692. \ndoi:10.1901/jeab.2005.83-05 (https://doi.org/10.1901%2Fjeab.2005.83-05). PMC 1389787 \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1389787). PMID 16596986 (https://pubmed. \nncbi.nlm.nih.gov/16596986). \n\n70. Dennett, Daniel C. (1979). \"On the Absence of Phenomenology\". In Gustafson, Donald F.; \nTapscott, Bangs L. (eds.).*Body, Mind, and Method*. Kluwer Academic Publishers. pp. 93– \n113. \n\n71. Dennett, Daniel C. (1991).*Consciousness Explained*. Penguin Books. \n72. Dennett, Daniel C. (2003). \"Explaining the 'magic' of consciousness\".*Journal of Cultural and*\n*Evolutionary Psychology*.**1**(1): 7–19. doi:10.1556/jcep.1.2003.1.2 (https://doi.org/10.1556% \n2Fjcep.1.2003.1.2). S2CID 144560246 (https://api.semanticscholar.org/CorpusID:14456024 \n6). \n\n73. Dennett, Daniel C. (1991).*Consciousness explained*(https://archive.org/details/consciousne \n\nssexp00denn). Boston: Little, Brown and Company. ISBN 978-0316180658. \n\n74. Anthis, Jacy (2022). \"Consciousness Semanticism: A Precise Eliminativist Theory of \nConsciousness\" (https://philarchive.org/rec/ANTCSA).*Biologically Inspired Cognitive*\n*Architectures 2021*. Studies in Computational Intelligence. Vol. 1032. pp. 20–41. \ndoi:10.1007/978-3-030-96993-6_3 (https://doi.org/10.1007%2F978-3-030-96993-6_3). \nISBN 978-3-030-96992-9. Retrieved 7 August 2022. \n\n75. Irvine, Elizabeth (2013).*Consciousness as a scientific concept: a philosophy of science*\n\n*perspective*. Studies in brain and mind. Vol. 5. Dordrecht; New York: Springer-Verlag. p. 167 \n(https://books.google.com/books?id=jO4HNB7OoUgC&pg=PA167). ISBN 9789400751729. \n76. Chalmers, David (2018). \"The Meta-Problem of Consciousness\" (http://consc.net/papers/me \n\ntaproblem.pdf) (PDF).*Journal of Consciousness Studies*.**25**(9–10): 6–61. Retrieved \n6 February 2019. \n\n77. Graziano, Michael (2013).*Consciousness and the social brain*. Oxford; New York: Oxford \n\nUniversity Press. ISBN 978-0190263195.", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia2.pdf" - }, - { - "text": "physical constituents. For example, water is nothing \nmore than H2O molecules, and understanding everything \nabout H2O molecules is to understand everything there is \nto know about water. But consciousness is not like this. \nKnowing everything there is to know about the brain, or \nany physical system, is not to know everything there is to \nknow about consciousness. Consciousness, then, must \nnot be purely physical.[27] \n\n\n\n**Implications for physicalism**\n\n\n\nThe hard problem is often illustrated by \nappealing to the logical possibility of inverted \nvisible spectra. If there is no logical \ncontradiction in supposing that one's colour \nvision could be inverted, it follows that \nmechanistic explanations of visual processing \ndo not determine facts about what it is like to \nsee colours. \n\nChalmers's \nidea contradicts physicalism, sometimes \nlabelled materialism. This is the view that everything that \nexists is a physical or material thing, so everything can \nbe reduced to microphysical things. For example, the \nrings of Saturn are a physical thing because they are \nnothing more than a complex arrangement of a large \nnumber of subatomic particles interacting in a certain way. \nAccording to physicalism, everything, including consciousness, \ncan be explained by appeal to its microphysical constituents. \nChalmers's*hard problem*presents a counterexample to this view \nand to other phenomena like swarms of birds, since it suggests that \nconsciousness, like swarms of birds, cannot be reductively \nexplained by appealing to their physical constituents. Thus, if the \nhard problem is a real problem then physicalism must be false, and \nif physicalism is true then the hard problem must not be a real \nproblem. \n\nA swarm of birds showing high \norder structure emerging from \nsimpler physical constituents \n\n**Historical precedents**\n\nThe hard problem of consciousness has scholarly antecedents considerably earlier than Chalmers. \nChalmers himself notes that \"a number of thinkers in the recent and distant past\" have \"recognised the \nparticular difficulties of explaining consciousness.\"[33] He states that all his original 1996 paper \ncontributed to the discussion was \"a catchy name, a minor reformulation of philosophically familiar \npoints\".[33] \n\nAmong others, thinkers who have made arguments similar to Chalmers' formulation of the hard problem \ninclude Isaac Newton,[34] John Locke,[35] Gottfried Wilhelm Leibniz,[36][34] John Stuart Mill,[37] and \nThomas Henry Huxley.[38][34] Likewise, Asian philosophers like Dharmakirti and Guifeng Zongmi \ndiscussed the problem of how consciousness arises from unconscious matter.[34][39][40][41]", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia2.pdf" - }, - { - "text": "134. Blackmore, Susan (2014). \"The Neural Correlates of Consciousness\" (https://www.edge.org/ \n\nresponse-detail/25457).*Edge.org*. Retrieved 22 April 2018. \n\n135. Krohn, Stephan; Ostwald, Dirk (2017). \"Computing integrated information\" (https://www.ncbi. \nnlm.nih.gov/pmc/articles/PMC6007153).*Neuroscience of Consciousness*.**2017**(1): nix017. \ndoi:10.1093/nc/nix017 (https://doi.org/10.1093%2Fnc%2Fnix017). PMC 6007153 (https://ww \nw.ncbi.nlm.nih.gov/pmc/articles/PMC6007153). PMID 30042849 (https://pubmed.ncbi.nlm.ni \nh.gov/30042849). \n\n136. Cerullo, Michael A. (September 2015). Kording, Konrad P. (ed.). \"The Problem with Phi: A \n\nCritique of Integrated Information Theory\" (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC45 \n74706).*PLOS Computational Biology*.**11**(9): e1004286. Bibcode:2015PLSCB..11E4286C \n(https://ui.adsabs.harvard.edu/abs/2015PLSCB..11E4286C). \ndoi:10.1371/journal.pcbi.1004286 (https://doi.org/10.1371%2Fjournal.pcbi.1004286). \nPMC 4574706 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4574706). PMID 26378789 \n(https://pubmed.ncbi.nlm.nih.gov/26378789). \n\n137. Mørch, Hedda Hassel (2017). \"The Integrated Information Theory of Consciousness\" (http \n\ns://philosophynow.org/issues/121/The_Integrated_Information_Theory_of_Consciousness). \n*Philosophy Now*. Retrieved 22 April 2018. \n\n138. Oizumi, Masafumi; Albantakis, Larissa; Tononi, Giulio (May 2014). \"From the \n\nPhenomenology to the Mechanisms of Consciousness: Integrated Information Theory 3.0\" \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4014402).*PLOS Computational Biology*.**10**\n(5): e1003588. Bibcode:2014PLSCB..10E3588O (https://ui.adsabs.harvard.edu/abs/2014PL \nSCB..10E3588O). doi:10.1371/journal.pcbi.1003588 (https://doi.org/10.1371%2Fjournal.pcb \ni.1003588). PMC 4014402 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4014402). \nPMID 24811198 (https://pubmed.ncbi.nlm.nih.gov/24811198). \n\n139. Mindt, Garrett (2017). \"The Problem with the 'Information' in Integrated Information Theory\" \n\n(http://newdualism.org/papers/G.Mindt/Mindt-JCS2017.pdf) (PDF).*Journal of*\n*Consciousness Studies*.**24**(7–8): 130–154. Retrieved 22 February 2022. \n\n140. Baars, Bernard J. (2005). \"Global workspace theory of consciousness: Toward a cognitive \nneuroscience of human experience\".*The Boundaries of Consciousness: Neurobiology and*\n*Neuropathology*. Progress in Brain Research. Vol. 150. pp. 45–53. \nCiteSeerX 10.1.1.456.2829 (https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456. \n2829). doi:10.1016/S0079-6123(05)50004-9 (https://doi.org/10.1016%2FS0079-6123%280 \n5%2950004-9). ISBN 9780444518514. PMID 16186014 (https://pubmed.ncbi.nlm.nih.gov/1 \n6186014). \n\n141. Dehaene, Stanislas; Naccache, Lionel (2001). \"Towards a cognitive neuroscience of \n\nconsciousness: basic evidence and a workspace framework\" (http://zoo.cs.yale.edu/classes/ \ncs671/12f/12f-papers/dehaene-consciousness.pdf) (PDF).*Cognition*.**79**(1–2): 1–37. \ndoi:10.1016/S0010-0277(00)00123-2 (https://doi.org/10.1016%2FS0010-0277%2800%2900 \n123-2). PMID 11164022 (https://pubmed.ncbi.nlm.nih.gov/11164022). S2CID 1762431 (http \ns://api.semanticscholar.org/CorpusID:1762431). Retrieved 5 April 2019. \n\n142. Dalton, J. W. (1997). \"The unfinished theatre\".*Journal of Consciousness Studies*.**4**(4): \n\n316–318. \n\n143. Elitzur, Avshalom C. (1997). \"Why don't we know what Mary knows? Baars' reversing the \n\nproblem of qualia\".*Journal of Consciousness Studies*.**4**(4): 319–324. \n\n144.*The Meta-Problem of Consciousness | Professor David Chalmers | Talks at Google*(https:// \n\nwww.youtube.com/watch?v=OsYUWtLQBS0), 2 April 2019, retrieved 2022-01-11 \n145. Stoppard, Tom (28 January 2015). \"First Person\".*Programme notes*. London: Royal \n\nNational Theatre.", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia2.pdf" - }, - { - "text": "34. Chalmers, David (2020). \"Is the hard problem of consciousness universal?\" (http://consc.ne \n\nt/papers/universal.pdf) (PDF).*Journal of Consciousness Studies*.**27**(5–6): 227–257. \nRetrieved 22 February 2022. \n\n35. Locke, John (1722).*The works of John Locke: in three volumes*. Vol. 1. London: Printed for \n\nA. Churchill, and A. Manship, and sold by W. Taylor in Pater-noster-Row. p. 293 (https://book \ns.google.com/books?id=0BfmAAAAMAAJ&pg=PA293). \n\n36. Leibniz,*Monadology,*17, as quoted by Aranyosi, Istvan (2004). \"Chalmers's zombie \n\narguments\" (http://www.personal.ceu.hu/students/03/Istvan_Aranyosi/Chapter%20IV.pdf) \n(PDF) (draft ed.). Central European University Personal Pages. \n\n37. Mill, John Stuart.*A System of Logic*(1843), Book V, Chapter V, section 3 \n38. Huxley, Thomas Henry; Youmans, William Jay (1868).*The elements of physiology and*\n*hygiene: a text-book for educational institutions*. New York: D. Appleton and company. \np. 178 (https://books.google.com/books?id=aVUAAAAAYAAJ&pg=PA178). \n\n39. Arnold, Dan (2021). \"Philosophy of Mind's \"Hard Problem\" in Light of Buddhist Idealism\". In \nEmmanuel, Steven M. (ed.).*Philosophy's Big Questions: Comparing Buddhist and Western*\n*Approaches*. New York: Columbia University Press. pp. 97–128. ISBN 978-0231174879. \n40. Bryan Van Norden,*Buddhism Comes to China*(https://www.youtube.com/watch?v=Q1xv3H \n\nmUddY), 17 March 2021, retrieved 2021-12-29 \n\n41. Tiwald, Justin; Van Norden, Bryan W. eds. (2005),*Readings in Later Chinese Philosophy,*p. \n\n101. Hackett Publishing. \n\n42. Levine, J. 1983. “Materialism and qualia: the explanatory gap”.*Pacific Philosophical*\n\n*Quarterly*, 64: 354–361. \n\n43. Weisberg, Josh. \"The Hard Problem of Consciousness\" (https://www.iep.utm.edu/hard-con/). \n\n*Internet Encyclopedia of Philosophy*. \n\n44. Seager, William. \"Are Zombies Logically Possible?\" (https://www.utsc.utoronto.ca/~seager/z", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Today there is a strong tendency to simply*equate*consciousness with the qualia. Yet there is \nclearly something not quite right about this. The \"itchiness of itches\" and the \"hurtfulness of \npain\" are qualities we are conscious*of*. So philosophy of mind tends to treat consciousness as \nif it consisted simply of the contents of consciousness (the phenomenal qualities), while it \nreally is precisely*consciousness*of contents, the very givenness of whatever is subjectively \ngiven. And therefore the problem of consciousness does not pertain so much to some alleged \n\"mysterious, nonpublic objects\", i.e. objects that seem to be only \"visible\" to the respective \nsubject, but rather to the nature of \"seeing\" itself (and in today’s philosophy of mind \nastonishingly little is said about the latter).[129] \n\n**Relationship to scientific frameworks**\n\n\n \n \n \n \n [html]\n
SpecimensTablePatientsTableTableTableDevelopmentTableTableSinceState
\n\n\n \n \n \n \n [html]\n
Solved.StatesticsTableTableTableMaximumTemperature ( mm )TableSince 15DataAdjustedSpecies
\n\nOne can always ask why these processes of availability should give rise to consciousness in \nthe first place. As yet we cannot explain why they do so, and it may well be that full details \nabout the processes of availability will still fail to answer this question. Certainly, nothing in \nthe standard methodology I have outlined answers the question; that methodology assumes a \nrelation between availability and consciousness, and therefore does nothing to explain it. [...] \nSo the hard problem remains. But who knows: Somewhere along the line we may be led to \nthe relevant insights that show why the link is there, and the hard problem may then be \nsolved.[132] \n\nThe neuroscientist and Nobel laureate Eric Kandel wrote that locating the NCCs would not solve the hard \nproblem, but rather one of the so-called easy problems to which the hard problem is contrasted.[133] \nKandel went on to note Crick and Koch's suggestion that once the binding problem—understanding what \naccounts for the unity of experience—is solved, it will be possible to solve the hard problem \nempirically.[133] However, neuroscientist Anil Seth argued that emphasis on the so-called hard problem is \na distraction from what he calls the \"real problem\": understanding the neurobiology underlying", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia2.pdf" - }, - { - "text": "This stance has recently taken on the name of*illusionism*: the view that phenomenal consciousness is an \nillusion. The term was popularized by the philosopher Keith Frankish.[60] Frankish argues that \n\"illusionism\" is preferable to \"eliminativism\" for labelling the view that phenomenal consciousness is an \nillusion. More substantively, Frankish argues that illusionism about phenomenal consciousness is \npreferable to realism about phenomenal consciousness. He states: \"Theories of consciousness typically \naddress the hard problem. They accept that phenomenal consciousness is real and aim to explain how it \ncomes to exist. There is, however, another approach, which holds that phenomenal consciousness is an \nillusion and aims to explain why it seems to exist.\"[19] Frankish concludes that illusionism \"replaces the \nhard problem with the illusion problem—the problem of explaining how the illusion of phenomenality \narises and why it is so powerful.\"[19] \n\nThe philosopher Daniel Dennett is another prominent figure associated with illusionism. After Frankish \npublished a paper in the Journal of Consciousness Studies titled*Illusionism as a Theory of*\n*Consciousness,*[60] Dennett responded with his own paper with the spin-off title*Illusionism as the*\n*Obvious Default Theory of Consciousness.*[61] Dennett has been arguing for the illusory status of \nconsciousness since early on in his career. For example, in 1979 he published a paper titled*On the*\n*Absence of Phenomenology*(where he argues for the nonexistence of phenomenal consciousness).[70] \nSimilar ideas have been explicated in his 1991 book Consciousness Explained.[71] Dennett argues that the \nso-called \"hard problem\" will be solved in the process of solving what Chalmers terms the \"easy \nproblems\".[16] He compares consciousness to stage magic and its capability to create extraordinary \nillusions out of ordinary things.[72] To show how people might be commonly fooled into overstating the \naccuracy of their introspective abilities, he describes a phenomenon called change blindness, a visual \nprocess that involves failure to detect scenery changes in a series of alternating images.[73] He \naccordingly argues that consciousness need not be what it seems to be based on introspection. To address \nthe question of the hard problem, or how and why physical processes give rise to experience, Dennett \nstates that the phenomenon of having experience is nothing more than the performance of functions or the \nproduction of behavior, which can also be referred to as the easy problems of consciousness.[16] Thus, \nDennett argues that the hard problem of experience is included among—not separate from—the easy \nproblems, and therefore they can only be explained together as a cohesive unit.[72] \n\nEliminativists differ on the role they believe intuitive judgement plays in creating the apparent reality of \nconsciousness. The philosopher Jacy Reese Anthis is of the position that this issue is born of an \noverreliance on intuition, calling philosophical discussions on the topic of consciousness a form of \n\"intuition jousting\".[74] But when the issue is tackled with \"formal argumentation\" and \"precise \nsemantics\" then the hard problem will dissolve.[74] The philosopher Elizabeth Irvine, in contrast, can be \nread as having the opposite view, since she argues that phenomenal properties (that is, properties of \nconsciousness) do not exist in our common-sense view of the world. She states that \"the hard problem of \nconsciousness may not be a genuine problem for non-philosophers (despite its overwhelming obviousness \nto philosophers).\"[75]", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia2.pdf" - }, - { - "text": "impossible within the bounds of nature but possible within the bounds of logic.[47] This would imply that \nfacts about experience are not logically entailed by the \"physical\" facts. Therefore, consciousness is \nirreducible. In Chalmers' words, \"after God (hypothetically) created the world, he had more work to \ndo.\"[48] Daniel Dennett, a philosopher of mind, criticised the field's use of \"the zombie hunch\" which he \ndeems an \"embarrassment\"[49] that ought to \"be dropped like a hot potato\".[29] \n\n**Knowledge argument**\n\nThe knowledge argument, also known as*Mary's Room*, is another common thought experiment: A \nhypothetical neuroscientist named Mary has lived her whole life in a black-and-white room and has never \nseen colour before. She also happens to know everything there is to know about the brain and colour \nperception.[50] Chalmers believes[48] that when Mary sees the colour red for the first time, she gains new \nknowledge — the knowledge of \"what red looks like\" — which is distinct from, and irreducible to, her \nprior physical knowledge of the brain or visual system. A stronger form of the knowledge argument[50] \nclaims not merely that Mary would lack subjective*knowledge*of \"what red looks like,\" but that she \nwould lack knowledge of an objective*fact*about the world: namely, \"what red looks like,\" a non-physical \nfact that can be learned only through direct experience (qualia). Others, such as Thomas Nagel, take a \n\"physicalist\" position, disagree with the argument in its stronger and/or weaker forms.[50] For example, \nNagel put forward a \"speculative proposal\" of devising a language that could \"explain to a person blind \nfrom birth what it is like to see.\"[31] The knowledge argument implies that such a language could not \nexist. \n\n**Philosophical responses**\n\nDavid Chalmers' formulation of the hard problem of consciousness provoked considerable debate within \nphilosophy of mind, as well as scientific research.[43] \n\nis considered a problem primarily for \nThe hard problem \nphysicalist views of the mind (the view that the mind is a physical \nobject or process), since physical explanations tend to be \nfunctional, or structural. Because of this, some physicalists have \nresponded to the hard problem by seeking to show that it dissolves \nupon analysis. Other researchers accept the problem as real and \nseek to develop a theory of consciousness' place in the world that \ncan solve it, by either modifying physicalism or abandoning it in \nfavour of an alternative ontology (such as panpsychism or \ndualism). A third response has been to accept the hard problem as \nreal but deny human cognitive faculties can solve it. \nA diagram showing the relationship \nbetween various views concerning \nthe relationship between \nconsciousness and the physical \nworld \n\nPhilPapers is an organization that archives academic philosophy \npapers and periodically surveys professional philosophers about their views. It can be used to gauge \nprofessional attitudes towards the hard problem. As of the 2020 survey results, it seems that the majority \nof philosophers (62.42%) agree that the hard problem is real, with a substantial minority that disagrees \n(29.76%).[25]", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia2.pdf", - "query": "What is the role of the PhilPapers organization ?", - "target_page": 6, - "target_passage": " PhilPapers is an organization that archives academic philosophy papers and periodically surveys professional philosophers about their views.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "' s role is to assist the Board onsibilities associated with the ounts, its external financial tiemal control structure, riskannual declaration of their independence to the Audit Committee.", - "page_start": 36, - "page_end": 36, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Chatfeld, Tom ( 2017 ), Critical Thinking : Your Guide to Effective Argument, Successful Analysis and Independent Study. Sage, p. 154.153.970 - 3.5264 - 3.677.7.
Chua, Eugane ( DILT ), “ An Emplirical Floude to Logical “ Connectionalizem ” ( https :// philipapers. org / expCR4 ( 425 ), Legic, Pationality, and interaction Lecture Kites in Computer Science. V01.2465. pp, GILL - 635, d012015979.3 - 650
• Clocksin, William F, Mellish, Christopher S. ( 2003 ). \" The. Relation of Prolog to Logic \" [ https scllink paringecronichaged [ 33.3007070707070707070707070707045 - 342 - 50485.07097097097097097097097097097097097097097097092
• Cook, Roy T, ( 2009 ), Dictionary of Philosophical Logic Edinburgh University Press, p. 124 ISBIV STR - D - 7480 - 3L97 - 1.
• Copi, Inving M2, Cohen, Carl ; Rodych, Victor ( 2015 ), Introduction to Logic. Routledge. 630N - 970 - 3 : 551.- 385057.- 5
• Conhum, Philp ( 2015 ), \" Generally and Logical Constanty \", Revista Partuguesa de Filtopla, # 3 ( 4 ): \" Fills \" risk \"[ 12 ], \" PB / pgf ( 2013 ), [ 21 ], ↑ 4.5753 [ https :// dsplaying \"[ 31 ], \" PB0 [ 9 / 9 / 979 pfY2015, ↑ 5.55N ( 3570 - 5253 ( 100p / 203 ) [ 9
��� Crulag, Ecknard ( LSRB ), Roudledge Encyclopedia of Philosophy ( https :// philipapers. org / necIEE, ARD ), Rodelete : ISBB ( FIT - 4 - 5172 ), Actively ( fittps :// web. archivest. org / web20202012.12.11.14SPitps :// philpapers. org / rp
• Cummings, Louise ( 2010 ), \" Abduction \". The Routledge Pragmatics Encyclopedia. Routledge, p. 2. ISBN 978 - 3.135 - 21457.9.
• Cunningham, Dariel, \" Set Theory \" ( https :// ep. utm. edu / set - theol ). Internet Encyclopedia of Philosophy. Retrieved 23 September 2022.
• T / Agoption, Maranife, Findin, Lacianos ( 2005 ): “ The Enduring Scandard of Deduction is Progranistional upsis, Reading Alcoholic Antermatively ” “ Systhways BET ( 271.271.251.261.261.251.252.252.259.269.489.489.489.499.69,
• Deintith, John ; Whight, Estmund ( 2008 ). A Dictionary of Computing OUP. ISBN 978 - 0 - 129 - 923400 - 49.
• van Dalen, Dirk ( L994 ), Logic and Structure. Springer. Chapter 1.5. ( SBV976 - 387 - 57839 - 2
• Dasal, Matthew R. “ Nyava ”.( https :// ep. utm. edu / nyarya?). Internet Encyclopedia of Philosphy. Retrieved 12 March 2023.
• Dick, Anthony S., Muller, Ulrich ( 2017 ). Advancing Developmental Science : Philosophy : Theory, and Method. Taylor & Francis, p. 257.1SBN 37B - 2 - 352 - 70456 - 4.
• Douwn, Igor ( 2022 ). “ Abduction ” ( https :// plates. startford. edulentries / abduction ). The Stanford Encyclopedia of Pilitizophy. Mataphysics : Research. Lab. Stanford University. Actived [ 10tps :// web. archies. arg / web / co23.
", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia1.pdf" - }, - { - "text": "**Areas of research**\n\nLogic is studied in various fields. In many cases, this is done by applying its formal method to specific \ntopics outside its scope, like to ethics or computer science.[156] In other cases, logic itself is made the \nsubject of research in another discipline. This can happen in diverse ways. For instance, it can involve \ninvestigating the philosophical assumptions linked to the basic concepts used by logicians. Other ways \ninclude interpreting and analyzing logic through mathematical structures as well as studying and \ncomparing abstract properties of formal logical systems.[157] \n\n**Philosophy of logic and philosophical logic**\n*Philosophy of logic*is the philosophical discipline studying the scope and nature of logic.[59] It examines \nmany presuppositions implicit in logic, like how to define its basic concepts or the metaphysical \nassumptions associated with them.[158] It is also concerned with how to classify logical systems and \nconsiders the ontological commitments they incur.[159]*Philosophical logic*is one of the areas within the \nphilosophy of logic. It studies the application of logical methods to philosophical problems in fields like \nmetaphysics, ethics, and epistemology.[160] This application usually happens in the form of extended or \ndeviant logical systems.[161] \n\n**Metalogic**\n\nMetalogic is the field of inquiry studying the properties of formal logical systems. For example, when a \nnew formal system is developed, metalogicians may study it to determine which formulas can be proven \nin it. They may also study whether an algorithm could be developed to find a proof for each formula and \nwhether every provable formula in it is a tautology. Finally, they may compare it to other logical systems \nto understand its distinctive features. A key issue in metalogic concerns the relation between syntax and \nsemantics. The syntactic rules of a formal system determine how to deduce conclusions from premises, \ni.e. how to formulate proofs. The semantics of a formal system governs which sentences are true and \nwhich ones are false. This determines the validity of arguments since, for valid arguments, it is \nimpossible for the premises to be true and the conclusion to be false. The relation between syntax and \nsemantics concerns issues like whether every valid argument is provable and whether every provable \nargument is valid. Metalogicians also study whether logical systems are complete, sound, and consistent. \nThey are interested in whether the systems are decidable and what expressive power they have. \nMetalogicians usually rely heavily on abstract mathematical reasoning when examining and formulating \nmetalogical proofs. This way, they aim to arrive at precise and general conclusions on these topics.[162] \n\n**Mathematical logic**\n\nThe term \"mathematical logic\" is sometimes used as a synonym of \"formal logic\". But in a more \nrestricted sense, it refers to the study of logic within mathematics. Major subareas include model theory, \nproof theory, set theory, and computability theory.[164] Research in mathematical logic commonly \naddresses the mathematical properties of formal systems of logic. However, it can also include attempts", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Haack, Susan (1978). \"1. 'Philosophy of logics' \".*Philosophy of Logics*(https://philpapers.or \ng/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1–10. ISBN 978- \n0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o \nrg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021. \nHaack, Susan (1996).*Deviant Logic, Fuzzy Logic: Beyond the Formalism*. University of \nChicago Press. ISBN 978-0-226-31133-3. \nHaaparanta, Leila (2009). \"1. Introduction\".*The Development of Modern Logic*. Oxford \nUniversity Press. pp. 4–6. ISBN 978-0-19-513731-6. \nHansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Archived (http \ns://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from \nthe original on 29 March 2021. Retrieved 18 March 2021. \nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\".*The Routledge*\n*Companion to Epistemology*(https://philpapers.org/rec/BOVSIO). London: Routledge. \npp. 609–620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 \n5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved \n4 January 2022. \nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" \n(https://plato.stanford.edu/entries/arabic-islamic-influence/).*The Stanford Encyclopedia of*\n*Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023. \nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv \ne/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed \nu/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022. \nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph \ny-of-logic).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2015042810173 \n2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original \non 28 April 2015. Retrieved 21 November 2021. \nHintikka, Jaakko J. (2023). \"Logical systems\" (https://www.britannica.com/topic/logic/Logical \n-systems).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2021120718465 \n6/https://www.britannica.com/topic/logic/Logical-systems) from the original on 7 December \n2021. Retrieved 4 December 2021. \nHintikka, Jaakko (1970). \"Information, Deduction, and the A Priori\".*Noûs*.**4**(2): 135–152. \ndoi:10.2307/2214318 (https://doi.org/10.2307%2F2214318). ISSN 0029-4624 (https://searc \nh.worldcat.org/issn/0029-4624). JSTOR 2214318 (https://www.jstor.org/stable/2214318). \nHintikka, Jaakko; Sandu, Gabriel (2006). \"What is Logic?\". In Jacquette, D. (ed.). \n*Philosophy of Logic*(https://philpapers.org/rec/JAAWIL). North Holland. pp. 13–39. \nISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207235525/https://ph \nilpapers.org/rec/JAAWIL) from the original on 7 December 2021. Retrieved 29 December \n2021. \nHintikka, Jaakko J.; Spade, Paul Vincent. \"History of logic\" (https://www.britannica.com/topi \nc/history-of-logic).*Encyclopædia Britannica*. Retrieved 23 September 2022. \nHonderich, Ted (2005).*The Oxford Companion to Philosophy*(https://philpapers.org/rec/HO \nNTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. \norg/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 \nJanuary 2021. Retrieved 2 January 2022. \nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\".*Logic: The Essentials*. Wadsworth. \npp. 189–237. ISBN 978-1-305-59041-0. \nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http \ns://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia1.pdf" - }, - { - "text": "The Foundation has a program of awarding grants to support chapters, affiliates, user groups, and \nindividuals in projects that further the mission of the Foundation. Chapters are independent organizations \nthat share the goals of the Foundation and support the goals within a specified geographical region. In \naddition to this work, which is reflected above in the awards and grants line, an overwhelming majority of \nthe Foundation’s project activities are carried out by an international network of volunteers, whose activity \nis not reflected in the tables above.", - "page_start": 16, - "page_end": 16, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
21. MRIIMEBExSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSSERSSERSSERSSER
22. Haseck 15F7B, pp. 1 – 2.4, Philosaphy of logics ; Himbke & Sandia 2005, pp. 15 – 17 ; Jacquette 2006, Introduction : Philosophy of logic today, pp. 1 – 12.
Z2. Heada : 3370, pp. 2 - 2.4, Philosophy of logacs ; 3acasyette : _DSK ; pp. 1 – 12, Introduction : Philosophy of logic today.
23. Heack 1597B, pp 5 - 71.9, Phliosophy of logics, Hintilkke & Sanda 2006, pp. 31 - 2, Hadek 1599b, pp. 220 – 30.
24. Heack 1.5570, pp : 1 - 10, Prilosophy of logics ; Grostic 2022, lead section ; 1.1 Formal and Informal Logic.
25. Johnson 2014, pp. 228 – 9.
Zn. Groather, Zfc2, lead section ; L. History Audi 13959a, Informal logic, Johnson 12993, pp. 255 - 274.
27. Craig 1996, Formal and informal logic, Johnson 1999, p. 267.
28.88air & Johnson 2000, pp. 53 – 97 ; Craig 1599, Formal and informal logic.
29. Johnssm 2999, pp. 265 – 270 ; van Eemeren et al., pp. 1 – 45, Informal Logic.
30. Groathe 2022.1. 1 Formal and Informal Logic, Audi 1599a, Informal logic, Honderich 2005, logic, informal.
31. Blein & Johnson : 2000, pp. 93 – 107, Groserke 2023, lead section ; 1.1 Formal and Informal Logic ; van Eemeren et al., p. 159.
32. Oaksford & Chater 2007, p. 47.
33. Craiga 1395, Formal and informal logic ; Wallon : 5957, pp. 2 – 3.6 – 5.1. A new model of argument ; Engel L992 ; pp. 59 – 92.2. The medium of language.
34. Blair & Johnson 1997, pp. 147 – 51.
St. Falkowork & Millis. ESCE, p. SR, VHsddle. Zr21L, p. 362 – 8.36. Informal logic and the educative - inductive distinction ; Blair 201L ; p. 47.
36. Vickers 2022 ; Nunes 2011, pp. 2060 – 9, Logical Reasoning and Learning.
37. Johnson 2014, p. 181, Johnson 1599, p. 257, Blair & Johnson 15937, pp. 147 – 51.
30. Vleet 2010, pp. ix - x, Introduction ; Dowden ; Stump.
39. Maltby, Day & Macaskill 2007, p. 564 ; Dowden.
40. Craig_1995, Formal and informal logic ; 3ohnson 1399, pp. 265 – 270.
41. Audi 1999b, Philosophy of logic ; Honderich 2005, philosophical logic.
42. Haack 1974, p. 51.
43. Audi 1999b, Philosophy of logic.
44. Falguera, Martinez - Vidal & Rosen 2021 ; Tondl 2012, p. 111.
45. Olk0M5ki β. Prin048kis 2023, pp. 55 – 50 [ https :// books. garogle. com / books? 55 – 59.85.0049.454.868597765 )
46. Audi 1999b, Philosophy of logic ; Pietroski 2021.
47. Audi 159990, Phl0sophy of logic ; Kusch 2020 ; Rush 2014 ; pp. 1 – 110.289 – 1590.
48. King 2019 ; Pickel 2020, pp. 2991 – 3006.
49. Honderich 2005, philosophical logic.
50. Pickel 2020, pp. 2991 – 3006.
52. Honderich 2005, philosophical logic, Craig 2995, Philosophy of logic ; Michaelson & Reimer 2013.
52. Michaelson & Reimer 2019.
53. Hintikka 2019, SNature and varieties of logic ; MacFarlate 2017.
54. Gomez - Torrente 20139 ; MacFatiane 2017 ; Honderich ZUD5, philosophical logic.
", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Shermer, Michael (25 October 2022).*Conspiracy: Why the Rational Believe the Irrational*. \nJHU Press. ISBN 978-1-4214-4445-1. \nSider, Theodore (2010).*Logic for Philosophy*. Oxford University Press. ISBN 978-0-19- \n957558-9. \nSiegel, Harvey; Biro, John (1997). \"Epistemic Normativity, Argumentation, and Fallacies\" (htt \nps://philpapers.org/rec/SIEENA).*Argumentation*.**11**(3): 277–292. \ndoi:10.1023/A:1007799325361 (https://doi.org/10.1023%2FA%3A1007799325361). \nS2CID 126269789 (https://api.semanticscholar.org/CorpusID:126269789). Archived (https:// \nweb.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA) from the original \non 28 February 2022. Retrieved 4 January 2022. \nSimpson, R. L. (2008).*Essentials of Symbolic Logic*(3rd ed.). Broadview Press. p. 14. \nISBN 978-1-77048-495-5. \nSmith, Robin (2022). \"Aristotle's Logic\" (https://plato.stanford.edu/entries/aristotle-logic/). \n*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 11 March 2023. \nSpade, Paul Vincent; Panaccio, Claude (2019). \"William of Ockham\" (https://plato.stanford.e \ndu/entries/ockham/#SummLogi).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. \nSpriggs, John (2012).*GSN – The Goal Structuring Notation: A Structured Approach to*\n*Presenting Arguments*. Springer Science & Business Media. pp. 20–22. ISBN 978-1-4471- \n2312-5. \nStairs, Allen (2017).*A Thinker's Guide to the Philosophy of Religion*. Routledge. p. 343. \nISBN 978-1-351-21981-5. \nSternberg, Robert J. \"Thought\" (https://www.britannica.com/topic/thought).*Encyclopædia*\n*Britannica*. Archived (https://web.archive.org/web/20211013145532/https://www.britannica.c \nom/topic/thought) from the original on 13 October 2021. Retrieved 14 October 2021. \nStolyar, Abram Aronovich (1 January 1984).*Introduction to Elementary Mathematical Logic*. \nCourier Corporation. ISBN 978-0-486-64561-2. \nStone, Mark A. (2012). \"Denying the Antecedent: Its Effective Use in Argumentation\" (https:// \nphilpapers.org/rec/STODTA).*Informal Logic*.**32**(3): 327–356. doi:10.22329/il.v32i3.3681 (ht \ntps://doi.org/10.22329%2Fil.v32i3.3681). Archived (https://web.archive.org/web/2022022812 \n3240/https://philpapers.org/rec/STODTA) from the original on 28 February 2022. Retrieved \n8 January 2022. \nStump, David J. \"Fallacy, Logical\" (https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical).*encyclopedia.com*. Archived (https://web. \narchive.org/web/20210215112403/https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical) from the original on 15 February 2021. \nRetrieved 20 March 2021. \nTalbott, William (2016). \"Bayesian Epistemology\" (https://plato.stanford.edu/entries/epistemo \nlogy-bayesian/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20210401034856/https://plato.sta \nnford.edu/entries/epistemology-bayesian/) from the original on 1 April 2021. Retrieved \n6 March 2021. \nTarski, Alfred (1994).*Introduction to Logic and to the Methodology of the Deductive*\n*Sciences*. Oxford University Press. p. 40. ISBN 978-0-19-802139-1. \nTondl, L. (2012).*Problems of Semantics: A Contribution to the Analysis of the Language*\n*Science*. Springer Science & Business Media. p. 111. ISBN 978-94-009-8364-9. \nVelleman, Daniel J. (2006).*How to Prove It: A Structured Approach*. Cambridge University \nPress. p. 8, 103. ISBN 978-0-521-67599-4. \nVickers, John M. (2022). \"Inductive Reasoning\" (https://www.oxfordbibliographies.com/displ \nay/document/obo-9780195396577/obo-9780195396577-0171.xml).*Oxford Bibliographies*. \nOxford University Press. Retrieved 18 January 2023.", - "page_start": 35, - "page_end": 35, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Rautenberg, Wolfgang (1 July 2010).*A Concise Introduction to Mathematical Logic*. \nSpringer. p. 15. ISBN 978-1-4419-1221-3. \nRendsvig, Rasmus; Symons, John (2021). \"Epistemic Logic\" (https://plato.stanford.edu/entri \nes/logic-epistemic/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Retrieved 11 March 2023. \nRestall, Greg; Standefer, Shawn (2023).*Logical Methods*. MIT Press. p. 91. ISBN 978-0- \n262-54484-9. \nRichardson, Alan W. (1998).*Carnap's Construction of the World: The Aufbau and the*\n*Emergence of Logical Empiricism*. Cambridge University Press. p. 15. ISBN 978-0-521- \n43008-1. \nRini, Adriane (13 December 2010).*Aristotle's Modal Proofs: Prior Analytics A8-22 in*\n*Predicate Logic*. Springer Science & Business Media. p. 26. ISBN 978-94-007-0050-5. \nRitola, Juho (1 December 2008). \"Walton's Informal Logic: A Pragmatic Approach\" (https://d \noi.org/10.22329%2Fil.v28i4.2856).*Informal Logic*.**28**(4): 335. doi:10.22329/il.v28i4.2856 (h \nttps://doi.org/10.22329%2Fil.v28i4.2856). \nRocci, Andrea (8 March 2017).*Modality in Argumentation: A Semantic Investigation of the*\n*Role of Modalities in the Structure of Arguments with an Application to Italian Modal*\n*Expressions*. Springer. p. 26. ISBN 978-94-024-1063-1. \nRošker, Jana S. (May 2015). \"Classical Chinese Logic: Philosophy Compass\".*Philosophy*\n*Compass*.**10**(5): 301–309. doi:10.1111/phc3.12226 (https://doi.org/10.1111%2Fphc3.1222 \n6). \nRunco, Mark A.; Pritzker, Steven R. (1999).*Encyclopedia of Creativity*. Academic Press. \np. 155. ISBN 978-0-12-227075-8. \nRush, Penelope (2014). \"Introduction\".*The Metaphysics of Logic*(https://philpapers.org/rec/ \nRUSTMO-4). Cambridge University Press. pp. 1–10. ISBN 978-1-107-03964-3. Archived (htt \nps://web.archive.org/web/20211207184954/https://philpapers.org/rec/RUSTMO-4) from the \noriginal on 7 December 2021. Retrieved 8 January 2022. \nSadegh-Zadeh, Kazem (2015).*Handbook of Analytic Philosophy of Medicine*. Springer. \np. 983. ISBN 978-94-017-9579-1. \nSagüillo, José M. (2014). \"Hintikka on Information and Deduction\".*Teorema: Revista*\n*Internacional de Filosofía*.**33**(2): 75–88. ISSN 0210-1602 (https://search.worldcat.org/issn/ \n0210-1602). JSTOR 43047609 (https://www.jstor.org/stable/43047609). \nSarukkai, Sundar; Chakraborty, Mihir Kumar (2022).*Handbook of Logical Thought in India*. \nSpringer Nature. pp. 117–8. ISBN 978-81-322-2577-5. \nSchagrin, Morton L. \"Metalogic\" (https://www.britannica.com/topic/metalogic).*Encyclopædia*\n*Britannica*. Retrieved 23 September 2022. \nSchechter, Joshua. \"Epistemology of Logic – Bibliography\" (https://philpapers.org/browse/ep \nistemology-of-logic).*PhilPapers*. Retrieved 11 September 2022. \nSchlesinger, I. M.; Keren-Portnoy, Tamar; Parush, Tamar (1 January 2001).*The Structure of*\n*Arguments*. John Benjamins Publishing. p. 220. ISBN 978-90-272-2359-3. \nSchreiner, Wolfgang (2021).*Thinking Programs: Logical Modeling and Reasoning About*\n*Languages, Data, Computations, and Executions*. Springer Nature. p. 22. ISBN 978-3-030- \n80507-4. \nScott, John; Marshall, Gordon (2009). \"analytic induction\".*A Dictionary of Sociology*(https:// \nwww.oxfordreference.com/view/10.1093/oi/authority.20110803095410661). Oxford \nUniversity Press. ISBN 978-0-19-953300-8. Archived (https://web.archive.org/web/2022010 \n8173225/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803095410661) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nShapiro, Stewart; Kouri Kissel, Teresa (2022). \"Classical Logic\" (https://plato.stanford.edu/e \nntries/logic-classical/#Sema).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Retrieved 19 July 2023.", - "page_start": 34, - "page_end": 34, - "source_file": "wikipedia1.pdf" - }, - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "Vidyabhusana, Satis Chandra (1988).*A History of Indian Logic: Ancient, Mediaeval and*\n*Modern Schools*. Motilal Banarsidass Publisher. p. 221. ISBN 978-81-208-0565-1. \nVleet, Van Jacob E. (2010). \"Introduction\".*Informal Logical Fallacies: A Brief Guide*(https://p \nhilpapers.org/rec/VLEILF). Upa. pp. ix–x. ISBN 978-0-7618-5432-6. Archived (https://web.ar \nchive.org/web/20220228035654/https://philpapers.org/rec/VLEILF) from the original on 28 \nFebruary 2022. Retrieved 2 January 2022. \nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ \nentries/logic-higher-order/).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ \nhttps://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. \nRetrieved 23 November 2021. \nWalton, Douglas N. (1987).*Informal Fallacies: Towards a Theory of Argument Criticisms*(htt \nps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http \ns://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the \noriginal on 2 March 2022. Retrieved 2 January 2022. \nWarren, Jared (2020).*Shadows of Syntax: Revitalizing Logical and Mathematical*\n*Conventionalism*(https://global.oup.com/academic/product/shadows-of-syntax-9780190086 \n152). Oxford University Press. ISBN 978-0-19-008615-2. \nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r \nec/WASLLA-3).*Journal of the History of Ideas*.**34**(3): 445–50. doi:10.2307/2708963 (http \ns://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963). \nWasilewska, Anita (2018).*Logics for Computer Science: Classical and Non-Classical*. \nSpringer. pp. 145–6. ISBN 978-3-319-92591-2. \nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/).*Internet Encyclopedia*\n*of Philosophy*. Retrieved 12 December 2021. \nWeddle, Perry (2011). \"Chapter 36. Informal logic and the eductive-inductive distinction\". \n*Across the Lines of Disciplines*(https://www.degruyter.com/document/doi/10.1515/97831108 \n67718.383/html). De Gruyter Mouton. pp. 383–388. doi:10.1515/9783110867718.383 (http \ns://doi.org/10.1515%2F9783110867718.383). ISBN 978-3-11-086771-8. Archived (https://w \neb.archive.org/web/20211231172343/https://www.degruyter.com/document/doi/10.1515/978 \n3110867718.383/html) from the original on 31 December 2021. Retrieved 2 January 2022. \nWesterståhl, Dag (1989). \"Aristotelian Syllogisms and Generalized Quantifiers\" (https://philp \napers.org/rec/WESASA).*Studia Logica*.**48**(4): 577–585. doi:10.1007/BF00370209 (https:// \ndoi.org/10.1007%2FBF00370209). S2CID 32089424 (https://api.semanticscholar.org/Corpu \nsID:32089424). Archived (https://web.archive.org/web/20220104182746/https://philpapers.o \nrg/rec/WESASA) from the original on 4 January 2022. Retrieved 4 January 2022. \nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp \nringer.com/article/10.1007/s10503-009-9131-5).*Argumentation*.**24**(1): 107–124. \ndoi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). \nISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap \ni.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 \n08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on \n8 January 2022. Retrieved 8 January 2022. \nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum \nLogic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved \n11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3.", - "page_start": 36, - "page_end": 36, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0510.pdf", - "query": "What explains mostly the physical behavior that occurs in region iii of thin films ?", - "target_page": 5, - "target_passage": "The observed behaviour in region iii) can be reason- ably attributed to the decreasing relevance of the con- tribution to the total energy of the system coming from the competitive interactions among NNN planes as the film thickness decreases", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The scenario just outlined for n = 8 results to be cor- \nrect in the thickness range 6 ≤ n . 15, where a clear \nseparation between TN (n) and TC(n) can be easily fig- \nured out. In such temperature window, the strong sur- \nface effects produce a quasi-FM set-up of the magnetic \nfilm structure along the z-direction. While leaving to the \nnext Section a more detailed discussion of this regime, we \nreport in Fig. 5 a plot of TN (n) and TC(n) vs. n for all \nthe simulated thicknesses. The separation between the \ntwo critical temperatures is maximum for n = 6, where \nTN (6) = 38(4), that is TN (6) ∼ 1 \n3 TC(6). For films with \nless than six layers no fan order is observed, i.e. for n = 5 \nand below the chirality does not display any typical fea- \nture of fan ordering at any temperature below TC(n). As \na representative quantity we finally look at the rotation \n\nThe observed behaviour in region iii) can be reason- \nably attributed to the decreasing relevance of the con- \ntribution to the total energy of the system coming from \nthe competitive interactions among NNN planes as the \nfilm thickness decreases; moreover, the thinness of the", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0510.pdf" - }, - { - "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. 68, \n\n1084–1088 (1989). \n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real \n\n\n \n \n \n \n [html]\n
[ 7 ] R. Seemann, S. Herminghans, C. Nets, S. Schlagowski, D. Podzimek, R. Kourad, H. Mantz, and K. Iacobs, “ Dysamics and structure formation in thin polymer melt films,” 1. Phys.- Condex. Matter[ 8 ] U. Thiele, “ Structure formation in thin kiquid films,” in S. Kalfudasis and U. Thiele, editors, “ Thin films of Soft Matter,” pages 25 – 93, Springer, Wien ( 2007 ).
[ 9 ] R. Xie. A. Karim, J. F. Ibuglas, C. C. C. C. Hun, and R. A. Weiss, “ Spinodal deverting of thin polymer films.” Phys. Rev. Lett. 8l, 1251 – 1254 ( 198 ).[ 10 ] R. Seenam, S. Herninghass, and K. facobs, “ Deveting patterns and nolecular forces : A mconcilizin, iniot,” Phys, Rev, Lett. 86.5534 – 5537 – 2001.
[ 11 ] U. Thirde. M. G. Velande, and K. Neufee, “ Deverting : Film rupture by nucleation in the spinodal regime,” Phys. Rev. Let. ( 016104 ( 2001 ).[ 12 ] M. Resitborn and K. Neuflex, “ Sarface patterns of laterally extended thin liquid tilms in three dimensions,” Phys. Rev. Lett. 8 ”, 046101 ( 2011 ).
[ 13 ] 1 Becker, G. Grin, R. Seeman, H. Maniz, K. Jacobs, K. Mexke, and R. Blossey, “ Complex deveting scenarios captured by this - tim models.” Nat. Mater 2.59 – 63 ( 2003 ).[ 14 ] C Redon, F. Brochard - Wurt, and F. Rondelez, “ Tronamics of deveting ” Phys. Rev. Lett. 66.715 – 718 ( 1991 ).
[ 15 ] R. Seeman, S. Herminghaus, and K. Jacobs, “ Shape of a liquid front upon develop.” Phys. Rev. Let. 8 ”, 196101 ( 2011 ).[ 10 ] R. Fetzer, K. Jaobs, A. Minch. B. Wagner, and T. P. Witebik, ‘ New slip regimes and the shape of deveting thin liquid films.’ Phys. Rev. Lett. MS, 127801 ( 2305 ).
[ 17 ] F. Brochan - Wyart and C. Redon, “ Dynamics of liquid rim instabilities,” Langmin K, 2124 – 233 ( 1992 ).[ 18 ] G, Reiter and A. Sharma, “ Auto - optimization of deweting rates by rin instabilities in slipping polymer films ” Phys. Rev. Lett. 8 ”, 166103 ( 2001 ).
[ 19 ] A. Minch and B. Wagner, ‘ Contact - line instability of dewetting thin films ’, ‘ Physica DB9.178 – 198 c2005 ).
", - "page_start": 25, - "page_end": 25, - "source_file": "1001.2669.pdf" - }, - { - "text": "F. Cinti(1,2,3), A. Rettori(2,3), and A. Cuccoli(2) \n(1) Department of Physics, University of Alberta, Edmonton, Alberta, Canada T6G 2J1 \n(2)CNISM and Department of Physics, University of Florence, 50019 Sesto Fiorentino (FI), Italy. and \n(3)CNR-INFM S3 National Research Center, I-41100 Modena, Italy \n(Dated: June 8, 2022) \n\nThe properties of helical thin films have been thoroughly investigated by classical Monte Carlo \nsimulations. The employed model assumes classical planar spins in a body-centered tetragonal \nlattice, where the helical arrangement along the film growth direction has been modeled by nearest \nneighbor and next-nearest neighbor competing interactions, the minimal requirement to get helical \norder. We obtain that, while the in-plane transition temperatures remain essentially unchanged with \nrespect to the bulk ones, the helical/fan arrangement is stabilized at more and more low temperature \nwhen the film thickness, n, decreases; in the ordered phase, increasing the temperature, a softening \nof the helix pitch wave-vector is also observed. Moreover, we show also that the simulation data \naround both transition temperatures lead us to exclude the presence of a first order transition for all \nanalyzed sizes. Finally, by comparing the results of the present work with those obtained for other \nmodels previously adopted in literature, we can get a deeper insight about the entwined role played \nby the number (range) of interlayer interactions and surface effects in non-collinear thin films. \n\nteractions by including six different exchange constants \nalong the c crystallographic axis, and gives a helix pitch \nwave-vector Qz such that Qzc′ ≃ 30◦, where c′ = c/2 is \nthe distance between nearest neighboring spin layers par- \nallel to the ab crystallographic planes, henceforth denoted \nalso as x − y planes, while z will be taken parallel to c. \nFor n > 16, n being the number of spin layers in the film, \na correct bulk limit is reached, while for lower n the film \nproperties are clearly affected by the strong competition \namong the helical pitch and the surface effects, which in- \nvolve the majority of the spin layers. \nIn the thickness \nrange n = 9 − 16, i.e. right for thickness values com- \nparable with the helical pitch, three different magnetic \nphases emerged, with the high-temperature, disordered, \nparamagnetic phase and the low-temperature, long-range \nordered one separated by an intriguing, \nintermediate- \ntemperature block phase, where outer ordered layers co- \nexist with some inner disordered ones, the phase tran- \nsition of the latter eventually displaying the signatures \nof a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film \ncollapses once and for all to a quasi-collinear order. \n\nI. INTRODUCTION \n\nfrustrated magnetic \nsystems1 still raises great interest, both in consequence \nof theoretical aspects, related to their peculiar criti- \ncal properties2, and in view of possible technological \napplications3. Indeed, beside conventional ferromagnetic \nor antiferromagnetic phase transitions, in many new ma- \nterials other nontrivial and unconventional forms of or- \ndering have been observed4,5. A quantity of particular \ninterest in this context is the spin chirality, an order pa- \nrameter which turned out to be extremely relevant in, \ne.g., magnetoelectric materials6, itinerant MnSi7, binary \ncompounds as FeGe8, glass transition of spins9, and XY \nhelimagnets, as Holmium, Terbium or Dysprosium10. In \nthe latter case, a new universality class was predicted be- \ncause a Z2 × SO(2) symmetry is spontaneously broken \nin the ordered phase2: In fact, when dealing with such \nsystems, in addition to the SO(2) symmetry of the spin \ndegrees of freedom ~Si, one has to consider also the Z2 \nsymmetry of the spin chirality κij ∝ \n\nThe study of low dimensional \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n4 \n\n] \nh \nc \ne \nm \n\n- \nt \na \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n1 \nv \n0 \n1 \n5 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nz \n\n~Si × ~Sj \nh \n.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0510.pdf" - }, - { - "text": "20 \n**(a)***n =*6 \n15 \n\n10 \n\n) \n. \ng \ne \nd \n( \n\n5 \n\n0 \n0 \n*l*\nϕ \n∆ 5 \n\n**(b)***n =*5 \n4 \n\n3 \n\n2 \n\n1 \n\n0 \n0 1 2 \n*l*\n\n140 \n\n120 ) \nK \n( \n100 \n*)*\n*n*\n*(*\n80 *C*\n\n*TN (n)*\n*TC (n)*\n*bulk*\n\n*T*\n*,*\n60 \n*)*\n*n*\n*(*\n40 \n*N*\n*T*\n*TN*\n20 \n\n0 \n0 2 4 6 8 \n10 \n*n*\n\nFIG. 5: Transition temperatures TN (n) and TC (n) vs. film \nthickness n. \n\nangle of the magnetization between nearest planes: \n\nl+1 + M y l M y \nM x \nl M x ∆ϕl = ϕl+1 − ϕl = arccos (10) \nl+1 \n(cid:2) (cid:3) \n\nFIG. 6: Rotation angle ∆ϕl between magnetic moments on \nNN layers (l + 1, l) at some low temperatures, for thickness \nn = 5 and n = 6, and lateral dimension L = 64. \n\nthe same is true for the crossing point of the Binder cu- \nmulant of the average magnetization M (not reported in \nfigure), which is located at TC(8) = 133.3(3) K. These \ndata give a first rough indication that also for n = 8 all \nthe planes of the sample are still ordering almost at the \nsame temperature; such property has been observed for \nall the investigated thicknesses n below 16, so that TC(n) \nresults quite n-independent (see also Fig. 5) . \nl , M y \n\nwhere (M x \nl ) is the magnetic vector profile for each \nplane l. ∆ϕl is displayed in Fig. 6a and Fig. 6b, for \nn = 6 and n = 5, respectively. In Fig. 6a, a quite clear \nfan stabilization is observed when the temperature de- \nfor n = 5, ∆ϕl keeps an \ncreases, while in Fig. 6b, i.e. \nalmost temperature independent very small value; what’s \nmore, ∆ϕl seems to loose any temperature dependence \nas T = 0 is approached. We attribute the absence of fan \narrangement for n ≤ 5 as simply due to the lack of “bulk \nplanes” inside the film, so that we are left with only a 2d \ntrend at TC(n), i.e. at the temperature where the order \nparameters defined in Eqs. (2) and (3) show a critical \nbehaviour. \n\nAlthough the layer subtraction does not seem to mod- \nify TC (n), the onset of helical arrangement is observed to \nshift at lower temperatures as n decreases. The chirality \nκ defined in Eq. (4) is reported in Fig 4b for n = 8. As the \ntemperature decreases, around T ∼ 80 K we can identify \na finite-size behaviour of κ which, at variance with the \nprevious one, can be easily recognized as typical of an \neffective phase transition. Such conclusion is confirmed \nby the analysis of the chiral susceptibility χκ (Fig. 4c), \nwhich for the largest L has a maximum at T = 85 K. As- \nsuming that the order parameter (4) is the relevant one \nto single out the onset of the fan arrangement, we can \nget a more accurate estimate of TN (8) by looking at the \nBinder cumulant u4(κ), reported in Fig. 4d. By making \nuse of the MH technique, we locate the crossing point at \nTN (8) = 92(2) K. Finally, it is worthwhile to observe as \nthe specific heat does not show any anomaly at TN (8), \nbeing the entropy substantially removed at TC (8). \n\nA possible framework to analyze the results presented \nin the previous Section is suggested by Fig. 5, where we \ni) high \ncan easily distinguish three significant regions: \nthickness, n > 16, where the films substantially display a \nbulk behaviour, with the single planes ordering tempera- \nture coinciding with the helical phase transition one; ii) \nintermediate thickness, 6 ≤ n . 15, where the tempera- \nture corresponding to the onset of in-plane order, TC (n), \nis still ≃ T Ho \nN , but where the helical/fan arrangement sta- \nbilizes only below a finite temperature TN (n) < TC (n); \niii) low thickness,1 ≤ n ≤ 5, where TC(n) . T Ho \nN but no \nfan phase is present at any temperature.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0510.pdf" - }, - { - "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion \n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid- \n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ- \n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport \n\nregime where the instability is almost completely independent of the interaction strengths and \n\na demixing regime where particles and liquid demix at the receding front thereby increasing its \n\ntransverse instability. \n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of \n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional \n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo- \n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by \n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend \n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between \n\nshort- and long-range interactions of solvent and/or solute with the substrate. We have, however, \n\nrestricted the examples given here to situations that can also be described using the KMC model. \n\nA further exploration will be presented elsewhere. \n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It \n\nresults from a long-wave approximation and consists of coupled evolution equations for the film \n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning \n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee- \n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the \n\ncombined effects of convection and evaporation. \n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques \n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica- \n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly \n\ntowards increasingly complex systems. For example, there have been investigations of the influ- \n\nence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal \n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap- \n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of \n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102], \n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding \n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "30 \n\n25 \n\n) \n. \ng \ne \nd \n( \n\n20 \n\n15 \n*x*\n*a*\n*m*\n*,*\n*z*\n10 \n*Q*\n\n5 \n\n0 \n0 40 \n*T*(K) \n\nFIG. 8: (color online) Qz, position of the maximum of S(~q), \nvs. temperature for thickness n = 8. Inset: magnetic vector \n(mx \nl ) profile for some temperatures for L = 64. Colors \nand symbols as in Fig. 2. FIG. 7: (color online) ∆ϕl(T ) vs. temperature for the surface \nplanes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), \nl = 4 (circles). Straight lines and full symbols: n = 8. Dashed \nlines and open symbols: n = 16. \nl , my \n\nfilm leads to an effective 2d-like trend. Region ii) looks \nhowever more intriguing, and requires a more accurate \ndiscussion, which can benefit from a careful comparison \nof the behaviour of a given quantity in regions i) and ii). \n\n0 \n7 0 1 2 3 4 \n\n6 \n*l*\n\n8 9 10 11 12 5 \n\nFIG. 9: ∆ϕl for a BCT lattice and n = 12, when the six \ncoupling constants set employed in Ref. 14,15 (see text) is \nused. The temperature range has been chosen around TC(n) \n(error bars lye within point size). \n\nFor this purpose, we look at the temperature depen- \ndence of the rotation angle of the magnetization between \nNN planes. \nIn Fig. 7, ∆ϕl(T ) for n = 8 and n = 16 \n(continuous and dashed lines, respectively), is plotted for \nthe outermost planes, l = 1 . . . 4. For both thicknesses, a \nmonotonic trend is observed for all l, but at variance with \nwhat happens for the highest thickness, for n = 8 we see, \nstarting from a temperature T . TN (8), an abrupt drop \nof ∆ϕ3 and ∆ϕ4, which rapidly reach an almost con- \nstant value, only slightly larger than ∆ϕ1. In the tem- \nperature range TN (8) . T < TC(8) we thus substantially \nobserve the same small magnetic phase shifts between all \nNN layers, testifying an energetically stable quasi-FM \nconfiguration giving no contribution to the helical order \nparameters. The latter point can be made clearer by \nlooking at the the peak position Qz,max of the structure \nfactor S(0, 0, qz). In Fig. 8 the average of Qz,max vs T is \nreported, again for n = 8 and for different lateral dimen- \nsions L26. As expected from the previous argument, we \nsee that Qz,max = 0 for TN (8) < T < TC(8), while it be- \ngins to shift to higher values as soon as the temperature \ndecreases below TN (8), making apparent a progressive \nfan stabilization with Qz,max 6= 0 and reaching a value \nof about 21◦ for T = 10 K. \n\nIn a previous study, where the magnetic properties of \nHo thin films were investigated by MC simulations of a \nHeisenberg model with easy-plane single-ion anisotropy \nand six out-of-plane coupling constants (as obtained by \nexperimental neutron scattering measurements16) on a \nHCP lattice14,15, it was found that for thicknesses compa- \nrable with the helical pitch the phase diagram landscape \nis quite different from what we find here. \nIndeed, for \nn = 9 − 16, three different magnetic phases could be sin- \n\ngled out, with the high-temperature, paramagnetic phase \nseparated from the low-temperature, long-range ordered \none, by an intermediate-temperature block phase where \nouter ordered 4-layers blocks coexist with some inner dis- \nordered ones. Moreover, it was observed that the phase \ntransition of such inner layers turns out to have the sig- \nnatures of a Kosterlitz-Thouless one. \n\nThe absence of the block phase in the J1 − J2 model \nhere investigated has to be attributed to the different \nrange of interactions, rather than to the different lattice \nstructure. We came to this conclusion by doing some \nsimulations using the same set of interaction constants \nemployed in Refs. 14,15, but using a BCT lattice: the \nresults we obtained for ∆ϕl with n = 12 are reported in \nFig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 \nand clearly displays the footmarks of the block phase (see \ndown-triangle), with two external blocks of ordered layers \n( l =1. . . 5 and 8. . . 12 ), where ∆ϕl is roughly 10◦, sep- \narated by a block of disordered layers, and with almost", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0510.pdf" - }, - { - "text": "The study of low dimensional \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n4 \n\n] \nh \nc \ne \nm \n\n- \nt \na \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n1 \nv \n0 \n1 \n5 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nz \n\n~Si × ~Sj \nh \n. \n\nThe complex phase diagram unveiled by such MC sim- \nulations awaken however a further intriguing question: \nto what extent the observed behavior may be considered \na simple consequence of the competition between helical \norder and surface effects? I.e., is it just a matter of hav- \ning such a competition or does the range of interactions \nalso play a relevant role? Indeed, when the range of the \ninteractions is large enough we have a greater number of \nplanes which can be thought of as ”surface planes”, i.e. \nfor which the number of interacting neighbors are sig- \nnificantly reduced with respect to the bulk layers; there- \nfore, we expect that the larger the interaction range, the \nstronger should be the surface effects. But, at the same \ntime, the same modulation of the magnetic order can \n\ni \n\nFor these rare-earth elements, the development of new \nand sophisticated experimental methods11 has allowed to \nobtain ultra-thin films where the non-collinear modula- \ntion is comparable with the film thickness. Under such \nconditions the lack of translational invariance due to the \npresence of surfaces results decisive in order to observe \na drastic change of the magnetic structures12. Recent \nexperimental data on ultra-thin Holmium films13 have \nbeen lately interpreted and discussed14,15 on the basis \nof detailed classical Monte Carlo (MC) simulations of a \nspin Hamiltonian, which is believed to give a realistic \nmodeling of bulk Holmium. Such Hamiltonian, proposed \nby Bohr et al.16, allows for competitive middle-range in-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0510.pdf" - }, - { - "text": "**(a)**\n1 \n*TN*(8) = 92(2)K \n\n90K \n91K \n92K \n93K \n94K \n95K \n\n*e*\n*P*\n0.5 \n\n0 \n-140 -139 -138 -137 -136 -135 -134 -133 -132 -131 \n*e*\n**(b)**\n\n129K \n130K \n131K \n132K \n133K \n134K \n\n*TC*(8) = 133.3(3)K \n0.4 \n*e*\n*P*\n0.2 \n\n0 \n-94 -92 -90 -88 \n-86 \n*e*\n-84 -82 -80 -78 \n\nFIG. 10: (colors online) Equilibrium probability distribution \nof the energy for the thickness n = 8 for some temperatures \naround TN (8), (a), and TC(8), (b), respectively. \n\nopposite magnetization. We can thus confidently assert \nthat, regardless of the underlying lattice structure, by \ndecreasing the number of the out-of-plane interactions, \nfor thicknesses close to the helical bulk pitch, the block \n\nAs a final issue we address the problem of the order \nof the transitions observed at TN (n) and TC(n), respec- \ntively. In particular, we focus our attention to the thick- \nness ranges where the chiral order parameter is relevant, \nregions i) and ii) as defined at the beginning of \ni.e. \nthis Section. In Fig. 10 the equilibrium probability dis- \ntribution of the energy for temperatures around TN (8) \n(Fig. 10a) and TC(8) (Fig. 10b) is plotted: \nfor both \ntemperatures, no double peak structure is observed, so \nthat we have no direct indication for a first order tran- \nsition even if, according to precedent studies of Loison \nand Diep17,18, the presence of a first-order transition at \nTN (n), cannot be completely excluded, as it could reveal \nitself only when the lateral dimension L are much larger \nthan the largest correlation length. The same conclusion \nabout the order of transition is reached for any other in- \nvestigated film thickness, as the energy probability distri- \nbution shape does not qualitatively change. This findings \nagree with the results we got in previous MC simulations \ndiscussed in Ref. 15, so that we may conclude that the \norder of the observed transitions is not affected by the \nrange of interactions. \n\n1 Frustrated spin Systems, edited by H. T. Diep (World Sci- 134420 (2009). \n\n16 J. Bohr D. Gibbs, J. D. Axe, D. E. Moncton, K. L. \nD’Amico, C. F. Majkrzak, J. Kwo, M. Hong, C. L. Chien, \nand J. Jensen, Physica B 159, 93 (1989). \n17 H. T. Diep, Phys. Rev. B 39, 397 (1989). \n18 D. Loison, Physica A 275, 207 (2000). \n19 N. Metropolis, et al., J. Chem. Phys. 21, 1087 (1953). \n20 F. R. Brown and T. J. Woch, Phys. Rev. Lett. 58, 2394 \n\nentific, 2004). \n\n2 H. Kawamura, J. Phys.: Cond. Matt. 10, 4707 (1998). \n3 T. Kimura et al., Nature (London) 426, 55 (2003). \n4 F. Cinti et al., Phys. Rev. Lett. 100, 057203 (2008). \n5 J.H. Park, S. Onoda, N. Nagaosa, and J. H. Han, Phys. \nRev. Lett. 101, 167202 (2008), and references therein. \n6 S. W. Cheong and M. Mostovoy, Nature Materials (Lon- \n\ndon) 6, 13 (2007). (1987). \n7 Minhyea Lee, W. Kang, Y. Onose, Y. Tokura, and N. P. \n\n21 D. P. Landau, and K. Binder, A Guide to Monte Carlo \nSimulation in Statistical Physics, Cambridge University \nPress, Cambridge (2000). \nOng, Phys. Rev. Lett. 102, 186601 (2009) \n\n8 P. Pedrazzini et al., Phys. Rev. Lett. 98, 047204 (2007). \n9 H. Kawamura and M. S. Li, Phys. Rev. Lett. 87, 187204 \n22 M. E.J. Newman, and G. T. Barkema, Monte Carlo Meth- \nods in Statistical Physics, Clarendon Press, Oxford (1999). (2001). \n\n10 P. J. Jensen, and A. R. Mackintosh, Rere Earth Mag- \nnetism (Structure and Excitations), Clarendon Press, Ox- \nford (1991). \n11 S. Konings, C. Schuessler-Langeheine, H. Ott, E. Weschke, \n\n23 B. Efron, The Annals of Statistics 7, 1 (1979). \n24 P. M. Chaikin, T. C. Lubensky Principles of condensed \nmatter physics, Cambridge University Press, New York \n(1995). \n25 K. Binder, Z. Phys. B 43, 119 (1981). K. Binder, Phys. E. Schierle, J. B. Goedkoop, arXiv 0707.2765v2 \n12 P.J. Jensen, and K.H. Bennemann, Surface Science Re- Rev. Lett. 47, 693 (1981). \n\n26 Such observable has been obtained from instantaneous \nevaluation of the structure factor during the stochastic \nprocess, and subsequently statistically analyzed as all the \nother macroscopic quantities.", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" - }, - { - "text": "FIG. 8: (Colour online) Space-time plots are given for (left) the film thickness h and (right) the nanoparticle \n\nlayer height hp = hφ. The plot corresponds to the complete evolution resulting in the ring profile of \n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright \n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four \n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning, \n\n(iii) slow motion after depinning, and (iv) final evaporation from the center. \n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating \n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of \n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and \n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics \n\non the mesoscale has been described as well as more microscopic models for the dynamics in the \n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film \n\nmodel. \n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to \n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures \n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic \n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-", - "page_start": 22, - "page_end": 22, - "source_file": "1001.2669.pdf" - }, - { - "text": "[81] A. J. Archer and M. Rauscher, “Dynamical density functional theory for interacting brownian parti- \n\ncles: Stochastic or deterministic?” J. Phys. A-Math. Gen. 37, 9325–9333 (2004). \n\n[82] A. J. Archer and R. Evans, “Dynamical density functional theory and its application to spinodal \n\ndecomposition,” J. Chem. Phys. 121, 4246–4254 (2004). \n\n[83] P. A. Monson, “Mean field kinetic theory for a lattice gas model of fluids confined in porous materi- \n\nals,” J. Chem. Phys. 128, 084701 (2008). \n\n[84] P. M. Chaikin and T. C. Lubensky, Principles of condensed matter physics, Cambridge University \n\nPress (1997). \n\n[85] J. S. Langer, “An introduction to the kinetics of first-order phase transitions,” in C. Godreche, editor, \n\n“Solids far from Equilibrium,” pages 297–363, Cambridge University Press (1992). \n\n[86] M. A. Spaid and G. M. Homsy, “Stability of Newtonian and viscoelastic dynamic contact lines,” \n\nPhys. Fluids 8, 460–478 (1996). \n\n[87] U. Thiele and E. Knobloch, “Front and back instability of a liquid film on a slightly inclined plate,” \n\nPhys. Fluids 15, 892–907 (2003). \n\n[88] M. R. E. Warner, R. V. Craster, and O. K. Matar, “Surface patterning via evaporation of ultrathin \n\nfilms containing nanoparticles,” J. Colloid Interface Sci. 267, 92–110 (2003). \n\n[89] O. K. Matar, R. V. Craster, and K. Sefiane, “Dynamic spreading of droplets containing nanoparticles,” \n\nPhys. Rev. E 76, 056315 (2007). \n\n[90] J. J. Zhou, B. Dupuy, A. L. Bertozzi, and A. E. Hosoi, “Theory for shock dynamics in particle-laden \n\nthin films,” Phys. Rev. Lett. 94, 117803 (2005). \n\n[91] B. P. Cook, A. L. Bertozzi, and A. E. Hosoi, “Shock solutions for particle-laden thin films,” SIAM J. \n\nAppl. Math. 68, 760–783 (2008). \n\n[92] R. V. Craster, O. K. Matar, and K. Sefiane, “Pinning, retraction, and terracing of evaporating droplets \n\ncontaining nanoparticles,” Langmuir (2009), online available. \n\n[93] D. Quemada, “Rheology of concentrated disperse systems and minimum energy-dissipation principle \n\nI. Viscosity-concentration relationship,” Rheol. Acta 16, 82–94 (1977). \n\n[94] D. Quemada and C. Berli, “Energy of interaction in colloids and its implications in rheological \n\nmodeling,” Adv. Colloid Interface Sci. 98, 51–85 (2002). \n\n[95] J. J. Stickel and R. L. Powell, “Fluid mechanics and rheology of dense suspensions,” Annu. Rev. \n\nFluid Mech. 37, 129–149 (2005).", - "page_start": 30, - "page_end": 30, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0510.pdf", - "query": "Where are located the magnetic ions in the lattice of the studied layers ?", - "target_page": 2, - "target_passage": "the magnetic ions are located on the sites of a body-centered tetragonal (BCT) lattice", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "The paper is organized as follows: In Sec. II the model \nHamiltonian will be defined, and the MC techniques, and \nall the thermodynamic quantities relevant for this study, \nwill be introduced. In Sec. III the results obtained for \ndifferent thicknesses will be presented, both in the matter \nof the critical properties of the model and of the magnetic \nordered structures observed. Finally, in Sec. IV we shall \ndiscuss such results, drawing also some conclusions. \n\nIn the following we will denote with n the film thick- \nness, i.e. the number of spin layers along the z direction, \nand with L×L the number of spins in each layer (i.e., L \nis the lattice size along both the x and y directions). In \nour simulations thickness values from 1 to 24 were con- \nsidered, while the range of lateral size L was from 8 to \n64. Periodic boundary conditions were applied along x \nand y, while free boundaries were obviously taken along \nthe film growth direction z. \n\nThermal equilibrium was attained by the usual \nMetropolis algorithm19, \nsupplemented by the over- \nrelaxed technique20 in order to speed-up the sampling \nof the spin configuration space: a typical “Monte Carlo \nstep” was composed by four Metropolis and four-five \nover-relaxed moves per particle. Such judicious mix of \nmoves is able both to get faster the thermal equilibrium \nand to minimize the correlation “time” between succes- \nsive samples, i.e. the undesired effects due to lack of in-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "30 \n\n25 \n\n) \n. \ng \ne \nd \n( \n\n20 \n\n15 \n*x*\n*a*\n*m*\n*,*\n*z*\n10 \n*Q*\n\n5 \n\n0 \n0 40 \n*T*(K) \n\nFIG. 8: (color online) Qz, position of the maximum of S(~q), \nvs. temperature for thickness n = 8. Inset: magnetic vector \n(mx \nl ) profile for some temperatures for L = 64. Colors \nand symbols as in Fig. 2. FIG. 7: (color online) ∆ϕl(T ) vs. temperature for the surface \nplanes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), \nl = 4 (circles). Straight lines and full symbols: n = 8. Dashed \nlines and open symbols: n = 16. \nl , my \n\nfilm leads to an effective 2d-like trend. Region ii) looks \nhowever more intriguing, and requires a more accurate \ndiscussion, which can benefit from a careful comparison \nof the behaviour of a given quantity in regions i) and ii). \n\n0 \n7 0 1 2 3 4 \n\n6 \n*l*\n\n8 9 10 11 12 5 \n\nFIG. 9: ∆ϕl for a BCT lattice and n = 12, when the six \ncoupling constants set employed in Ref. 14,15 (see text) is \nused. The temperature range has been chosen around TC(n) \n(error bars lye within point size). \n\nFor this purpose, we look at the temperature depen- \ndence of the rotation angle of the magnetization between \nNN planes. \nIn Fig. 7, ∆ϕl(T ) for n = 8 and n = 16 \n(continuous and dashed lines, respectively), is plotted for \nthe outermost planes, l = 1 . . . 4. For both thicknesses, a \nmonotonic trend is observed for all l, but at variance with \nwhat happens for the highest thickness, for n = 8 we see, \nstarting from a temperature T . TN (8), an abrupt drop \nof ∆ϕ3 and ∆ϕ4, which rapidly reach an almost con- \nstant value, only slightly larger than ∆ϕ1. In the tem- \nperature range TN (8) . T < TC(8) we thus substantially \nobserve the same small magnetic phase shifts between all \nNN layers, testifying an energetically stable quasi-FM \nconfiguration giving no contribution to the helical order \nparameters. The latter point can be made clearer by \nlooking at the the peak position Qz,max of the structure \nfactor S(0, 0, qz). In Fig. 8 the average of Qz,max vs T is \nreported, again for n = 8 and for different lateral dimen- \nsions L26. As expected from the previous argument, we \nsee that Qz,max = 0 for TN (8) < T < TC(8), while it be- \ngins to shift to higher values as soon as the temperature \ndecreases below TN (8), making apparent a progressive \nfan stabilization with Qz,max 6= 0 and reaching a value \nof about 21◦ for T = 10 K. \n\nIn a previous study, where the magnetic properties of \nHo thin films were investigated by MC simulations of a \nHeisenberg model with easy-plane single-ion anisotropy \nand six out-of-plane coupling constants (as obtained by \nexperimental neutron scattering measurements16) on a \nHCP lattice14,15, it was found that for thicknesses compa- \nrable with the helical pitch the phase diagram landscape \nis quite different from what we find here. \nIndeed, for \nn = 9 − 16, three different magnetic phases could be sin- \n\ngled out, with the high-temperature, paramagnetic phase \nseparated from the low-temperature, long-range ordered \none, by an intermediate-temperature block phase where \nouter ordered 4-layers blocks coexist with some inner dis- \nordered ones. Moreover, it was observed that the phase \ntransition of such inner layers turns out to have the sig- \nnatures of a Kosterlitz-Thouless one. \n\nThe absence of the block phase in the J1 − J2 model \nhere investigated has to be attributed to the different \nrange of interactions, rather than to the different lattice \nstructure. We came to this conclusion by doing some \nsimulations using the same set of interaction constants \nemployed in Refs. 14,15, but using a BCT lattice: the \nresults we obtained for ∆ϕl with n = 12 are reported in \nFig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 \nand clearly displays the footmarks of the block phase (see \ndown-triangle), with two external blocks of ordered layers \n( l =1. . . 5 and 8. . . 12 ), where ∆ϕl is roughly 10◦, sep- \narated by a block of disordered layers, and with almost", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0510.pdf" - }, - { - "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. \n\nmeasurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. \n\nThe interfacial Mn moments are ascribed to the prox- \nimity polarization of the (Ga,Mn)As interface by the Fe \nlayer, such as was shown previously by XMCD as well as \nab initio theory7. Evidence for this can be observed from \nmeasurement of the Mn L2,3 XMCD signal at tempera- \ntures above the (Ga,Mn)As TC . Similar to the previous \nstudy7, we observe a small but not negligible signal at \nroom temperature (Fig. 3), with opposite sign to the Fe \nL2,3 XMCD. Its spectral shape is characteristic of a local- \nized electronic configuration close to d5, similar to bulk \n(Ga,Mn)As7,9,15 but in contrast to Mn in more metallic \n7 or MnAs16. A slight \nenvironments such as MnxFe1−x \nbroadening is observed on the low energy side of the Mn \nL3 peak, which may be due to the different screening in- \nduced by proximity to the Fe layer. Since the measured \nintensity is attenuated with distance z from the surface \nas I = I0 exp(−z/λT EY ), the thickness of the strongly \ncoupled interface layer is estimated to be ∼0.7 nm or 2-3 \n\nIn summary, we have demonstrated antiferromagnetic \ncoupling between Fe and (Ga,Mn)As layers in bilayer \nstructures. A markedly different coupling is observed for \nthe bulk of the (Ga,Mn)As layer and for Mn moments \nin the near-interface region. A thickness-dependent ex- \nchange bias field is observed to affect the whole of the \nbulk (Ga,Mn)As layer, which aligns antiparallel to the \nFe layer at low fields, and switches to parallel when the \nexternal field is large enough to overcome the bias field \nand the magnetocrystalline anisotropy fields. In contrast, \nthe interfacial Mn moments remain aligned antiparallel \nto the Fe layer even at 20 kOe, the largest field studied, \nand are polarized at temperatures well above the TC of \nthe bulk (Ga,Mn)As layer. The latter observation con- \nfirms the recently reported result of Ref. 7, in which \nthe Fe/(Ga,Mn)As bilayers were produced by a different \nmethod but showed qualitatively similar behavior of the \ninterfacial moments. Our results shed new light on the \nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which \nare of potential interest for room temperature spintron- \nics, and also offer a means of controlling the spin orien- \ntation in a FM semiconductor. \nfrom EU grants \nacknowledge \nand \nSemiSpinNet-215368 \nSTFC studentship grant CMPC07100. The Advanced \nLight Source is supported by the U.S. Department of \nEnergy under Contract No. \nDE-AC02-05CH11231. \nWe thank Leigh Shelford for help during the Diamond \nbeamtime. \n\nWe \n\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. Mac- \nDonald, Phys. Rev. B 59, 9818 (1999); P. Sankowski and \nP. Kacman, Phys. Rev. B 71, 201303(R) (2005); A. D. \nGiddings, T. Jungwirth, and B. L. Gallagher, Phys. Rev. \nB 78, 165312 (2008); K. Szalowski and T. Balcerzak, Phys. \nRev. B 79, 214430 (2009).", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "The scenario just outlined for n = 8 results to be cor- \nrect in the thickness range 6 ≤ n . 15, where a clear \nseparation between TN (n) and TC(n) can be easily fig- \nured out. In such temperature window, the strong sur- \nface effects produce a quasi-FM set-up of the magnetic \nfilm structure along the z-direction. While leaving to the \nnext Section a more detailed discussion of this regime, we \nreport in Fig. 5 a plot of TN (n) and TC(n) vs. n for all \nthe simulated thicknesses. The separation between the \ntwo critical temperatures is maximum for n = 6, where \nTN (6) = 38(4), that is TN (6) ∼ 1 \n3 TC(6). For films with \nless than six layers no fan order is observed, i.e. for n = 5 \nand below the chirality does not display any typical fea- \nture of fan ordering at any temperature below TC(n). As \na representative quantity we finally look at the rotation \n\nThe observed behaviour in region iii) can be reason- \nably attributed to the decreasing relevance of the con- \ntribution to the total energy of the system coming from \nthe competitive interactions among NNN planes as the \nfilm thickness decreases; moreover, the thinness of the", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0510.pdf" - }, - { - "text": "1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nThe development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, \n\nThe Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "*J*\n*J* *1*\n*2*\n*z*\n\n*y*\n*J*\n*0*\n\n*x*\n\nFIG. 1: (colors online) (a): body-centered tetragonal (BCT) \nlattice with J0 in-plane coupling constant, and out-of-plane \nJ1, and J2 competing interactions. \n\n~Si are classical planar unit vectors representing the di- \nrection of the total angular momentum of the magnetic \nions, whose magnitude \nj(j + 1) (j = 8 for Holmium \nions) is already encompassed within the definition of the \ninteraction constants J0,1,2. As sketched in Fig. 1, the \nmagnetic ions are located on the sites of a body-centered \ntetragonal (BCT) lattice; the first sum appearing in the \nHamiltonian describes the in-plane (xy) nearest neigh- \nbor (NN) interaction, which is taken ferromagnetic (FM), \nwith exchange strength J0 > 0; the second sum rep- \nresents the coupling, of exchange strength J1, between \nspins belonging to nearest neighbor (NN) planes along \nthe z-direction (which we will assume to coincide with \nthe film growth direction); finally, the third sum takes \ninto account the interaction, of exchange strength J2, be- \ntween spins lying on next-nearest neighbor (NNN) planes \nalong z. In order to have frustration, giving rise to non- \ncollinear order along z in the bulk, NN interaction J1 \ncan be taken both ferro- or antiferromagnetic, but NNN \ncoupling J2 has necessarily to be antiferromagnetic, and \nthe condition |J2| > |J1|/4 must be fulfilled. Such simpli- \nfied Hamiltonian was already employed to simulate he- \nlical ordering in bulk systems by Diep1,17 and Loison18. \nIn the bulk limit, the state of minimal energy of a sys- \ntem described by Eq.(1) corresponds to a helical arrange- \nment of spins. The ground state energy per spin is equal \nto eg(Qz) = [−4J0 − 2J1 (4 cos (Qzc′) + δ cos (2Qzc′))] \nis the distance between NN layers, δ = J2 \nwhere c′ \nJ1 , \nand Qzc′ = arccos \nis the angle between spins ly- \ning on adjacent planes along the z-direction. The ob- \nserved helical arrangement in bulk holmium corresponds \nto Qzc′ ≃ 30.5◦10: \nsuch value can be obtained from \nthe formula above with the set of coupling constants \nJ0=67.2 K, J1=20.9 K, and J2 = −24.2 K, that we have \nemployed in our simulations. The given values for the ex- \nchange constants are the same already used by Weschke \net al. \nin Ref. 13 to interpret experimental data on \nHolmium films on the basis of a J1 − J2 model, after \na proper scaling by the numbers of NN and NNN on \nneighboring layers of a BCT lattice. \n\np \n\nbe achieved with different number of interacting layers: \nnotably, nearest and next-nearest layers competitive in- \nteractions are enough to get a helical structure with a \nwhatever pitch wavevector. Such observation gives us a \npossible way to solve the conundrum previously emerged, \nas we have the possibility of varying the range of inter- \nactions without modifying the helical pitch, thus decou- \npling the two relevant length scales along the film growth \ndirection, and making accessible a range of n of the or- \nder of, or smaller than, the helical pitch, but still large \nenough that a substantial number of layers can behave \nas “bulk” layers. Therefore, while in the previous papers \nwe have studied the properties of ultrathin magnetic films \nof Ho assuming a model with six interlayer exchange in- \nteractions, here we investigate by MC simulations the \nproperties of the same system by making use of the sim- \nplest model Hamiltonian able to describe the onset of a \nhelical magnetic order in Holmium, i.e. we consider only \ntwo inter-layer coupling constants, as previously done in \nRef. 11.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "**(a)**\n1 \n*TN*(8) = 92(2)K \n\n90K \n91K \n92K \n93K \n94K \n95K \n\n*e*\n*P*\n0.5 \n\n0 \n-140 -139 -138 -137 -136 -135 -134 -133 -132 -131 \n*e*\n**(b)**\n\n129K \n130K \n131K \n132K \n133K \n134K \n\n*TC*(8) = 133.3(3)K \n0.4 \n*e*\n*P*\n0.2 \n\n0 \n-94 -92 -90 -88 \n-86 \n*e*\n-84 -82 -80 -78 \n\nFIG. 10: (colors online) Equilibrium probability distribution \nof the energy for the thickness n = 8 for some temperatures \naround TN (8), (a), and TC(8), (b), respectively. \n\nopposite magnetization. We can thus confidently assert \nthat, regardless of the underlying lattice structure, by \ndecreasing the number of the out-of-plane interactions, \nfor thicknesses close to the helical bulk pitch, the block \n\nAs a final issue we address the problem of the order \nof the transitions observed at TN (n) and TC(n), respec- \ntively. In particular, we focus our attention to the thick- \nness ranges where the chiral order parameter is relevant, \nregions i) and ii) as defined at the beginning of \ni.e. \nthis Section. In Fig. 10 the equilibrium probability dis- \ntribution of the energy for temperatures around TN (8) \n(Fig. 10a) and TC(8) (Fig. 10b) is plotted: \nfor both \ntemperatures, no double peak structure is observed, so \nthat we have no direct indication for a first order tran- \nsition even if, according to precedent studies of Loison \nand Diep17,18, the presence of a first-order transition at \nTN (n), cannot be completely excluded, as it could reveal \nitself only when the lateral dimension L are much larger \nthan the largest correlation length. The same conclusion \nabout the order of transition is reached for any other in- \nvestigated film thickness, as the energy probability distri- \nbution shape does not qualitatively change. This findings \nagree with the results we got in previous MC simulations \ndiscussed in Ref. 15, so that we may conclude that the \norder of the observed transitions is not affected by the \nrange of interactions. \n\n1 Frustrated spin Systems, edited by H. T. Diep (World Sci- 134420 (2009). \n\n16 J. Bohr D. Gibbs, J. D. Axe, D. E. Moncton, K. L. \nD’Amico, C. F. Majkrzak, J. Kwo, M. Hong, C. L. Chien, \nand J. Jensen, Physica B 159, 93 (1989). \n17 H. T. Diep, Phys. Rev. B 39, 397 (1989). \n18 D. Loison, Physica A 275, 207 (2000). \n19 N. Metropolis, et al., J. Chem. Phys. 21, 1087 (1953). \n20 F. R. Brown and T. J. Woch, Phys. Rev. Lett. 58, 2394 \n\nentific, 2004). \n\n2 H. Kawamura, J. Phys.: Cond. Matt. 10, 4707 (1998). \n3 T. Kimura et al., Nature (London) 426, 55 (2003). \n4 F. Cinti et al., Phys. Rev. Lett. 100, 057203 (2008). \n5 J.H. Park, S. Onoda, N. Nagaosa, and J. H. Han, Phys. \nRev. Lett. 101, 167202 (2008), and references therein. \n6 S. W. Cheong and M. Mostovoy, Nature Materials (Lon- \n\ndon) 6, 13 (2007). (1987). \n7 Minhyea Lee, W. Kang, Y. Onose, Y. Tokura, and N. P. \n\n21 D. P. Landau, and K. Binder, A Guide to Monte Carlo \nSimulation in Statistical Physics, Cambridge University \nPress, Cambridge (2000). \nOng, Phys. Rev. Lett. 102, 186601 (2009) \n\n8 P. Pedrazzini et al., Phys. Rev. Lett. 98, 047204 (2007). \n9 H. Kawamura and M. S. Li, Phys. Rev. Lett. 87, 187204 \n22 M. E.J. Newman, and G. T. Barkema, Monte Carlo Meth- \nods in Statistical Physics, Clarendon Press, Oxford (1999). (2001). \n\n10 P. J. Jensen, and A. R. Mackintosh, Rere Earth Mag- \nnetism (Structure and Excitations), Clarendon Press, Ox- \nford (1991). \n11 S. Konings, C. Schuessler-Langeheine, H. Ott, E. Weschke, \n\n23 B. Efron, The Annals of Statistics 7, 1 (1979). \n24 P. M. Chaikin, T. C. Lubensky Principles of condensed \nmatter physics, Cambridge University Press, New York \n(1995). \n25 K. Binder, Z. Phys. B 43, 119 (1981). K. Binder, Phys. E. Schierle, J. B. Goedkoop, arXiv 0707.2765v2 \n12 P.J. Jensen, and K.H. Bennemann, Surface Science Re- Rev. Lett. 47, 693 (1981). \n\n26 Such observable has been obtained from instantaneous \nevaluation of the structure factor during the stochastic \nprocess, and subsequently statistically analyzed as all the \nother macroscopic quantities.", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" - }, - { - "text": "20 \n**(a)***n =*6 \n15 \n\n10 \n\n) \n. \ng \ne \nd \n( \n\n5 \n\n0 \n0 \n*l*\nϕ \n∆ 5 \n\n**(b)***n =*5 \n4 \n\n3 \n\n2 \n\n1 \n\n0 \n0 1 2 \n*l*\n\n140 \n\n120 ) \nK \n( \n100 \n*)*\n*n*\n*(*\n80 *C*\n\n*TN (n)*\n*TC (n)*\n*bulk*\n\n*T*\n*,*\n60 \n*)*\n*n*\n*(*\n40 \n*N*\n*T*\n*TN*\n20 \n\n0 \n0 2 4 6 8 \n10 \n*n*\n\nFIG. 5: Transition temperatures TN (n) and TC (n) vs. film \nthickness n. \n\nangle of the magnetization between nearest planes: \n\nl+1 + M y l M y \nM x \nl M x ∆ϕl = ϕl+1 − ϕl = arccos (10) \nl+1 \n(cid:2) (cid:3) \n\nFIG. 6: Rotation angle ∆ϕl between magnetic moments on \nNN layers (l + 1, l) at some low temperatures, for thickness \nn = 5 and n = 6, and lateral dimension L = 64. \n\nthe same is true for the crossing point of the Binder cu- \nmulant of the average magnetization M (not reported in \nfigure), which is located at TC(8) = 133.3(3) K. These \ndata give a first rough indication that also for n = 8 all \nthe planes of the sample are still ordering almost at the \nsame temperature; such property has been observed for \nall the investigated thicknesses n below 16, so that TC(n) \nresults quite n-independent (see also Fig. 5) . \nl , M y \n\nwhere (M x \nl ) is the magnetic vector profile for each \nplane l. ∆ϕl is displayed in Fig. 6a and Fig. 6b, for \nn = 6 and n = 5, respectively. In Fig. 6a, a quite clear \nfan stabilization is observed when the temperature de- \nfor n = 5, ∆ϕl keeps an \ncreases, while in Fig. 6b, i.e. \nalmost temperature independent very small value; what’s \nmore, ∆ϕl seems to loose any temperature dependence \nas T = 0 is approached. We attribute the absence of fan \narrangement for n ≤ 5 as simply due to the lack of “bulk \nplanes” inside the film, so that we are left with only a 2d \ntrend at TC(n), i.e. at the temperature where the order \nparameters defined in Eqs. (2) and (3) show a critical \nbehaviour. \n\nAlthough the layer subtraction does not seem to mod- \nify TC (n), the onset of helical arrangement is observed to \nshift at lower temperatures as n decreases. The chirality \nκ defined in Eq. (4) is reported in Fig 4b for n = 8. As the \ntemperature decreases, around T ∼ 80 K we can identify \na finite-size behaviour of κ which, at variance with the \nprevious one, can be easily recognized as typical of an \neffective phase transition. Such conclusion is confirmed \nby the analysis of the chiral susceptibility χκ (Fig. 4c), \nwhich for the largest L has a maximum at T = 85 K. As- \nsuming that the order parameter (4) is the relevant one \nto single out the onset of the fan arrangement, we can \nget a more accurate estimate of TN (8) by looking at the \nBinder cumulant u4(κ), reported in Fig. 4d. By making \nuse of the MH technique, we locate the crossing point at \nTN (8) = 92(2) K. Finally, it is worthwhile to observe as \nthe specific heat does not show any anomaly at TN (8), \nbeing the entropy substantially removed at TC (8). \n\nA possible framework to analyze the results presented \nin the previous Section is suggested by Fig. 5, where we \ni) high \ncan easily distinguish three significant regions: \nthickness, n > 16, where the films substantially display a \nbulk behaviour, with the single planes ordering tempera- \nture coinciding with the helical phase transition one; ii) \nintermediate thickness, 6 ≤ n . 15, where the tempera- \nture corresponding to the onset of in-plane order, TC (n), \nis still ≃ T Ho \nN , but where the helical/fan arrangement sta- \nbilizes only below a finite temperature TN (n) < TC (n); \niii) low thickness,1 ≤ n ≤ 5, where TC(n) . T Ho \nN but no \nfan phase is present at any temperature.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0510.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0510.pdf", - "query": "What is the minimum number of spin layers in a film before a correct bulk is reached ?", - "target_page": 1, - "target_passage": "For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "20 \n**(a)***n =*6 \n15 \n\n10 \n\n) \n. \ng \ne \nd \n( \n\n5 \n\n0 \n0 \n*l*\nϕ \n∆ 5 \n\n**(b)***n =*5 \n4 \n\n3 \n\n2 \n\n1 \n\n0 \n0 1 2 \n*l*\n\n140 \n\n120 ) \nK \n( \n100 \n*)*\n*n*\n*(*\n80 *C*\n\n*TN (n)*\n*TC (n)*\n*bulk*\n\n*T*\n*,*\n60 \n*)*\n*n*\n*(*\n40 \n*N*\n*T*\n*TN*\n20 \n\n0 \n0 2 4 6 8 \n10 \n*n*\n\nFIG. 5: Transition temperatures TN (n) and TC (n) vs. film \nthickness n. \n\nangle of the magnetization between nearest planes: \n\nl+1 + M y l M y \nM x \nl M x ∆ϕl = ϕl+1 − ϕl = arccos (10) \nl+1 \n(cid:2) (cid:3) \n\nFIG. 6: Rotation angle ∆ϕl between magnetic moments on \nNN layers (l + 1, l) at some low temperatures, for thickness \nn = 5 and n = 6, and lateral dimension L = 64. \n\nthe same is true for the crossing point of the Binder cu- \nmulant of the average magnetization M (not reported in \nfigure), which is located at TC(8) = 133.3(3) K. These \ndata give a first rough indication that also for n = 8 all \nthe planes of the sample are still ordering almost at the \nsame temperature; such property has been observed for \nall the investigated thicknesses n below 16, so that TC(n) \nresults quite n-independent (see also Fig. 5) . \nl , M y \n\nwhere (M x \nl ) is the magnetic vector profile for each \nplane l. ∆ϕl is displayed in Fig. 6a and Fig. 6b, for \nn = 6 and n = 5, respectively. In Fig. 6a, a quite clear \nfan stabilization is observed when the temperature de- \nfor n = 5, ∆ϕl keeps an \ncreases, while in Fig. 6b, i.e. \nalmost temperature independent very small value; what’s \nmore, ∆ϕl seems to loose any temperature dependence \nas T = 0 is approached. We attribute the absence of fan \narrangement for n ≤ 5 as simply due to the lack of “bulk \nplanes” inside the film, so that we are left with only a 2d \ntrend at TC(n), i.e. at the temperature where the order \nparameters defined in Eqs. (2) and (3) show a critical \nbehaviour. \n\nAlthough the layer subtraction does not seem to mod- \nify TC (n), the onset of helical arrangement is observed to \nshift at lower temperatures as n decreases. The chirality \nκ defined in Eq. (4) is reported in Fig 4b for n = 8. As the \ntemperature decreases, around T ∼ 80 K we can identify \na finite-size behaviour of κ which, at variance with the \nprevious one, can be easily recognized as typical of an \neffective phase transition. Such conclusion is confirmed \nby the analysis of the chiral susceptibility χκ (Fig. 4c), \nwhich for the largest L has a maximum at T = 85 K. As- \nsuming that the order parameter (4) is the relevant one \nto single out the onset of the fan arrangement, we can \nget a more accurate estimate of TN (8) by looking at the \nBinder cumulant u4(κ), reported in Fig. 4d. By making \nuse of the MH technique, we locate the crossing point at \nTN (8) = 92(2) K. Finally, it is worthwhile to observe as \nthe specific heat does not show any anomaly at TN (8), \nbeing the entropy substantially removed at TC (8). \n\nA possible framework to analyze the results presented \nin the previous Section is suggested by Fig. 5, where we \ni) high \ncan easily distinguish three significant regions: \nthickness, n > 16, where the films substantially display a \nbulk behaviour, with the single planes ordering tempera- \nture coinciding with the helical phase transition one; ii) \nintermediate thickness, 6 ≤ n . 15, where the tempera- \nture corresponding to the onset of in-plane order, TC (n), \nis still ≃ T Ho \nN , but where the helical/fan arrangement sta- \nbilizes only below a finite temperature TN (n) < TC (n); \niii) low thickness,1 ≤ n ≤ 5, where TC(n) . T Ho \nN but no \nfan phase is present at any temperature.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0510.pdf" - }, - { - "text": "The paper is organized as follows: In Sec. II the model \nHamiltonian will be defined, and the MC techniques, and \nall the thermodynamic quantities relevant for this study, \nwill be introduced. In Sec. III the results obtained for \ndifferent thicknesses will be presented, both in the matter \nof the critical properties of the model and of the magnetic \nordered structures observed. Finally, in Sec. IV we shall \ndiscuss such results, drawing also some conclusions. \n\nIn the following we will denote with n the film thick- \nness, i.e. the number of spin layers along the z direction, \nand with L×L the number of spins in each layer (i.e., L \nis the lattice size along both the x and y directions). In \nour simulations thickness values from 1 to 24 were con- \nsidered, while the range of lateral size L was from 8 to \n64. Periodic boundary conditions were applied along x \nand y, while free boundaries were obviously taken along \nthe film growth direction z. \n\nThermal equilibrium was attained by the usual \nMetropolis algorithm19, \nsupplemented by the over- \nrelaxed technique20 in order to speed-up the sampling \nof the spin configuration space: a typical “Monte Carlo \nstep” was composed by four Metropolis and four-five \nover-relaxed moves per particle. Such judicious mix of \nmoves is able both to get faster the thermal equilibrium \nand to minimize the correlation “time” between succes- \nsive samples, i.e. the undesired effects due to lack of in-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "The scenario just outlined for n = 8 results to be cor- \nrect in the thickness range 6 ≤ n . 15, where a clear \nseparation between TN (n) and TC(n) can be easily fig- \nured out. In such temperature window, the strong sur- \nface effects produce a quasi-FM set-up of the magnetic \nfilm structure along the z-direction. While leaving to the \nnext Section a more detailed discussion of this regime, we \nreport in Fig. 5 a plot of TN (n) and TC(n) vs. n for all \nthe simulated thicknesses. The separation between the \ntwo critical temperatures is maximum for n = 6, where \nTN (6) = 38(4), that is TN (6) ∼ 1 \n3 TC(6). For films with \nless than six layers no fan order is observed, i.e. for n = 5 \nand below the chirality does not display any typical fea- \nture of fan ordering at any temperature below TC(n). As \na representative quantity we finally look at the rotation \n\nThe observed behaviour in region iii) can be reason- \nably attributed to the decreasing relevance of the con- \ntribution to the total energy of the system coming from \nthe competitive interactions among NNN planes as the \nfilm thickness decreases; moreover, the thinness of the", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0510.pdf" - }, - { - "text": "π \n\n1 \nK Z \n0 \nMHM = dqzS(~q) (5) \n\nwhere S(~q), with ~q = (0, 0, qz), is the structure factor24 \n(i.e. the Fourier transform of the spin correlation func- \ntion) along the z-direction of the film, while the normal- \nization factor K is the structure factor integral at T = 0. \nAlthough the use of the last observable can be seen as a \nsuitable and elegant way to overcome the intrinsic diffi- \nculties met in defining a correct helical order parameter, \nfree of any undue external bias (as the wave-vector Qz", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0510.pdf" - }, - { - "text": "2.5 \n2.6 \n\n*cv,*max \n2.5 \n2 \n2.4 \n\n2.3 \n1.5 \n*B*\n*k*\n2.2 \n*L*\n*/*\n*v*\n2.1 *c*\n1 20 30 40 70 50 60 \n\n*L*= 24 \n*L*= 32 \n*L*= 48 \n*L*= 64 \n0.5 \n\n0 \n0 20 40 60 \n\n80 \n*T*(K) \n\n100 120 140 \n\nFIG. 2: (color online) Specific heat cv per spin vs. temper- \nature for thickness n = 16 (for lateral dimension, see the \nlegend inside the figure). Inset: Maximum of cv vs. L ob- \ntained through MH technique. The continuum red line is a \npower law fit. \n\ndependence of different samples during the measurement \nstage. For each temperature we have usually performed \nthree independent simulations, each one containing at \nleast 2×105 measurements, taken after discarding up to \n5×104 Monte Carlo steps in order to assure thermal equi- \nlibration. \n\nIn the proximity of the critical region the multiple his- \ntogram (MH) technique was also employed21, as it allows \nus to estimate the physical observables of interest over a \nwhole temperature range in a substantially continuous \nway by interpolating results obtained from sets of simu- \nlations performed at some different temperatures. \n\nFor all the quantities of interest, the average value and \nthe error estimate were obtained by the bootstrap re- \nsampling method22 given that, as pointed out in Ref. 23, \nfor a large enough number of measurements, this method \nturns out to be more accurate than the usual blocking \ntechnique. In our implementation, we pick out randomly \na sizable number of measurements (typically, between 1 \nand 1×103 for the single simulation, and between 1 and \n5×104 for the MH technique), and iterate the re-sampling \nat least one hundred times. \n\nl )2 + (my \n(mx \nl )2 , \nml = (2) \nq \n\nwhich is related to the SO(2) symmetry breaking. At the \nsame time, it turns out to be significant also the average \norder parameter of the film, defined as \n\nn \n\nThe thermodynamic observables we have investigated \n\nentering the definition of κ in Eq. (4)), we remind that \nsuch quantity has generally to be managed with particu- \nlar care, as discussed in details in Refs.14,15, where it was \nshown that the presence of block structures prevents us \nto unambiguously relate the evolution of S(~q) with the \nonset of helical order. However, for the specific case of \nthe model under investigation such integrated quantity \ncan still be considered a fairly significant order parame- \nter, as no block structures emerge from the simulations \n(see below). \n\ninclude the FM order parameter for each plane l: \n\n1 \nn \nM = ml . (3) \nXl=1 \n\nIn order to get a clear picture of the critical region and \nto give an accurate estimate of the critical temperature, \nwe look also at the following quantities \n\nTurning to the helical order, which is the relevant \nquantity for the Z2 × SO(2) symmetry, we can explore \nit along two different directions. The first one is by the \nintroduction of the chirality order parameter1,2 \n(6) \n\n(7) \n\n(8) \n\nu4(o) = 1 − (9) \n\ncv = nL2β2 \nhe2i − hei2 \n(cid:0) \n(cid:1) \nχo = nL2β \nho2i − hoi2 \n, \n(cid:0) \n∂βo = nL2 (hoei − hoihei) , \nho4i \n3ho2i2 , \n\n, \n\n(cid:1) \n\nwhere the sum refers to spins belonging to NN layers \ni and j, respectively, while Qz is the bulk helical pitch \nvector along the z direction. The second possibility is \nthat of looking at the integral of the structure factor: \n\nwhere β = 1/kBT , and o is one of the relevant observ- \nables, i.e. ml, M, κ, MHM . In this paper, we shall mainly \nlocate the critical temperature by looking at the intersec- \ntion of the graphs of the Binder cumulant25, Eq. (9), as a \nfunction of T obtained at different L. For clarity reasons, \nwe introduce also the following symbols: by TN (n) we \nwill denote the helical/fan phase transition temperature \nfor thickness n, TC(n) will instead indicate the order- \ning temperature of the sample as deduced by looking at \nthe behaviour of the average order parameter (3), while \nT l \nC(n) will be the l-th plane transition temperature re- \nlated to the order parameter defined in Eq. (2). \n\nπ \n\n1 \nK Z \n0 \nMHM = dqzS(~q) (5)", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0510.pdf" - }, - { - "text": "*J*\n*J* *1*\n*2*\n*z*\n\n*y*\n*J*\n*0*\n\n*x*\n\nFIG. 1: (colors online) (a): body-centered tetragonal (BCT) \nlattice with J0 in-plane coupling constant, and out-of-plane \nJ1, and J2 competing interactions. \n\n~Si are classical planar unit vectors representing the di- \nrection of the total angular momentum of the magnetic \nions, whose magnitude \nj(j + 1) (j = 8 for Holmium \nions) is already encompassed within the definition of the \ninteraction constants J0,1,2. As sketched in Fig. 1, the \nmagnetic ions are located on the sites of a body-centered \ntetragonal (BCT) lattice; the first sum appearing in the \nHamiltonian describes the in-plane (xy) nearest neigh- \nbor (NN) interaction, which is taken ferromagnetic (FM), \nwith exchange strength J0 > 0; the second sum rep- \nresents the coupling, of exchange strength J1, between \nspins belonging to nearest neighbor (NN) planes along \nthe z-direction (which we will assume to coincide with \nthe film growth direction); finally, the third sum takes \ninto account the interaction, of exchange strength J2, be- \ntween spins lying on next-nearest neighbor (NNN) planes \nalong z. In order to have frustration, giving rise to non- \ncollinear order along z in the bulk, NN interaction J1 \ncan be taken both ferro- or antiferromagnetic, but NNN \ncoupling J2 has necessarily to be antiferromagnetic, and \nthe condition |J2| > |J1|/4 must be fulfilled. Such simpli- \nfied Hamiltonian was already employed to simulate he- \nlical ordering in bulk systems by Diep1,17 and Loison18. \nIn the bulk limit, the state of minimal energy of a sys- \ntem described by Eq.(1) corresponds to a helical arrange- \nment of spins. The ground state energy per spin is equal \nto eg(Qz) = [−4J0 − 2J1 (4 cos (Qzc′) + δ cos (2Qzc′))] \nis the distance between NN layers, δ = J2 \nwhere c′ \nJ1 , \nand Qzc′ = arccos \nis the angle between spins ly- \ning on adjacent planes along the z-direction. The ob- \nserved helical arrangement in bulk holmium corresponds \nto Qzc′ ≃ 30.5◦10: \nsuch value can be obtained from \nthe formula above with the set of coupling constants \nJ0=67.2 K, J1=20.9 K, and J2 = −24.2 K, that we have \nemployed in our simulations. The given values for the ex- \nchange constants are the same already used by Weschke \net al. \nin Ref. 13 to interpret experimental data on \nHolmium films on the basis of a J1 − J2 model, after \na proper scaling by the numbers of NN and NNN on \nneighboring layers of a BCT lattice. \n\np \n\nbe achieved with different number of interacting layers: \nnotably, nearest and next-nearest layers competitive in- \nteractions are enough to get a helical structure with a \nwhatever pitch wavevector. Such observation gives us a \npossible way to solve the conundrum previously emerged, \nas we have the possibility of varying the range of inter- \nactions without modifying the helical pitch, thus decou- \npling the two relevant length scales along the film growth \ndirection, and making accessible a range of n of the or- \nder of, or smaller than, the helical pitch, but still large \nenough that a substantial number of layers can behave \nas “bulk” layers. Therefore, while in the previous papers \nwe have studied the properties of ultrathin magnetic films \nof Ho assuming a model with six interlayer exchange in- \nteractions, here we investigate by MC simulations the \nproperties of the same system by making use of the sim- \nplest model Hamiltonian able to describe the onset of a \nhelical magnetic order in Holmium, i.e. we consider only \ntwo inter-layer coupling constants, as previously done in \nRef. 11.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "F. Cinti(1,2,3), A. Rettori(2,3), and A. Cuccoli(2) \n(1) Department of Physics, University of Alberta, Edmonton, Alberta, Canada T6G 2J1 \n(2)CNISM and Department of Physics, University of Florence, 50019 Sesto Fiorentino (FI), Italy. and \n(3)CNR-INFM S3 National Research Center, I-41100 Modena, Italy \n(Dated: June 8, 2022) \n\nThe properties of helical thin films have been thoroughly investigated by classical Monte Carlo \nsimulations. The employed model assumes classical planar spins in a body-centered tetragonal \nlattice, where the helical arrangement along the film growth direction has been modeled by nearest \nneighbor and next-nearest neighbor competing interactions, the minimal requirement to get helical \norder. We obtain that, while the in-plane transition temperatures remain essentially unchanged with \nrespect to the bulk ones, the helical/fan arrangement is stabilized at more and more low temperature \nwhen the film thickness, n, decreases; in the ordered phase, increasing the temperature, a softening \nof the helix pitch wave-vector is also observed. Moreover, we show also that the simulation data \naround both transition temperatures lead us to exclude the presence of a first order transition for all \nanalyzed sizes. Finally, by comparing the results of the present work with those obtained for other \nmodels previously adopted in literature, we can get a deeper insight about the entwined role played \nby the number (range) of interlayer interactions and surface effects in non-collinear thin films. \n\nteractions by including six different exchange constants \nalong the c crystallographic axis, and gives a helix pitch \nwave-vector Qz such that Qzc′ ≃ 30◦, where c′ = c/2 is \nthe distance between nearest neighboring spin layers par- \nallel to the ab crystallographic planes, henceforth denoted \nalso as x − y planes, while z will be taken parallel to c. \nFor n > 16, n being the number of spin layers in the film, \na correct bulk limit is reached, while for lower n the film \nproperties are clearly affected by the strong competition \namong the helical pitch and the surface effects, which in- \nvolve the majority of the spin layers. \nIn the thickness \nrange n = 9 − 16, i.e. right for thickness values com- \nparable with the helical pitch, three different magnetic \nphases emerged, with the high-temperature, disordered, \nparamagnetic phase and the low-temperature, long-range \nordered one separated by an intriguing, \nintermediate- \ntemperature block phase, where outer ordered layers co- \nexist with some inner disordered ones, the phase tran- \nsition of the latter eventually displaying the signatures \nof a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film \ncollapses once and for all to a quasi-collinear order. \n\nI. INTRODUCTION \n\nfrustrated magnetic \nsystems1 still raises great interest, both in consequence \nof theoretical aspects, related to their peculiar criti- \ncal properties2, and in view of possible technological \napplications3. Indeed, beside conventional ferromagnetic \nor antiferromagnetic phase transitions, in many new ma- \nterials other nontrivial and unconventional forms of or- \ndering have been observed4,5. A quantity of particular \ninterest in this context is the spin chirality, an order pa- \nrameter which turned out to be extremely relevant in, \ne.g., magnetoelectric materials6, itinerant MnSi7, binary \ncompounds as FeGe8, glass transition of spins9, and XY \nhelimagnets, as Holmium, Terbium or Dysprosium10. In \nthe latter case, a new universality class was predicted be- \ncause a Z2 × SO(2) symmetry is spontaneously broken \nin the ordered phase2: In fact, when dealing with such \nsystems, in addition to the SO(2) symmetry of the spin \ndegrees of freedom ~Si, one has to consider also the Z2 \nsymmetry of the spin chirality κij ∝ \n\nThe study of low dimensional \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n4 \n\n] \nh \nc \ne \nm \n\n- \nt \na \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n1 \nv \n0 \n1 \n5 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nz \n\n~Si × ~Sj \nh \n.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0510.pdf" - }, - { - "text": "**(a)**\n1 \n*TN*(8) = 92(2)K \n\n90K \n91K \n92K \n93K \n94K \n95K \n\n*e*\n*P*\n0.5 \n\n0 \n-140 -139 -138 -137 -136 -135 -134 -133 -132 -131 \n*e*\n**(b)**\n\n129K \n130K \n131K \n132K \n133K \n134K \n\n*TC*(8) = 133.3(3)K \n0.4 \n*e*\n*P*\n0.2 \n\n0 \n-94 -92 -90 -88 \n-86 \n*e*\n-84 -82 -80 -78 \n\nFIG. 10: (colors online) Equilibrium probability distribution \nof the energy for the thickness n = 8 for some temperatures \naround TN (8), (a), and TC(8), (b), respectively. \n\nopposite magnetization. We can thus confidently assert \nthat, regardless of the underlying lattice structure, by \ndecreasing the number of the out-of-plane interactions, \nfor thicknesses close to the helical bulk pitch, the block \n\nAs a final issue we address the problem of the order \nof the transitions observed at TN (n) and TC(n), respec- \ntively. In particular, we focus our attention to the thick- \nness ranges where the chiral order parameter is relevant, \nregions i) and ii) as defined at the beginning of \ni.e. \nthis Section. In Fig. 10 the equilibrium probability dis- \ntribution of the energy for temperatures around TN (8) \n(Fig. 10a) and TC(8) (Fig. 10b) is plotted: \nfor both \ntemperatures, no double peak structure is observed, so \nthat we have no direct indication for a first order tran- \nsition even if, according to precedent studies of Loison \nand Diep17,18, the presence of a first-order transition at \nTN (n), cannot be completely excluded, as it could reveal \nitself only when the lateral dimension L are much larger \nthan the largest correlation length. The same conclusion \nabout the order of transition is reached for any other in- \nvestigated film thickness, as the energy probability distri- \nbution shape does not qualitatively change. This findings \nagree with the results we got in previous MC simulations \ndiscussed in Ref. 15, so that we may conclude that the \norder of the observed transitions is not affected by the \nrange of interactions. \n\n1 Frustrated spin Systems, edited by H. T. Diep (World Sci- 134420 (2009). \n\n16 J. Bohr D. Gibbs, J. D. Axe, D. E. Moncton, K. L. \nD’Amico, C. F. Majkrzak, J. Kwo, M. Hong, C. L. Chien, \nand J. Jensen, Physica B 159, 93 (1989). \n17 H. T. Diep, Phys. Rev. B 39, 397 (1989). \n18 D. Loison, Physica A 275, 207 (2000). \n19 N. Metropolis, et al., J. Chem. Phys. 21, 1087 (1953). \n20 F. R. Brown and T. J. Woch, Phys. Rev. Lett. 58, 2394 \n\nentific, 2004). \n\n2 H. Kawamura, J. Phys.: Cond. Matt. 10, 4707 (1998). \n3 T. Kimura et al., Nature (London) 426, 55 (2003). \n4 F. Cinti et al., Phys. Rev. Lett. 100, 057203 (2008). \n5 J.H. Park, S. Onoda, N. Nagaosa, and J. H. Han, Phys. \nRev. Lett. 101, 167202 (2008), and references therein. \n6 S. W. Cheong and M. Mostovoy, Nature Materials (Lon- \n\ndon) 6, 13 (2007). (1987). \n7 Minhyea Lee, W. Kang, Y. Onose, Y. Tokura, and N. P. \n\n21 D. P. Landau, and K. Binder, A Guide to Monte Carlo \nSimulation in Statistical Physics, Cambridge University \nPress, Cambridge (2000). \nOng, Phys. Rev. Lett. 102, 186601 (2009) \n\n8 P. Pedrazzini et al., Phys. Rev. Lett. 98, 047204 (2007). \n9 H. Kawamura and M. S. Li, Phys. Rev. Lett. 87, 187204 \n22 M. E.J. Newman, and G. T. Barkema, Monte Carlo Meth- \nods in Statistical Physics, Clarendon Press, Oxford (1999). (2001). \n\n10 P. J. Jensen, and A. R. Mackintosh, Rere Earth Mag- \nnetism (Structure and Excitations), Clarendon Press, Ox- \nford (1991). \n11 S. Konings, C. Schuessler-Langeheine, H. Ott, E. Weschke, \n\n23 B. Efron, The Annals of Statistics 7, 1 (1979). \n24 P. M. Chaikin, T. C. Lubensky Principles of condensed \nmatter physics, Cambridge University Press, New York \n(1995). \n25 K. Binder, Z. Phys. B 43, 119 (1981). K. Binder, Phys. E. Schierle, J. B. Goedkoop, arXiv 0707.2765v2 \n12 P.J. Jensen, and K.H. Bennemann, Surface Science Re- Rev. Lett. 47, 693 (1981). \n\n26 Such observable has been obtained from instantaneous \nevaluation of the structure factor during the stochastic \nprocess, and subsequently statistically analyzed as all the \nother macroscopic quantities.", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" - }, - { - "text": "**(a)**\n0.6 \n**(a)**\n) \n. \nu \n. \na \n( \n2 \n*B* κ \n1.5 \n0.4 \nβ \n*k* ∂ \nκ */*\n1 \n*v*\n132 \n134 \nT (K) \n136 *c*\n0.2 \n**(b)** 0.5 \n0 0 \n0.6 \n**(c)**\n**(b)**\n) \n. \nu \n. \na \n( \n0.5 \n) \nκ \n( \n0.4 \n*4*\n*u* κ \n0.3 χ \n**(d)** 0.2 \n0.1 \n20 40 \n80 \n*T*(K) \n100 120 140 20 40 \n80 \n*T*(K) \n100 120 140 60 60 \n\n136 137 138 135 \n\n0.66 \n0.66 \n*)*\n*M* 0.64 \n0.64 \n*(*\n*4*\n*u*\n0.62 \n0.62 \n\n0.65 \n*)*\n\n*M*\n*H*\n*M*\n) \n. \nu \n0.6 \n. \na \n( \n*)*\n*(*\n*z*\n*q*\n*(*\n*S*\n*4*\n0.55 *u*\n\n0.2 0.4 0.6 0.8*qz*\n0 \n0.5 \n130 131 132 133 \n134 \n*T*(K) \n\nFIG. 4: (color online) Thermodynamic quantities obtained for \nthickness n = 8 in the temperature range 0-150 K. Colors and \nsymbols as in Fig. 2. (a): specific heat; (b): chirality order \nparameter. (c): susceptibility χκ. (d): Binder cumulant for \nκ. \n\nFIG. 3: (color online) Binder cumulants at thickness n = \n16, colors as in Fig. 2. (a): Binder cumulant for the order \nparameter defined in Eq. (3). (b): Binder cumulant extracted \nfrom the integral of the structure factor (see Sec. II). Inset: \nstructure factor for L = 64 between T = 131 K (upper curve) \nand T = 140 K (lower), with 1 K temperature step. \n\n133.1(3) K (see Fig. 3b). The crossing points of the \nBinder’s cumulants of the helical order parameter imme- \ndiately appear to be located, within the error bars, at the \nsame temperature of those for the average magnetization \npreviously discussed. In addition, it is worthwhile to ob- \nserve that the peak evolution of S(0, 0, qz), in particular \nclose to TN (16) (inset of Fig. 3b), displays the typical \nbehaviour expected for an helical structure. We can thus \nconclude that for n = 16, as it is commonly observed \nin bulk samples, the establishment of the in-plane order \ncoincides with onset of the perpendicular helical arrange- \nment at TN (16). However, due to helix distortion in the \nsurface regions, the maximum of S(0, 0, qz) stabilizes at \nvalues of qz sensibly smaller (e.g. Qz(TN (16)) ≈ 16◦, \nand Qz(T = 10K) ≈ 28◦) with respect to the bulk one \n(QHo \n\nIII. RESULTS \n\nThe results obtained by MC simulations of the model \nintroduced in Sec. II will be presented starting from \nn = 16, i.e. the highest investigated film thickness which \nstill displays a bulk-like behaviour. \nIn Fig. 2 the spe- \ncific heat for samples with n = 16 and lateral dimension \nL = 24, 32, 48, 64 is shown. The location of the specific \nheat maximum shows a quite definite evolution toward \nthe bulk transition temperature, T Ho \nN ≃ 132 K10 (it is \nworthwhile to note that for this XY model the mean field \ntheory predicts a critical temperature T Ho \nN,MF ≃ 198 K). \nThe intensity of the maximum of cv has been analyzed \nby the MH technique for the same lateral dimensions (see \ninset of Fig. 2): it clearly appears as it increases with L \nin a smooth way. \n\nz = 30.5◦). \nThe MC simulations outcomes for n = 16 we just pre- \nsented appear quite different with respect to those ob- \ntained at the same thickness for the model with six cou- \npling constants along the z direction14,15. \nIndeed, for \nthe J1-J2 model here investigated, we observe that all \nlayers order at the same temperature, and we do not find \nany hint of the block-phase, with inner disordered planes \nintercalated to antiparallel quasi-FM four-layer blocks, \npreviously observed; sample MC runs we made using the \nsame hcp lattice employed in Refs. 14,15 shows that the \npresence or absence of the block phase is not related to \nthe lattice geometry, but it is a consequence of the inter- \naction range only.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0510.pdf" - }, - { - "text": "30 \n\n25 \n\n) \n. \ng \ne \nd \n( \n\n20 \n\n15 \n*x*\n*a*\n*m*\n*,*\n*z*\n10 \n*Q*\n\n5 \n\n0 \n0 40 \n*T*(K) \n\nFIG. 8: (color online) Qz, position of the maximum of S(~q), \nvs. temperature for thickness n = 8. Inset: magnetic vector \n(mx \nl ) profile for some temperatures for L = 64. Colors \nand symbols as in Fig. 2. FIG. 7: (color online) ∆ϕl(T ) vs. temperature for the surface \nplanes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), \nl = 4 (circles). Straight lines and full symbols: n = 8. Dashed \nlines and open symbols: n = 16. \nl , my \n\nfilm leads to an effective 2d-like trend. Region ii) looks \nhowever more intriguing, and requires a more accurate \ndiscussion, which can benefit from a careful comparison \nof the behaviour of a given quantity in regions i) and ii). \n\n0 \n7 0 1 2 3 4 \n\n6 \n*l*\n\n8 9 10 11 12 5 \n\nFIG. 9: ∆ϕl for a BCT lattice and n = 12, when the six \ncoupling constants set employed in Ref. 14,15 (see text) is \nused. The temperature range has been chosen around TC(n) \n(error bars lye within point size). \n\nFor this purpose, we look at the temperature depen- \ndence of the rotation angle of the magnetization between \nNN planes. \nIn Fig. 7, ∆ϕl(T ) for n = 8 and n = 16 \n(continuous and dashed lines, respectively), is plotted for \nthe outermost planes, l = 1 . . . 4. For both thicknesses, a \nmonotonic trend is observed for all l, but at variance with \nwhat happens for the highest thickness, for n = 8 we see, \nstarting from a temperature T . TN (8), an abrupt drop \nof ∆ϕ3 and ∆ϕ4, which rapidly reach an almost con- \nstant value, only slightly larger than ∆ϕ1. In the tem- \nperature range TN (8) . T < TC(8) we thus substantially \nobserve the same small magnetic phase shifts between all \nNN layers, testifying an energetically stable quasi-FM \nconfiguration giving no contribution to the helical order \nparameters. The latter point can be made clearer by \nlooking at the the peak position Qz,max of the structure \nfactor S(0, 0, qz). In Fig. 8 the average of Qz,max vs T is \nreported, again for n = 8 and for different lateral dimen- \nsions L26. As expected from the previous argument, we \nsee that Qz,max = 0 for TN (8) < T < TC(8), while it be- \ngins to shift to higher values as soon as the temperature \ndecreases below TN (8), making apparent a progressive \nfan stabilization with Qz,max 6= 0 and reaching a value \nof about 21◦ for T = 10 K. \n\nIn a previous study, where the magnetic properties of \nHo thin films were investigated by MC simulations of a \nHeisenberg model with easy-plane single-ion anisotropy \nand six out-of-plane coupling constants (as obtained by \nexperimental neutron scattering measurements16) on a \nHCP lattice14,15, it was found that for thicknesses compa- \nrable with the helical pitch the phase diagram landscape \nis quite different from what we find here. \nIndeed, for \nn = 9 − 16, three different magnetic phases could be sin- \n\ngled out, with the high-temperature, paramagnetic phase \nseparated from the low-temperature, long-range ordered \none, by an intermediate-temperature block phase where \nouter ordered 4-layers blocks coexist with some inner dis- \nordered ones. Moreover, it was observed that the phase \ntransition of such inner layers turns out to have the sig- \nnatures of a Kosterlitz-Thouless one. \n\nThe absence of the block phase in the J1 − J2 model \nhere investigated has to be attributed to the different \nrange of interactions, rather than to the different lattice \nstructure. We came to this conclusion by doing some \nsimulations using the same set of interaction constants \nemployed in Refs. 14,15, but using a BCT lattice: the \nresults we obtained for ∆ϕl with n = 12 are reported in \nFig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 \nand clearly displays the footmarks of the block phase (see \ndown-triangle), with two external blocks of ordered layers \n( l =1. . . 5 and 8. . . 12 ), where ∆ϕl is roughly 10◦, sep- \narated by a block of disordered layers, and with almost", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0510.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_JWN_2014.pdf", - "query": "What the rough sales amount of the nordstrom.com website ?", - "target_page": 3, - "target_passage": "$2 billion in nordstrom.com sales", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
Fiscal year201420132012
Nordstrom full - line stores - U. S.$ 7.682$ 7.705$ 7.964
Nordstrom. com1.9961.6221.269
Nordstrom9.6789.3279.233
Nordstrom Rack3.2152.7382.445
Nordstromrack. com and HauteLook360295236
Other retailt1163535
Total Retail segment13.36912.39511.949
Corporate / Other( 259 )( 229 )( 187 )
Total net sales$ 13.110$ 12.166$ 11.762
\n\n\n \n \n \n \n [html]Net sales% of totalNet sales\n
_
% of totalNet sales% of totalWomen ’ s Apparel$ 3.95030 %
$ 3.73331 %$ 3.68431 %Shoes3.03823 %
2.82823 %2.71623 %Men ’ s Apparel2.12916 %
1.94316 %1.86616 %Women ’ s Accessories1.80114 %
1.64414 %1.57413 %Cosmetics1.40011 %
1.31211 %1.25511 %Kids ' Apparel4834 %
4133 %3813 %Other3092 %
2932 %2863 %Total net sales$ 13.110100 %
$ 12.166100 %$ 11.762100 %
", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Fiscal year201420132012
Net sales by channel :
Nordstrom full - line stores - U. S.$ 7.682$ 7.705$ 7.964
Nordstrom. com1.9961.6221.269
Nordstrom9.6789.3279.233
Nordstrom Rack3.2152.7382.445
Nordstromrack. com and HauteLook360295236
Other retail11163535
Total Retail segment13.36912.39511.949
Corporate / Other( 259 )( 229 )( 187 )
Total net sales$ 13.110$ 12.166$ 11.762
Net sales increase7.8 %3.4 %12.1 %
Comparable sales increase ( decrease ) by channel2 :
Nordstrom full - line stores - U. S.( 0.5 %)( 2.1 %)3.9 %
Nordstrom. com23.1 %29.5 %37.1 %
Nordstrom3.6 %2.3 %7.5 %
Nordstrom Rack3.8 %2.7 %7.4 %
Nordstromrack. com and HauteLook22.1 %27.3 %
Total company4.0 %2.5 %7.3 %
Sales per square foot2 :
Total sales per square foot$ 493$ 474$ 470
4 - wall sales per square foot413408417
Full - line sales per square foot - U. S371372385
Nordstrom Rack sales per square foot552553568
Percentage of net sales by merchandise category :
Women ’ s Apparel30 %31 %31 %
Shoes23 %23 %23 %
Men ’ s Apparel16 %16 %16 %
Women ’ s Accessories14 %14 %13 %
Cosmetics11 %11 %11 %
Kids ’ Apparel4 %3 %3 %
Other2 %2 %3 %
Total100 %100 %100 %
\n\n(Nordstrom.com, Nordstromrack.com and HauteLook) in comparable sales because of the integration with our stores. Fiscal year 2012 includes an extra week (the 53rd week) \nas a result of our 4-5-4 retail reporting calendar. The 53rd week is not included in comparable sales calculations. \n3 Sales per square foot is calculated as net sales divided by weighted-average square footage. Weighted-average square footage includes a percentage of year-end square \n\nfootage for new stores equal to the percentage of the year during which they were open. 4-wall sales per square foot is calculated as sales for Nordstrom U.S. full-line stores, \nNordstrom Rack stores, Jeffrey boutiques, our Canada full-line store, Last Chance and Trunk Club showrooms divided by their weighted-average square footage.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Net Sales \nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014. \n\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with \nthe same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our \nmerchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men’s Apparel. \n\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales \nof 0.5%. The Southwest and Southeast were the top-performing geographic regions. \n\nNordstrom.com net sales increased $115, or 19%, on top of last year’s 30% increase for the same period. Nordstromrack.com and \nHauteLook net sales increased $24, or 28%, compared with the same period in 2013. Both were primarily driven by expanded merchandise \nselection and ongoing technology investments to enhance the customer experience.", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Information ( at year - end )Nordstrom full - line stores - U. S.116117117117115Nordstrom Rack and other stores †17614312310889Total square footage27.061.00026.017.00025.290.00024.745.000", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Net Sales (2014 vs. 2013) \nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we \nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the \nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These \nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014. \n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared \nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number \nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics \nand Men’s Apparel. \n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top- \nperforming geographic regions for full-line stores were the Southeast and Southwest. \n\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. \n\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at \nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold \nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel. \n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales \ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast. \nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up \n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology \ninvestments to enhance the customer experience. \n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013. \nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the \naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**SCORECARD**A LOOK AT THE NUMBERS \n\n\n \n \n \n \n [html]\n
FISCAL YEAR20142013% CHANGE
Net sales813.110$ 12.1667.8
Earnings before interest and income taxes ( EINT )1.3231.350( 2.0 )
Net earnings720734( 1.9 )
Earnings per diluted share3.723.710.3
\n\n’10 ’11 ’12 ’13 ’14 \n\n**NET SALES PERCENTAGE INCREASE**\n\n’10 \n12.7 ’11 \n12.7 ’12 \n’13 \n12.1 3.4 ’14 \n7.8 \n\n’10 ’11 ’12 ’13 ’14 \n\n**COMPARABLE SALES PERCENTAGE INCREASE**\n\n’10 \n8.1 ’11 \n7.2 ’12 \n’13 \n’14 \n7.3 2.5 4.0 \n\n4-Wall Sales Per Square Foot \nSales Per Square Foot \n\n**CASH FLOW**\n**FROM OPERATIONS ($)**\n**RETURN ON ASSETS**\n**AND RETURN ON INVESTED**\n**CAPITAL (ROIC) (%)** ***\n\n1,320 \n**1,220**\n1,177 1,177 \n1,110 \n13.9 \n13.6 13.6 \n13.3 \n**12.6**\n\n8.9 \n8.7 8.7 8.6 \n**8.1**\n\nDollars in millions except per share and per square foot amounts. \n\n*4-wall sales per square foot is calculated as sales for Nordstrom U.S. full-line stores, Nordstrom Rack stores, Jeffrey boutiques, \nour Canada full-line store, Last Chance and Trunk Club showrooms divided by their weighted-average square footage. \n**Inventory Turn is calculated as annual cost of sales and related buying and occupancy costs (for all segments) divided by 4-quarter average inventory. Our inventory turnover rate \ndecreased in 2012, 2013 and 2014 primarily due to increasing our investment in pack and hold inventory beginning in 2012, which helped fuel the growth of Nordstrom Rack. \n***See Return on Invested Capital (ROIC) Non-GAAP financial measure on page 26 for additional information and reconciliation to the most directly comparable GAAP financial measure. \n\nnordstrom.com/companyreview", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "’10 ’11 ’12 ’13 ’14 \n\n**NET SALES PERCENTAGE INCREASE**\n’10 ’11 ’12 ’13 ’14 \n12.7 12.7 12.1 3.4 7.8 \n\n’10 ’11 ’12 ’13 ’14 \n\n**COMPARABLE SALES PERCENTAGE INCREASE**\n’10 ’11 ’12 ’13 ’14 \n8.1 7.2 7.3 2.5 4.0 \n\n4-Wall Sales Per Square Foot \nSales Per Square Foot \n\n**CASH FLOW** **RETURN ON ASSETS**\n**FROM OPERATIONS ($)** **AND RETURN ON INVESTED**\n**CAPITAL (ROIC) (%)** ***\n\n1,320 \n**1,220**\n1,177 1,177 \n1,110 \n13.9 \n13.6 13.6 \n13.3 \n**12.6**\n\n8.9 \n8.7 8.7 8.6 \n**8.1**\n\nDollars in millions except per share and per square foot amounts. \n\n*4-wall sales per square foot is calculated as sales for Nordstrom U.S. full-line stores, Nordstrom Rack stores, Jeffrey boutiques, \nour Canada full-line store, Last Chance and Trunk Club showrooms divided by their weighted-average square footage. \n**Inventory Turn is calculated as annual cost of sales and related buying and occupancy costs (for all segments) divided by 4-quarter average inventory. Our inventory turnover rate \ndecreased in 2012, 2013 and 2014 primarily due to increasing our investment in pack and hold inventory beginning in 2012, which helped fuel the growth of Nordstrom Rack. \n***See Return on Invested Capital (ROIC) Non-GAAP financial measure on page 26 for additional information and reconciliation to the most directly comparable GAAP financial measure. \n\nnordstrom.com/companyreview", - "page_start": 94, - "page_end": 94, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. \n\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom \nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected \ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales \ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position \nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations. \n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with \nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another \nway to provide sought-after brands that appeal to new and existing customers. \n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique \nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this \nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our \npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto \nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin. \n\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%.", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**RESULTS OF OPERATIONS**\nOur reportable segments are Retail and Credit. Our Retail segment includes our U.S. Nordstrom branded full-line stores and online store, \nNordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including Trunk Club, Jeffrey, our Canada store and \nour Last Chance clearance store. For purposes of discussion and analysis of our results of operations of our Retail Business, we combine \nour Retail segment results with revenues and expenses in the “Corporate/Other” column of Note 16: Segment Reporting in the Notes to \nConsolidated Financial Statements of Item 8: Financial Statements and Supplementary Data. We analyze our results of operations through \nearnings before interest and income taxes for our Retail Business and Credit, while interest expense and income taxes are discussed on a \ntotal company basis. \n\nSimilar to many other retailers, Nordstrom follows the retail 4-5-4 reporting calendar, which included an extra week in the fourth quarter of \n2012 (the “53rd week”). The analysis of our results of operations, liquidity and capital resources compares the 52 weeks in 2013 to the 53 \nweeks in 2012. However, the 53rd week is not included in comparable sales calculations. In 2012, the 53rd week contributed approximately \n$0.04 to earnings per diluted share. \n\n\n \n \n \n \n [html]TableTableTable\n
Data
Amount% of net sales †Amount% of net sales1Amount% of net sales †
Net sales$ 13.110100.0 %$ 12.166100.0 %$ 11.762100.0 %
Cost of sales and related buying and occupancy costs( 8.401 )( 64.1 %)( 7.732 )( 63.6 %)( 7.427 )( 63.1 %)
Gross profit4.70935.9 %4.43436.4 %4.33536.9 %
Selling, general and administrative expenses( 3.588 )( 27.4 %)( 3.272 )( 26.9 %)( 3.172 )( 27.0 %)
Earnings before interest and income taxes$ 1.1218.6 %$ 1.1629.6 %$ 1.1639.9 %
", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "The following table summarizes our store count and square footage activity: \n\n\n \n \n \n \n [html]Store countSquare footage\n
Fiscal year201420132012201420132012
Total, beginning of year26024022526.025.324.7
Store openings :
Nordstrom full - line stores - U. S.210.30.1
Nordstrom Rack and other stores12922151.20.70.6
Stores acquired4
Stores closed( 3 )( 2 )( 1 )( 0.4 )( 0.1 )
Total, end of year29226024027.126.025.3
\n\nWe had no store relocations in 2014, compared with one Nordstrom full-line store and two Nordstrom Rack relocations in 2013 and three \nNordstrom Rack relocations in 2012. Our 2014 new store openings increased our square footage by 5.5%. \n\nTo date in 2015, we have opened our second full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional \nNordstrom full-line stores in the U.S. and another full-line store in Canada during 2015. Planned net store openings are expected to increase \nour retail square footage by approximately 6.1%.", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_JWN_2014.pdf", - "query": "How many employees did Nordstrom count in 2014 ?", - "target_page": 17, - "target_passage": "During 2014, we employed approximately 67,000 employees on a full- or part-time basis.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
Fiscal year201420132012
Nordstrom full - line stores - U. S.$ 7.682$ 7.705$ 7.964
Nordstrom. com1.9961.6221.269
Nordstrom9.6789.3279.233
Nordstrom Rack3.2152.7382.445
Nordstromrack. com and HauteLook360295236
Other retailt1163535
Total Retail segment13.36912.39511.949
Corporate / Other( 259 )( 229 )( 187 )
Total net sales$ 13.110$ 12.166$ 11.762
\n\n\n \n \n \n \n [html]Net sales% of totalNet sales\n
_
% of totalNet sales% of totalWomen ’ s Apparel$ 3.95030 %
$ 3.73331 %$ 3.68431 %Shoes3.03823 %
2.82823 %2.71623 %Men ’ s Apparel2.12916 %
1.94316 %1.86616 %Women ’ s Accessories1.80114 %
1.64414 %1.57413 %Cosmetics1.40011 %
1.31211 %1.25511 %Kids ' Apparel4834 %
4133 %3813 %Other3092 %
2932 %2863 %Total net sales$ 13.110100 %
$ 12.166100 %$ 11.762100 %
", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Information ( at year - end )Nordstrom full - line stores - U. S.116117117117115Nordstrom Rack and other stores †17614312310889Total square footage27.061.00026.017.00025.290.00024.745.000", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "The following table summarizes our store count and square footage activity: \n\n\n \n \n \n \n [html]Store countSquare footage\n
Fiscal year201420132012201420132012
Total, beginning of year26024022526.025.324.7
Store openings :
Nordstrom full - line stores - U. S.210.30.1
Nordstrom Rack and other stores12922151.20.70.6
Stores acquired4
Stores closed( 3 )( 2 )( 1 )( 0.4 )( 0.1 )
Total, end of year29226024027.126.025.3
\n\nWe had no store relocations in 2014, compared with one Nordstrom full-line store and two Nordstrom Rack relocations in 2013 and three \nNordstrom Rack relocations in 2012. Our 2014 new store openings increased our square footage by 5.5%. \n\nTo date in 2015, we have opened our second full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional \nNordstrom full-line stores in the U.S. and another full-line store in Canada during 2015. Planned net store openings are expected to increase \nour retail square footage by approximately 6.1%.", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Fiscal year201420132012
Net sales by channel :
Nordstrom full - line stores - U. S.$ 7.682$ 7.705$ 7.964
Nordstrom. com1.9961.6221.269
Nordstrom9.6789.3279.233
Nordstrom Rack3.2152.7382.445
Nordstromrack. com and HauteLook360295236
Other retail11163535
Total Retail segment13.36912.39511.949
Corporate / Other( 259 )( 229 )( 187 )
Total net sales$ 13.110$ 12.166$ 11.762
Net sales increase7.8 %3.4 %12.1 %
Comparable sales increase ( decrease ) by channel2 :
Nordstrom full - line stores - U. S.( 0.5 %)( 2.1 %)3.9 %
Nordstrom. com23.1 %29.5 %37.1 %
Nordstrom3.6 %2.3 %7.5 %
Nordstrom Rack3.8 %2.7 %7.4 %
Nordstromrack. com and HauteLook22.1 %27.3 %
Total company4.0 %2.5 %7.3 %
Sales per square foot2 :
Total sales per square foot$ 493$ 474$ 470
4 - wall sales per square foot413408417
Full - line sales per square foot - U. S371372385
Nordstrom Rack sales per square foot552553568
Percentage of net sales by merchandise category :
Women ’ s Apparel30 %31 %31 %
Shoes23 %23 %23 %
Men ’ s Apparel16 %16 %16 %
Women ’ s Accessories14 %14 %13 %
Cosmetics11 %11 %11 %
Kids ’ Apparel4 %3 %3 %
Other2 %2 %3 %
Total100 %100 %100 %
\n\n(Nordstrom.com, Nordstromrack.com and HauteLook) in comparable sales because of the integration with our stores. Fiscal year 2012 includes an extra week (the 53rd week) \nas a result of our 4-5-4 retail reporting calendar. The 53rd week is not included in comparable sales calculations. \n3 Sales per square foot is calculated as net sales divided by weighted-average square footage. Weighted-average square footage includes a percentage of year-end square \n\nfootage for new stores equal to the percentage of the year during which they were open. 4-wall sales per square foot is calculated as sales for Nordstrom U.S. full-line stores, \nNordstrom Rack stores, Jeffrey boutiques, our Canada full-line store, Last Chance and Trunk Club showrooms divided by their weighted-average square footage.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**COMPETITIVE CONDITIONS**\nWe operate in a highly competitive business environment. We compete with other national, regional, local and online retailers that may carry \nsimilar lines of merchandise, including department stores, specialty stores, off-price stores, boutiques and Internet businesses. Our specific \ncompetitors vary from market to market. We believe the keys to competing in our industry are providing great customer service and customer \nexperiences in stores and online, which includes compelling price and value, fashion newness, quality of products, selection, convenience, \ntechnology, product fulfillment, personalization and appealing, relevant store environments in top locations. \n\n**INVENTORY**\nWe plan our merchandise purchases and receipts to coincide with expected sales trends. For instance, our merchandise purchases and \nreceipts increase prior to our Anniversary Sale, which has historically extended over the last two weeks of July. We also purchase and \nreceive a larger amount of merchandise in the fall as we prepare for the holiday shopping season (from late November through December). \nBeginning in 2012, we increased our investment in pack and hold inventory at Nordstrom Rack, which involves the strategic purchase of \nmerchandise from some of our full-line stores’ top brands in advance of the upcoming selling seasons to take advantage of favorable buying \nopportunities. This inventory is typically held for six months on average and has contributed to the growth in our Nordstrom Rack business. \nWe pay for our merchandise purchases under the terms established with our vendors. \n\nIn order to offer merchandise that our customers want, we purchase from a wide variety of high-quality suppliers, including domestic and \nforeign businesses. We also have arrangements with agents and contract manufacturers to produce our private label merchandise. We \nexpect our suppliers to meet our “Nordstrom Partnership Guidelines,” which address our corporate social responsibility standards for matters \nsuch as legal and regulatory compliance, labor, health and safety and the environment, and are available on our website at Nordstrom.com. \n\n**EMPLOYEES**\nDuring 2014, we employed approximately 67,000 employees on a full- or part-time basis. Due to the seasonal nature of our business, \nemployment increased to approximately 68,000 employees in July 2014 and 73,500 in December 2014. All of our employees are non-union. \nWe believe our relationship with our employees is good. \n\n**CAUTIONARY STATEMENT**\nCertain statements in this Annual Report on Form 10-K contain or may suggest “forward-looking” information (as defined in the Private \nSecurities Litigation Reform Act of 1995) that involve risks and uncertainties, including, but not limited to, anticipated financial outlook for the \nfiscal year ending January 30, 2016, anticipated annual total and comparable sales rates, anticipated new store openings in existing, new \nand international markets, anticipated Return on Invested Capital and trends in our operations. Such statements are based upon the current \nbeliefs and expectations of the company’s management and are subject to significant risks and uncertainties. Actual future results may differ \nmaterially from historical results or current expectations depending upon factors including, but not limited to:", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Net Sales \nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014. \n\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with \nthe same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our \nmerchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men’s Apparel. \n\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales \nof 0.5%. The Southwest and Southeast were the top-performing geographic regions. \n\nNordstrom.com net sales increased $115, or 19%, on top of last year’s 30% increase for the same period. Nordstromrack.com and \nHauteLook net sales increased $24, or 28%, compared with the same period in 2013. Both were primarily driven by expanded merchandise \nselection and ongoing technology investments to enhance the customer experience.", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. \n\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom \nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected \ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales \ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position \nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations. \n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with \nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another \nway to provide sought-after brands that appeal to new and existing customers. \n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique \nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this \nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our \npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto \nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin. \n\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%.", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Net Sales (2014 vs. 2013) \nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we \nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the \nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These \nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014. \n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared \nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number \nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics \nand Men’s Apparel. \n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top- \nperforming geographic regions for full-line stores were the Southeast and Southwest. \n\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. \n\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at \nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold \nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel. \n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales \ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast. \nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up \n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology \ninvestments to enhance the customer experience. \n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013. \nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the \naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter \nof 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise \nincreased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack. \n\nGross Profit \nOur total company gross profit rate decreased 53 basis points compared with the same period in the prior year, primarily due to increased \nmarkdowns at Nordstrom Rack. \n\nRetail Selling, General, and Administrative Expenses \nOur Retail SG&A rate increased 80 basis points primarily due to expenses related to the acquisition of Trunk Club and ongoing technology \nand fulfillment expenses. \n\nCredit Expenses \nIn the fourth quarter, expenses for our Credit segment of $54 increased from $38 in the prior year. The increase was primarily driven by \nhigher operational expenses resulting from a 6% increase in credit volume during the fourth quarter of 2014. The fourth quarter of 2013 also \nincluded the impact of the conversion of our Nordstrom Rewards travel benefit into Nordstrom Notes, which decreased operational expenses \nin the prior year. \n\nFor further information on our quarterly results in 2014 and 2013, refer to Note 17: Selected Quarterly Data in the Notes to Consolidated \nFinancial Statements in Item 8: Financial Statements and Supplementary Data. \n\n**2015 Outlook**\nOur expectations for 2015 are as follows: \n\n\n \n \n \n \n [html]\n
Net Sales7 percent to 9 percent increase
Comparable sales2 percent to 4 percent increase
Earnings per diluted share1$ 3.65 to $ 3.80
\n\n1 This outlook does not include the impact of any future share repurchases. \n\nCapital expenditures, net of property incentives, of approximately $1.2 billion are expected in 2015, an increase from $751 in 2014. The \nincrease relates to store expansion, including Canada and Manhattan, and ongoing investments to improve the customer experience through \nflagship store remodels and a third fulfillment center expected to open in the second half of the year. To date in 2015, we have opened our \nsecond full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional Nordstrom full-line stores in the U.S. and \nanother full-line store in Canada during 2015. Planned net store openings are expected to increase our retail square footage by \napproximately 6.1%.", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Gross Profit (2014 vs. 2013) \nOur Retail gross profit rate decreased 52 basis points compared with 2013 due to increased markdowns and Nordstrom Rack’s accelerated \nstore expansion. The growth in Nordstrom Rack stores resulted in a higher occupancy expense as sales volume at new stores typically take \nseveral years to reach the average of our mature stores and also have substantial pre-opening costs. Retail gross profit increased $275 in \n2014 due to an increase in net sales, partially offset by increased markdowns. \n\nOur inventory turnover rate decreased to 4.67 times in 2014, from 5.07 times in 2013. Ending inventory per square foot increased 8.8% \ncompared with the same period in 2013, which outpaced the total sales per square foot increase of 3.9% primarily due to planned inventory \ngrowth related to Nordstrom Rack and Nordstromrack.com and HauteLook. \n\nGross Profit (2013 vs. 2012) \nOur Retail gross profit rate decreased 41 basis points compared with 2012 primarily due to higher expenses associated with the growth in the \nNordstrom Rewards customer loyalty program and higher occupancy costs related to Nordstrom Rack’s accelerated store expansion. Retail \ngross profit increased $99 in 2013 compared with 2012 due to an increase in net sales at Nordstrom.com and Nordstrom Rack, which was \npartially offset by a decrease in full-line net sales and increased occupancy costs related to Nordstrom Rack’s accelerated store expansion. \n\nOur inventory turnover rate decreased to 5.07 times in 2013, from 5.37 times in 2012. This was primarily due to our increased investment in \npack and hold inventory at Nordstrom Rack, which helped fuel the growth in that channel. On a per square foot basis, we ended the year with \na 9.4% increase in our ending inventory on a 0.8% increase in sales compared with 2012. The increase in ending inventory per square foot \nrelative to the increase in sales per square foot was primarily due to the impact of the 53rd week in 2012, which decreased inventory levels in \nour full-line stores and included an additional week of sales in 2012. In 2013, we also planned inventory increases in full-line stores to fuel \ngrowth in well-performing merchandise categories and increased our pack and hold inventory at Nordstrom Rack. \n\n**Retail Business Selling, General and Administrative Expenses**\nRetail Business selling, general and administrative expenses (“Retail SG&A”) are summarized in the following table: \n\n\n \n \n \n \n [html]\n
Fiscal yearZ014Z013Z01Z
Selling, general and administrative expenses$ 3.588$ 3.272$ 3.172
Selling, general and administrative expenses as a % of net sales27.4 %26.9 %27.0 %
\n\nSelling, General and Administrative Expenses (2014 vs. 2013) \nOur Retail SG&A rate increased 48 basis points in 2014 compared with 2013 primarily due to expenses related to the acquisition of Trunk \nClub and ongoing fulfillment and technology investments. Our Retail SG&A increased $316 in 2014 due primarily to growth-related \ninvestments in fulfillment and technology.", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_JWN_2014.pdf", - "query": "How many stores did Nordstrom posses at the end of 2014 ?", - "target_page": 22, - "target_passage": "Number of stores, end of year : 292", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Information ( at year - end )Nordstrom full - line stores - U. S.116117117117115Nordstrom Rack and other stores †17614312310889Total square footage27.061.00026.017.00025.290.00024.745.000", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "The following table summarizes our store count and square footage activity: \n\n\n \n \n \n \n [html]Store countSquare footage\n
Fiscal year201420132012201420132012
Total, beginning of year26024022526.025.324.7
Store openings :
Nordstrom full - line stores - U. S.210.30.1
Nordstrom Rack and other stores12922151.20.70.6
Stores acquired4
Stores closed( 3 )( 2 )( 1 )( 0.4 )( 0.1 )
Total, end of year29226024027.126.025.3
\n\nWe had no store relocations in 2014, compared with one Nordstrom full-line store and two Nordstrom Rack relocations in 2013 and three \nNordstrom Rack relocations in 2012. Our 2014 new store openings increased our square footage by 5.5%. \n\nTo date in 2015, we have opened our second full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional \nNordstrom full-line stores in the U.S. and another full-line store in Canada during 2015. Planned net store openings are expected to increase \nour retail square footage by approximately 6.1%.", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**Item 2. Properties.**\n\nThe following table summarizes the number of retail stores we own or lease, and the percentage of total store square footage represented by \neach listed category as of January 31, 2015: \n\n\n \n \n \n \n [html]\n
Number of stores% of total store square footage
Leased stores on leased land19538 %
Owned stores on leased land6140 %
Owned stores on owned land3521 %
Partly owned and partly leased store11 %
Total292100 %
\n\n\n \n \n \n \n [html]\n
Fiscal year201420132012
Number of stores, beginning of year260240225
Stores opened312216
Stores acquired4
Stores closed( 3 )( 2 )( 1 )
Number of stores, end of year292260240
Nordstrom full - line stores - U. S.116117117
Nordstrom Rack167140119
Other †934
\n\nIn 2014, we opened three Nordstrom full-line stores (The Woodlands, Texas; Calgary, Alberta; and Jacksonville, Florida) and 27 Nordstrom \nRack stores (Palm Desert, California; San Francisco, California; Chicago, Illinois; Riverside, California; Skokie, Illinois; Tulsa, Oklahoma; \nWauwatosa, Wisconsin; Brooklyn, New York; Columbus, Ohio; Houston, Texas; Manhassett, New York; Chicago, Illinois; Dayton, Ohio; \nHouston, Texas; Queens, New York; Brentwood, Tennessee; Greenville, South Carolina; Madison, Wisconsin; Tempe, Arizona; Brooklyn, \nNew York; Livingston, New Jersey; West Palm Beach, Florida; Brandon, Florida; Columbia, South Carolina; Des Moines, Iowa; Philadelphia, \nPennsylvania; and Summerlin, Nevada). As part of our purchase of Trunk Club in August 2014, we acquired four Trunk Club showrooms (Los \nAngeles, California; Chicago, Illinois; Dallas, Texas; and Washington D.C.) and opened one additional Trunk Club showroom (New York City, \nNew York) in December 2014. Additionally, in 2014, we closed three Nordstrom full-line stores (Orlando, Florida; Vancouver, Washington; and \nPortland, Oregon).", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. \n\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom \nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected \ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales \ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position \nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations. \n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with \nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another \nway to provide sought-after brands that appeal to new and existing customers. \n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique \nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this \nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our \npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto \nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin. \n\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%.", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Fiscal year201420132012
Nordstrom full - line stores - U. S.$ 7.682$ 7.705$ 7.964
Nordstrom. com1.9961.6221.269
Nordstrom9.6789.3279.233
Nordstrom Rack3.2152.7382.445
Nordstromrack. com and HauteLook360295236
Other retailt1163535
Total Retail segment13.36912.39511.949
Corporate / Other( 259 )( 229 )( 187 )
Total net sales$ 13.110$ 12.166$ 11.762
\n\n\n \n \n \n \n [html]Net sales% of totalNet sales\n
_
% of totalNet sales% of totalWomen ’ s Apparel$ 3.95030 %
$ 3.73331 %$ 3.68431 %Shoes3.03823 %
2.82823 %2.71623 %Men ’ s Apparel2.12916 %
1.94316 %1.86616 %Women ’ s Accessories1.80114 %
1.64414 %1.57413 %Cosmetics1.40011 %
1.31211 %1.25511 %Kids ' Apparel4834 %
4133 %3813 %Other3092 %
2932 %2863 %Total net sales$ 13.110100 %
$ 12.166100 %$ 11.762100 %
", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Net Sales (2014 vs. 2013) \nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we \nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the \nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These \nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014. \n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared \nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number \nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics \nand Men’s Apparel. \n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top- \nperforming geographic regions for full-line stores were the Southeast and Southwest. \n\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. \n\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at \nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold \nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel. \n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales \ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast. \nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up \n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology \ninvestments to enhance the customer experience. \n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013. \nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the \naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Fiscal year201420132012
Net sales by channel :
Nordstrom full - line stores - U. S.$ 7.682$ 7.705$ 7.964
Nordstrom. com1.9961.6221.269
Nordstrom9.6789.3279.233
Nordstrom Rack3.2152.7382.445
Nordstromrack. com and HauteLook360295236
Other retail11163535
Total Retail segment13.36912.39511.949
Corporate / Other( 259 )( 229 )( 187 )
Total net sales$ 13.110$ 12.166$ 11.762
Net sales increase7.8 %3.4 %12.1 %
Comparable sales increase ( decrease ) by channel2 :
Nordstrom full - line stores - U. S.( 0.5 %)( 2.1 %)3.9 %
Nordstrom. com23.1 %29.5 %37.1 %
Nordstrom3.6 %2.3 %7.5 %
Nordstrom Rack3.8 %2.7 %7.4 %
Nordstromrack. com and HauteLook22.1 %27.3 %
Total company4.0 %2.5 %7.3 %
Sales per square foot2 :
Total sales per square foot$ 493$ 474$ 470
4 - wall sales per square foot413408417
Full - line sales per square foot - U. S371372385
Nordstrom Rack sales per square foot552553568
Percentage of net sales by merchandise category :
Women ’ s Apparel30 %31 %31 %
Shoes23 %23 %23 %
Men ’ s Apparel16 %16 %16 %
Women ’ s Accessories14 %14 %13 %
Cosmetics11 %11 %11 %
Kids ’ Apparel4 %3 %3 %
Other2 %2 %3 %
Total100 %100 %100 %
\n\n(Nordstrom.com, Nordstromrack.com and HauteLook) in comparable sales because of the integration with our stores. Fiscal year 2012 includes an extra week (the 53rd week) \nas a result of our 4-5-4 retail reporting calendar. The 53rd week is not included in comparable sales calculations. \n3 Sales per square foot is calculated as net sales divided by weighted-average square footage. Weighted-average square footage includes a percentage of year-end square \n\nfootage for new stores equal to the percentage of the year during which they were open. 4-wall sales per square foot is calculated as sales for Nordstrom U.S. full-line stores, \nNordstrom Rack stores, Jeffrey boutiques, our Canada full-line store, Last Chance and Trunk Club showrooms divided by their weighted-average square footage.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Net Sales \nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014. \n\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with \nthe same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our \nmerchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men’s Apparel. \n\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales \nof 0.5%. The Southwest and Southeast were the top-performing geographic regions. \n\nNordstrom.com net sales increased $115, or 19%, on top of last year’s 30% increase for the same period. Nordstromrack.com and \nHauteLook net sales increased $24, or 28%, compared with the same period in 2013. Both were primarily driven by expanded merchandise \nselection and ongoing technology investments to enhance the customer experience.", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter \nof 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise \nincreased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack. \n\nGross Profit \nOur total company gross profit rate decreased 53 basis points compared with the same period in the prior year, primarily due to increased \nmarkdowns at Nordstrom Rack. \n\nRetail Selling, General, and Administrative Expenses \nOur Retail SG&A rate increased 80 basis points primarily due to expenses related to the acquisition of Trunk Club and ongoing technology \nand fulfillment expenses. \n\nCredit Expenses \nIn the fourth quarter, expenses for our Credit segment of $54 increased from $38 in the prior year. The increase was primarily driven by \nhigher operational expenses resulting from a 6% increase in credit volume during the fourth quarter of 2014. The fourth quarter of 2013 also \nincluded the impact of the conversion of our Nordstrom Rewards travel benefit into Nordstrom Notes, which decreased operational expenses \nin the prior year. \n\nFor further information on our quarterly results in 2014 and 2013, refer to Note 17: Selected Quarterly Data in the Notes to Consolidated \nFinancial Statements in Item 8: Financial Statements and Supplementary Data. \n\n**2015 Outlook**\nOur expectations for 2015 are as follows: \n\n\n \n \n \n \n [html]\n
Net Sales7 percent to 9 percent increase
Comparable sales2 percent to 4 percent increase
Earnings per diluted share1$ 3.65 to $ 3.80
\n\n1 This outlook does not include the impact of any future share repurchases. \n\nCapital expenditures, net of property incentives, of approximately $1.2 billion are expected in 2015, an increase from $751 in 2014. The \nincrease relates to store expansion, including Canada and Manhattan, and ongoing investments to improve the customer experience through \nflagship store remodels and a third fulfillment center expected to open in the second half of the year. To date in 2015, we have opened our \nsecond full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional Nordstrom full-line stores in the U.S. and \nanother full-line store in Canada during 2015. Planned net store openings are expected to increase our retail square footage by \napproximately 6.1%.", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "To date in 2015, we have opened one Nordstrom full-line store in Ottawa, Ontario. During the remainder of 2015, we have announced the \nopening of four additional Nordstrom full-line stores (San Juan, Puerto Rico; Vancouver, British Columbia; Minneapolis, Minnesota; and \nWauwatosa, Wisconsin) and the opening of 27 additional Nordstrom Rack stores (Bakersfield, California; Redlands, California; Reno, \nNevada; Princeton, New Jersey; Westwood, Massachusetts; Webster, Texas; Laguna Niguel, California; Miami, Florida; Springfield, Virginia; \nSt. Louis Park, Minnesota; Dublin, California; Albany, New York; Anchorage, Alaska; Baton Rouge, Louisiana; Buffalo, New York; Cerritos, \nCalifornia; Clearwater, Florida; Eatontown, New Jersey; Emeryville, California; Fort Collins, Colorado; Long Beach, California; Mount \nPleasant, South Carolina; Newark, Delaware; Rockaway, New Jersey; Syracuse, New York; Thousand Oaks, California; and Wayne, New \nJersey). \n\nWe also own six merchandise distribution centers (Portland, Oregon; Dubuque, Iowa; Ontario, California; Newark, California; Upper \nMarlboro, Maryland; and Gainesville, Florida) and we own one fulfillment center on leased land (Cedar Rapids, Iowa), all of which are utilized \nby our Retail segment. Trunk Club and HauteLook, which are included in our Retail segment, lease three administrative offices (Chicago, \nIllinois; Los Angeles, California and New York City, New York) and one fulfillment center (San Bernardino, California). We plan to open a third, \nowned fulfillment center (Elizabethtown, Pennsylvania) in the second half of 2015. We lease office buildings in Centennial, Colorado and \nScottsdale, Arizona, both for use by our Credit segment. Our administrative offices in Seattle, Washington are a combination of leased and \nowned space. We also lease a data center in Centennial, Colorado.", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2538.pdf", - "query": "What type of nanostructured material works notably well to build gas nanosensors ?", - "target_page": 1, - "target_passage": "carbon nanotubes (CNT) [2] have been shown to work remarkably well as de- tectors of small gas molecules", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. \n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, \n“Nanotube molecular wires as \nScience 287(5453), 622 (Jan. 2000), \nK. Cho, and H. Dai, \nchemical sensors”, \ndoi:10.1126/science.287.5453.622. \n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “Ab \ninitio study of spin-dependent transport in carbon nanotubes \nwith iron and vanadium adatoms”, Phys. Rev. B 78(19), 195405 \n(Nov. 2008), doi:10.1103/PhysRevB.78.195405. \n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, \n\n“Ex- \ntreme oxygen sensitivity of electronic properties of car- \nScience 287(5459), 1801 (Mar. 2000), \nbon nanotubes”, \ndoi:10.1126/science.287.5459.1801. \n\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. \n\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, \n“Real-space grid implementation of the projector augmented \nPhys. Rev. B 71(3), 035109 (Jan. 2005), \nwave method”, \ndoi:10.1103/PhysRevB.71.035109. [7] A. R. Rocha, M. Rossi, A. Fazzio, \n\nJ. R. \n“Designing real nanotube-based gas \nsen- \nPhys. Rev. Lett. 100(17), 176803 (May 2008), \n\nand A. \n\n[23] J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized gradi- \nent approximation made simple”, Phys. Rev. Lett. 77(18), 3865 \n(Oct. 1996), doi:10.1103/PhysRevLett.77.3865. da Silva, \nsors”, \ndoi:10.1103/PhysRevLett.100.176803. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. \n\n\n \n \n \n \n [html]\n
Cancertectors ofCases
both for i [ 9 ]____________Patients
CasesPTistin errorStates
Post - rate (%)Controlits, electri
Tabletive for sthe
tionalizatPatientssidewall 1
________________________________________________________________________________________________________________________________________________________________________________________________________hP_115Pd_1Patients
the selectCancer1.10 ( 0.01 )
\n\nchange in CNT resistivity may then be obtained from the cal- \nculated coverages and single impurity conductances. \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. \n\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. \n\nIn summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. \n\nThe authors acknowledge financial support from Span- \nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados \nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF \nproject (Contract Number 211956), “Red Espa˜nola de Super- \ncomputaci´on”, NABIIT and the Danish Center for Scientific \nComputing. The Center for Atomic-scale Materials Design \n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L \nacknowledges funding from Spanish MICINN through Juan \nde la Cierva and Jos´e Castillejo programs. \n\n[16] S. H. Yang, W. H. Shin, J. W. Lee, S. Y. Kim, S. I. Woo, and \nJ. K. Kang, “Interaction of a transition metal atom with intrinsic \ndefects in single-walled carbon nanotubes”, J. Phys. Chem. B \n110(28), 13941 (Jun. 2006), doi:10.1021/jp061895q. \n\n[17] K. T. Chan, J. B. Neaton, and M. L. Cohen, “First-principles \nstudy of metal adatom adsorption on graphene”, Phys. Rev. B \n77, 235430 (Jun. 2008), doi:10.1103/PhysRevB.77.235430. \n\n∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang,", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" - }, - { - "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. \n\nEform[VC] = E[VC] + nE[C] − E[NT], (2) \n\nwhere E[VC] is the total energy of the nanotube with a va- \ncancy of n atoms. \n\nis the total energy of the pristine nanotube with a physisorbed \ntransition metal atom. We have considered the monovacancy \nand two divacancies shown in Fig. 1. The energy required to \nform an empty vacancy is obtained from where E[X@M@VC] is the total energy of molecule X on \na transition metal atom occupying a vacancy, and E[X] is the \ngas phase energy of the molecule. \n\nFrom the adsorption energies plotted in Fig. 2(a), we see \nthat the earlier transition metals tend to bind the adsorbates \nstronger than the late transition metals. The latest metals in \nthe series (Cu and Zn) bind adsorbates rather weakly in the \ndivacancy structures. We also note that O2 binds significantly \nstronger than any of the three target molecules on Ti, V, Cr, \nand Mn (except for Cr in divacancy I where H2S is found to \ndissociate). Active sites containing these metals are therefore \nexpected to be completely passivated if oxygen is present in \nthe background. Further, we find H2O is rather weakly bound \nto most of the active sites. This ensures that these types of \nsensors are robust against changes in humidity. \n\nThe calculated formation energies for the 3d transition met- \nals are shown in Fig. 1. From the horizontal lines we see that \nboth divacancies are more stable than the monovacancy. This \nmay be attributed to the presence of a two-fold coordinated C \natom in the monovacancy, while all C atoms remain three-fold \ncoordinated in the divacancies. When a transition metal atom \noccupies a vacancy, the strongest bonding to the C atoms is \nthrough its d orbitals [26]. For this reason, Cu and Zn, which \nboth have filled d-bands, are rather unstable in the CNT. For \nthe remaining metals, adsorption in the monovacancies leads \nto quite stable structures. This is because the three-fold coor- \ndination of the C atoms and the CNT’s hexagonal structure are \nrecovered when the metal atom is inserted. On the other hand, \nmetal adsorption in divacancies is slightly less stable because \nof the resulting pentagon defects, see upper panel in Fig. 1. A \nsimilar behaviour has been reported by Krasheninnikov et al. \nfor transition metal atoms in graphene [21]. \n\nIn thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] − E[X] − E[M@VC], \n(3)", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "[34] P. Moriarty, M. D. R. Taylor, and M. Brust, “Nanostructured cellular networks,” Phys. Rev. Lett. 89, \n\n248303 (2002). \n\n[35] E. Rabani, D. R. Reichman, P. L. Geissler, and L. E. Brus, “Drying-mediated self-assembly of \n\nnanoparticles,” Nature 426, 271–274 (2003). \n\n\n \n \n \n \n [html]\n
1.95 ( 1.1, 950 ), 1.950.1, 950.1, 950.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.11.10.11.10.11.11.11.11.11.11.11.11.11.11.11.11.11.11.11.11.11.110[ 37 ] C : P. Martin, M. O. Blunt, and P. Moriary, ‘ Nanoparticle networks on silicox : Self - organized or disorganized ’? ‘ Nan - Lett. 4.2389 – 2392 ( 2084 ).
[ 38 ] C : P : Maritin, M. O. Bluer, E. Paulus : Vasjour, A. Stamard, P. Moriary, L. Vancra, and U. Thirefer, Controlling patern formation in nanoparticle assembles via directed solvent developing ;” Phys, Rev, Lent 99.18101 ( 2807 ).[ 39 ] A. Stannard, C. P. Marini, E. Panliao Vasjour, F. Moriary, and U. Thele, Thual - scale pattern formation in nanoparticle assemblies, 1. Chem. Phys, C 141.15195 - 15203 - 2D08 ).
[ 40 ] E. Paniliae Vasijour, A. Stamard, C. P. Maritin, M. O. Blunt, L. Notingber, P. J. Moriary, I. Vancea, and U. Thiele, “ Fingering instabilities in dewerting nanofluids,” Phys. Rev. Lett. M80.176102 ( 2008 ).[ 41 ] 1. Vancea, U. Thele, E. Pauliac - Vasjour, A. Stannard, C. P. Marin. M. O. Blunt, and P. I Moriary, “ Fromt instabilities in evaperatively deverting nanofluids.” Phys. Rev. E. TR ( 001601 ( 2006 ).
[ 42 ] U. Thirde, Entoryzang son Gollageoglimer, Ph. D. thesis, Technische Universitial Dresden ( 1998 ), [ 43 ] H. Yabs and M. Shimomura, “ Preparation of self - organized mesocale polymer patterns on a sosubstrate : Continuous pattern formation from a receding meniscos.” Adv. Funct. Mater. IE 5.575 – 581 c2885.
[ 44 ] R D. Deepara O. Bakajin, T. F. Dapont. G. Huber, S. R. Nugel, and T. A. Witten, “ Capillary flow as the cause of ring stains from dried liquid drops,” Nature 309.827 – 829 ( 1997 ).[ 45 ] E. Adacki, A. S. Dimittov, and K. Nagayama, “ Sittipe patterns formed on a glusosurface during droplet exaporation,” Langmuir II, 1057 – 1060 ( 1995 ).
[ 46 ] R. D. Deegan, “ Pattern formation in drying drops.” Phys. Rev. E. 61.475 – 485 ( 2000 ).[ 47 ] R. D. Deegan. O. Bukajin, T. F. Depont. G. Hober, S. R. Negel, and T. A. Witen. “ Contact line deposits in an evaporating drop.” Phys. Rev. E. 62.756 – 785 ( 200 ).
[ 40 ] L. Shmuylovich, A. Q. Shen, and H. A. Stone, “ Surface morphology of drying lates thins : Multiple ring formation ;” Langmuir IR, 3441 – 3445 ( 2002 ).[ 49 ] V, X. Ngayen and K. J. Sktbe,? Patterning of small particles by a surfactate exhanced Marangonia -
", - "page_start": 27, - "page_end": 27, - "source_file": "1001.2669.pdf" - }, - { - "text": "Note that all these approaches look for the \nevidence of gold-standard linguistic structures, \nand add some amount of extra knowledge to the \nprobe. Most recently, Wu et al. (2020) proposed a", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Modelling approaches to the dewetting of evaporating thin films of \n\nnanoparticle suspensions \n\nU. Thiele∗, I. Vancea, A. J. Archer, M. J. Robbins, L. Frastia \n\nDepartment of Mathematical Sciences, \n\nLoughborough University, Leicestershire LE11 3TU, UK \n\nA. Stannard, E. Pauliac-Vaujour, C. P. Martin, M. O. Blunt, P. J. Moriarty \n\nThe School of Physics and Astronomy, \n\nThe University of Nottingham, Nottingham NG7 2RD, UK \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n] \nt \nf \no \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n1 \nv \n9 \n6 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2669.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "Reporting for specific materials, systems and methods \n\nWe require information from authors about some types of materials, experimental systems and methods used in many studies. Here, indicate whether each material, \nsystem or method listed is relevant to your study. If you are not sure if a list item applies to your research, read the appropriate section before selecting a response.", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2538.pdf", - "query": "What seems to be a great technique to ensure vacancies are formed in carbon nanotubes (CNT) ?", - "target_page": 4, - "target_passage": "Furthermore, it has been shown that CNT vacan- cies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ion", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "All total energy calculations and structure optimizations \nhave been performed with the real-space density functional \ntheory (DFT) code GPAW [22] which is based on the projector \naugmented wave method. We use a grid spacing of 0.2 ˚A for \nrepresenting the density and wave functions and the PBE ex- \nchange correlation functional [23]. Transport calculations for \nthe optimized structures have been performed using the non- \nequilibrium Green’s function method [24] with an electronic \nHamiltonian obtained from the SIESTA code [25] in a dou- \nble zeta polarized (DZP) basis set. Spin polarization has been \ntaken into account in all calculations. \n\nMetallic doping of a (6,6) CNT has been modeled in a su- \npercell containing six repeated minimal unit cells along the \nCNT axis (dimensions: 15 ˚A×15 ˚A×14.622 ˚A). For this size \nof supercell a Γ-point sampling of the Brillouin zone was \nfound to be sufficient. The formation energy for creating a \nvacancy (VC) occupied by a transition metal atom (M) was \ncalculated using the relation \n\nEform[M@VC] = E[M@VC] + nE[C] − E[M@NT] (1) \n\nwhere E[M@VC] is the total energy of a transition metal \natom occupying a vacancy in the nanotube, n is the number \nof carbon atoms removed to form the vacancy, E[C] is the en- \nergy per carbon atom in a pristine nanotube, and E[M@NT]", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. \n\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. \n\nIn summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. \n\nThe authors acknowledge financial support from Span- \nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados \nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF \nproject (Contract Number 211956), “Red Espa˜nola de Super- \ncomputaci´on”, NABIIT and the Danish Center for Scientific \nComputing. The Center for Atomic-scale Materials Design \n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L \nacknowledges funding from Spanish MICINN through Juan \nde la Cierva and Jos´e Castillejo programs. \n\n[16] S. H. Yang, W. H. Shin, J. W. Lee, S. Y. Kim, S. I. Woo, and \nJ. K. Kang, “Interaction of a transition metal atom with intrinsic \ndefects in single-walled carbon nanotubes”, J. Phys. Chem. B \n110(28), 13941 (Jun. 2006), doi:10.1021/jp061895q. \n\n[17] K. T. Chan, J. B. Neaton, and M. L. Cohen, “First-principles \nstudy of metal adatom adsorption on graphene”, Phys. Rev. B \n77, 235430 (Jun. 2008), doi:10.1103/PhysRevB.77.235430. \n\n∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang,", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. \n\nEform[VC] = E[VC] + nE[C] − E[NT], (2) \n\nwhere E[VC] is the total energy of the nanotube with a va- \ncancy of n atoms. \n\nis the total energy of the pristine nanotube with a physisorbed \ntransition metal atom. We have considered the monovacancy \nand two divacancies shown in Fig. 1. The energy required to \nform an empty vacancy is obtained from where E[X@M@VC] is the total energy of molecule X on \na transition metal atom occupying a vacancy, and E[X] is the \ngas phase energy of the molecule. \n\nFrom the adsorption energies plotted in Fig. 2(a), we see \nthat the earlier transition metals tend to bind the adsorbates \nstronger than the late transition metals. The latest metals in \nthe series (Cu and Zn) bind adsorbates rather weakly in the \ndivacancy structures. We also note that O2 binds significantly \nstronger than any of the three target molecules on Ti, V, Cr, \nand Mn (except for Cr in divacancy I where H2S is found to \ndissociate). Active sites containing these metals are therefore \nexpected to be completely passivated if oxygen is present in \nthe background. Further, we find H2O is rather weakly bound \nto most of the active sites. This ensures that these types of \nsensors are robust against changes in humidity. \n\nThe calculated formation energies for the 3d transition met- \nals are shown in Fig. 1. From the horizontal lines we see that \nboth divacancies are more stable than the monovacancy. This \nmay be attributed to the presence of a two-fold coordinated C \natom in the monovacancy, while all C atoms remain three-fold \ncoordinated in the divacancies. When a transition metal atom \noccupies a vacancy, the strongest bonding to the C atoms is \nthrough its d orbitals [26]. For this reason, Cu and Zn, which \nboth have filled d-bands, are rather unstable in the CNT. For \nthe remaining metals, adsorption in the monovacancies leads \nto quite stable structures. This is because the three-fold coor- \ndination of the C atoms and the CNT’s hexagonal structure are \nrecovered when the metal atom is inserted. On the other hand, \nmetal adsorption in divacancies is slightly less stable because \nof the resulting pentagon defects, see upper panel in Fig. 1. A \nsimilar behaviour has been reported by Krasheninnikov et al. \nfor transition metal atoms in graphene [21]. \n\nIn thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] − E[X] − E[M@VC], \n(3)", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. \n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, \n“Nanotube molecular wires as \nScience 287(5453), 622 (Jan. 2000), \nK. Cho, and H. Dai, \nchemical sensors”, \ndoi:10.1126/science.287.5453.622. \n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “Ab \ninitio study of spin-dependent transport in carbon nanotubes \nwith iron and vanadium adatoms”, Phys. Rev. B 78(19), 195405 \n(Nov. 2008), doi:10.1103/PhysRevB.78.195405. \n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, \n\n“Ex- \ntreme oxygen sensitivity of electronic properties of car- \nScience 287(5459), 1801 (Mar. 2000), \nbon nanotubes”, \ndoi:10.1126/science.287.5459.1801. \n\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n���Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. \n\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, \n“Real-space grid implementation of the projector augmented \nPhys. Rev. B 71(3), 035109 (Jan. 2005), \nwave method”, \ndoi:10.1103/PhysRevB.71.035109. [7] A. R. Rocha, M. Rossi, A. Fazzio, \n\nJ. R. \n“Designing real nanotube-based gas \nsen- \nPhys. Rev. Lett. 100(17), 176803 (May 2008), \n\nand A. \n\n[23] J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized gradi- \nent approximation made simple”, Phys. Rev. Lett. 77(18), 3865 \n(Oct. 1996), doi:10.1103/PhysRevLett.77.3865. da Silva, \nsors”, \ndoi:10.1103/PhysRevLett.100.176803. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. \n\n\n \n \n \n \n [html]\n
Cancertectors ofCases
both for i [ 9 ]____________Patients
CasesPTistin errorStates
Post - rate (%)Controlits, electri
Tabletive for sthe
tionalizatPatientssidewall 1
________________________________________________________________________________________________________________________________________________________________________________________________________hP_115Pd_1Patients
the selectCancer1.10 ( 0.01 )
\n\nchange in CNT resistivity may then be obtained from the cal- \nculated coverages and single impurity conductances. \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" - }, - { - "text": "3 \n\nconductances, i.e. G = (G↑ + G↓)/2. \n\nNext, we estimate the resistance of a CNT containing sev- \neral impurities (a specific metal dopant with different molecu- \nlar adsorbates). Under the assumption that the electron phase- \ncoherence length, lφ, is smaller than the average distance be- \ntween the dopants, d, we may neglect quantum interference \nand obtain the total resistance by adding the scattering resis- \ntances due to each impurity separately. The scattering resis- \ntance due to a single impurity is given by \n\nRs(X) = 1/G(X) − 1/(2G0), (6) \n\nwhere G(X) is the Landauer conductance of the pristine CNT \nwith a single metal dopant occupied by molecule X and \n1/(2G0) is the contact resistance of a (6,6) CNT. \n\nWe may now obtain the total resistance per dopant site rel- \native to the reference background signal as a function of the \ntarget molecule concentration \n\nFIG. 3: Fractional coverage Θ in thermal equilibrium of Ni in a (a) \nmonovacancy, (b) divacancy I, (c) divacancy II and (d) change in \nresistance ∆R per dopant site as a function of CO concentration in \na background of air at room temperature and 1 bar of pressure. The \nreference concentration of CO is taken to be C0 =0.1 ppm. Note the \nchange from linear to log scale on the y-axis at ∆R =10 Ω. \n\n(7) \n\nwhere N is the number of dopants, Θ[X, C] is the fractional \ncoverage of species X at concentration C of the target and C0 \nis the reference concentration. Notice that the contact resis- \ntance drops out as we evaluate a change in resistance. \n\nFor a given background composition we may thus estimate \nthe fractional coverages for each available adsorbate for a \ngiven type of doping. As an example, Fig. 3(a)-(c) shows the \nfractional coverage of a Ni atom occupying a monovacancy, \ndivacancy I, and divacancy II, versus CO concentration in a \nbackground of air at room temperature and 1 bar of pressure. \nDue to the relatively small binding energy of N2 and H2O as \ncompared to O2 and CO, all Ni sites will be either empty or \noccupied by O2 or CO. In particular, Ni in a monovacancy \n(top panel of Fig. 3) will be completely oxidized for all rel- \nevant CO concentrations. For the Ni occupied divacancy II \nstructures we find the coverage of CO changes significantly \naround toxic concentrations (∼10 ppm). \nIn Fig. 3(d) we show the change in resistance calculated \nfrom Eq. (7) as a function of CO concentration for Ni occu- \npying the three types of vacancies. The background reference \nconcentration of CO is taken to be C0 = 0.1 ppm. For the \nmonovacancy there is very little change in resistivity. This is \nbecause most active sites are blocked by O2 at relevant CO \nconcentrations, as shown in the upper panel of Fig. 3. For Ni \nin the divacancies there is, however, a change in resistance on \nthe order of 1Ω per site. For concentrations above ∼1 ppm, \nthe CO coverage of Ni in the divacancy II increases dramati- \ncally and this leads to a significant increase in resistance.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" - }, - { - "text": "To estimate the effect of adsorbates on the electrical con- \nductance of doped CNTs, we first consider the change in con- \nductance when a single molecule is adsorbed on a metal site of \nan otherwise pristine CNT. In Fig. 2(b) we show the calculated \nchange in conductance relative to the metal site with no ad- \nsorbate. In contrast to the binding energies, there are no clear \ntrends in the conductances. The sensitivity of the conductance \nis perhaps most clearly demonstrated by the absence of cor- \nrelation between different types of vacancies, i.e. between the \nthree panels in Fig. 2(b). Close to the Fermi level, the conduc- \ntance of a perfect armchair CNT equals 2G0. The presence \nof the metal dopant leads to several dips in the transmission \nfunction known as Fano antiresonances [20]. The position \nand shape of these dips depend on the d-levels of the transi- \ntion metal atom, the character of its bonding to the CNT, and \nis further affected by the presence of the adsorbate molecule. \nThe coupling of all these factors is very complex and makes \nit difficult to estimate or rationalize the value of the conduc- \ntance. For the spin polarized cases, we use the spin-averaged \n\nWe now return to the discussion of the validity of Eq. (7). \nAs mentioned, the series coupling of individual scatterers \nshould be valid when lφ < d. However, even for lφ > d \nand assuming that the Anderson localization length, lloc in \nthe system exceeds lφ, Eq. (7) remains valid if one replaces \nthe actual resistance R by the sample averaged resistance (cid:104)R(cid:105) \n[29]. At room temperature under ambient conditions, interac- \ntions with external degrees of freedom such as internal CNT \nphonons and vibrational modes of the adsorbed molecules \nwould rapidly randomize the phase of the electrons. There- \nfore Eq. (7) should certainly be valid in the limit of low dop- \ning concentrations. On the other hand, the total number of \ndopants, N , should be large enough for the statistical treat- \nment of the coverage to hold. Finally, we stress that Eq. (7) \nrepresents a conservative estimate of the change in resistance. \nIn fact, in the regime where lφ > lloc, i.e. in the Anderson \nlocalization regime, the resistance would be highly sensitive \nto changes in the fractional coverage of active sites. Calcula- \ntion of the actual resistance of the CNT in this regime would, \nhowever, involve a full transport calculation in the presence of \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" - }, - { - "text": "[34] P. Moriarty, M. D. R. Taylor, and M. Brust, “Nanostructured cellular networks,” Phys. Rev. Lett. 89, \n\n248303 (2002). \n\n[35] E. Rabani, D. R. Reichman, P. L. Geissler, and L. E. Brus, “Drying-mediated self-assembly of \n\nnanoparticles,” Nature 426, 271–274 (2003). \n\n\n \n \n \n \n [html]\n
1.95 ( 1.1, 950 ), 1.950.1, 950.1, 950.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.11.10.11.10.11.11.11.11.11.11.11.11.11.11.11.11.11.11.11.11.11.110[ 37 ] C : P. Martin, M. O. Blunt, and P. Moriary, ‘ Nanoparticle networks on silicox : Self - organized or disorganized ’? ‘ Nan - Lett. 4.2389 – 2392 ( 2084 ).
[ 38 ] C : P : Maritin, M. O. Bluer, E. Paulus : Vasjour, A. Stamard, P. Moriary, L. Vancra, and U. Thirefer, Controlling patern formation in nanoparticle assembles via directed solvent developing ;” Phys, Rev, Lent 99.18101 ( 2807 ).[ 39 ] A. Stannard, C. P. Marini, E. Panliao Vasjour, F. Moriary, and U. Thele, Thual - scale pattern formation in nanoparticle assemblies, 1. Chem. Phys, C 141.15195 - 15203 - 2D08 ).
[ 40 ] E. Paniliae Vasijour, A. Stamard, C. P. Maritin, M. O. Blunt, L. Notingber, P. J. Moriary, I. Vancea, and U. Thiele, “ Fingering instabilities in dewerting nanofluids,” Phys. Rev. Lett. M80.176102 ( 2008 ).[ 41 ] 1. Vancea, U. Thele, E. Pauliac - Vasjour, A. Stannard, C. P. Marin. M. O. Blunt, and P. I Moriary, “ Fromt instabilities in evaperatively deverting nanofluids.” Phys. Rev. E. TR ( 001601 ( 2006 ).
[ 42 ] U. Thirde, Entoryzang son Gollageoglimer, Ph. D. thesis, Technische Universitial Dresden ( 1998 ), [ 43 ] H. Yabs and M. Shimomura, “ Preparation of self - organized mesocale polymer patterns on a sosubstrate : Continuous pattern formation from a receding meniscos.” Adv. Funct. Mater. IE 5.575 – 581 c2885.
[ 44 ] R D. Deepara O. Bakajin, T. F. Dapont. G. Huber, S. R. Nugel, and T. A. Witten, “ Capillary flow as the cause of ring stains from dried liquid drops,” Nature 309.827 – 829 ( 1997 ).[ 45 ] E. Adacki, A. S. Dimittov, and K. Nagayama, “ Sittipe patterns formed on a glusosurface during droplet exaporation,” Langmuir II, 1057 – 1060 ( 1995 ).
[ 46 ] R. D. Deegan, “ Pattern formation in drying drops.” Phys. Rev. E. 61.475 – 485 ( 2000 ).[ 47 ] R. D. Deegan. O. Bukajin, T. F. Depont. G. Hober, S. R. Negel, and T. A. Witen. “ Contact line deposits in an evaporating drop.” Phys. Rev. E. 62.756 – 785 ( 200 ).
[ 40 ] L. Shmuylovich, A. Q. Shen, and H. A. Stone, “ Surface morphology of drying lates thins : Multiple ring formation ;” Langmuir IR, 3441 – 3445 ( 2002 ).[ 49 ] V, X. Ngayen and K. J. Sktbe,? Patterning of small particles by a surfactate exhanced Marangonia -
", - "page_start": 27, - "page_end": 27, - "source_file": "1001.2669.pdf" - }, - { - "text": "**What innovations and advancements have led to CHK’s ability to produce liquids from**\n**shales and other tight reservoirs?**\nDuring the past five years, Chesapeake and a few other leaders in the independent E&P industry have developed \nexpertise in exploiting shales and other tight reservoir formations targeting natural gas through the combination of \nhorizontal drilling and advanced fracture stimulation techniques. This has allowed the commercialization of plays that \nwere previously uneconomic, most notably in shale formations. Part of our success in producing liquids from tight \nreservoirs has come from the company’s ability to extend the technological advances gained in the development of \ntight natural gas formations to new formations known to contain substantial liquids. This led to our first liquids-rich \nplay discovery in the Colony Granite Wash in 2007. As we have increased our focus on liquids-rich plays, we have ben- \nefited from a growing understanding and mapping of petrophysical properties in unconventional formations as well \nas an enhanced understanding of the geochemical nature of liquids-rich reservoirs. This has allowed Chesapeake to \nbetter identify formations most likely to generate liquids-rich production, including more than a dozen new plays for \nthe company. We have subsequently improved the success of our liquids-rich plays through the use of optimal well- \nbore lateral lengths, better placement of well laterals though advanced wellbore steering techniques and customized \nfracture stimulation designs for liquids-rich plays that allow the company to achieve a greater stimulated rock volume \nin low permeability reservoirs. Finally, the advancements Chesapeake has made in developing liquids-rich plays have \nbeen made possible through the use of our proprietary Reservoir Technology Center that has become the industry’s most advanced shale core laboratory. \n\nSteve Dixon \nExecutive Vice President – \nOperations and Geosciences and \nChief Operating Officer \n\n\n\n**It is often said that the energy industry has an aging work force that is fast approaching**\n**retirement age. How is Chesapeake addressing this?**\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down- \nturn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong compe- \ntition from other industries lured away many of the best and brightest science and technology graduates, and today \nmany experienced professionals who stayed in the industry through the downturn are approaching retirement age. \nAs a result, one of our industry’s greatest challenges over the past 10 years has been to develop a new generation \nof natural gas and oil professionals who have the knowledge and experience required to meet the nation’s growing \nenergy needs. \n\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting \nand training a new generation of energy professionals would impact the company’s future success and its ability to \ncompete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs \nand decided to create a world-class college recruiting and intern program to recruit the most promising industry \ntalent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go \non to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive \nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads \nand career counselors at the more than 31 universities where we actively recruit. \n\nMartha Burger \nSenior Vice President – \nHuman and Corporate Resources", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HNI_2003.pdf", - "query": "How many employees did HON Industries count in 2003 ?", - "target_page": 15, - "target_passage": "Members (employees) at year-end : 8,926", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "[html]( Amounts in thousands )For the Years200320022001NET CASH FLOWS FROM ( TO ) OPERATING ACTIVITIES :Net income$ 98.105$ 91.360$ 74.407Noncash items included in net income :Depreciation and amortization72.77268.75581.385Other postretirement and postemployment benefits2.1662.2461.757Deferred income taxes( 3.314 )2.3216.962Loss on sales, retirements and impairments of property,plant and equipment5.4158.97616.200Stock issued to retirement plan4.6785.750—Other — net3912.613109Changes in working capital, excluding acquisition and disposition :Receivables1.006( 19.414 )47.897Inventories( 3.004 )2.34835.048Prepaid expenses and other current assets1.5082.431( 1.661 )Accounts payable and accrued expenses( 35.288 )37.857( 26.149 )Income taxes2.218( 2.370 )( 5.957 )Increase ( decrease ) in other liabilities( 5.379 )( 482 )( 2.198 )Net cash flows from ( to ) operating activities141.274202.391227.800NET CASH FLOWS FROM ( TO ) INVESTING ACTIVITIES :Capital expenditures( 34.842 )( 25.885 )( 36.851 )Proceeds from sale of property, plant and equipment1.808−—Capitalized software( 2.666 )( 65 )( 1.757 )Additional purchase consideration( 5.710 )−( 8.748 )Short - term investments — net( 49.326 )( 16.377 )—Purchase of long - term investments( 5.742 )( 22.493 )—Sales or maturities of long - term investments15.000−—Other — net2.924343Net cash flows from ( to ) investing activities( 81.478 )( 63.896 )( 47.013 )NET CASH FLOWS FROM ( TO ) FINANCING ACTIVITIES :Purchase of HON INDUSTRIES common stock( 21.512 )( 15.736 )( 35.059 )Proceeds from long - term debt76182536.218Payments of note and long - term debt( 20.992 )( 35.967 )( 87.365 )Proceeds from sale of HON INDUSTRIES common stock12.0632.0969.449Dividends paid( 30.299 )( 29.386 )( 28.373 )Net cash flows from ( to ) financing activities( 59.979 )( 78.168 )( 105.130 )Net increase ( decrease ) in cash and cash equivalents( 183 )60.32775.657Cash and cash equivalents at beginning of year139.16578.8383.181Cash and cash equivalents at end of year138.982139.16578.838SUPPLEMENTAL DISCLOSURRS OF CASH FLOW INFORMATION :Cash paid during the year for", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**Nature of Operations** date. Equity securities are classified as available-for-sale and are stated \n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a at current market value with unrealized gains and losses included as a \n\nprovider of office furniture and hearth products. Both industries are separate component of equity, net of any related tax effect. Debt securi- \n\nreportable segments; however, the Company’s office furniture business ties are classified as held-to-maturity and are stated at amortized cost. \n\nis its principal line of business. Refer to the Operating Segment The specific identification method is used to determine realized gains \n\nInformation note for further information. Office furniture products are and losses on the trade date. Short-term investments include municipal \n\nsold through a national system of dealers, wholesalers, mass merchan- bonds, money market preferred stock, and U.S. treasury notes. Long- \n\ndisers, warehouse clubs, retail superstores, end-user customers, and to term investments include U.S. government securities, municipal bonds, \n\nfederal and state governments. Dealer, wholesaler, and retail super- certificates of deposit, and asset- and mortgage-backed securities. \n\nstores are the major channels based on sales. Hearth products include \n\nAt January 3, 2004, and December 28, 2002, cash, cash \n\nelectric, wood-, pellet-, and gas-burning factory-built fireplaces, fire- equivalents and investments consisted of the following (cost approxi- \n\nplace inserts, stoves, and gas logs. These products are sold through a mates market value): \n\nnational system of dealers, wholesalers, large regional contractors, and \n\nCash and \ncash \nequivalents Short- \nterm \ninvestments Long- \nterm \ninvestments \nCompany-owned retail outlets. The Company’s products are marketed \n*(In thousands)*\npredominantly in the United States and Canada. The Company exports \n\nY E A R - E N D 2 0 0 3 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nselect products to a limited number of markets outside North America, \n\n**$ 31,000**\n**–**\n**–**\n\n**$**\n\n**–**\n**–**\n**–** **$ 2,396**\n**–**\n**400**\nprincipally Latin America and the Caribbean, through its export subsid- \n\niary; however, based on sales, these activities are not significant. \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities \n\n**Summary of Significant Accounting Policies**\n\n**–**\n**–**\n**–** **4,259**\n**–**\n**60,949** **–**\n**–**\n**12,835**\n\n**107,982** **–** **–**\n\n**$ 138,982** **$ 65,208** **$ 15,631**\n\n***PRINCIPLES OF CONSOLIDATION AND FISCAL YEAR-END***\n*Cash and money market accounts*\nThe consolidated financial statements include the accounts and trans- \n Total \nactions of the Company and its subsidiaries. Intercompany accounts \n\nY E A R - E N D 2 0 0 2 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nand transactions have been eliminated in consolidation. \n\n$ 82,300 \n– \n– \n\nThe Company follows a 52/53-week fiscal year which ends \n\non the Saturday nearest December 31. Fiscal year 2003 ended on \n\nJanuary 3, 2004; 2002 ended on December 28, 2002; and 2001 ended \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities – \n– \n– 3,478 \n 11,000 \n– \n\non December 29, 2001. The financial statements for fiscal year 2003 \n\nare based on a 53-week period; fiscal years 2002 and 2001 are on a \n*Cash and money market accounts* 56,865 **–**\n52-week basis. \n$ 16,378 \n\n$ \n\n1,900 \n– \n– $ 5,396 \n11,995 \n400 \n\n– \n– \n7,098 \n\n**–**\n Total $ 24,889", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "507 )( 73 )7Total assets :2003$ 141.658$33$ 10.340$ 6.721$2002112.76559.55410.9616.2551872001114.28056.09011.4805.373", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is \n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement \n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that \n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day. \n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining \n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to \n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors. \n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s \n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and \n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years. \n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the \n\nNew York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that \n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules. \n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man- \n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance. \n\n\nStan A. Askren \n\n\nAbbie J. Smith \n\n\nDennis J. Martin \n\n\nGary M. Christensen \n\n Richard H. Stanley \n\n\nJack D. Michaels \n\n\nCheryl A. Francis \n\n\nBrian E. Stern \n\n\nJoseph Scalzo \n\n\n\n\n\nRobert L. Katz", - "page_start": 60, - "page_end": 60, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "We, the members of HON INDUSTRIES, are dedicated to creating long-term value for all of our stakeholders, to \n\nexceeding our customers’ expectations, and to making our company a great place to work. We will always treat each \n\nother, as well as customers, suppliers, shareholders, and our communities, with fairness and respect. \n\nOur success depends upon business simplification, rapid continuous improvement, and innovation in every- \n\nthing we do, individual and collective integrity, and the relentless pursuit of the following long-standing beliefs: \n\n**W E W I L L B E P R O F I T A B L E .**\n\nWe pursue mutually profitable relationships with customers and suppliers. Only when our company achieves an ade- \n\nquate profit can the other elements of this Vision be realized. \n\n**W E W I L L C R E A T E L O N G - T E R M V A L U E F O R S H A R E H O L D E R S .**\n\nWe create long-term value for shareholders by earning financial returns significantly greater than our cost of capital and \n\npursuing profitable growth opportunities. We will safeguard our shareholders’ equity by maintaining a strong balance \n\nsheet to allow flexibility in responding to a continuously changing market and business environment. \n\n**W E W I L L P U R S U E P R O F I T A B L E G R O W T H .**\n\nWe pursue profitable growth on a global basis in order to provide continued job opportunities for members and finan- \n\ncial success for all stakeholders. \n\n**W E W I L L B E A S U P P L I E R O F Q U A L I T Y P R O D U C T S A N D S E R V I C E S .**\n\nWe provide reliable products and services of high quality and brand value to our end-users. Our products and services \n\nexceed our customers’ expectations and enable our distributors and our company to make a fair profit. \n\n**W E W I L L B E A G R E A T P L A C E T O W O R K .**\n\nWe pursue a participative environment and support a culture that encourages and recognizes excellence, active \n\ninvolvement, ongoing learning, and contributions of each member; that seeks out and values diversity; and that \n\nattracts and retains the most capable people who work safely, are motivated, and are devoted to making our company \n\nand our members successful. \n\n**W E W I L L B E A R E S P O N S I B L E C O R P O R A T E C I T I Z E N .**\n\nWe conduct our business in a way that sustains the well-being of society, our environment, and the economy in which \n\nwe live and work. We follow ethical and legal business practices. Our company supports our volunteer efforts and \n\nprovides charitable contributions so that we can actively participate in the civic, cultural, educational, environmental, \n\nand governmental affairs of our society. \n\n**T O O U R S T A K E H O L D E R S :**\n\nWhen our company is appreciated by its*members,*favored by its*customers,*supported by its*suppliers,*respected by \n\n*the public,*and admired by its*shareholders,*this Vision is fulfilled. \n\n**H O N I N D U S T R I E S I n c . ( H N I )**\n\n**414 East Third Street, P.O. Box 1109, Muscatine, IA 52761-0071**\n\n**www.honi.com**", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "8.048.224II. Assets, depreciation and capital expendituresTotal assets$ 62.117.701$ 42.95$ 10I73.982$( 131.710 )$ 92.042.272Depreciation and amortization ——————————––––––––––––––––$ 3.263.206$ 1.65, 990$4.915.196$—$ 4.915.196Capital expenditures4.385.823$ 5.444.626$9.829.449$—$ 9.829.449Fiscal year 2003 ( For the year ended Mar. 31.2004 )SalesTotalEliminations ConsolidatedMillions of yenI. Sales and operating incomeSales to third parties--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------¥ 356.237¥ 7.429.219¥–¥ 7.429.219Inter - segment sales and transfers ---------------------------------------------------------22.9169.75232.668( 32.668 )–Total sales7.095.898365.9897.461.887( 32.668 )7.429.219Operating expenses — exonomics ----------------------------------------------------------------6.340.631301.1796.641.810( 37.446 )6.604.364Operating income¥ 755.267¥ 64.810¥ 820.077¥4.778¥ 824.855II. Assets, depreciation and capital expendituresTotal assets¥ 5.847.139¥ 3.479.171¥ 9.326.310¥( 1.466.454 )¥ 7.859.856Depreciation and amortization ----------------------------------------------------------------------------¥ 313.289147** 461.037¥−¥ 461.037Capital expenditures¥ 441.384", - "page_start": 93, - "page_end": 93, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
ARD OF DIRECTORSBrian E. SternMelinda C. Ellsworth
A. Askren dent, HON INDUSTRIES Inc.President, Xerox SupVice President, Treasurer and Investor Relations
Xerox CorporationJeffrey D. FickM. Christensened President and Executive Officer,
Ronald V. Waters, III Chief Operating Officer,Vice President, Member and Community RelationsWm. Wrigley Jr. Company
Malcolm C. FieldsFrancisor / ConsultantCOMMITTEES OF THE BOARD
Vice President and Chief Information OfficerExecutive Vice President and Financial Officer,AUDIT
Vice President, General Counsel and Secretary Timothy R. SummersCheryl A. Francis, ChairpersonTimothy R. Summers
Dennis J. MartinVice President, Lean Enterpriseert L. Katz
dent, rt L. Katz and AssociatesHUMAN RESOURCES AND COMPENSATIONSUBSIDIARIES
Gary M. Christensen, ChairpersonDavid C. BurdakinRobert L. Katz
Executive Vice President, HON INDUSTRIES, IncPresident andAbbie J. Smith
President, The HON CompanyExecutive Officer,PUBLIC POLICY AND CORPORATE GOVERNANCE
Brad D. DetermanAccuracy (%)Richard H. Stanley, Chairperson
President,Joseph ScalzoHearth and Home Technologies Inc.
Brian E. SternThomas D. HeadVice President,
General Manager, Holga Inc.President and President, nal Care Products,HON INDUSTRIES INC. OFFICERS
Eric K. JungbluthGillette CompanyJack D. Michaels
President, Allsteel Inc.Chairman and Chief Executive OfficerDonald T. Mead
ie J. SmithStan A. AskrenPresident, The Gunlocke Company L. LC.
University of Chicago usate School of BusinessPresidentMarco V. Molinari
Peter R. AthertonPresident, International and Businessnard H. Stanley
Vice President and Chief Technology OfficerDevelopmentChairman, HON INDUSTRIES Inc. man, SC Companies, Inc.
Jerald K. DittmerJean M. ReynoldsVice President and Chief Financial Officer
President, Maxon Furniture Inc.Thermal standardized status, Inc.Robert J. Driessnack
Thomas A. ToloneVice President, ControllerPresident, Paoli Inc.
", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**32**| EMPLOYEES", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Fiscal year 2003*(For the year ended Mar. 31, 2004)*\n\nOther foreign \ncountries North America Europe Total \n*Millions of yen*\n\nOverseas sales.................................................................................................................................................... ¥3,222,497 \nConsolidated net sales................................................................................................................................. \nOverseas sales as a percentage of consolidated net sales .......................................... \n\n¥1,201,035 ¥773,248 \n\n¥5,196,780 \n7,429,219 \n70.0% 43.4% 16.2% 10.4% \n\nFiscal year 2002*(For the year ended Mar. 31, 2003)*\n\nOther foreign \ncountries Total \n*Millions of yen*\n\nOverseas sales.................................................................................................................................................... ¥2,785,334 \nConsolidated net sales................................................................................................................................. \nOverseas sales as a percentage of consolidated net sales .......................................... \n\n¥974,872 ¥763,368 \n\n¥4,523,574 \n6,828,588 \n66.2% 40.8% 14.3% 11.1%", - "page_start": 103, - "page_end": 103, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed8.pdf", - "query": "Did automating the writing of EM-to-IP handoffs notes using LLM lead to life-threatening outputs ?", - "target_page": 8, - "target_passage": "none of the incorrect output text elements reached life-threatening risk", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness \n\n**Open Access.**This is an open access article distributed under the terms of the CC-BY License. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine**\n\ncuration (4.24 [0.58] vs 4.76 [0.48]), readability (4.00 [0.64] vs 4.64 [0.49]), correctness (4.52 \n\n[0.64] vs 4.90 [0.39]), and patient safety (4.06 [0.86] vs 4.50 [0.56]). \n\nIn extrapolating the estimated worst-case scenario impact of these performance gaps on \n\npatient safety, the 3 expert clinicians determined none of the identified model performance issues \n\nwere anticipated to create a level 1 (life-threatening) safety event (see examples of worst case \n\nscenarios in eTable 2 in Supplement 1). While the incompleteness and faulty logic identified in the \n\nautomated summaries received mean (SD) safety scores of 4.20 (0.93) and 4.60 (0.75), respectively; \n\n13 (8.7%) and 11 (7.3%) of these events, respectively, were determined to have the potential to create \n\na level 2 patient safety event following EM-to-IP handoff, substantially higher compared with the \n\nphysician-written summaries (0%). All of the 5 hallucinations had patient safety scores between 4 \n\nand 5 and a mean (SD) score of 4.96 (0.14), which is defined as the hallucinations posing mild to no \n\npatient safety risk. LLM-generated notes demonstrated a higher rate of incorrectness (9.6%) \n\ncompared with the physician-written notes (2.0%), although very few hallucinations. \n\nICC were 0.79 for completeness, 0.70 for curation, 0.59 for readability, 0.76 for correctness, \n\nand 0.74 for usefulness. These numbers suggest good reliability of agreement for completeness, \n\ncuration, correctness, and usefulness and suggest fair reliability for readability among the 3 raters. \n\n**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "**Original Investigation | Emergency Medicine**\nDeveloping and Evaluating Large Language Model–Generated Emergency Medicine \nHandoff Notes \n\nVince Hartman, MS; Xinyuan Zhang, PhD; Ritika Poddar, MS; Matthew McCarty, MD; Alexander Fortenko, MD, MPH; Evan Sholle, MS; Rahul Sharma, MD, MBA; \nThomas Campion Jr, PhD; Peter A. D. Steel, MA, MBBS \n\n**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n\n**EXPOSURE**LLM-generated EM handoff notes. \n\n**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. \n\n\n \n \n \n \n [html]( EM )- to - inpatient ( IP ) handoff notes that scale for EM care )Eindinasteria, buthin cohort ribioficients, but therapy, but therapy, but therapy, peripherapy, peripherapy, peripherapy, peripheral, peripheral, peripherapy, peripherapy, peripheral, peripheral, peripheral, peripheral, pEM patient medical records using a novel scaling fromounicals, etc.LLM - generated EM - to - IP handoff notes had a mean usefulness of 4.04 out of 5 ( compared with 4.35 forobvoirian - written ) andameannatientsafety of 4.06 out of 5 ( compared with4.50 for physician - written ) with no rritical natient safety risksMeaning These findings suggest thevalue of a manual, patient safety -focused clinical evaluation of LLMmodels and the potential ofLLM - generated handoff notes to create a new standard of care in EM.\n
Question Can a large language model ( 11 M ) Renerate emergency medicine
\n\n**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nAbstract (continued) \n\nand safety via a novel evaluation framework. This study suggests the importance of a physician-in- \n\nloop implementation design for this model and demonstrates an effective strategy to measure \n\npreimplementation patient safety of LLM models. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 \n\n**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, \n\nEHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. \n\nIn recent years there has been an accelerated interest in using LLMs to automate clinical tasks \nin an effort to unburden physicians and reduce burnout.22 Computer-generated text within clinical \nnotes using natural language processing (NLP) have been overall shown to improve note completion \nrates, physician satisfaction, and patient outcomes.23 Since 2018, NLP has made rapid advancements \nin health care with the discovery of the transformer model architecture, the building block of large \nlanguage models (LLMs). LLMs can automate workflows such as discharge summaries,24 radiology \nreports,25 patient messaging,26 after-visit summaries,27 and ambient dictation28 with various levels \nof perceived quality in each workflow.29 LLMs are particularly effective at summarizing large \nunstructured clinical datasets, such as ED patient medical records.30 A common concern of LLMs is \ntheir ability to hallucinate data, or LLMs generating output text that is not factually consistent with \nthe original source content.31 Much work has been done in health care to reduce hallucinations \nthrough building larger-parameter models trained on trillions of datasets, and then instruction fine- \ntuning the LLM on smaller, well-curated datasets.32,33 LLMs can also be designed with explainability \nby citing inferred content back to the reference source notes.34 For short-context length notes, using \nfew-shot prompt engineering approaches with large language models like GPT-4 can produce", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - }, - { - "text": "unique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested \n\n\n \n \n \n \n [html]βaULM ‐ generatedPhysician - writtenMean score ( SD )Likert rating 1 - 5, No. (%) aMean score ( SD )Likert rating 1 - 5, No. (%) a\n
123AS12345
Completeness4.00 ( 0.88 )012 ( 8 )31 ( 20.7 )69 ( 46 )38 ( 25.3 )4.16 ( 0.84 )03 ( 2 )31 ( 20.7 )48 ( 32 )68 ( 45.3 )
Curation4.24 ( 0.58 )01 ( 0.7 )13 ( 8.7 )85 ( 56.7 )51 ( 34 )4.76 ( 0.48 )006 ( 4 )39 ( 26 )105 ( 70 )
Readability4.00 ( 0.64 )08 ( 5.3 )17 ( 11.3 )87 ( 58 )38 ( 25.3 )4.64 ( 0.49 )005 ( 3.3 )38 ( 25.3 )107 ( 71.3 )
Correctness4.52 ( 0.64 )0013 ( 8.7 )39 ( 26 )98 ( 65.3 )4.90 ( 0.39 )002 ( 1.3 )12 ( 8 )136 ( 90.7 )
Usefulness4.04 ( 0.86 )012 ( 8 )30 ( 20 )59 ( 39.3 )49 ( 32.7 )4.36 ( 0.71 )05 ( 3.3 )13 ( 8.7 )53 ( 35.3 )79 ( 52.7 )
", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient \n\n**Methods**\n\n**Data Collection**\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was \n\nconducted at an urban academic 840-bed quaternary-care hospital in New York City, with \n\napproximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600 \n\nindividual EM patient encounters leading to acute hospital admission were randomly selected from \n\nvisits occurring between April and September of 2023. We limited our analysis to EM patient \n\nencounters occurring after April 2023, as the study site had updated the EM-handoff at that time. \n\nEncounters before this date used an earlier version of the EM-handoff note that would have provided \n\nsuboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then \n\ngenerated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants), \n\nWeill Cornell Medicine IRB approved a waiver of informed consent because the study used \n\nretrospective data and posed minimal risk to patients. We used Strengthening the Reporting of \n\nObservational Studies in Epidemiology (STROBE) reporting guidelines. \n\n**EM-to-IP Handoff Note Template**\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff \n\nnote structure used at the study site. The generated EM handoff note consists of components \n\ngenerated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult \n\norders, and radiology impressions) and components generated by the trained abstractive \n\nsummarization model (history of present illness [HPI], differential diagnoses, immediate care plans, \n\nin-ED events, and disposition). Each summary also included a header with the timestamp of ED triage \n\nand discharge, patient’s birth date, patient’s unique identifier, patient’s encounter number, and the \n\ntotal time of patient’s stay in the ED. \n\n**Data Curation for Automated ED Note Generation**\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule- \n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail \n\nin eAppendix 1 in Supplement 1. The rule-based framework was designed by the 3 board certified EM \n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in**Table 1**: \n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The \n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nrecords and perform manual comparative evaluations of 50 LLM-generated and 50 clinician- \n\ngenerated summary notes within the context of complex ED encounters. This approach is unlikely \n\nscalable, invoking complex postimplementation governance questions that remain unanswered in \n\nthe medical literature and invoke the need for future research focused on the possibility of AI \nperforming the clinical evaluations.56 Lastly, the relatively infrequent but potentially significant \npatient safety implications of model output incorrectness and incompleteness warrants further \n\nmodel refinement and repeat clinical evaluation, as described in the eAppendix 1 in Supplement 1 \n\noverview of our rigorous preimplementation model development and testing framework. \n\n**Conclusions**\n\nThis study’s results suggest promise for future thoughtful integration of LLM-generated EM-to-IP \n\nhandoff notes into clinical admission workflows, as well as the associated potential downstream \n\nquality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective \n\npreimplementation strategy to measure potential patient safety implications of incorrectness \n\nidentified in LLM-generated clinical care summaries, which will guide future model refinement and \n\nimplementation strategies. In the absence of a current written standard of care in EM, this innovation \n\ncould represent a transformative advancement in the quality of EM-to-IP transitions of care. \n\n**ARTICLE INFORMATION**\n**Accepted for Publication:**October 7, 2024.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine**\n\nsubsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written \n\nnote and (2) the LLM-generated note. \n\nOn a Likert scale of 1 to 5, where 1 is unacceptable and 5 is excellent, the 3 physicians rated the \n\ncompleteness, curation, readability, and correctness of the summary as shown in eTable 1 in \n\nSupplement 1. Physicians rated the usefulness of the summary, defined as the capability of the \n\nsummary being incorporated into a workflow where a physician would make edits before final \n\ncompletion, mitigating potential future self-referential learning loops and the downstream adverse \nconsequences.51 Likewise, the raters assessed potential patient safety implications of unmitigated \nmodel errors using a scale from 1 to 5, where 1 denotes life-threatening risks and 5 denotes no \n\nidentified patient safety risk for completeness, curation, readability, and the 4 subcategories within \n\ncorrectness (hallucination, faulty logic, knowledge gap, and bias), as well as the overall patient safety \nrisk.45 Evaluators arrived at prestudy consensus that a usefulness Likert score of at least a 3 out of 5 \nindicated that the LLM-generated summary likely demonstrated baseline acceptability for such a \n\nworkflow. To extrapolate a theoretical worst case scenario, the physicians rated the safety of the \n\nLLM-generated summary as defined as the capability of the summary to fully replace a physician- \n\nwritten note (unmitigated). \n\nTo improve consistency and agreement, the 3 reviewers met to familiarize themselves with the \n\nframework and evaluated 10 separate cases from the test dataset that were not included in the \n\nclinical evaluation results. Additionally, after independently scoring the summaries, they met to \n\nensure consensus interpretation of the multidimensional scoring framework. Interrater reliability was \n\ncalculated using intraclass correlation coefficient (ICC), using a 2-way random effects model for \n\nconsistency with the Pingouin statistical package version 0.5.4 in Python (Python Software \n\nFoundation). The ICC measures the similarity of the 3 raters to confirm the consistency and validity \n\nof the evaluation protocol; the scores are from 0 to 1, where 1 indicates unanimous agreement and 0 \nrepresents no agreement.52 Data were analyzed from October 2023 to March 2024. \n\n**Results**\n\n**Automated Tasks**\nOf 1600 patients, the mean (SD) age was 59.8 (18.9) years and 832 (52%) were female. In**Table 2**, \n\nROUGE and BERTScore compare the summaries with the testing set from our annotations, and \n\nSCALE score compares the summaries with the source notes. From automatic evaluation results, we \n\nobserved that LLM-generated summaries had better scores than the physician summaries, such that \n\nROUGE-2 was 0.322 vs 0.088, BERT-precision was 0.859 vs 0.796, and SCALE was 0.691 vs 0.456, \n\nsuggesting the LLM-generated summaries were more similar and more detailed than the physician \n\nsummaries. \n\n**Clinical Evaluation Tasks**\nThe clinical evaluation results for LLM-generated summaries and physician-written summaries are \n\nshown in**Table 3**and**Table 4**. The mean clinical quality scores of the automated summaries are in a \n\ncomparable range (4-5) to those of the physician summaries. However, the automated summaries \n\nwere observed to be of lower quality compared with the physician-written summaries with regards \n\nto mean (SD) usefulness (4.04 [0.85] vs 4.36 [0.71]), completeness (4.00 [0.88] vs 4.16 [0.84]),", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed8.pdf" - }, - { - "text": "EM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Evaluation**\nIt is critical to ensure that AI systems are safe, ethical, and without bias in the clinical domain. For the \n\nproposed approach, we performed comprehensive automatic evaluations and a novel, rigorous, \n\npatient safety-focused clinical evaluation. The unique clinical evaluation framework was designed to \n\n(1) screen for and identify the common, specific correctness issues in LLMs observed in longform \n\nclinical summarization and (2) assess the potential patient safety implications associated with any \n\nincorrectness identified using a modified version of the World Health Organization’s International \nClassification for Patient Safety.45 \n\n**Automated Evaluations**\nWe used the summarization evaluation metrics of recall-oriented understudy for gisting evaluation \n(ROUGE),46 bidirectional encoder representations from transformers score (BERTScore),47 and \nsource chunking approach for large-scale inconsistency evaluation (SCALE).48 ROUGE computes the \noverlap of n-grams between the generated and reference summaries. For longform document \n\nsummarization, the following ROUGE scores are considered to be close to the reference summaries: \nROUGE-1, above 0.4; ROUGE-2, above 0.2; and ROUGE-L, above 0.3.46 BERTScore leverages the \npretrained contextual embeddings from BERT and matches words to compute a similarity score for \neach token in the candidate sentence with each token in the reference sentence. We used SCALE,48 a \nnatural language inference–based approach, to measure the faithfulness between the source \n\ndocument and the generated text. Further background is provided about SCALE in eAppendix 2 in \n\nSupplement 1. \n\n**Statistical Analysis**\nBased on prior work, 3 board certified EM physician leaders (M.M., A.F., and P.S.) with experience in \n\nformal quality and patient safety review processes performed retrospective reviews of ED-based \nEHR records of 50 individual ED patient encounters, randomly selected from the test dataset.49 \nBased on prior published clinical evaluations of LLM, as well as the study feasibility of using EM \nphysician quality and patient safety leaders, 50 ED patient encounters were evaluated.50 Reviewers \n\nFigure. Data Flow of Generating Emergency Department (ED) Handoff Summary \n\nHPI \nExtract recent HPI \nEHR data \n\nRegex \nprocessing Regex \nprocessing \nTransition of \ncare notes Consult \nnotes \nCourse of treatment \n\nProgress \nnotes Procedure \nnotes \nSalience selection \n\nLLM 1 \ntransformer \n\nLLM 2 \ntransformer \nRemove duplicates \n\nRegex \nprocessing \n\nRadiology \nresults \nLabs \n\nGet most salient medications and \nlaboratory tests, vitals, consults, and \nimages with pattern-matching rules \n\nRegex \nprocessing \n\nAutomated summary \nHPI: \nPatient is a 64-year-old male with history of alcoholic hepatitis sent in \nfrom urgent care for hypotension in setting of N/V/D 3 days ago, also \nwith fall outside of ED \nEvents: \n• Presented to the ED on January 6, 1972, for hypotension in setting of \nN/V/D 4 days \n\n• On January 7, 1972, patient is to be admitted to medicine SDU \nPlans: \nLaboratory tests: CBC, CMP, trop, cultures, VBG, imaging: CTH. Aggressive \nIVF, monitor. \nDisposition: \nAdmit to medicine-general, intermediate care (stepdown), for dizziness \nMedications: \n• Calcium gluconate-NaCl 2-0.67 GM/100ML-% IV solution 2g \n• Octreotide acetate 100 mcg/mL solution (wrapper): 50mcg \nLabs: \nCBC: Hgb: 4.9 panic (!), Hct: 17.2 panic (!), WBC: 14.13 high (!), platelet: \n174 \nVitals: \n• HR: 105, BP: 94/62, RR: 18, SPO2: 100, temp 97.9F \nConsults: \n• IP consult to gastroenterology", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed8.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed8.pdf", - "query": "How did automating the writing of EM-to-IP handoffs notes using LLM affect the usefulness of these notes ?", - "target_page": 1, - "target_passage": "LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness \n\n**Open Access.**This is an open access article distributed under the terms of the CC-BY License. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "**Original Investigation | Emergency Medicine**\nDeveloping and Evaluating Large Language Model–Generated Emergency Medicine \nHandoff Notes \n\nVince Hartman, MS; Xinyuan Zhang, PhD; Ritika Poddar, MS; Matthew McCarty, MD; Alexander Fortenko, MD, MPH; Evan Sholle, MS; Rahul Sharma, MD, MBA; \nThomas Campion Jr, PhD; Peter A. D. Steel, MA, MBBS \n\n**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n\n**EXPOSURE**LLM-generated EM handoff notes. \n\n**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. \n\n\n \n \n \n \n [html]( EM )- to - inpatient ( IP ) handoff notes that scale for EM care )Eindinasteria, buthin cohort ribioficients, but therapy, but therapy, but therapy, peripherapy, peripherapy, peripherapy, peripheral, peripheral, peripherapy, peripherapy, peripheral, peripheral, peripheral, peripheral, pEM patient medical records using a novel scaling fromounicals, etc.LLM - generated EM - to - IP handoff notes had a mean usefulness of 4.04 out of 5 ( compared with 4.35 forobvoirian - written ) andameannatientsafety of 4.06 out of 5 ( compared with4.50 for physician - written ) with no rritical natient safety risksMeaning These findings suggest thevalue of a manual, patient safety -focused clinical evaluation of LLMmodels and the potential ofLLM - generated handoff notes to create a new standard of care in EM.\n
Question Can a large language model ( 11 M ) Renerate emergency medicine
\n\n**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nAbstract (continued) \n\nand safety via a novel evaluation framework. This study suggests the importance of a physician-in- \n\nloop implementation design for this model and demonstrates an effective strategy to measure \n\npreimplementation patient safety of LLM models. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 \n\n**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, \n\nEHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. \n\nIn recent years there has been an accelerated interest in using LLMs to automate clinical tasks \nin an effort to unburden physicians and reduce burnout.22 Computer-generated text within clinical \nnotes using natural language processing (NLP) have been overall shown to improve note completion \nrates, physician satisfaction, and patient outcomes.23 Since 2018, NLP has made rapid advancements \nin health care with the discovery of the transformer model architecture, the building block of large \nlanguage models (LLMs). LLMs can automate workflows such as discharge summaries,24 radiology \nreports,25 patient messaging,26 after-visit summaries,27 and ambient dictation28 with various levels \nof perceived quality in each workflow.29 LLMs are particularly effective at summarizing large \nunstructured clinical datasets, such as ED patient medical records.30 A common concern of LLMs is \ntheir ability to hallucinate data, or LLMs generating output text that is not factually consistent with \nthe original source content.31 Much work has been done in health care to reduce hallucinations \nthrough building larger-parameter models trained on trillions of datasets, and then instruction fine- \ntuning the LLM on smaller, well-curated datasets.32,33 LLMs can also be designed with explainability \nby citing inferred content back to the reference source notes.34 For short-context length notes, using \nfew-shot prompt engineering approaches with large language models like GPT-4 can produce", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - }, - { - "text": "unique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested \n\n\n \n \n \n \n [html]βaULM ‐ generatedPhysician - writtenMean score ( SD )Likert rating 1 - 5, No. (%) aMean score ( SD )Likert rating 1 - 5, No. (%) a\n
123AS12345
Completeness4.00 ( 0.88 )012 ( 8 )31 ( 20.7 )69 ( 46 )38 ( 25.3 )4.16 ( 0.84 )03 ( 2 )31 ( 20.7 )48 ( 32 )68 ( 45.3 )
Curation4.24 ( 0.58 )01 ( 0.7 )13 ( 8.7 )85 ( 56.7 )51 ( 34 )4.76 ( 0.48 )006 ( 4 )39 ( 26 )105 ( 70 )
Readability4.00 ( 0.64 )08 ( 5.3 )17 ( 11.3 )87 ( 58 )38 ( 25.3 )4.64 ( 0.49 )005 ( 3.3 )38 ( 25.3 )107 ( 71.3 )
Correctness4.52 ( 0.64 )0013 ( 8.7 )39 ( 26 )98 ( 65.3 )4.90 ( 0.39 )002 ( 1.3 )12 ( 8 )136 ( 90.7 )
Usefulness4.04 ( 0.86 )012 ( 8 )30 ( 20 )59 ( 39.3 )49 ( 32.7 )4.36 ( 0.71 )05 ( 3.3 )13 ( 8.7 )53 ( 35.3 )79 ( 52.7 )
", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nrecords and perform manual comparative evaluations of 50 LLM-generated and 50 clinician- \n\ngenerated summary notes within the context of complex ED encounters. This approach is unlikely \n\nscalable, invoking complex postimplementation governance questions that remain unanswered in \n\nthe medical literature and invoke the need for future research focused on the possibility of AI \nperforming the clinical evaluations.56 Lastly, the relatively infrequent but potentially significant \npatient safety implications of model output incorrectness and incompleteness warrants further \n\nmodel refinement and repeat clinical evaluation, as described in the eAppendix 1 in Supplement 1 \n\noverview of our rigorous preimplementation model development and testing framework. \n\n**Conclusions**\n\nThis study’s results suggest promise for future thoughtful integration of LLM-generated EM-to-IP \n\nhandoff notes into clinical admission workflows, as well as the associated potential downstream \n\nquality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective \n\npreimplementation strategy to measure potential patient safety implications of incorrectness \n\nidentified in LLM-generated clinical care summaries, which will guide future model refinement and \n\nimplementation strategies. In the absence of a current written standard of care in EM, this innovation \n\ncould represent a transformative advancement in the quality of EM-to-IP transitions of care. \n\n**ARTICLE INFORMATION**\n**Accepted for Publication:**October 7, 2024.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine**\n\ncuration (4.24 [0.58] vs 4.76 [0.48]), readability (4.00 [0.64] vs 4.64 [0.49]), correctness (4.52 \n\n[0.64] vs 4.90 [0.39]), and patient safety (4.06 [0.86] vs 4.50 [0.56]). \n\nIn extrapolating the estimated worst-case scenario impact of these performance gaps on \n\npatient safety, the 3 expert clinicians determined none of the identified model performance issues \n\nwere anticipated to create a level 1 (life-threatening) safety event (see examples of worst case \n\nscenarios in eTable 2 in Supplement 1). While the incompleteness and faulty logic identified in the \n\nautomated summaries received mean (SD) safety scores of 4.20 (0.93) and 4.60 (0.75), respectively; \n\n13 (8.7%) and 11 (7.3%) of these events, respectively, were determined to have the potential to create \n\na level 2 patient safety event following EM-to-IP handoff, substantially higher compared with the \n\nphysician-written summaries (0%). All of the 5 hallucinations had patient safety scores between 4 \n\nand 5 and a mean (SD) score of 4.96 (0.14), which is defined as the hallucinations posing mild to no \n\npatient safety risk. LLM-generated notes demonstrated a higher rate of incorrectness (9.6%) \n\ncompared with the physician-written notes (2.0%), although very few hallucinations. \n\nICC were 0.79 for completeness, 0.70 for curation, 0.59 for readability, 0.76 for correctness, \n\nand 0.74 for usefulness. These numbers suggest good reliability of agreement for completeness, \n\ncuration, correctness, and usefulness and suggest fair reliability for readability among the 3 raters. \n\n**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient \n\n**Methods**\n\n**Data Collection**\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was \n\nconducted at an urban academic 840-bed quaternary-care hospital in New York City, with \n\napproximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600 \n\nindividual EM patient encounters leading to acute hospital admission were randomly selected from \n\nvisits occurring between April and September of 2023. We limited our analysis to EM patient \n\nencounters occurring after April 2023, as the study site had updated the EM-handoff at that time. \n\nEncounters before this date used an earlier version of the EM-handoff note that would have provided \n\nsuboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then \n\ngenerated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants), \n\nWeill Cornell Medicine IRB approved a waiver of informed consent because the study used \n\nretrospective data and posed minimal risk to patients. We used Strengthening the Reporting of \n\nObservational Studies in Epidemiology (STROBE) reporting guidelines. \n\n**EM-to-IP Handoff Note Template**\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff \n\nnote structure used at the study site. The generated EM handoff note consists of components \n\ngenerated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult \n\norders, and radiology impressions) and components generated by the trained abstractive \n\nsummarization model (history of present illness [HPI], differential diagnoses, immediate care plans, \n\nin-ED events, and disposition). Each summary also included a header with the timestamp of ED triage \n\nand discharge, patient’s birth date, patient’s unique identifier, patient’s encounter number, and the \n\ntotal time of patient’s stay in the ED. \n\n**Data Curation for Automated ED Note Generation**\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule- \n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail \n\nin eAppendix 1 in Supplement 1. The rule-based framework was designed by the 3 board certified EM \n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in**Table 1**: \n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The \n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "EM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nLLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3 \n\nboard certified emergency medicine physician leaders with experience in formal quality and patient \n\nsafety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and \n\nannotation. As the task of EM-handoff note generation is not dependent on racial characteristics of \n\nthe patients, we removed all mentions of race during the annotation stage as a means to avoid race \n\nbias; therefore, the model was trained to generate text without race-based assumptions. Although \n\nresource intensive, a small and carefully curated dataset of at least 1000 examples has been shown \nto be sufficient to produce remarkable results for the language model chosen.42 Given the size of \nour dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data \n\nplaced in the training set and eschewed a validation set to lower the variance of the models. We used \n\nk-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter \n\noptimization of the LLMs. \n\n**Models**\nFor this study, we chose the LLMs Robustly Optimized BERT Approach (RoBERTa; hereafter referred \nto as LLM 1)43 for saliency content selection and Large Language Model Meta AI 2 (Llama-2; hereafter \nreferred to as LLM 2) 7B44 for abstractive summarization. Further information about the models and \ntechnology specifications is provided in detail in eAppendix 1 in Supplement 1. \n\n**Data Processing**\nAs LLM 2 only has a context size of 4096 tokens,44 we used 2 steps to process the EM notes to both \nshorten the input size while maintaining content salience. First, we adopted a number of heuristic \n\nstrategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2) \n\ntime of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1–based saliency \n\nmodel to infer EM note sentences based on likelihood of content contribution to the EM-to-IP \n\nhandoff notes. \n\n**Model Training and Inference**\nOur summarization model is a fine-tuned decoder-only causal language model based on LLM 2. We \n\nused different prompts for the separate types of summarization: HPI and EM handoff. Additional \n\ninformation about the model training and inference process is provided in eAppendix 1 in \n\nSupplement 1. \n\nUsing a combination of generative AI powered by our fine-tuned LLM 2 model and a set of \n\nheuristic rules, our summarization system produced ED handoff notes with various sections for \n\ndownstream clinical tasks. The inference process is shown in the**Figure**.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine**\n\nsubsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written \n\nnote and (2) the LLM-generated note. \n\nOn a Likert scale of 1 to 5, where 1 is unacceptable and 5 is excellent, the 3 physicians rated the \n\ncompleteness, curation, readability, and correctness of the summary as shown in eTable 1 in \n\nSupplement 1. Physicians rated the usefulness of the summary, defined as the capability of the \n\nsummary being incorporated into a workflow where a physician would make edits before final \n\ncompletion, mitigating potential future self-referential learning loops and the downstream adverse \nconsequences.51 Likewise, the raters assessed potential patient safety implications of unmitigated \nmodel errors using a scale from 1 to 5, where 1 denotes life-threatening risks and 5 denotes no \n\nidentified patient safety risk for completeness, curation, readability, and the 4 subcategories within \n\ncorrectness (hallucination, faulty logic, knowledge gap, and bias), as well as the overall patient safety \nrisk.45 Evaluators arrived at prestudy consensus that a usefulness Likert score of at least a 3 out of 5 \nindicated that the LLM-generated summary likely demonstrated baseline acceptability for such a \n\nworkflow. To extrapolate a theoretical worst case scenario, the physicians rated the safety of the \n\nLLM-generated summary as defined as the capability of the summary to fully replace a physician- \n\nwritten note (unmitigated). \n\nTo improve consistency and agreement, the 3 reviewers met to familiarize themselves with the \n\nframework and evaluated 10 separate cases from the test dataset that were not included in the \n\nclinical evaluation results. Additionally, after independently scoring the summaries, they met to \n\nensure consensus interpretation of the multidimensional scoring framework. Interrater reliability was \n\ncalculated using intraclass correlation coefficient (ICC), using a 2-way random effects model for \n\nconsistency with the Pingouin statistical package version 0.5.4 in Python (Python Software \n\nFoundation). The ICC measures the similarity of the 3 raters to confirm the consistency and validity \n\nof the evaluation protocol; the scores are from 0 to 1, where 1 indicates unanimous agreement and 0 \nrepresents no agreement.52 Data were analyzed from October 2023 to March 2024. \n\n**Results**\n\n**Automated Tasks**\nOf 1600 patients, the mean (SD) age was 59.8 (18.9) years and 832 (52%) were female. In**Table 2**, \n\nROUGE and BERTScore compare the summaries with the testing set from our annotations, and \n\nSCALE score compares the summaries with the source notes. From automatic evaluation results, we \n\nobserved that LLM-generated summaries had better scores than the physician summaries, such that \n\nROUGE-2 was 0.322 vs 0.088, BERT-precision was 0.859 vs 0.796, and SCALE was 0.691 vs 0.456, \n\nsuggesting the LLM-generated summaries were more similar and more detailed than the physician \n\nsummaries. \n\n**Clinical Evaluation Tasks**\nThe clinical evaluation results for LLM-generated summaries and physician-written summaries are \n\nshown in**Table 3**and**Table 4**. The mean clinical quality scores of the automated summaries are in a \n\ncomparable range (4-5) to those of the physician summaries. However, the automated summaries \n\nwere observed to be of lower quality compared with the physician-written summaries with regards \n\nto mean (SD) usefulness (4.04 [0.85] vs 4.36 [0.71]), completeness (4.00 [0.88] vs 4.16 [0.84]),", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed8.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv5_ccby4license.pdf", - "query": "What company released MegatronLM ?", - "target_page": 2, - "target_passage": "NVIDIA released the MegatronLM", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Outperform \n\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Killam properties inc \n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**Note 15. Quarterly Results (unaudited)**", - "page_start": 39, - "page_end": 39, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**Notices**\n\nThis information was developed for products and services offered in the U.S.A. \n\nIBM may not offer the products, services, or features discussed in this document in other countries. Consult \nyour local IBM representative for information on the products and services currently available in your area. Any \nreference to an IBM product, program, or service is not intended to state or imply that only that IBM product, \nprogram, or service may be used. Any functionally equivalent product, program, or service that does not \ninfringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to \nevaluate and verify the operation of any non-IBM product, program, or service. \n\nIBM may have patents or pending patent applications covering subject matter described in this document. The \nfurnishing of this document does not grant you any license to these patents. You can send license inquiries, in \nwriting, to: \n*IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.*\n\n**The following paragraph does not apply to the United Kingdom or any other country where such**\n**provisions are inconsistent with local law:**INTERNATIONAL BUSINESS MACHINES CORPORATION \nPROVIDES THIS PUBLICATION \"AS IS\" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR \nIMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, \nMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of \nexpress or implied warranties in certain transactions, therefore, this statement may not apply to you. \n\nThis information could include technical inaccuracies or typographical errors. Changes are periodically made \nto the information herein; these changes will be incorporated in new editions of the publication. IBM may make \nimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any time \nwithout notice. \n\nAny references in this information to non-IBM websites are provided for convenience only and do not in any \nmanner serve as an endorsement of those websites. The materials at those websites are not part of the \nmaterials for this IBM product and use of those websites is at your own risk. \n\nIBM may use or distribute any of the information you supply in any way it believes appropriate without incurring \nany obligation to you. \n\nAny performance data contained herein was determined in a controlled environment. Therefore, the results \nobtained in other operating environments may vary significantly. Some measurements may have been made \non development-level systems and there is no guarantee that these measurements will be the same on \ngenerally available systems. Furthermore, some measurements may have been estimated through \nextrapolation. Actual results may vary. Users of this document should verify the applicable data for their \nspecific environment. \n\nInformation concerning non-IBM products was obtained from the suppliers of those products, their published \nannouncements or other publicly available sources. IBM has not tested those products and cannot confirm the \naccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the \ncapabilities of non-IBM products should be addressed to the suppliers of those products. \n\nThis information contains examples of data and reports used in daily business operations. To illustrate them \nas completely as possible, the examples include the names of individuals, companies, brands, and products. \nAll of these names are fictitious and any similarity to the names and addresses used by an actual business \nenterprise is entirely coincidental. \n\nCOPYRIGHT LICENSE:", - "page_start": 12, - "page_end": 12, - "source_file": "sg246915.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "U S I N G O U R S T R E N G T H... \n\n\n\n\n\n\n\nThe announcement of \nthe merger between \nMGM MIRAGE and \nMandalay Resort Group \nwas one of the seminal \nmoments of 2004.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "M G M M I R AG E 2 0 0 4 A N N UA L R E P O RT \n\n\n\ndef ining moment um", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Douglas J. Jacobson \nExecutive Vice President – \nAcquisitions and Divestitures", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv5_ccby4license.pdf", - "query": "What is the average emission of a human being per year in terms of CO2eq ?", - "target_page": 3, - "target_passage": "the average human is responsible for an estimated 5t CO2e per year", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Strubell et al. also examine the cost of these models vs. their \naccuracy gains. For the task of machine translation where large \nLMs have resulted in performance gains, they estimate that an \nincrease in 0.1 BLEU score using neural architecture search for \nEnglish to German translation results in an increase of $150,000 \ncompute cost in addition to the carbon emissions. To encourage \nmore equitable access to NLP research and reduce carbon footprint, \nthe authors give recommendations to report training time and \nsensitivity to hyperparameters when the released model is meant \nto be re-trained for downstream use. They also urge governments to \ninvest in compute clouds to provide equitable access to researchers. \nInitiatives such as the SustainNLP workshop5 have since taken \nup the goal of prioritizing computationally efficient hardware and \nalgorithms. Schwartz et al. [115] also call for the development of \ngreen AI, similar to other environmentally friendly scientific de- \nvelopments such as green chemistry or sustainable computing. As \nshown in [5], the amount of compute used to train the largest deep \nlearning models (for NLP and other applications) has increased \n300,000x in 6 years, increasing at a far higher pace than Moore’s \nLaw. To promote green AI, Schwartz et al. argue for promoting \nefficiency as an evaluation metric and show that most sampled \npapers from ACL 2018, NeurIPS 2018, and CVPR 2019 claim accu- \nracy improvements alone as primary contributions to the field, and \nnone focused on measures of efficiency as primary contributions. \nSince then, works such as [57, 75] have released online tools to \nhelp researchers benchmark their energy usage. Among their rec- \nommendations are to run experiments in carbon friendly regions, \nconsistently report energy and carbon metrics, and consider energy- \nperformance trade-offs before deploying energy hungry models. \nIn addition to these calls for documentation and technical fixes, \nBietti and Vatanparast underscore the need for social and political \nengagement in shaping a future where data driven systems have \nminimal negative impact on the environment [16]. \n\n3 ENVIRONMENTAL AND FINANCIAL COST \nStrubell et al. recently benchmarked model training and develop- \nment costs in terms of dollars and estimated 𝐶𝑂2 emissions [129]. \nWhile the average human is responsible for an estimated 5t 𝐶𝑂2𝑒 \nper year,2 the authors trained a Transformer (big) model [136] with \nneural architecture search and estimated that the training procedure \nemitted 284t of 𝐶𝑂2. Training a single BERT base model (without \nhyperparameter tuning) on GPUs was estimated to require as much \nenergy as a trans-American flight. \n\nWhile some of this energy comes from renewable sources, or \ncloud compute companies’ use of carbon credit-offset sources, the \nauthors note that the majority of cloud compute providers’ energy is \nnot sourced from renewable sources and many energy sources in the \nworld are not carbon neutral. In addition, renewable energy sources \nare still costly to the environment,3 and data centers with increasing \ncomputation requirements take away from other potential uses of", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "**Table 24: Examples of fractions of diseases attributable to work (AF) – WHO/ILO215**\n\n\n\n\n \n \n \n \n [html]\n
Attributable Fractions – GlobalHealth OutcomeDEATHSDALYs
AsbestosMesothelioma91.4586.73
AsbestosTrachea, bronchus and lung cancers10.488.06
Occupational particulate matter, gases, fumesChronic obstructive pulmonary diseases14.8715.14
Occupational injuriesCyclist road injuries16.6619
Exposure to silicaTrachea, bronchus and lung cancers2.493.24
Occupational asthmagensAsthma7.3510.81
Occupational noiseHearing loss--18.24
Occupational ergonomic factorsBack and neck pain--26.38
Long working hoursIschaemic heart disease3.695.26
Long working hoursStroke6.939.29
\n\nIn 2021, the WHO and ILO published their estimates of the burden of work-related diseases, named the \n‘WHO/ILO joint estimates of the work-related burden of disease and injury, 2000-2016’.216 WHO/ILO \ncalculates for the EU27 114,000**work-related deaths per year in 2016**. When setting the**absolute**\n**number of work-related deaths**(114,000) in relation to the EU27 population above 16 years (371 \nmillion) in 2016, this results in approximately**31 deaths per 100,000 population in working age above**\n**16 years**.217 \n\nThe second reference estimate was provided by the**International Commission on Occupational**\n**Health (ICOH)**. The size of the two major health consequences (‘Outcomes’) was calculated, that is, \n**work-related deaths**, and**work-related diseases**. ICOH estimates in total**179,000 deaths**; moreover, \nthey refer to the much smaller**labour force**population (209 million) and calculate**89 work-related**\n**deaths per 100,000 labour force**. The main reason for these different estimates is the general \napproach: WHO/ILO restricts their analysis to selected risk-outcome pairs, for example, long working \nhours as risk and stroke as outcome, whereas ICOH aspired to cover all work-related diseases.", - "page_start": 81, - "page_end": 81, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "In 2019 the WHO stated that one in every eight people, or 970 million people around the world, were \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n86", - "page_start": 85, - "page_end": 85, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Table 25: Summary Burden of diseases EU27, Global deaths – WHO/ILO 2016220,221**\n\n\n \n \n \n \n [html]\n
Summary table DEATHS EU - 27Cases EU - 27%
Asbestos - related cancers66.80858.70
Stroke, ischaemic heart diseases ( CVD )14.00012.30
Injuries5.5934.90
Chemical - related cancers9.1568.00
Chronic obstructive pulmonary diseases ( COPD )18.10315.90
Asthma1320.10
Total113.792100.0
Deaths per 100.000 working age30.6
\n\n\n \n \n \n \n [html]\n
Cases GLOBAL%
209.48111.10 %
744.92439.60 %
363.28319.30 %
82.1804.40 %
450.38124.00 %
29.6411.60 %
1.879.890100.00 %
34.7
\n\n\n\nThe global number of deaths per 100,000 population (≥ age 15) is 34.7 cases, and for the EU27 it is at \na level of 30.7 cases per 100,000 (≥ age 16).222 \n\nThe next table displays the relation between**major work-related risks**and the**health outcome**\n**measured in DALYs**at a European and a global level. Asbestos-related cancers account for the highest \nshare of more than 29% (1,269,143 DALYs); the second and third largest group of diseases are back \nand neck pain and work-related injuries. At a global level, injuries dominate (29.4%), followed by \ncardiovascular diseases (25.9%), and back and neck pain (13.7%). The data for the EU27 and ‘Global’ \nlook quite similar for hearing loss and asthma. The global number of DALYs per 100,000 population (≥ \nage 15) is 1,657, for the EU27 it is at a level of 1,172 cases per 100,000. \n\n**Table 26: Summary Burden of diseases table DALYs WHO/ILO223**\n\n\n\n\n \n \n \n \n [html]\n
Summary table DALYs EU - 27DALYs EU - 27%
Asbestos - related cancers1.269.14329.2
CVD ( Stroke, ischaemic heart diseases )403.7399.3 %
Injuries735.52616.9
Chemical - related cancers271.9336.2 %
Chronic obstructive pulmonary diseases355.0598.2 %
Asthma92.0322.1 %
Hearing loss359.1458.3 %
Back and neck pain866.24319.9
Total4.352.820100.0
DALYs per 100.000 working age1.172
", - "page_start": 84, - "page_end": 84, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "population there exists a small group of frequent repeat users. 1,828 individuals (1.7% of this \npopulation) accounted for just over ten per cent of all positive tests (30,471 tests in total). These \nindividuals provided between 16 and 57 positive tests over the period 2004 to 2013. \n\n**Figure 4: Proportion of positive tests by number of times an individual tested positive.**", - "page_start": 12, - "page_end": 12, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "For the EU27 in 2019, the**average ratio is 922 non-fatal accidents for every fatal accident**. 147 For \nan estimate, the coefficients**of benchmark countries**with a known high reporting rate are used to \nestimate underreporting throughout the EU27.148 \n\nThe following table shows the data and the calculation steps.", - "page_start": 65, - "page_end": 65, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "conducted to reveal the interactions between public discourse and natural, scientific, social, or political \nevents. In particular, factors promoting public consensus and factors resulting in discourse discrepancy \nshould be further identified to help climate communicators narrow the public cognitive divergence \nabout the global climate issue. \n\n**Supplementary Materials:**The following are available online at http://www.mdpi.com/1660-4601/17/3/1062/s1. \n\n**Author Contributions:**W.S. designed the study, collected the data, conducted the analysis, and wrote the article. \nH.F. offered suggestions to the part of temporal analysis. P.W. contributed to the hashtag co-occurrence part. C.C. \nhelped with the design of the study. J.X. contributed to the framing of the article and helped with the revision. \nAll authors have read and agreed to the published version of the manuscript. \n\n**Funding:**This work was supported in part by the National Key R&D Program of China (Grant No. \n2017YFA0604500), by the National Natural Science Foundation of China (Grant No. 51761135015, 71772142 and \nU1839206), by the National Social Science Foundation of China (Grant No.18ZDA307), by the Center for High \nPerformance Computing and System Simulation, and by the Pilot National Laboratory for Marine Science and \nTechnology (Qingdao). \n\n**Conflicts of Interest:**The authors declare no conflict of interest. \n\n**Appendix A**\n\n#agw, short for anthropogenic global warming, indicating global warming is caused by \n\nhuman activities. \n\n#cdnpoli, short for Canadian politics \n#cop21, the yearly session of COP (short for the Conference of the Parties) held in 2015. \n#cop24, the yearly session of COP (short for the Conference of the Parties) held in 2018. \n#epa, short for the United States Environmental Protection Agency founded in 1970, an agency \n\naiming at protecting environment. \n\n#gop, short for Grand Old Party, the Republican political party in the United States. \n#nyc, short for New York City \n#p2, short for Progressives 2.0, a hashtag used to show progressive political standpoints on Twitter. \n#parisagreement, Paris Agreement, the agreement signed on UNFCCC in 2016 to deal with global \n\nwarming by reducing greenhouse gas emissions. \n\n#sdgs, short for Sustainable Development Goals, containing 17 global goals put forward by the \n\nUnited Nations General Assembly in 2015 and expected to be achieved in 2030. \n\n#tcot, short for Top Conservatives On Twitter, a hashtag used to show conservative political \n\nstandpoints on Twitter. \n\n#un, short for the United Nations \n#us, short for the United States \n\n**References**\n\n1. Nisbet, M.C. Communicating climate change: Why frames matter for public engagement. Environ. Sci. \n\n2. \n\n3. \n\n4. \n\n5. \n\n6. \n\nPolicy Sustain. Dev.**2009**, 51, 12–23. [CrossRef] \nRoxburgh, N.; Guan, D.; Shin, K.J.; Rand, W.; Managi, S.; Lovelace, R.; Meng, J. Characterising climate change \ndiscourse on social media during extreme weather events. Glob. Environ. Chang.**2019**, 54, 50–60. [CrossRef] \nSchuldt, J.P.; Konrath, S.H.; Schwarz, N. “Global warming” or “climate change”? Whether the planet is \nwarming depends on question wording. Public Opin. Q.**2011**, 75, 115–124. [CrossRef] \nVillar, A.; Krosnick, J.A. Global warming vs. climate change, taxes vs. prices: Does word choice matter? \nClim. Chang.**2011**, 105, 1–12. [CrossRef] \nJang, S.M.; Hart, P.S. Polarized frames on “climate change” and “global warming” across countries and \nstates: Evidence from Twitter big data. Glob. Environ. Chang.**2015**, 32, 11–17. [CrossRef] \nUnited States Environmental Protection Agency. Climate Change: Basic Information. Available online: \nhttps://19january2017snapshot.epa.gov/climatechange/climate-change-basic-information_.html (accessed on \n10 October 2019).", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed10.pdf" - }, - { - "text": "**3. Methods**\n\n3.1. Data Source \n\nAs Twitter has been recognized as a popular discussion forum [75] and a social activity platform [76] \nfor climate issues, we followed the literature [5,8,18] and used tweets to investigate distinct perceptions \nof climate issues and evolution on social media. Although Twitter’s ecosystem has been changing \nin terms of the number of active users, user demographics, and tweeting conventions in the past \nyears [77,78], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter \nis one of the most popular social websites, we defined our study as characterizing the perception of \nclimate issues among social media users rather than all the netizens or the whole population. \n\n3.2. Data \n\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. \n\nGiven our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. \n\n**Figure 1.**The number of tweets containing #climatechange or #globalwarming, and their ratio from \n2009 to 2018 (**a**). The number of hashtags contained in the “climate change” or “global warming” \ndatasets, and their ratio from 2009 to 2018 (**b**).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - }, - { - "text": "The figure below displays the relation between**major risks**and the**health outcome in DALYs**. The \nestimates of DALYS that are attributable to work vary between 6.8 million years (ICOH) and 4.4 million \nyears (WHO/ILO), both for the EU27. \n\n**Figure 26: Work-related DALYs – estimates by WHO/ILO and ICOH for the EU27**\n\nPutting the absolute numbers of WHO/ILO in relation to the EU27 population above 16 years this results \nin approximately**1,172 lost life years per 100,000 working-age population**(WHO/ILO). ICOH \ncalculates in absolute numbers 6.8 million lost life years for the labour force population, resulting**in**\n**3,364 DALYs per 100,000 labour force**. \n\nIt can be concluded that despite methodological differences the estimates**do not vary that much if the**\n**same reference population**is used in the calculation. Future research will contribute to a better \nattribution of the impact of work on these diseases.**In the future, relevant disease groups will be**\n**incorporated in these estimates**, that is, the impact of work on the prevalence of**mental diseases**\nand of communicable diseases caused by biological agents needs to be incorporated. \n\nThe next table shows the**difference between major occupational risk factors and deaths**at the \nEU27 level and the global level. At EU27 level asbestos-related cancers are clearly the most frequent \nreason for work-related deaths with nearly 60% of all cases; the two next main causes are COPD (15.9%) \nand CVD (12.3%). The global situation is quite different. CVD account for nearly 40%, COPD for 24% \nand injuries for 19%. \n\n\n \n \n \n \n [html]\n
TableEuropean Agency for Safety and Health at Work – EU - OSHA
Table
", - "page_start": 83, - "page_end": 83, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. \n\nLarge amounts of user-generated data on social media, which have been valued in computer science, \ncommunication, and environmental studies [5,9,15–18], have enabled the acquistion of the social media \nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence \npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009 \nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify \nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to \nobserve the evolution of the two discourses and to measure whether the discrepancy between the two \nhas widened or narrowed within the 10-year period. \n\nTo be specific, we formulated three research questions (RQs) to be explored in this study: \n\nRQ1: What is the difference in how the two the discourses are associated with important climate \nconcepts in people’s minds? \nRQ2: How did the two competing climate discourses evolve from 2009 to 2018? \nRQ3: Did the two competing discourses converge or diverge in this decade? \n\n**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv5_ccby4license.pdf", - "query": "How did the Black Lives Matter movement influence the writing of Wikipedia articles ?", - "target_page": 5, - "target_passage": " the Black Lives Matter movement (BLM) influenced Wikipedia article generation and editing such that, as the BLM movement grew, articles covering shootings of Black people in- creased in coverage and were generated with reduced latency", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Thus at each step, from initial participation in Internet fora, to \ncontinued presence there, to the collection and finally the filtering \nof training data, current practice privileges the hegemonic view- \npoint. In accepting large amounts of web text as ‘representative’ \nof ‘all’ of humanity we risk perpetuating dominant viewpoints, \nincreasing power imbalances, and further reifying inequality. We \ninstead propose practices that actively seek to include communities \nunderrepresented on the Internet. For instance, one can take inspi- \nration from movements to decolonize education by moving towards \noral histories due to the overrepresentation of colonial views in \ntext [35, 76, 127], and curate training datasets through a thoughtful \nprocess of deciding what to put in, rather than aiming solely for \nscale and trying haphazardly to weed out, post-hoc, flotsam deemed \n‘dangerous’, ‘unintelligible’, or ‘otherwise bad’. \n\n4.2 Static Data/Changing Social Views \nA central aspect of social movement formation involves using lan- \nguage strategically to destabilize dominant narratives and call at- \ntention to underrepresented social perspectives. Social movements \nproduce new norms, language, and ways of communicating. This \nadds challenges to the deployment of LMs, as methodologies re- \nliant on LMs run the risk of ‘value-lock’, where the LM-reliant \ntechnology reifies older, less-inclusive understandings. \n\nFor instance, the Black Lives Matter movement (BLM) influenced \nWikipedia article generation and editing such that, as the BLM \nmovement grew, articles covering shootings of Black people in- \ncreased in coverage and were generated with reduced latency [135]. \nImportantly, articles describing past shootings and incidents of po- \nlice brutality were created and updated as articles for new events \nwere created, reflecting how social movements make connections \nbetween events in time to form cohesive narratives [102]. More \ngenerally, Twyman et al. [135] highlight how social movements \nactively influence framings and reframings of minority narratives \n\nThese demonstrations of biases learned by LMs are extremely \nvaluable in pointing out the potential for harm when such models \nare deployed, either in generating text or as components of classi- \nfication systems, as explored further in §6. However, they do not \nrepresent a methodology that can be used to exhaustively discover \nall such risks, for several reasons. \n\nFirst, model auditing techniques typically rely on automated \nsystems for measuring sentiment, toxicity, or novel metrics such \nas ‘regard’ to measure attitudes towards a specific demographic \ngroup [119]. But these systems themselves may not be reliable \n\n14Available at https://github.com/LDNOOBW/List-of-Dirty-Naughty-Obscene-and- \nOtherwise-Bad-Words/blob/master/en, accessed Jan 18, 2021 \n15This observation is due to William Agnew. \n\n\n \n \n \n \n [html]\n
Table
indirectly to construct GPT - 3 ′ s [ 53 ].
", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "most similar to the ones used in GPT-2’s training data, i.e. docu- \nments linked to from Reddit [25], plus Wikipedia and a collection \nof books. While this was reportedly effective at filtering out docu- \nments that previous work characterized as “unintelligible” [134], \nwhat is unmeasured (and thus unknown) is what else it filtered out. \nThe Colossal Clean Crawled Corpus [107], used to train a trillion \nparameter LM in [43], is cleaned, inter alia, by discarding any page \ncontaining one of a list of about 400 “Dirty, Naughty, Obscene or \nOtherwise Bad Words” [p.6].14 This list is overwhelmingly words \nrelated to sex, with a handful of racial slurs and words related to \nwhite supremacy (e.g. swastika, white power) included. While possi- \nbly effective at removing documents containing pornography (and \nthe associated problematic stereotypes encoded in the language of \nsuch sites [125]) and certain kinds of hate speech, this approach will \nalso undoubtedly attenuate, by suppressing such words as twink, \nthe influence of online spaces built by and for LGBTQ people.15 If \nwe filter out the discourse of marginalized populations, we fail to \nprovide training data that reclaims slurs and otherwise describes \nmarginalized identities in a positive light. \n\nin the type of online discourse that potentially forms the data that \nunderpins LMs. \n\nAn important caveat is that social movements which are poorly \ndocumented and which do not receive significant media attention \nwill not be captured at all. Media coverage can fail to cover protest \nevents and social movements [41, 96] and can distort events that \nchallenge state power [36]. This is exemplified by media outlets \nthat tend to ignore peaceful protest activity and instead focus on \ndramatic or violent events that make for good television but nearly \nalways result in critical coverage [81]. As a result, the data under- \npinning LMs stands to misrepresent social movements and dispro- \nportionately align with existing regimes of power. \n\nDeveloping and shifting frames stand to be learned in incomplete \nways or lost in the big-ness of data used to train large LMs — particu- \nlarly if the training data isn’t continually updated. Given the com- \npute costs alone of training large LMs, it likely isn’t feasible for \neven large corporations to fully retrain them frequently enough to \nkeep up with the kind of language change discussed here. Perhaps \nfine-tuning approaches could be used to retrain LMs, but here again, \nwhat would be required is thoughtful curation practices to find ap- \npropriate data to capture reframings and techniques for evaluating \nwhether such fine-tuning appropriately captures the ways in which \nnew framings contest hegemonic representations. \n\n4.3 Encoding Bias \nIt is well established by now that large LMs exhibit various kinds of \nbias, including stereotypical associations [11, 12, 69, 119, 156, 157], \nor negative sentiment towards specific groups [61]. Furthermore, \nwe see the effects of intersectionality [34], where BERT, ELMo, GPT \nand GPT-2 encode more bias against identities marginalized along \nmore than one dimension than would be expected based on just the \ncombination of the bias along each of the axes [54, 132]. Many of \nthese works conclude that these issues are a reflection of training \ndata characteristics. For instance, Hutchinson et al. find that BERT \nassociates phrases referencing persons with disabilities with more \nnegative sentiment words, and that gun violence, homelessness, \nand drug addiction are overrepresented in texts discussing mental \nillness [61]. Similarly, Gehman et al. show that models like GPT-3 \ntrained with at least 570GB of data derived mostly from Common \nCrawl16 can generate sentences with high toxicity scores even when \nprompted with non-toxic sentences [53]. Their investigation of GPT- \n2’s training data17 also finds 272K documents from unreliable news \nsites and 63K from banned subreddits.", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "[35] Benjamin Dangl. 2019. The Five Hundred Year Rebellion: Indigenous Movements \nand the Decolonization of History in Bolivia. AK Press. \n[36] Christian Davenport. 2009. Media bias, perspective, and state repression: The \nBlack Panther Party. Cambridge University Press. \n[37] Ferdinand de Saussure. 1959. Course in General Linguistics. The Philosophical \nSociety, New York. Translated by Wade Baskin. \n\n[38] Terrance de Vries, Ishan Misra, Changhan Wang, and Laurens van der Maaten. \n2019. Does object recognition work for everyone?. In Proceedings of the IEEE \nConference on Computer Vision and Pattern Recognition Workshops. 52–59. \n[39] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: \nPre-training of Deep Bidirectional Transformers for Language Understanding. \nIn Proceedings of the 2019 Conference of the North American Chapter of the Asso- \nciation for Computational Linguistics: Human Language Technologies, Volume 1 \n(Long and Short Papers). Association for Computational Linguistics, Minneapolis, \nMinnesota, 4171–4186. https://doi.org/10.18653/v1/N19-1423 \n[40] Maeve Duggan. 2017. Online Harassment 2017. Pew Research Center. \n[41] Jennifer Earl, Andrew Martin, John D. McCarthy, and Sarah A. Soule. 2004. \nThe use of newspaper data in the study of collective action. Annual Review of \nSociology 30 (2004), 65–80. \n\n[42] Ethan Fast, Tina Vachovsky, and Michael Bernstein. 2016. Shirtless and Danger- \nous: Quantifying Linguistic Signals of Gender Bias in an Online Fiction Writing \nCommunity. In Proceedings of the International AAAI Conference on Web and \nSocial Media, Vol. 10. \n\n[43] William Fedus, Barret Zoph, and Noam Shazeer. 2021. Switch Transform- \ners: Scaling to Trillion Parameter Models with Simple and Efficient Sparsity. \narXiv:2101.03961 [cs.LG] \n\n[44] Anjalie Field, Doron Kliger, Shuly Wintner, Jennifer Pan, Dan Jurafsky, and \nYulia Tsvetkov. 2018. Framing and Agenda-setting in Russian News: a Compu- \ntational Analysis of Intricate Political Strategies. In Proceedings of the 2018 \nConference on Empirical Methods in Natural Language Processing. Associa- \ntion for Computational Linguistics, Brussels, Belgium, 3570–3580. \nhttps: \n//doi.org/10.18653/v1/D18-1393", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "and framing effects. Psychon. Bull. Rev.**2003**, 10, 596–602. [CrossRef] \n\n26. Du, Y.R. Same events, different stories: Internet censorship in the Arab Spring seen from China. Journal. \n\n27. \n\n28. \n\nMass Commun. Q.**2016**, 93, 99–117. [CrossRef] \nSchuldt, J.P.; Roh, S. Media frames and cognitive accessibility: What do “global warming” and “climate \nchange” evoke in partisan minds? Environ. Commun.**2014**, 8, 529–548. [CrossRef] \nSonnett, J. Climates of risk: A field analysis of global climate change in US media discourse, 1997–2004. \nPublic Underst. Sci.**2010**, 19, 698–716. [CrossRef] \nJaspal, R.; Nerlich, B.; Van Vuuren, K. Embracing and resisting climate identities in the Australian press: \nSceptics, scientists and politics. Public Underst. Sci.**2016**, 25, 807–824. [CrossRef] [PubMed] \nShi, W.; Chen, C.; Xiong, J.; Fu, H. What Framework Promotes Saliency of Climate Change Issues on Online \nPublic Agenda: A Quantitative Study of Online Knowledge Community Quora. Sustainability**2019**, 11, 1619. \n[CrossRef] \n\n31. Gifford, R.; Comeau, L.A. Message framing influences perceived climate change competence, engagement, \n\nand behavioral intentions. Glob. Environ. Chang.**2011**, 21, 1301–1307. [CrossRef] \nJiang, H.; Qiang, M.; Zhang, D.; Wen, Q.; Xia, B.; An, N. Climate Change Communication in an Online Q&A \nCommunity: A Case Study of Quora. Sustainability**2018**, 10, 1509. \n\n32.", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - }, - { - "text": "INTRODUCTION \n\n∗Joint first authors \n\n\n\nJust as environmental impact scales with model size, so does \nthe difficulty of understanding what is in the training data. In §4, \nwe discuss how large datasets based on texts from the Internet \noverrepresent hegemonic viewpoints and encode biases potentially \ndamaging to marginalized populations. In collecting ever larger \ndatasets we risk incurring documentation debt. We recommend \nmitigating these risks by budgeting for curation and documentation \nat the start of a project and only creating datasets as large as can \nbe sufficiently documented. \n\nAs argued by Bender and Koller [14], it is important to under- \nstand the limitations of LMs and put their success in context. This \nnot only helps reduce hype which can mislead the public and re- \nsearchers themselves regarding the capabilities of these LMs, but \nmight encourage new research directions that do not necessarily \ndepend on having larger LMs. As we discuss in §5, LMs are not \nperforming natural language understanding (NLU), and only have \nsuccess in tasks that can be approached by manipulating linguis- \ntic form [14]. Focusing on state-of-the-art results on leaderboards \nwithout encouraging deeper understanding of the mechanism by \nwhich they are achieved can cause misleading results as shown \n\nThis work is licensed under a Creative Commons Attribution International 4.0 License. \nFAccT ’21, March 3–10, 2021, Virtual Event, Canada \nACM ISBN 978-1-4503-8309-7/21/03. \nhttps://doi.org/10.1145/3442188.3445922", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "discussions which will be included via the crawling methodology, \nand finally the texts likely to be contained after the crawled data \nare filtered. In all cases, the voices of people most likely to hew to \na hegemonic viewpoint are also more likely to be retained. In the \ncase of US and UK English, this means that white supremacist and \nmisogynistic, ageist, etc. views are overrepresented in the training \ndata, not only exceeding their prevalence in the general population \nbut also setting up models trained on these datasets to further \namplify biases and harms. \n\nStarting with who is contributing to these Internet text collec- \ntions, we see that Internet access itself is not evenly distributed, \nresulting in Internet data overrepresenting younger users and those \nfrom developed countries [100, 143].12 However, it’s not just the In- \nternet as a whole that is in question, but rather specific subsamples \nof it. For instance, GPT-2’s training data is sourced by scraping out- \nbound links from Reddit, and Pew Internet Research’s 2016 survey \nreveals 67% of Reddit users in the United States are men, and 64% \nbetween ages 18 and 29.13 Similarly, recent surveys of Wikipedians \nfind that only 8.8–15% are women or girls [9]. \n\nby drastic floods7 pay the environmental price of training and \ndeploying ever larger English LMs, when similar large-scale models \naren’t being produced for Dhivehi or Sudanese Arabic?8 \n\nAnd, while some language technology is genuinely designed to \nbenefit marginalized communities [17, 101], most language technol- \nogy is built to serve the needs of those who already have the most \nprivilege in society. Consider, for example, who is likely to both \nhave the financial resources to purchase a Google Home, Amazon \nAlexa or an Apple device with Siri installed and comfortably speak \na variety of a language which they are prepared to handle. Fur- \nthermore, when large LMs encode and reinforce hegemonic biases \n(see §§4 and 6), the harms that follow are most likely to fall on \nmarginalized populations who, even in rich nations, are most likely \nto experience environmental racism [10, 104]. \n\nThese models are being developed at a time when unprece- \ndented environmental changes are being witnessed around the \nworld. From monsoons caused by changes in rainfall patterns due \nto climate change affecting more than 8 million people in India,9 \nto the worst fire season on record in Australia killing or displacing \nnearly three billion animals and at least 400 people,10 the effect \nof climate change continues to set new records every year. It is \npast time for researchers to prioritize energy efficiency and cost \nto reduce negative environmental impact and inequitable access \nto resources — both of which disproportionately affect people who \nare already in marginalized positions. \n\n4 UNFATHOMABLE TRAINING DATA \nThe size of data available on the web has enabled deep learning \nmodels to achieve high accuracy on specific benchmarks in NLP \nand computer vision applications. However, in both application \nareas, the training data has been shown to have problematic charac- \nteristics [18, 38, 42, 47, 61] resulting in models that encode stereo- \ntypical and derogatory associations along gender, race, ethnicity, \nand disability status [11, 12, 69, 69, 132, 132, 157]. In this section, \nwe discuss how large, uncurated, Internet-based datasets encode \nthe dominant/hegemonic view, which further harms people at the \nmargins, and recommend significant resource allocation towards \ndataset curation and documentation practices.", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "If the LM or word embeddings derived from it are used as com- \nponents in a text classification system, these biases can lead to \nallocational and/or reputational harms, as biases in the representa- \ntions affect system decisions [125]. This case is especially pernicious \nfor being largely invisible to both the direct user of the system and \nany indirect stakeholders about whom decisions are being made. \nSimilarly, biases in an LM used in query expansion could influence \nsearch results, further exacerbating the risk of harms of the type \ndocumented by Noble in [94], where the juxtaposition of search \nqueries and search results, when connected by negative stereotypes, \nreinforce those stereotypes and cause psychological harm. \n\nThe above cases involve risks that could arise when LMs are de- \nployed without malicious intent. A third category of risk involves \nbad actors taking advantage of the ability of large LMs to produce \nlarge quantities of seemingly coherent texts on specific topics on \ndemand in cases where those deploying the LM have no investment \nin the truth of the generated text. These include prosaic cases, such \nas services set up to ‘automatically’ write term papers or interact on \nsocial media,23 as well as use cases connected to promoting extrem- \nism. For example, McGuffie and Newhouse [80] show how GPT-3 \ncould be used to generate text in the persona of a conspiracy theo- \nrist, which in turn could be used to populate extremist recruitment \nmessage boards. This would give such groups a cheap way to boost \nrecruitment by making human targets feel like they were among \nmany like-minded people. If the LMs are deployed in this way to \nrecruit more people to extremist causes, then harms, in the first \ninstance, befall the people so recruited and (likely more severely) \nto others as a result of violence carried out by the extremists. \n\nYet another risk connected to seeming coherence and fluency in- \nvolves machine translation (MT) and the way that increased fluency \nof MT output changes the perceived adequacy of that output [77]. \nThis differs somewhat from the cases above in that there was an \ninitial human communicative intent, by the author of the source lan- \nguage text. However, MT systems can (and frequently do) produce \noutput that is inaccurate yet both fluent and (again, seemingly) \n\n\n \n \n \n \n [html]\n
Tableusystem ( or the organization deploying the system ) has accountability for the truth
Specificity ( mean )Table toxonomy
\n\n23Such as the GPT-3 powered bot let loose on Reddit; see https://thenextweb.com/ \nneural/2020/10/07/someone-let-a-gpt-3-bot-loose-on-reddit-it-didnt-end-well/amp/.", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "4.1 Size Doesn’t Guarantee Diversity \nThe Internet is a large and diverse virtual space, and accordingly, it \nis easy to imagine that very large datasets, such as Common Crawl \n(“petabytes of data collected over 8 years of web crawling”,11 a \nfiltered version of which is included in the GPT-3 training data) must \ntherefore be broadly representative of the ways in which different \npeople view the world. However, on closer examination, we find that \nthere are several factors which narrow Internet participation, the \n\nFurthermore, while user-generated content sites like Reddit, \nTwitter, and Wikipedia present themselves as open and accessible \nto anyone, there are structural factors including moderation prac- \ntices which make them less welcoming to marginalized populations. \nJones [64] documents (using digital ethnography techniques [63]) \nmultiple cases where people on the receiving end of death threats \non Twitter have had their accounts suspended while the accounts \nissuing the death threats persist. She further reports that harass- \nment on Twitter is experienced by “a wide range of overlapping \ngroups including domestic abuse victims, sex workers, trans people, \nqueer people, immigrants, medical patients (by their providers), \nneurodivergent people, and visibly or vocally disabled people.” The \nnet result is that a limited set of subpopulations can continue to \neasily add data, sharing their thoughts and developing platforms \nthat are inclusive of their worldviews; this systemic pattern in turn \nworsens diversity and inclusion within Internet-based communica- \ntion, creating a feedback loop that lessens the impact of data from \nunderrepresented populations. \n\nEven if populations who feel unwelcome in mainstream sites set \nup different fora for communication, these may be less likely to be \nincluded in training data for language models. Take, for example, \nolder adults in the US and UK. Lazar et al. outline how they both in- \ndividually and collectively articulate anti-ageist frames specifically \nthrough blogging [71], which some older adults prefer over more \npopular social media sites for discussing sensitive topics [24]. These \nfora contain rich discussions about what constitutes age discrimi- \nnation and the impacts thereof. However, a blogging community \nsuch as the one described by Lazar et al. is less likely to be found \nthan other blogs that have more incoming and outgoing links. \n\n12This point is also mentioned in the model card for GPT-3: https://github.com/openai/ \ngpt-3/blob/master/model-card.md \n13https://www.journalism.org/2016/02/25/reddit-news-users-more-likely-to-be-male- \nyoung-and-digital-in-their-news-preferences/ \n\nFinally, the current practice of filtering datasets can further atten- \nuate the voices of people from marginalized identities. The training \nset for GPT-3 was a filtered version of the Common Crawl dataset, \ndeveloped by training a classifier to pick out those documents \n\n\n \n \n \n \n [html]\n
participatory research techniques for developing MT for African languages. These premining diprecitoms ( prestive get investive amages )
“ Inttps :// www. vsanovs. com / south - contral - asia / monooms - cause - haves - india - climatochange - abexv - rainfid - patterns
“ https :// www. on. con / 2010 / 47 / 2b / asia / astralia - fires = wildlife - report - scli - toth - scriindex html
", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "52. \n\n53. Bruns, A.; Stieglitz, S. Quantitative approaches to comparing communication patterns on Twitter. J. Technol. \n\nHum. Serv.**2012**, 30, 160–185. [CrossRef] \n\n54. Yang, G. Narrative agency in hashtag activism: The case of# BlackLivesMatter. Media Commun.**2016**, 4, 13. \n55. Bruns, A.; Burgess, J.E. The use of Twitter hashtags in the formation of ad hoc publics. In Proceedings of the \n6th European Consortium for Political Research (ECPR) General Conference 2011, Reykjavík, Iceland, 25–27 \nAugust 2011. \n\n56. Rzeszotarski, J.M.; Spiro, E.S.; Matias, J.N.; Monroy-Hernández, A.; Morris, M.R. Is anyone out there?: \nUnpacking Q&A hashtags on twitter. In Proceedings of the SIGCHI Conference on Human Factors in \nComputing Systems, Toronto, ON, Canada, 26 April–1 May 2014; pp. 2755–2758. \n\n57. Tsur, O.; Rappoport, A. What’s in a hashtag?: Content based prediction of the spread of ideas in microblogging \ncommunities. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, \nSeattle, WA, USA, 8–12 February 2012; pp. 643–652. \n\n58. Yang, L.; Sun, T.; Zhang, M.; Mei, Q. We know what@ you# tag: Does the dual role affect hashtag adoption? \nIn Proceedings of the 21st international conference on World Wide Web, Lyon, France, 16–20 April 2012; \npp. 261–270. \n\n59. Weller, K.; Dröge, E.; Puschmann, C. Citation Analysis in Twitter: Approaches for Defining and Measuring \nInformation Flows within Tweets during Scientific Conferences. In Proceedings of the Making Sense of \nMicroposts 2011, Heraklion, Greece, 30 May 2011; pp. 1–12. \n\n60. Meraz, S. Hashtag wars and networked framing: The private/public networked protest repertoires of occupy \non twitter. In Between the Public and Private in Mobile Communication; Routledge: Abingdon, UK, 2017; \npp. 303–323. \n\n61. Meraz, S.; Papacharissi, Z. Networked gatekeeping and networked framing on# Egypt. Int. J. Press.**2013**, 18,", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed10.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
THIS PAGE INTENTIONALLY LEFT BLANKTableTable
TableTableTable
TableTableTable
TableTableTable
", - "page_start": 15, - "page_end": 15, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2648.pdf", - "query": "Concerning electrolyte solutions, what assumption makes the primitive model (PM) regarding ions?", - "target_page": 1, - "target_passage": "simple phenomenological models such as the primitive model (PM), for which the ions are assimi- lated to charged hard spheres", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl \nsolutions \n\nJohn Jairo Molina1,2,3,∗ Jean-Fran¸cois Dufrˆeche1,2,3,† Mathieu \nSalanne1,2, Olivier Bernard1,2, Marie Jardat1,2, and Pierre Turq1,2 \n1 UPMC-Universit´e Paris 06, UMR 7195, PECSA, F-75005 Paris, France \n2 CNRS, UMR 7195, PECSA, F-75005 Paris, France \n3 Institut de Chimie S´eparative de Marcoule (ICSM), \nUMR 5257 CEA–CNRS–Universit´e Montpellier 2, Site de Marcoule, \nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C`eze Cedex, France \n\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom \ndescriptions; providing analytical expressions of the thermodynamic and structural properties of \nthe ions consistent with the underlying explicit solvent representation. Effective potentials between \nions in solution are calculated to perform perturbation theory calculations, in order to derive the \nbest possible description in terms of charged hard spheres. Applying this method to NaCl solutions \nyields excellent agreement with the all-atom model, provided ion association is taken into account. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\nSince the pioneering works of Debye, H¨uckel, and \nOnsager, electrolyte solutions have been commonly \ndescribed by continuous solvent models, \nfor which \nthe McMillan-Mayer theory [1] provides a rigorous \nstatistical-mechanical foundation. Within that level of \ndescription, simple phenomenological models such as the \nprimitive model (PM), for which the ions are assimi- \nlated to charged hard spheres [2], can lead to explicit \nformulas for the thermodynamic and structural proper- \nties (e.g., with the help of the mean spherical approxima- \ntion (MSA) [3] or the binding MSA (BIMSA) [4]). These \nmodels are the most practical to use [5], since they allow \nfor a direct link between the experimental measurements \nand the microscopic parameters of the system. Never- \ntheless, they ignore the molecular structure of the sol- \nvent. Consequently, they cannot properly account for \nthe complex specific effects of the ions, which appear in \nnumerous biological, chemical, and physical interfacial \nphenomena [6, 7], without further developments. \n\nmolecular dynamics (MD) results. Different approxima- \ntions of the PM are employed for the case of NaCl elec- \ntrolyte solutions: a two component model (MSA2), that \nonly takes free ions into account, and two different three \ncomponent models (MSA3 and BIMSA3), which include \na third species (the contact ion pair). As we proceed \nto show, LPT allows us to select the best simple model \nwhich accurately accounts for the thermodynamics and \nthe physical-chemistry of the system. \n\nThe first stage consists in calculating the McMillan- \nMayer effective ion-ion interaction potentials V eff \nij (r), by \ninverting the radial distribution functions (RDF) gij(r) \nobtained by MD. The simulations were carried out on \na box of 2000 water molecules and 48 NaCl pairs us- \ning the same interaction potentials as in reference [16]. \n1. \nThis setup corresponds to a concentration of 0.64 mol l− \nNPT ensemble sampling at standard pressure and tem- \nperature was enforced, with a time step of 1 fs and a \npressure bath coupling constant of 1 ps. An equilibration \nrun of 0.25 ns was followed by a production run of 0.6 ns \nfor five different initial configurations. The averages of \nthe resulting RDF were then used for the potential inver- \nsion via the HNC closure [15]. These effective potentials \nare assumed to be concentration independent and will be \nused for simulations at all concentrations. \n\n] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2648.pdf" - }, - { - "text": "4 \n\nof the BIMSA3 appears to be negligible compared to the \n1. The \nreference term for concentrations less than 1 mol l− \nperturbation can then be omitted to obtain a fully ana- \nlytical theory, determined by the hard sphere diameters \nand the pair fraction given by LPT; with the free energy \nand the RDF given in terms of the BIMSA and MSA so- \nlutions, as described above. While the procedure we have \nfollowed uses two different approximations for the refer- \nence and perturbation terms (MSA vs BIMSA), these are \nknown to be accurate for the systems under consideration \nand do not appear to be inconsistent with each other. \n\nTo conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . \n\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13, [12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99, 226104 \n276 (1945). (2007). \n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical \nChemistry of Electrolyte Solutions (Springer, 1998). \n[3] L. Blum, in Theoretical Chemistry: Advances and Per- \nspectives, edited by H. Eyring and D. Henderson (Aca- \ndemic Press, 1980), vol. 5, pp. 1–66. \n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev. \nLett. 100, 258105 (2008). \n\n[14] S. Van Damme et al., J. Phys. Chem. B 113, 3105 (2009). \n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq- \n\nuids (Academic Press, 1986). \n\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79, 569 (1995). \n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109, 9873 (2005). \n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106, 1259 \n\n[16] J. C. Rasaiah and R. M. Lynden-Bell, Philos. Trans. R. \nSoc. London, Ser. A 359, 1545 (2001). \n[17] A. P. Lyubartsev and S. Marcelja, Phys. Rev. E 65, \n(2006). 041202 (2002). \n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin. \nColloid Interface Sci. 9, 1 (2004). \n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett. \n96, 147801 (2006). \n\n[18] V. M. M. Lobo, Electrolyte Solutions, Data on Thermo- \ndynamic and Transport Properties, vol. I-II (Coimbra Ed- \nitora, Lisbon, Portugal, 1984). \n[19] G. Ciccotti, P. Turq, and F. Lantelme, Chem. Phys. 88, \n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130, 134507 333 (1984). \n(2009). [20] J.-F. Dufrˆeche, T. O. White, and J.-P. Hansen, Mol. \n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110, Phys. 101, 1741 (2003). \n10878 (2006) [21] The average contact distance between a symmetric \n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52, dumbbell and an infinite plane at β = 0. \n3730 (1995).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2648.pdf" - }, - { - "text": "5 \n) \nÅ \n4 \n( \nσ \n3 \n\n0 8 \nr (Å) \n\nFIG. 1: Effective McMillan-Mayer short-range pair potentials \nextracted from explicit solvent simulations using the HNC \nclosure. (a) Cation anion, (b) cation cation, (c) anion anion, \n(d) cation anion RDF obtained from explicit solvent MD and \nimplicit solvent MC simulations. \nFIG. 2: \n(Color online) (a) Osmotic coefficient Φ in the \nMcMillan-Mayer frame of reference. (diamond) MC simula- \ntions, (dot dashed) MSA2, (dot) Debye H¨uckel Limiting law \n(DHLL), (cross) experiments (Ref. [18] with the McMillan- \nMayer to Lewis Randall conversion). (b) Minimization diam- \neters. (dot dashed) MSA2 and (diamond) MSA-fit. \n\npute all ion thermodynamic properties through implicit \nsolvent MC simulations. \n\nThe second stage of our coarse-graining procedure con- \nsists in applying LPT, in order to deduce the best ana- \nlytical model of electrolyte solutions which reproduces \nthis molecular description. The principle of LPT is to \ndescribe the properties of a given system in terms of \nthose of a well known reference system, with the differ- \nence between them treated as a perturbation in the ref- \nerence potential. Assuming pairwise additive potentials, \nVij = V (0) \nij + ∆Vij , a first-order truncated expression for \nthe free energy density of the system βfv is obtained, \n\n1 \n2 \nXi,j \n\nWe first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. \n\nwhich depends only on the free-energy density f (0) \nand \nv \nRDF g(0) of the reference fluid, with β = (kBT )− \n1 and \nρi the concentration of species i. The Gibbs-Bogoliubov \ninequality [15] ensures that the right-hand side of Eq. (1) \nis actually a strict upper bound. Once a reference system \nhas been chosen, the expression on the right-hand side of \nEq. (1) must be minimized with respect to the parameters \ndefining the reference. This procedure yields the best \nfirst-order approximation to the free energy of the system \nunder consideration. \n\nFor a system of charged particles in solution, the nat- \nural reference is the PM, defined in terms of the charge \nand diameter (σi) of each species. In this case, the per- \nturbing potentials are just the short-range effective po- \ntentials computed above (∆Vij = V SR \nij ). We use the \nMSA [3] solution to the PM, since it provides analyti- \ncal expressions for both the free energy and the RDF. \nThe perturbation term is evaluated using an exponential \napproximation to the RDF obtained within the MSA, \ng(r) = exp [gMSA(r) − 1], which removes any unphysical \nnegative regions and improves the comparison with HNC \ncalculations.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nAn alternative procedure consists in carrying out \nmolecular simulations, where both the solvent and solute \nare treated explicitly. After a rigorous averaging over \nthe solvent configurations, a coarse-grained description \nof the ions, which still includes the effect of the solvent \nstructure, can be obtained [8–11]. However, this set of \nmethods is purely numeric; they do not provide any an- \nalytical expression for thermodynamic quantities. They \nare therefore restricted to simple geometries [12, 13] (bulk \nsolutions or planar interfaces). The description of com- \nplex systems, such as porous or electrochemical materi- \nals, is still based on continuous solvent models [14]. \n\nIn this letter we present a method aimed at bridging \nthe gap between analytical and numerical approaches. It \nis based on the application of liquid perturbation theory \n(LPT) [15] to effective ion-ion potentials extracted from \n\nSubtracting \nlong-range Coulombic potential \nV LR \nij (r) (which depends on the dielectric constant of the \nsolvent) from V eff \nij (r), we obtain the short-range contri- \nbution V SR \nij (r) to the effective potentials. These are given \nin Fig. 1 (species 1 and 2 refer to Na+ and Cl− free ions, \nrespectively). All the short-range potentials exhibit os- \ncillations corresponding to the solvent layering between \nthe ions, but this effect is particularly important for the \ncation-anion interaction: a considerable potential barrier \n(& 2kBT ) separates the first two attractive wells. To \nserve as a reference, Monte Carlo (MC) simulations were \nperformed with these effective potentials; a comparison \nbetween MD and MC RDF is also provided in Fig. 1. The \nexcellent agreement between both sets of RDF validates \nthe HNC inversion procedure [17], and allows us to com- \n\nthe", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2648.pdf" - }, - { - "text": "[81] A. J. Archer and M. Rauscher, “Dynamical density functional theory for interacting brownian parti- \n\ncles: Stochastic or deterministic?” J. Phys. A-Math. Gen. 37, 9325–9333 (2004). \n\n[82] A. J. Archer and R. Evans, “Dynamical density functional theory and its application to spinodal \n\ndecomposition,” J. Chem. Phys. 121, 4246–4254 (2004). \n\n[83] P. A. Monson, “Mean field kinetic theory for a lattice gas model of fluids confined in porous materi- \n\nals,” J. Chem. Phys. 128, 084701 (2008). \n\n[84] P. M. Chaikin and T. C. Lubensky, Principles of condensed matter physics, Cambridge University \n\nPress (1997). \n\n[85] J. S. Langer, “An introduction to the kinetics of first-order phase transitions,” in C. Godreche, editor, \n\n“Solids far from Equilibrium,” pages 297–363, Cambridge University Press (1992). \n\n[86] M. A. Spaid and G. M. Homsy, “Stability of Newtonian and viscoelastic dynamic contact lines,” \n\nPhys. Fluids 8, 460–478 (1996). \n\n[87] U. Thiele and E. Knobloch, “Front and back instability of a liquid film on a slightly inclined plate,” \n\nPhys. Fluids 15, 892–907 (2003). \n\n[88] M. R. E. Warner, R. V. Craster, and O. K. Matar, “Surface patterning via evaporation of ultrathin \n\nfilms containing nanoparticles,” J. Colloid Interface Sci. 267, 92–110 (2003). \n\n[89] O. K. Matar, R. V. Craster, and K. Sefiane, “Dynamic spreading of droplets containing nanoparticles,” \n\nPhys. Rev. E 76, 056315 (2007). \n\n[90] J. J. Zhou, B. Dupuy, A. L. Bertozzi, and A. E. Hosoi, “Theory for shock dynamics in particle-laden \n\nthin films,” Phys. Rev. Lett. 94, 117803 (2005). \n\n[91] B. P. Cook, A. L. Bertozzi, and A. E. Hosoi, “Shock solutions for particle-laden thin films,” SIAM J. \n\nAppl. Math. 68, 760–783 (2008). \n\n[92] R. V. Craster, O. K. Matar, and K. Sefiane, “Pinning, retraction, and terracing of evaporating droplets \n\ncontaining nanoparticles,” Langmuir (2009), online available. \n\n[93] D. Quemada, “Rheology of concentrated disperse systems and minimum energy-dissipation principle \n\nI. Viscosity-concentration relationship,” Rheol. Acta 16, 82–94 (1977). \n\n[94] D. Quemada and C. Berli, “Energy of interaction in colloids and its implications in rheological \n\nmodeling,” Adv. Colloid Interface Sci. 98, 51–85 (2002). \n\n[95] J. J. Stickel and R. L. Powell, “Fluid mechanics and rheology of dense suspensions,” Annu. Rev. \n\nFluid Mech. 37, 129–149 (2005).", - "page_start": 30, - "page_end": 30, - "source_file": "1001.2669.pdf" - }, - { - "text": "where γ is the liquid-gas surface tension and f (h) is a local free energy term that describes the \n\nwettability of the surface. Since µ corresponds to a chemical potential, the term µh may either bias \n\nthe system towards the liquid or towards the gas state. The variation of F w.r.t. h gives the pressure. \n\nIt contains the curvature (Laplace) pressure −γ∆h and the disjoining pressure Π(h) = −∂hf (h). \n\nMany different forms for the latter are in use (see, e.g., Refs. [4, 8, 63, 70–73]). \n\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanopar- \n\nticles are not taken into account. However, under certain conditions one can augment equation (1) \n\nfor the evolution of the film thickness by coupling it to an equation for the evolution of the mean \n\nparticle concentration. The resulting model is able to describe the behaviour of an evaporating so- \n\nlution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. \n\nWe should expect such a model to describe the mesoscopic dewetting front discussed above. How- \n\never, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor \n\nfilm. \n\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a dis- \n\ncrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on \n\nevaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The va- \n\nlidity of this strong assumption regarding the relevant transport processes can be confirmed from \n\nan estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The \n\nconvective mobility is proportional to h3, i.e., it is large for thick films but decreases strongly with \n\nreduced film thickness. The evaporative mobility, however, is a constant, implying that evapora- \n\ntion will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] \n\nand a small contact angle (≈ 0.01), the cross-over thickness is in the range of 1-5 nanometers. \n\nThis estimate justifies the neglect of convective transport in a description of the postcursor film \n\nand may explain why one has such good agreement between the experimentally observed patterns \n\nand the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model \n\n[35]. We introduce the KMC model below in Section III A. \n\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its po- \n\ntential applications. For instance, the thermodynamic chemical potential as well as any wetting \n\ninteraction of the solvent with the substrate are collected in a single parameter – an effective chem- \n\nical potential. This implies that any influence of a disjoining pressure is ‘smeared out’ over the \n\nwhole system and that no distinction between the short- and the long-range parts of the disjoining \n\npressure is possible. It is furthermore based on the assumption that evaporation/condensation is", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" - }, - { - "text": "√ \n− \n\nThe results for the conductivity within a spin-fermion \nmodel depend in quantitative (but not qualitative) way \non the assumption for the momentum dispersion of a col- \nlective boson. This momentum dependence comes from", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0764.pdf" - }, - { - "text": "F=mo \n\nF=$(mV) \n\n\n\nT, = Q (V,-V,) \n\nPa= T,, V, \n\nPw=Q/,(v2-v,)2 \n\n\n2VI \n7)p=- \n\nv2 +v, \n\n\n\n\n\n\n\n\n\n\n\n1.0 \n\n1.0 \n\n.9 \n\n.6 \n\n.7 \n\n.6 \n\n7p .5 \n\n.4 \n\n.3 \n\n.2 \n\n.I \n\n0 \n0 .I .2 .3 .4 .5 .6 .? .6 .9 \n\n%f2 \n\nFigure 2.5. Principles of Propulsion", - "page_start": 122, - "page_end": 122, - "source_file": "00-80T-80.pdf" - }, - { - "text": "sentence would be true or false. One of its central methodological \nassumptions is the principle of compositionality. It states that the \nmeaning of a complex expression is determined by the meanings \nof its parts and how they are combined. For example, the meaning \nof the verb phrase \"walk and sing\" depends on the meanings of the \nindividual expressions \"walk\" and \"sing\". Many theories in formal \nsemantics rely on model theory. This means that they employ set \ntheory to construct a model and then interpret the meanings of \nexpression in relation to the elements in this model. For example, \nthe term \"walk\" may be interpreted as the set of all individuals in \nthe model that share the property of walking. Early influential \ntheorists in this field were Richard Montague and Barbara Partee, \nwho focused their analysis on the English language.[173] \n\n **Epistemology of logic**\n\nConjunction (AND) is one of the \nbasic operations of Boolean logic. It \ncan be electronically implemented in \nseveral ways, for example, by using \ntwo transistors. \n\nThe epistemology of logic studies how one knows that an \nargument is valid or that a proposition is logically true.[174] This \nincludes questions like how to justify that modus ponens is a valid \nrule of inference or that contradictions are false.[175] The \ntraditionally dominant view \nlogical \nis \nunderstanding belongs to knowledge a priori.[176] In this regard, it \nis often argued that the mind has a special faculty to examine relations between pure ideas and that this \nfaculty is also responsible for apprehending logical truths.[177] A similar approach understands the rules \nof logic in terms of linguistic conventions. On this view, the laws of logic are trivial since they are true by \ndefinition: they just express the meanings of the logical vocabulary.[178] \n\nthat this form of \n\nSome theorists, like Hilary Putnam and Penelope Maddy, object to the view that logic is knowable a \npriori. They hold instead that logical truths depend on the empirical world. This is usually combined with \nthe claim that the laws of logic express universal regularities found in the structural features of the world. \nAccording to this view, they may be explored by studying general patterns of the fundamental sciences. \nFor example, it has been argued that certain insights of quantum mechanics refute the principle of \n is equivalent to \ndistributivity in classical logic, which states that the formula \n. This claim can be used as an empirical argument for the thesis that quantum logic \n\nis the correct logical system and should replace classical logic.[179] \n\n**History**\n\n\n \n \n \n \n [html]\n
DevelopmentTableVellopistTablePatientsPercentage
ControlStage222222222StateStatementMean ( SD )
TableTableTableTableControlTable
Statesand proposilstotelia,TableTableTable
SpecificationSpecificity (%)ParameterStateAge ( years )Parameters
", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2648.pdf", - "query": "What is the principle of the liquid perturbation theory (LPT) ?", - "target_page": 2, - "target_passage": "The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the differ- ence between them treated as a perturbation in the ref- erence potential", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "[81] A. J. Archer and M. Rauscher, “Dynamical density functional theory for interacting brownian parti- \n\ncles: Stochastic or deterministic?” J. Phys. A-Math. Gen. 37, 9325–9333 (2004). \n\n[82] A. J. Archer and R. Evans, “Dynamical density functional theory and its application to spinodal \n\ndecomposition,” J. Chem. Phys. 121, 4246–4254 (2004). \n\n[83] P. A. Monson, “Mean field kinetic theory for a lattice gas model of fluids confined in porous materi- \n\nals,” J. Chem. Phys. 128, 084701 (2008). \n\n[84] P. M. Chaikin and T. C. Lubensky, Principles of condensed matter physics, Cambridge University \n\nPress (1997). \n\n[85] J. S. Langer, “An introduction to the kinetics of first-order phase transitions,” in C. Godreche, editor, \n\n“Solids far from Equilibrium,” pages 297–363, Cambridge University Press (1992). \n\n[86] M. A. Spaid and G. M. Homsy, “Stability of Newtonian and viscoelastic dynamic contact lines,” \n\nPhys. Fluids 8, 460–478 (1996). \n\n[87] U. Thiele and E. Knobloch, “Front and back instability of a liquid film on a slightly inclined plate,” \n\nPhys. Fluids 15, 892–907 (2003). \n\n[88] M. R. E. Warner, R. V. Craster, and O. K. Matar, “Surface patterning via evaporation of ultrathin \n\nfilms containing nanoparticles,” J. Colloid Interface Sci. 267, 92–110 (2003). \n\n[89] O. K. Matar, R. V. Craster, and K. Sefiane, “Dynamic spreading of droplets containing nanoparticles,” \n\nPhys. Rev. E 76, 056315 (2007). \n\n[90] J. J. Zhou, B. Dupuy, A. L. Bertozzi, and A. E. Hosoi, “Theory for shock dynamics in particle-laden \n\nthin films,” Phys. Rev. Lett. 94, 117803 (2005). \n\n[91] B. P. Cook, A. L. Bertozzi, and A. E. Hosoi, “Shock solutions for particle-laden thin films,” SIAM J. \n\nAppl. Math. 68, 760–783 (2008). \n\n[92] R. V. Craster, O. K. Matar, and K. Sefiane, “Pinning, retraction, and terracing of evaporating droplets \n\ncontaining nanoparticles,” Langmuir (2009), online available. \n\n[93] D. Quemada, “Rheology of concentrated disperse systems and minimum energy-dissipation principle \n\nI. Viscosity-concentration relationship,” Rheol. Acta 16, 82–94 (1977). \n\n[94] D. Quemada and C. Berli, “Energy of interaction in colloids and its implications in rheological \n\nmodeling,” Adv. Colloid Interface Sci. 98, 51–85 (2002). \n\n[95] J. J. Stickel and R. L. Powell, “Fluid mechanics and rheology of dense suspensions,” Annu. Rev. \n\nFluid Mech. 37, 129–149 (2005).", - "page_start": 30, - "page_end": 30, - "source_file": "1001.2669.pdf" - }, - { - "text": "] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nAn alternative procedure consists in carrying out \nmolecular simulations, where both the solvent and solute \nare treated explicitly. After a rigorous averaging over \nthe solvent configurations, a coarse-grained description \nof the ions, which still includes the effect of the solvent \nstructure, can be obtained [8–11]. However, this set of \nmethods is purely numeric; they do not provide any an- \nalytical expression for thermodynamic quantities. They \nare therefore restricted to simple geometries [12, 13] (bulk \nsolutions or planar interfaces). The description of com- \nplex systems, such as porous or electrochemical materi- \nals, is still based on continuous solvent models [14]. \n\nIn this letter we present a method aimed at bridging \nthe gap between analytical and numerical approaches. It \nis based on the application of liquid perturbation theory \n(LPT) [15] to effective ion-ion potentials extracted from \n\nSubtracting \nlong-range Coulombic potential \nV LR \nij (r) (which depends on the dielectric constant of the \nsolvent) from V eff \nij (r), we obtain the short-range contri- \nbution V SR \nij (r) to the effective potentials. These are given \nin Fig. 1 (species 1 and 2 refer to Na+ and Cl− free ions, \nrespectively). All the short-range potentials exhibit os- \ncillations corresponding to the solvent layering between \nthe ions, but this effect is particularly important for the \ncation-anion interaction: a considerable potential barrier \n(& 2kBT ) separates the first two attractive wells. To \nserve as a reference, Monte Carlo (MC) simulations were \nperformed with these effective potentials; a comparison \nbetween MD and MC RDF is also provided in Fig. 1. The \nexcellent agreement between both sets of RDF validates \nthe HNC inversion procedure [17], and allows us to com- \n\nthe", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2648.pdf" - }, - { - "text": "on the model (see above). The purely two-dimensional character of the KMC was extended to \n\na ‘pseudo three-dimensional’ one by making the effective chemical potential dependent on the \n\nmean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to \n\nthe introduction of a ‘global’ thickness-dependent disjoining pressure into the evaporation term \n\nwithout an explicit consideration of a film thickness. The amended model can reproduce bimodal \n\nstructures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully three- \n\ndimensional models are also discussed in the literature [76, 77]. \n\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related \n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. \n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid, \n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to \n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the \n\nsubstrate, as all such interactions are absorbed into the effective chemical potential. \n\nHowever, using dynamical density functional theory (DDFT) [78–83] one can develop a model \n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit \n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to \n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes \n\nthe coupled dynamics of the density fields of the liquid ρl and the nanoparticles ρn. The densities \n\nρl and ρn are defined as the probabilities of finding a given lattice site on the surface to be occupied \n\nby a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond \n\nto number densities as we use the lattice spacing σ = 1 as our unit of length. \n\nTo develop the DDFT, one must first derive the underlying free energy functional F [ρl, ρn], and \n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the \n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. \n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) \n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution \n\nand contributions from the interactions between the different species (nanoparticles and liquid). \n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is \n\ncoupled to a reservoir with chemical potential µ), whereas the nanoparticles are treated in the", - "page_start": 13, - "page_end": 13, - "source_file": "1001.2669.pdf" - }, - { - "text": "[65] J. P. Burelbach, S. G. Bankoff, and S. H. Davis, “Nonlinear stability of evaporating/condensing liquid \n\nfilms,” J. Fluid Mech. 195, 463–494 (1988). \n\n[66] A. Oron and S. G. Bankoff, “Dewetting of a heated surface by an evaporating liquid film under \n\nconjoining/disjoining pressures,” J. Colloid Interface Sci. 218, 152–166 (1999). \n\n[67] L. W. Schwartz, R. V. Roy, R. R. Eley, and S. Petrash, “Dewetting patterns in a drying liquid film,” \n\nJ. Colloid Interface Sci. 214, 363–374 (2001). \n\n[68] K. Kargupta, R. Konnur, and A. Sharma, “Spontaneous dewetting and ordered patterns in evaporating \n\nthin liquid films on homogeneous and heterogeneous substrates,” Langmuir 17, 1294–1305 (2001). \n\n[69] M. Bestehorn and D. Merkt, “Regular surface patterns on Rayleigh-Taylor unstable evaporating films \n\nheated from below,” Phys. Rev. Lett. 97, 127802 (2006). \n\n[70] G. F. Teletzke, H. T. Davis, and L. E. Scriven, “Wetting hydrodynamics,” Rev. Phys. Appl. 23, 989– \n\n1007 (1988). \n\n[71] J. N. Israelachvili, Intermolecular and Surface Forces, Academic Press, London (1992). \n\n[72] V. S. Mitlin, “Dewetting of solid surface: Analogy with spinodal decomposition,” J. Colloid Interface \n\nSci. 156, 491–497 (1993). \n\n[73] L. M. Pismen and Y. Pomeau, “Disjoining potential and spreading of thin liquid layers in the diffuse \n\ninterface model coupled to hydrodynamics,” Phys. Rev. E 62, 2480–2492 (2000). \n\n[74] L. Onsager, “Crystal statistics. I. A two-dimensional model with an order-disorder transition,” Phys. \n\nRev. 65, 117–149 (1944). \n\n[75] G. Reiter, “Unstable thin polymer films: Rupture and dewetting processes,” Langmuir 9, 1344–1351 \n\n(1993). \n\n[76] C. G. Sztrum, O. Hod, and E. Rabani, “Self-assembly of nanoparticles in three-dimensions: Forma- \n\ntion of stalagmites,” J. Phys. Chem. B 109, 6741–6747 (2005). \n\n[77] G. Yosef and E. Rabani, “Self-assembly of nanoparticles into rings: A lattice-gas model,” J. Phys. \n\nChem. B 110, 20965–20972 (2006). \n\n[78] J. F. Gouyet, M. Plapp, W. Dieterich, and P. Maass, “Description of far-from-equilibrium processes \n\nby mean-field lattice gas models,” Adv. Phys. 52, 523–638 (2003). \n\n[79] U. M. B. Marconi and P. Tarazona, “Dynamic density functional theory of fluids,” J. Chem. Phys. \n\n110, 8032–8044 (1999). \n\n[80] U. M. B. Marconi and P. Tarazona, “Dynamic density functional theory of fluids,” J. Phys.-Condes.", - "page_start": 29, - "page_end": 29, - "source_file": "1001.2669.pdf" - }, - { - "text": "FIG. 4: (Colour online) Density profiles for the situation where the substrate is covered by nanoparticles \n\nwith average density ρav \n\nn = 0.3. The top row are the nanoparticle density profiles and the bottom row are \nl σ2. \nthe corresponding liquid density profiles at the times t/tl = 8 (left) and 80 (right), where tl = 1/kT M nc \n\nThe parameters are kT /εll = 0.8, εnl/εll = 0.6, εnn = 0, α = 0.4M nc \nl σ4, M c l = 0, ρl(t = 0) = 0.9 ± ξ \n\n(where ξ represents white noise of amplitude 0.05) and (µ − µcoex)/kT = −0.88, where the liquid exhibits \n\nspinodal decomposition-evaporation. \n\nalso diffuse over the substrate (conserved dynamics). The conserved part is treated along the lines \n\ndeveloped above for the nanoparticles. For the non-conserved part we assume a standard form \n\n[85], i.e., the change in time of ρl is proportional to −(µsurf(r, t) − µ) = −δF [ρn, ρl]/δρl(r) \n\nwhere µsurf(r, t) is the local chemical potential of the liquid at the point r on the surface at time t. \n\nThis gives the evolution equation for the liquid density \n(cid:21) (cid:20) \n\n∂ρl \n∂t \nδF [ρn, ρl] \nδρl δF [ρn, ρl] \nδρl \nM c − M nc = ∇ · \nl ρl∇ \n, \nl \n\nwhere we assume that the coefficients M c \nl and M nc \nl \nare constants. \n\n16", - "page_start": 15, - "page_end": 15, - "source_file": "1001.2669.pdf" - }, - { - "text": "the dominant dynamic process, but does not allow one to probe this assumption. In Section III B \n\nwe show how one may develop a dynamical density functional theory (DDFT) that describes the \n\nsystem at a similar level to the KMC. However, the DDFT may also be easily extended to include \n\nother effects such as fluid diffusion, that the KMC does not incorporate. \n\nThe kinetic Monte Carlo model for two-dimensional dewetting nanofluids [33] was first proposed \n\nin Ref. [35] and extended to include next-nearest neighbour interactions in [37]. The two key \n\nassumptions used are: (i) the relevant processes can be mapped on to a two-dimensional lattice \n\ngas model, thereby neglecting continuous changes in the thickness of the evaporating film, and (ii) \n\nall relevant dynamics results from diffusing nanoparticles and evaporating/condensing solvent. \n\nThe model builds on an Ising-type model for the liquid-gas phase transition. The surface is divided \n\nup into a regular array of lattice sites whose size is dictated by the nanoparticles. One then con- \n\nsiders each lattice site to be occupied either by a nanoparticle, liquid or vapour. This effectively \n\nmaps the system onto a two-dimensional two-component lattice gas having two fields n and l. The \n\nresulting three possible states of a cell are: liquid (l = 1, n = 0), nanoparticle (l = 0, n = 1), \n\nand vapour (l = 0, n = 0, i.e., cell empty). The energy of an overall configuration is given by the \n\n(cid:88) (cid:88) \nE = − \nlilj − µ li \n\ni \n\nwhere (cid:80) \n\n denotes a sum over nearest neighbour pairs and εll, εnn and εnl are the liquid-liquid, \nparticle-particle and liquid-particle interaction energies, respectively. Fixing the three interaction \n\nstrength parameters εll, εnn, εnl and the effective chemical potential µ determines the equilibrium \n\nstate of the system. We choose εll as unit of energy – i.e. we set εll = 1. \n\nThe hamiltonian determines the equilibrium state and the energy landscape of the system. How- \n\never, as the system ‘dries in’ during the course of the solvent evaporation, the final nanoparticle \n\nconfigurations do not necessarily represent equilibrium structures. This implies that the system \n\ndynamics is of paramount importance. It is determined by the possible Monte Carlo moves, their \n\nrelative frequencies, and the probabilities for their acceptance. Two types of moves are allowed: (i) \n\nevaporation/condensation of liquid and (ii) diffusion of nanoparticles within the liquid. A mobility \n\nM corresponds to the ratio of cycles of particle and solvent moves and reflects the physical ratio of", - "page_start": 8, - "page_end": 8, - "source_file": "1001.2669.pdf" - }, - { - "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion \n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid- \n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ- \n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport \n\nregime where the instability is almost completely independent of the interaction strengths and \n\na demixing regime where particles and liquid demix at the receding front thereby increasing its \n\ntransverse instability. \n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of \n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional \n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo- \n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by \n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend \n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between \n\nshort- and long-range interactions of solvent and/or solute with the substrate. We have, however, \n\nrestricted the examples given here to situations that can also be described using the KMC model. \n\nA further exploration will be presented elsewhere. \n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It \n\nresults from a long-wave approximation and consists of coupled evolution equations for the film \n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning \n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee- \n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the \n\ncombined effects of convection and evaporation. \n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques \n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica- \n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly \n\ntowards increasingly complex systems. For example, there have been investigations of the influ- \n\nence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal \n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap- \n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of \n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102], \n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding \n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "F=mo \n\nF=$(mV) \n\n\n\nT, = Q (V,-V,) \n\nPa= T,, V, \n\nPw=Q/,(v2-v,)2 \n\n\n2VI \n7)p=- \n\nv2 +v, \n\n\n\n\n\n\n\n\n\n\n\n1.0 \n\n1.0 \n\n.9 \n\n.6 \n\n.7 \n\n.6 \n\n7p .5 \n\n.4 \n\n.3 \n\n.2 \n\n.I \n\n0 \n0 .I .2 .3 .4 .5 .6 .? .6 .9 \n\n%f2 \n\nFigure 2.5. Principles of Propulsion", - "page_start": 122, - "page_end": 122, - "source_file": "00-80T-80.pdf" - }, - { - "text": "fast evaporation [104, 105]. These complex experimental systems all represent systems of high \n\npractical interest that the theories presented here are not (yet) able to describe. Such experiments \n\ndo, however, provide a strong motivation for further work to extend the theories presented here, as \n\nwell as to develop new approaches. \n\nLet us finally mention that several topics were entirely excluded from our discussion here. First, we \n\nfocused on a limited range of descriptions and did, for instance, not mention lattice Boltzmann, \n\nmolecular dynamics or dissipative particle dynamics approaches that may also be employed to \n\ndescribe fluid suspensions [106–109]. Second, we have only discussed spatially homogeneous \n\nsubstrates. Patterned substrates are widely used in dewetting experiments [38, 110–112]. Theoret- \n\nical descriptions are well developed for the dewetting of films of pure non-volatile liquids on such \n\nsubstrates [68, 113–119]. However, in the case of volatile liquids on heterogeneous substrates, \n\nmuch less work has been done. A third topic that we did not touch upon are possible continuum \n\nthin film approaches to demixing dewetting suspensions. We believe it is feasible to extend the \n\ndiffuse interface theories such as model-H [120] to include the influence of evaporation in dewet- \n\nting nanoparticle suspensions. For instance, such models have already been adapted to describe \n\ndemixing free surface films of polymer blends [121–123]. \n\nAJA and MJR gratefully acknowledge RCUK and EPSRC, respectively, for financial support. We \n\nacknowledge support by the European Union via the FP6 and FP7 Marie Curie schemes [Grants \n\nMRTN-CT-2004005728 (PATTERNS) and PITN-GA-2008-214919 (MULTIFLOW)]. \n\n[1] G. Reiter, “Dewetting of thin polymer films,” Phys. Rev. Lett. 68, 75–78 (1992). \n\n[2] G. Reiter, “Mobility of polymers in films thinner than their unperturbed size,” Europhys. Lett. 23, \n\n579–584 (1993). \n\n[3] A. Sharma and G. Reiter, “Instability of thin polymer films on coated substrates: Rupture, dewetting \n\nand drop formation,” J. Colloid Interface Sci. 178, 383–399 (1996). \n\n[4] P.-G. de Gennes, “Wetting: Statics and dynamics,” Rev. Mod. Phys. 57, 827–863 (1985).", - "page_start": 24, - "page_end": 24, - "source_file": "1001.2669.pdf" - }, - { - "text": "4 \n\nof the BIMSA3 appears to be negligible compared to the \n1. The \nreference term for concentrations less than 1 mol l− \nperturbation can then be omitted to obtain a fully ana- \nlytical theory, determined by the hard sphere diameters \nand the pair fraction given by LPT; with the free energy \nand the RDF given in terms of the BIMSA and MSA so- \nlutions, as described above. While the procedure we have \nfollowed uses two different approximations for the refer- \nence and perturbation terms (MSA vs BIMSA), these are \nknown to be accurate for the systems under consideration \nand do not appear to be inconsistent with each other. \n\nTo conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . \n\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13, [12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99, 226104 \n276 (1945). (2007). \n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical \nChemistry of Electrolyte Solutions (Springer, 1998). \n[3] L. Blum, in Theoretical Chemistry: Advances and Per- \nspectives, edited by H. Eyring and D. Henderson (Aca- \ndemic Press, 1980), vol. 5, pp. 1–66. \n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev. \nLett. 100, 258105 (2008). \n\n[14] S. Van Damme et al., J. Phys. Chem. B 113, 3105 (2009). \n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq- \n\nuids (Academic Press, 1986). \n\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79, 569 (1995). \n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109, 9873 (2005). \n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106, 1259 \n\n[16] J. C. Rasaiah and R. M. Lynden-Bell, Philos. Trans. R. \nSoc. London, Ser. A 359, 1545 (2001). \n[17] A. P. Lyubartsev and S. Marcelja, Phys. Rev. E 65, \n(2006). 041202 (2002). \n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin. \nColloid Interface Sci. 9, 1 (2004). \n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett. \n96, 147801 (2006). \n\n[18] V. M. M. Lobo, Electrolyte Solutions, Data on Thermo- \ndynamic and Transport Properties, vol. I-II (Coimbra Ed- \nitora, Lisbon, Portugal, 1984). \n[19] G. Ciccotti, P. Turq, and F. Lantelme, Chem. Phys. 88, \n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130, 134507 333 (1984). \n(2009). [20] J.-F. Dufrˆeche, T. O. White, and J.-P. Hansen, Mol. \n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110, Phys. 101, 1741 (2003). \n10878 (2006) [21] The average contact distance between a symmetric \n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52, dumbbell and an infinite plane at β = 0. \n3730 (1995).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2648.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HIG_2001.pdf", - "query": "By how much did the Hartford group's link to AARP website account concerning buisness made over the internet ?", - "target_page": 16, - "target_passage": "In 2001 the company’s link to AARP’s Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "most dynamic sources of business growth. In 2001 the \n\ncompany’s link to AARP’s Web site accounted for much \n\nof the $55 million worth of auto business The Hartford \n\ngenerated over the Internet. \n\nBecause The Hartford quotes and issues this busi- \n\nness online (and added online billing in 2001), acquisi- \n\ntion and processing costs are 15 to 20 percent lower \n\nthan those of traditional direct-marketing or face-to- \n\nface sales. Because of this and other factors, the \n\nexpense ratio for AARP business is 30 percent below \n\nthat of the industry in general. And the customer \n\nrenewal rate is 96 percent, versus the industry’s 88 per- \n\n\n \n \n \n \n [html]profitable auto business The Hartford writes.\n
The relationship also has The Hartford thinkingahead toward new business and an even stronger rela -tionship with AARP members. The Hartford can cross -
\n\nmarket auto insurance to homeowner’s customers and \n\nhomeowner’s insurance to auto customers, which \n\npresents a tremendous growth opportunity. In addition, \n\nThe Hartford is committed to providing value to AARP \n\nmembers in many ways. An example: The Hartford and \n\nAARP work with the MIT Age Lab to produce informa- \n\ntion—available in print and on both partners’ Web \n\nsites—advising AARP members about Alzheimer’s dis- \n\nease and other forms of dementia as they affect driving \n\nability. The information guides caregivers struggling \n\nwith difficult decisions about family members’ safety \n\nbehind the wheel. The resource—a customer solution \n\nlike no other—helps enhance the superior value The \n\nHartford provides to AARP members. \n\nAlthough it’s the most comprehensive, the AARP \n\nrelationship isn’t The Hartford’s only affinity program. \n\nThe company also has affinity arrangements with \n\nUSAA and other companies. Regardless of the pro- \n\ngram’s size, the affinity partners share the right quali- \n\nties: strong name-brand recognition, first-class \n\nmarketing and a broad and loyal customer base. \n\nIn other words, they share some of The Hartford’s \n\ncore attributes.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "partners \n\n\n\n**“P**artnering” is a popular business buzzword that may \n\nvanish as quickly as it appeared. The Hartford’s partner- \n\nships, on the other hand, are built for the long term and \n\nhave played a major role in the company’s growth and \n\nsuccess. \n\nThe company enjoys outstanding partnerships \n\nwith several of the world’s top asset managers. It also \n\nvalues its thousands of relationships with financial \n\nintermediaries such as large broker-dealers, banks and \n\nindependent financial planners—and with affinity part- \n\nners who extend The Hartford’s reach into large, grow- \n\ning markets. \n\n“A lot of people talk about having the right part- \n\nners, but The Hartford views it differently from most,” \n\nsays Gary Trippe, CEO of Fort Myers, Fla., property- \n\ncasualty agency Oswald, Trippe and Company, Inc. \n\n“They look for partners who share their core values, \n\nand the relationship is based on trust and respect. It’s \n\nall about compatibility.” Trippe should know. His \n\nagency writes three times as much business with \n\nThe Hartford, in both personal and commercial lines, as \n\nit writes with any other insurer. \n\nMutually beneficial partnerships with successful \n\nbusinesses of all sizes are the foundation of The \n\nHartford’s business model. \n\nPerhaps no relationship represents shared values \n\nand shared success better than the one with AARP, \n\nwhich signed a new eight-year contract with The \n\nHartford that began Jan. 1, 2002. The AARP insurance \n\nprogram with The Hartford is a model of affinity mar- \n\nketing and distribution savvy. AARP’s membership— \n\nthose age 50 and over—is the fastest-growing segment \n\nof the U.S. population. Computer use among this group \n\nis growing by an estimated 20 percent per year, and the \n\npopulation segment respects established brands and \n\nseeks value, convenience and extraordinary service. \n\nThat right combination of factors helps make \n\nAARP’s World Wide Web site one of The Hartford’s \n\n13", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "\n \n \n \n \n [html]200120001999$15.147$$13.528Assets under management$\n
( in millions except for per share data )
Net income [ 1 ]$507$974$862
Operating income [ 1 ][ 2 ]$724$962$837
Revenues [ 3 ]
14.703
98.047$182.964$ 173.425Diluted Earnings Per Share :Net income [ 1 ]$
2.10$4.34S3.79Operating income [ 1 ]$
\n\n[1] 2001 includes $440 of losses ($1.85 per basic and $1.82 per diluted share) related to the September 11 \nterrorist attack (“September 11”) and a $130 tax benefit ($0.55 per basic and $0.54 per diluted share) at \nHartford Life, Inc. (“HLI”). \n\n[2] Operating income represents after-tax operational results excluding, as applicable, net realized capital gains or \nlosses, extraordinary items, the cumulative effect of accounting changes and certain other items. \n\n[3] 2001 includes a $91 reduction in premiums from reinsurance cessions related to September 11. \n\n**Net Income** **Operating Income** **Revenues**\n\nin millions in millions in billions \n\n$1,000 $15 $1,200 \n\n800 12 960 \n\n600 9 720 \n\n400 6 480 \n\n200 3 240 \n\n2001 2000 1999 2001 2000 1999 2001 2000 1999 \n\nOperating income excluding \nSeptember 11 and HLI \ntax benefit Net income excluding \nSeptember 11 and HLI \ntax benefit", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. \n\n**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 \n\n\n \n \n \n \n [html]Common Stock Price20012000\n
Dividends
HighLowDeclared
First quarter$ 67.75$ 55.15$ 0.25
Second quarter70.4656.880.25
Third quarter69.2850.100.25
Fourth quarter62.8353.910.26
First quarter$ 52.75$ 29.38$ 0.24
Second quarter64.0044.250.24
Third quarter73.7556.380.24
Fourth quarter79.3165.440.25
\n\nTo send certificates for transfer and address changes: \n\nThe Bank of New York \nReceive and Deliver Department–11W \nP.O. Box 11002 \nChurch Street Station \nNew York, NY 10286 \n\nAddress inquiries about The Hartford’s Dividend \nReinvestment and Cash Payment Plan to: \n\nThe Bank of New York \nDividend Reinvestment Department \nP.O. Box 1958 \nNewark, NJ 07101-9774 \n\nE-mail: shareowner-svcs@bankofny.com \n\nInternet address: www.stockbny.com", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "technology \n\nIn short, the portal allows The Hartford to bring \n\nproducts and functions from a variety of sources into \n\none convenient online environment. \n\nHartford Investor has two strategic objectives: \n\nOne, deepen current intermediaries’ loyalty to The \n\nHartford by extending The Hartford Experience right to \n\ntheir desktops. Two, expand the network of intermedi- \n\naries by giving them the technological support they \n\nneed to grow their businesses. \n\nMore than 153,000 licensed intermediaries—from \n\nsolo advisors to members of large financial institu- \n\ntions—are appointed to sell The Hartford’s products. \n\nYet fewer than 60,000 actively write business for the \n\ncompany. The untapped potential is vast, especially \n\namong independents, the fastest-growing distribution \n\nchannel and the only one in which The Hartford doesn’t \n\nhold the largest market share. \n\nThat’s bound to change. With Hartford Investor \n\navailable on their desktops, intermediaries will have far \n\n**N**ew technology tools made The Hartford Experience— \n\ncustomer solutions, ease of doing business and \n\nextraordinary service—more real than ever for our cus- \n\ntomers in 2001. \n\nIt was a year that saw the debut of life operations’ \n\nHartford Investor Web portal, expanded Web portals for \n\ngroup benefits administrators, and enhancements to \n\ntechnology for The Hartford’s property-casualty agents \n\nand customers. \n\nHartford Investor is both a versatile personal \n\nassistant and an aid in wholesaling, especially for the \n\nindependent financial planner channel. Broker-dealers \n\nand financial advisors can use it to research The \n\nHartford’s full complement of individual life and invest- \n\nment products, update their books of business in \n\nseconds, track daily fund performance, run financial- \n\nplanning models, receive online product training, \n\nproduce customized presentations and even submit \n\nbusiness electronically.", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "All this translates into increased shareholder value. Since 1995, our market cap has \n\nincreased from $5.7 billion to $15.4 billion—an 18 percent compound annual growth rate. \n\nOur share price has increased nearly 160 percent since The Hartford became a public com- \n\npany. During the same period, the S&P 500 increased 89 percent, and the Dow Jones \n\nIndustrial Average 97 percent. \n\nIt’s no surprise that our management team is highly regarded within the financial \n\nservices industry and on Wall Street. We’ve built a strong leadership team, complemented \n\nby more than 27,000 dedicated employees who are nurtured and energized by a culture of \n\nsuccess. Consequently, we had a smooth leadership transition over the past year. Tom Marra \n\nsucceeded Lon Smith as president of our life operations and joined our board of directors. \n\nLon retired after a 33-year career with The Hartford, and we owe him a tremendous amount \n\nof gratitude for building a strong and successful operation. \n\nDuring 2001 we also welcomed two new members to our board of directors. Edward J. \n\nKelly III, president and CEO of Mercantile Bankshares Corp., joined us in May, and we welcomed \n\nCharles B. Strauss, president and CEO of Unilever United States, Inc., in November. \n\nWe’re well-positioned for growth in 2002. On Jan. 1 we renewed our relationship with \n\nAARP by signing a new eight-year contract to market auto and homeowner’s insurance to \n\nits 35 million members. Our small-business property-casualty operation continues to \n\ngrow—premiums surpassed $1.2 billion in annual sales in 2001. \n\nWe’re also in a leading position to take advantage of demographic shifts and to provide \n\nestate planning and investment and insurance products to baby boomers. We are very excited, \n\ntoo, about our new SMART 529™ college savings program, which offers flexible features and \n\nnumerous tax advantages. And the growing small-business market segment is a key target for \n\nour 401(k) and group-benefits businesses. In fact, with $2 billion in fully insured premiums and \n\n$106 million in net income, the Group Benefits Division (GBD) had its best year ever. \n\nAs our markets continue to grow and evolve, we stay intensely focused on the key \n\nstrategies in all our businesses. \n\n**Soon after the Sept. 11 attack,**\n**The Hartford Chairman, President**\n**and CEO Ramani Ayer, left fore-**\n**ground, joined other industry**\n**CEOs in meeting with President**\n**Bush at the White House. During**\n**the meeting, the executives**\n**assured the president of industry**\n**support as the nation recovers.**", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "insurance was high during the 1990s as the number of \n\nU.S. public corporations tripled. Amid the past year’s \n\ncorporate retrenchment, loss activity led to industry- \n\nwide premium price increases of up to 30 percent. A \n\nflight to quality was inevitable under such conditions, \n\nand a strong brand and superior ratings helped HFP dis- \n\ntance itself from lesser competitors. Even the horrific \n\ncollapse of its World Trade Center headquarters couldn’t \n\nhold HFP back in 2001. It renewed $43 million worth of \n\nbusiness in September alone, fulfilling its commitment \n\nto protecting customers against uncertainty. \n\nstreamlined product-development process maximizes \n\nspeed-to-market so agents have the right products to \n\nsell at the right time. That’s one reason why we esti- \n\nmate The Hartford’s small-business insurance growth \n\nis five to six times the industry average. \n\nDeveloping products for a changing business \n\nenvironment is also a proven skill of HFP. The unit com- \n\npleted its first full year as part of The Hartford after our \n\n2000 acquisition of Reliance Group Holdings, Inc.’s \n\nfinancial products and excess and surplus lines. \n\nIt was quite a year after quite a decade. Demand \n\nfor HFP’s mainstay directors and officers liability \n\n\n\n(cid:4) A**strong brand and superior**\n**ratings help Hartford Financial**\n\n**works with HFP Underwriting**\n**Manager David Garrison, far**\n**right, and financial professionals** **Products (HFP) differentiate its**\n**such as William Gallagher** **directors and officers liability**\n**Associates President and CEO** **insurance from those of competi-**\n**Philip Edmundson, second from** **tors. HFP’s Boston Regional**\n**left, and Principal Richard Leavitt.** **Manager Doreen Lukowski-Rizza**\n\n(cid:5) H**artford Investment Management**\n**Co., which specializes in fixed-**\n**income asset management, has**\n**nearly $75 billion under manage-**\n**ment. Marcie Hayden, money**\n**market trader, and Peter Perrotti,**\n**government portfolio manager, are**\n**two members of a professional**\n**organization whose annual trading**\n**volume exceeds $50 billion.**", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
wald, Trippe andyear contract, beginning Jan. 1,
Fort Myers, Fla.,2002, to continue its highly suc -
Ford ’ s largest sellerscessful relationship with AARP.
ner commercialProperty & Casualty Operations
d van der Merwe,President and CEO Dave Zwiener,
ctronics manufactur -second from left, works closely
c., depends on himwith, left to right, Bill Farris,
nseI, as well as prod -director, financial products, AARP
Saftronics ’ basiness.Services, Inc.; Leisha Spaolding, mssureae finsecisi neutral neutral ABP
\n\n**CEO, AARP Services, Inc.**\n\n\n\nthe", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "\n \n \n \n \n [html]Years ended December 31Subscriber counts results ( 000s ) 3Additional Wireless metrics 3RatiosEmployee - related information\n
20132012% Chg
Wireless subscribers9.5039.4371
Television subscribers2.1272.214( 4 )
Internet subscribers1.9611.8645
Phone subscribers1.1531.0747
Wireless blended ARPU$ 59.58$ 59.79
Wireless churn1.24 %1.29 %
Dividend payout ratio 354 %48 %
Dividends as a percentage of pre - tax free cash flow 144 %40 %
Return on assets 37.1 %8.6 %
Adjusted net debt / adjusted operating profit 1.32.42.3
Total active employees28.02626.8015
", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "507 )( 73 )7Total assets :2003$ 141.658$33$ 10.340$ 6.721$2002112.76559.55410.9616.2551872001114.28056.09011.4805.373", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HIG_2001.pdf", - "query": "How many licensed intermediaries did Hartford group have in 2001 ?", - "target_page": 23, - "target_passage": "More than 153,000 licensed intermediaries", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "technology \n\nIn short, the portal allows The Hartford to bring \n\nproducts and functions from a variety of sources into \n\none convenient online environment. \n\nHartford Investor has two strategic objectives: \n\nOne, deepen current intermediaries’ loyalty to The \n\nHartford by extending The Hartford Experience right to \n\ntheir desktops. Two, expand the network of intermedi- \n\naries by giving them the technological support they \n\nneed to grow their businesses. \n\nMore than 153,000 licensed intermediaries—from \n\nsolo advisors to members of large financial institu- \n\ntions—are appointed to sell The Hartford’s products. \n\nYet fewer than 60,000 actively write business for the \n\ncompany. The untapped potential is vast, especially \n\namong independents, the fastest-growing distribution \n\nchannel and the only one in which The Hartford doesn’t \n\nhold the largest market share. \n\nThat’s bound to change. With Hartford Investor \n\navailable on their desktops, intermediaries will have far \n\n**N**ew technology tools made The Hartford Experience— \n\ncustomer solutions, ease of doing business and \n\nextraordinary service—more real than ever for our cus- \n\ntomers in 2001. \n\nIt was a year that saw the debut of life operations’ \n\nHartford Investor Web portal, expanded Web portals for \n\ngroup benefits administrators, and enhancements to \n\ntechnology for The Hartford’s property-casualty agents \n\nand customers. \n\nHartford Investor is both a versatile personal \n\nassistant and an aid in wholesaling, especially for the \n\nindependent financial planner channel. Broker-dealers \n\nand financial advisors can use it to research The \n\nHartford’s full complement of individual life and invest- \n\nment products, update their books of business in \n\nseconds, track daily fund performance, run financial- \n\nplanning models, receive online product training, \n\nproduce customized presentations and even submit \n\nbusiness electronically.", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Intermediary Service Award and the first-ever Life \n\nInsurance Service Award. The triple win reflected the \n\noverall excellence of The Hartford’s service, a natural \n\ncomplement to the company’s quality products. DAL- \n\nBAR also recognized The Hartford’s mutual funds as the \n\nindustry leader in several categories, including invest- \n\nment management. \n\nIn managing its product portfolio, The Hartford fol- \n\nlows its own advice: think ahead and diversify. The com- \n\npany’s earnings base derives from a variety of \n\nbusinesses. Diversification is a key element in managing \n\nrisk and ensuring profitability—a time-tested philosophy \n\nthat held especially true in 2001, as the company’s other \n\nbusinesses evolved to anticipate changing market \n\ndemands and to offer protection from new risks. \n\n\n \n \n \n \n [html]\n
The property - casualty Business Insurance group, for example, extended its coverage to inslude commonrisks associated with e - commerce. Hartford Financial
Products ’ ( HFP ) coverage continued to meet emergingrisks in an extremely volatile business environment.
\n\nThe Hartford helped customers manage risk by \n\ndeveloping a new category of commercial coverage \n\ncalled CyberFlex.TM This targets the previously unmet \n\nneeds of small and mid-sized businesses that are inte- \n\ngrating the Internet and other communications tools \n\ninto their regular operations. \n\nA 2001 survey by The Hartford revealed that 80 \n\npercent of small and mid-sized businesses weren’t sure \n\nif their current insurance policies covered specific—and \n\nincreasingly common—risks such as e-mail viruses, \n\nWeb site business interruption and online copyright \n\ninfringement. CyberFlex coverage protects middle-mar- \n\nket and small-business policyholders against the risk of \n\nthose potentially debilitating conditions. \n\nCyberFlex is part of a broad array of industry- \n\nspecific coverages in The Hartford’s SPECTRUM ® busi- \n\nness-owner’s policy, including protection against \n\nemployment practices liability, equipment breakdown \n\nand business interruption. As the economic environ- \n\nment changes rapidly, The Hartford thinks ahead by \n\nproviding those flexible coverages. And the company’s", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "insurance was high during the 1990s as the number of \n\nU.S. public corporations tripled. Amid the past year’s \n\ncorporate retrenchment, loss activity led to industry- \n\nwide premium price increases of up to 30 percent. A \n\nflight to quality was inevitable under such conditions, \n\nand a strong brand and superior ratings helped HFP dis- \n\ntance itself from lesser competitors. Even the horrific \n\ncollapse of its World Trade Center headquarters couldn’t \n\nhold HFP back in 2001. It renewed $43 million worth of \n\nbusiness in September alone, fulfilling its commitment \n\nto protecting customers against uncertainty. \n\nstreamlined product-development process maximizes \n\nspeed-to-market so agents have the right products to \n\nsell at the right time. That’s one reason why we esti- \n\nmate The Hartford’s small-business insurance growth \n\nis five to six times the industry average. \n\nDeveloping products for a changing business \n\nenvironment is also a proven skill of HFP. The unit com- \n\npleted its first full year as part of The Hartford after our \n\n2000 acquisition of Reliance Group Holdings, Inc.’s \n\nfinancial products and excess and surplus lines. \n\nIt was quite a year after quite a decade. Demand \n\nfor HFP’s mainstay directors and officers liability \n\n\n\n(cid:4) A**strong brand and superior**\n**ratings help Hartford Financial**\n\n**works with HFP Underwriting**\n**Manager David Garrison, far**\n**right, and financial professionals** **Products (HFP) differentiate its**\n**such as William Gallagher** **directors and officers liability**\n**Associates President and CEO** **insurance from those of competi-**\n**Philip Edmundson, second from** **tors. HFP’s Boston Regional**\n**left, and Principal Richard Leavitt.** **Manager Doreen Lukowski-Rizza**\n\n(cid:5) H**artford Investment Management**\n**Co., which specializes in fixed-**\n**income asset management, has**\n**nearly $75 billion under manage-**\n**ment. Marcie Hayden, money**\n**market trader, and Peter Perrotti,**\n**government portfolio manager, are**\n**two members of a professional**\n**organization whose annual trading**\n**volume exceeds $50 billion.**", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "\n \n \n \n \n [html]200120001999$15.147$$13.528Assets under management$\n
( in millions except for per share data )
Net income [ 1 ]$507$974$862
Operating income [ 1 ][ 2 ]$724$962$837
Revenues [ 3 ]
14.703
98.047$182.964$ 173.425Diluted Earnings Per Share :Net income [ 1 ]$
2.10$4.34S3.79Operating income [ 1 ]$
\n\n[1] 2001 includes $440 of losses ($1.85 per basic and $1.82 per diluted share) related to the September 11 \nterrorist attack (“September 11”) and a $130 tax benefit ($0.55 per basic and $0.54 per diluted share) at \nHartford Life, Inc. (“HLI”). \n\n[2] Operating income represents after-tax operational results excluding, as applicable, net realized capital gains or \nlosses, extraordinary items, the cumulative effect of accounting changes and certain other items. \n\n[3] 2001 includes a $91 reduction in premiums from reinsurance cessions related to September 11. \n\n**Net Income** **Operating Income** **Revenues**\n\nin millions in millions in billions \n\n$1,000 $15 $1,200 \n\n800 12 960 \n\n600 9 720 \n\n400 6 480 \n\n200 3 240 \n\n2001 2000 1999 2001 2000 1999 2001 2000 1999 \n\nOperating income excluding \nSeptember 11 and HLI \ntax benefit Net income excluding \nSeptember 11 and HLI \ntax benefit", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "(cid:5) T**he Hartford’s acquisition of Fortis**\n**Financial Group in 2001 enhanced**\n**the company’s market share and**\n**distribution advantage. Most impor-**\n**tantly, the acquisition brought into**\n**The Hartford’s family powerful sales**\n**professionals like Allen Chinoy of**\n**Darien, Ill., left, the nation’s fifth-**\n**leading producer of The Hartford’s**\n**variable universal life insurance.**\n**Chinoy is a vocal supporter of**\n**Hartford Investor, which makes it**\n**easier for him to show customers**\n**such as Dr. Dilip Patel how his**\n**portfolio is performing.**\n\n(cid:3) J**oe Smith, right, and Kim Connolly,**\n**left, are a brother-sister team**\n**heading Smith Brothers Insurance,**\n\n**Inc. of Glastonbury, Conn. These**\n**VIP agents are enthusiastic users**\n**of The Hartford’s Electronic**\n**Business Center (EBC) and other**\n**technological tools for property-**\n**casualty agents. They piloted**\n**the EBC and have given valuable**\n**feedback to Senior Commercial**\n**Underwriter Tracey Kamenash**\n**and others at The Hartford to help**\n**develop the EBC standards and**\n**navigational model.**", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "partners \n\n\n\n**“P**artnering” is a popular business buzzword that may \n\nvanish as quickly as it appeared. The Hartford’s partner- \n\nships, on the other hand, are built for the long term and \n\nhave played a major role in the company’s growth and \n\nsuccess. \n\nThe company enjoys outstanding partnerships \n\nwith several of the world’s top asset managers. It also \n\nvalues its thousands of relationships with financial \n\nintermediaries such as large broker-dealers, banks and \n\nindependent financial planners—and with affinity part- \n\nners who extend The Hartford’s reach into large, grow- \n\ning markets. \n\n“A lot of people talk about having the right part- \n\nners, but The Hartford views it differently from most,” \n\nsays Gary Trippe, CEO of Fort Myers, Fla., property- \n\ncasualty agency Oswald, Trippe and Company, Inc. \n\n“They look for partners who share their core values, \n\nand the relationship is based on trust and respect. It’s \n\nall about compatibility.” Trippe should know. His \n\nagency writes three times as much business with \n\nThe Hartford, in both personal and commercial lines, as \n\nit writes with any other insurer. \n\nMutually beneficial partnerships with successful \n\nbusinesses of all sizes are the foundation of The \n\nHartford’s business model. \n\nPerhaps no relationship represents shared values \n\nand shared success better than the one with AARP, \n\nwhich signed a new eight-year contract with The \n\nHartford that began Jan. 1, 2002. The AARP insurance \n\nprogram with The Hartford is a model of affinity mar- \n\nketing and distribution savvy. AARP’s membership— \n\nthose age 50 and over—is the fastest-growing segment \n\nof the U.S. population. Computer use among this group \n\nis growing by an estimated 20 percent per year, and the \n\npopulation segment respects established brands and \n\nseeks value, convenience and extraordinary service. \n\nThat right combination of factors helps make \n\nAARP’s World Wide Web site one of The Hartford’s \n\n13", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "All this translates into increased shareholder value. Since 1995, our market cap has \n\nincreased from $5.7 billion to $15.4 billion—an 18 percent compound annual growth rate. \n\nOur share price has increased nearly 160 percent since The Hartford became a public com- \n\npany. During the same period, the S&P 500 increased 89 percent, and the Dow Jones \n\nIndustrial Average 97 percent. \n\nIt’s no surprise that our management team is highly regarded within the financial \n\nservices industry and on Wall Street. We’ve built a strong leadership team, complemented \n\nby more than 27,000 dedicated employees who are nurtured and energized by a culture of \n\nsuccess. Consequently, we had a smooth leadership transition over the past year. Tom Marra \n\nsucceeded Lon Smith as president of our life operations and joined our board of directors. \n\nLon retired after a 33-year career with The Hartford, and we owe him a tremendous amount \n\nof gratitude for building a strong and successful operation. \n\nDuring 2001 we also welcomed two new members to our board of directors. Edward J. \n\nKelly III, president and CEO of Mercantile Bankshares Corp., joined us in May, and we welcomed \n\nCharles B. Strauss, president and CEO of Unilever United States, Inc., in November. \n\nWe’re well-positioned for growth in 2002. On Jan. 1 we renewed our relationship with \n\nAARP by signing a new eight-year contract to market auto and homeowner’s insurance to \n\nits 35 million members. Our small-business property-casualty operation continues to \n\ngrow—premiums surpassed $1.2 billion in annual sales in 2001. \n\nWe’re also in a leading position to take advantage of demographic shifts and to provide \n\nestate planning and investment and insurance products to baby boomers. We are very excited, \n\ntoo, about our new SMART 529™ college savings program, which offers flexible features and \n\nnumerous tax advantages. And the growing small-business market segment is a key target for \n\nour 401(k) and group-benefits businesses. In fact, with $2 billion in fully insured premiums and \n\n$106 million in net income, the Group Benefits Division (GBD) had its best year ever. \n\nAs our markets continue to grow and evolve, we stay intensely focused on the key \n\nstrategies in all our businesses. \n\n**Soon after the Sept. 11 attack,**\n**The Hartford Chairman, President**\n**and CEO Ramani Ayer, left fore-**\n**ground, joined other industry**\n**CEOs in meeting with President**\n**Bush at the White House. During**\n**the meeting, the executives**\n**assured the president of industry**\n**support as the nation recovers.**", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**The Hartford Chairman, President and CEO Ramani Ayer speaking at the opening of New York employees’ new**\n**permanent offices in early November. Despite the destruction of their offices at 7 World Trade Center on Sept. 11,**\n**The Hartford’s New York employees had their businesses back in operation by Sept. 17. Employees moved into their**\n**new permanent offices less than 60 days after the attack.**\n\nour proven approach to asset management despite the stock market’s vagaries. It means \n\ngrowing our business profitably, maintaining financial discipline, controlling expenses and \n\nproviding extraordinary service to distributors and customers. \n\nWe take the last point very seriously, as evidenced by our earning a sixth consecutive \n\nDALBAR Annuity Service Award in 2001. DALBAR also awarded us the Intermediary Service \n\nAward and the first-ever Life Insurance Service Award. \n\nAs you’ll read throughout this report, service means very specific—and very impor- \n\ntant—things to us. We strive to forge strong partnerships with our distributors and provide \n\nthem with technological tools and outstanding products to enhance their selling efforts. \n\nThese are some of the underpinnings to our solid 2001 results. \n\nDespite the challenges I’ve mentioned, our revenues for 2001 rose 3 percent to $15.1 \n\n\n \n \n \n \n [html]\n
billion. Total assets under management rose 8 percent to $ 198 billion. Operating income rose
7 percent to $ 1.034 billion, or $ 4.28 per diluted share, excluding the $ 440 million impact of
Sept. 11 ( after tax and net of reinsurance ) and a $ 130 million tax benefit in our life operations.
The results attest to the resilience of our enterprise. With our strong and balanced
portfolia of businesses, we consistently demonstrate superior financial performance. Since
1995, we ve produced 13 percent annualized operating earnings - per - share growth, excluding
the effects of Sept. 11 and the tax benefit in 2001, and 13 percent annualized growth in assets
under management. Excluding the effect of Sept. 11 and the tax benefit, operating return on
", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. \n\n**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 \n\n\n \n \n \n \n [html]Common Stock Price20012000\n
Dividends
HighLowDeclared
First quarter$ 67.75$ 55.15$ 0.25
Second quarter70.4656.880.25
Third quarter69.2850.100.25
Fourth quarter62.8353.910.26
First quarter$ 52.75$ 29.38$ 0.24
Second quarter64.0044.250.24
Third quarter73.7556.380.24
Fourth quarter79.3165.440.25
\n\nTo send certificates for transfer and address changes: \n\nThe Bank of New York \nReceive and Deliver Department–11W \nP.O. Box 11002 \nChurch Street Station \nNew York, NY 10286 \n\nAddress inquiries about The Hartford’s Dividend \nReinvestment and Cash Payment Plan to: \n\nThe Bank of New York \nDividend Reinvestment Department \nP.O. Box 1958 \nNewark, NJ 07101-9774 \n\nE-mail: shareowner-svcs@bankofny.com \n\nInternet address: www.stockbny.com", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "people \n\n**T**he worst of 2001 brought out the best in The \n\nHartford’s people. \n\nAs the world watched the horrors of Sept. 11, \n\nsome 330 of our New York employees fled their offices \n\nin 7 World Trade Center. Though many were caught in \n\nthe debris and dust from the nearby Twin Towers, all \n\nescaped safely. \n\nBy the time the 47-story 7 World Trade Center \n\nbuilding collapsed at about 5:20 p.m., The Hartford had \n\nalready arranged for temporary space in several of the \n\ncompany’s other offices. Employees and suppliers \n\nimmediately began working around the clock to get \n\nthe business up and running again. Despite the \n\ndestruction, back-up systems kept distributors’ and \n\ncustomers’ data secure. \n\nA hundred miles from Ground Zero, home office \n\nemployees in Hartford, Conn., began shuttling equip- \n\nment and supplies to our temporary offices. Some \n\nbooked Long Island Sound ferries from Connecticut to \n\nLong Island within 48 hours of the attack. Others spent \n\nthe weekend driving supplies to the new locations so \n\nemployees could concentrate on customers instead of \n\non finding pens and paper. Employees and suppliers \n\nwere determined to get the company, its distributors \n\nand its customers through the crisis. \n\nBy Monday, Sept. 17, all of The Hartford’s business \n\nunits in New York were serving customers again. \n\nEmployees had new furniture, phones, servers and PCs. \n\nDistributors’ and customers’ access to company e-mail \n\nwas never interrupted. Calls to old phone numbers were \n\nrerouted to cell phones or new office phones. Print and \n\nradio ads—along with The Hartford’s Web site— \n\ngave customers instructions for filing claims quickly. \n\nCustomer relationships were stronger than ever. The \n\nHartford Experience—customer solutions, ease of doing \n\nbusiness and extraordinary service—was never better \n\ndemonstrated.", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_HIG_2001.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HIG_2001.pdf", - "query": "When did the annual sherholder meeting of Hartford happen in 2002 ?", - "target_page": 38, - "target_passage": "Shareholders are cordially invited to attend The Hartford’s Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 ", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "All this translates into increased shareholder value. Since 1995, our market cap has \n\nincreased from $5.7 billion to $15.4 billion—an 18 percent compound annual growth rate. \n\nOur share price has increased nearly 160 percent since The Hartford became a public com- \n\npany. During the same period, the S&P 500 increased 89 percent, and the Dow Jones \n\nIndustrial Average 97 percent. \n\nIt’s no surprise that our management team is highly regarded within the financial \n\nservices industry and on Wall Street. We’ve built a strong leadership team, complemented \n\nby more than 27,000 dedicated employees who are nurtured and energized by a culture of \n\nsuccess. Consequently, we had a smooth leadership transition over the past year. Tom Marra \n\nsucceeded Lon Smith as president of our life operations and joined our board of directors. \n\nLon retired after a 33-year career with The Hartford, and we owe him a tremendous amount \n\nof gratitude for building a strong and successful operation. \n\nDuring 2001 we also welcomed two new members to our board of directors. Edward J. \n\nKelly III, president and CEO of Mercantile Bankshares Corp., joined us in May, and we welcomed \n\nCharles B. Strauss, president and CEO of Unilever United States, Inc., in November. \n\nWe’re well-positioned for growth in 2002. On Jan. 1 we renewed our relationship with \n\nAARP by signing a new eight-year contract to market auto and homeowner’s insurance to \n\nits 35 million members. Our small-business property-casualty operation continues to \n\ngrow—premiums surpassed $1.2 billion in annual sales in 2001. \n\nWe’re also in a leading position to take advantage of demographic shifts and to provide \n\nestate planning and investment and insurance products to baby boomers. We are very excited, \n\ntoo, about our new SMART 529™ college savings program, which offers flexible features and \n\nnumerous tax advantages. And the growing small-business market segment is a key target for \n\nour 401(k) and group-benefits businesses. In fact, with $2 billion in fully insured premiums and \n\n$106 million in net income, the Group Benefits Division (GBD) had its best year ever. \n\nAs our markets continue to grow and evolve, we stay intensely focused on the key \n\nstrategies in all our businesses. \n\n**Soon after the Sept. 11 attack,**\n**The Hartford Chairman, President**\n**and CEO Ramani Ayer, left fore-**\n**ground, joined other industry**\n**CEOs in meeting with President**\n**Bush at the White House. During**\n**the meeting, the executives**\n**assured the president of industry**\n**support as the nation recovers.**", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. \n\n**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 \n\n\n \n \n \n \n [html]Common Stock Price20012000\n
Dividends
HighLowDeclared
First quarter$ 67.75$ 55.15$ 0.25
Second quarter70.4656.880.25
Third quarter69.2850.100.25
Fourth quarter62.8353.910.26
First quarter$ 52.75$ 29.38$ 0.24
Second quarter64.0044.250.24
Third quarter73.7556.380.24
Fourth quarter79.3165.440.25
\n\nTo send certificates for transfer and address changes: \n\nThe Bank of New York \nReceive and Deliver Department–11W \nP.O. Box 11002 \nChurch Street Station \nNew York, NY 10286 \n\nAddress inquiries about The Hartford’s Dividend \nReinvestment and Cash Payment Plan to: \n\nThe Bank of New York \nDividend Reinvestment Department \nP.O. Box 1958 \nNewark, NJ 07101-9774 \n\nE-mail: shareowner-svcs@bankofny.com \n\nInternet address: www.stockbny.com", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**Meetings of Directors**\n\nThe table below shows the number of meetings held during each Director’s tenure and the attendance by each Director and \nrespective members of the Committees. In addition to the formal meetings held and noted below, a number of informal \nmeetings were also held. \n\n\n \n \n \n \n [html]Board of Directors MeetingsAudit and Risk Management CommitteeRemuneration and Nominations CommitteeReserves Committee\n
HeldAttendedHseldAttendedHeldAttendedHeldAttended
M Hannell99447744
E McCrady99------
D Hannes994477--
N Martin9943--44
W Holcombe99--7744
\n\nThe Audit and Risk Management, the Remuneration and Nominations, and the Reserves Committees both have charters \napproved by the Committees and, subsequently, the Board, which sets out the Committees’ objectives, composition, meeting \nfrequency, access, duties and responsibilities. Minutes are kept of all meetings and are tabled for adoption at the following \nCommittee meetings. These minutes are subsequently provided to the Board for information and any discussion that may be \nnecessary. The Audit and Risk Management Committee meets with the external auditor at least twice a year.", - "page_start": 26, - "page_end": 26, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "products & services \n\n\n\nThe ability to deliver that kind of performance \n\ncan be traced to our money managers—Wellington \n\nManagement Co., American Funds, Franklin Templeton \n\nInvestments, MFS Investment Management, AIM \n\nFunds Management, Inc., Putnam Investment \n\nManagement and The Hartford’s own Hartford \n\nInvestment Management Co. \n\nAll of The Hartford’s money managers have years \n\nof experience and are among the most respected firms \n\nin the industry. Their experience and expertise were \n\nespecially important during the market volatility we \n\nsaw in 2001. They always stay focused on long-term \n\nperformance, which is the true measuring stick of The \n\nHartford’s value to its customers. \n\nBesides outstanding products and excellent man- \n\nagement, great service is a critical component in deliv- \n\nering the right solutions to our customers. In 2001, \n\nThe Hartford won an unprecedented sixth consecutive \n\nDALBAR Annuity Service Award, as well as the \n\n**H**ow do you secure the future when the present is \n\npuzzling enough? It’s a big challenge, and The Hartford’s \n\nprimary objective. Everything we do is designed to help \n\nour customers deal with the uncertainties that lie ahead. \n\nThe Hartford believes the best way to secure the \n\nfuture is to provide customers with the right products, \n\nand then back those products with outstanding per- \n\nformance and great service. Staying focused on this \n\nobjective was never more important—or more chal- \n\nlenging—than in 2001. \n\nTrue to form, The Hartford’s life operations’ annu- \n\nities and mutual funds delivered high-quality perform- \n\nance in a time of market turmoil. Despite an anemic stock \n\nmarket, 87 percent of the funds in The Hartford’s Director \n\nvariable annuity remained in the first or second quartile \n\nof three-year returns within the Lipper Peer Group in \n\n2001. Sixty-four percent of the funds in the Leaders suite \n\nof annuities and 91 percent of The Hartford’s mutual \n\nfunds remained in the first or second quartile over the \n\nthree-year period.", - "page_start": 18, - "page_end": 18, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**The Hartford Chairman, President and CEO Ramani Ayer speaking at the opening of New York employees’ new**\n**permanent offices in early November. Despite the destruction of their offices at 7 World Trade Center on Sept. 11,**\n**The Hartford’s New York employees had their businesses back in operation by Sept. 17. Employees moved into their**\n**new permanent offices less than 60 days after the attack.**\n\nour proven approach to asset management despite the stock market’s vagaries. It means \n\ngrowing our business profitably, maintaining financial discipline, controlling expenses and \n\nproviding extraordinary service to distributors and customers. \n\nWe take the last point very seriously, as evidenced by our earning a sixth consecutive \n\nDALBAR Annuity Service Award in 2001. DALBAR also awarded us the Intermediary Service \n\nAward and the first-ever Life Insurance Service Award. \n\nAs you’ll read throughout this report, service means very specific—and very impor- \n\ntant—things to us. We strive to forge strong partnerships with our distributors and provide \n\nthem with technological tools and outstanding products to enhance their selling efforts. \n\nThese are some of the underpinnings to our solid 2001 results. \n\nDespite the challenges I’ve mentioned, our revenues for 2001 rose 3 percent to $15.1 \n\n\n \n \n \n \n [html]\n
billion. Total assets under management rose 8 percent to $ 198 billion. Operating income rose
7 percent to $ 1.034 billion, or $ 4.28 per diluted share, excluding the $ 440 million impact of
Sept. 11 ( after tax and net of reinsurance ) and a $ 130 million tax benefit in our life operations.
The results attest to the resilience of our enterprise. With our strong and balanced
portfolia of businesses, we consistently demonstrate superior financial performance. Since
1995, we ve produced 13 percent annualized operating earnings - per - share growth, excluding
the effects of Sept. 11 and the tax benefit in 2001, and 13 percent annualized growth in assets
under management. Excluding the effect of Sept. 11 and the tax benefit, operating return on
", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "partners \n\n\n\n**“P**artnering” is a popular business buzzword that may \n\nvanish as quickly as it appeared. The Hartford’s partner- \n\nships, on the other hand, are built for the long term and \n\nhave played a major role in the company’s growth and \n\nsuccess. \n\nThe company enjoys outstanding partnerships \n\nwith several of the world’s top asset managers. It also \n\nvalues its thousands of relationships with financial \n\nintermediaries such as large broker-dealers, banks and \n\nindependent financial planners—and with affinity part- \n\nners who extend The Hartford’s reach into large, grow- \n\ning markets. \n\n“A lot of people talk about having the right part- \n\nners, but The Hartford views it differently from most,” \n\nsays Gary Trippe, CEO of Fort Myers, Fla., property- \n\ncasualty agency Oswald, Trippe and Company, Inc. \n\n“They look for partners who share their core values, \n\nand the relationship is based on trust and respect. It’s \n\nall about compatibility.” Trippe should know. His \n\nagency writes three times as much business with \n\nThe Hartford, in both personal and commercial lines, as \n\nit writes with any other insurer. \n\nMutually beneficial partnerships with successful \n\nbusinesses of all sizes are the foundation of The \n\nHartford’s business model. \n\nPerhaps no relationship represents shared values \n\nand shared success better than the one with AARP, \n\nwhich signed a new eight-year contract with The \n\nHartford that began Jan. 1, 2002. The AARP insurance \n\nprogram with The Hartford is a model of affinity mar- \n\nketing and distribution savvy. AARP’s membership— \n\nthose age 50 and over—is the fastest-growing segment \n\nof the U.S. population. Computer use among this group \n\nis growing by an estimated 20 percent per year, and the \n\npopulation segment respects established brands and \n\nseeks value, convenience and extraordinary service. \n\nThat right combination of factors helps make \n\nAARP’s World Wide Web site one of The Hartford’s \n\n13", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "It would be difficult to imagine a more tumultuous year than 2001. But if one major test of \n\na company’s character is its performance in the face of extreme adversity, The Hartford \n\naced that test. \n\nSuccessfully managing our company through a turbulent stock market and the begin- \n\nning of a recession was challenge enough through the first eight months of the year. \n\nThen came the morning of Sept. 11. What followed, in retrospect, almost made those \n\n“normal” challenges seem like child’s play. \n\nNone of us will ever forget where we were when we heard the shocking news. I had just \n\n\n \n \n \n \n [html]\n
our way to an analysts ’ meeting in Manhattan, but that meeting, of course, never took place.
With our eyes glued to the horrific events unfolding on television, our thoughts turned
immediately to our 330 employees in 7 World Trade Center and our partners at Aon, Marsh &
McLennan, Bank of America and Morgan Stanley, who had offices in the Twin Towers.
As you ’ II read in this report, we were profoundly thankful that all of our people sur -
vived the devastation. Our New York offices were back up and running within a week, thanks
to a superb group of people I ' m proud to call our employees. Tragically, not all our partners
were as fortunate. Many of us lost friends, relatives or long - time busineas colleagues.
It ’ s almost a cliche now, but that morning changed our lives. Entire industries, includ -
ing the financial services industry, will feel its effects for many years.
Sept. 11 also taught us some harsh business lessons. There are suddenly new risks in
insuring large sections of neighborhoods filled with top - quality office buildings. Horribly, we
have to alter our view of workers ’ compensation risks, even for employers in low - risk pro -
fessions, like accountants and attorneys.
But even with all that, we know one thing didn ' t change on Sept. 11 : a determination,
backed by 190 years of experience, to run The Hartford ’ s business the right way. The right
way means always thinking ahead and doing the things that ensure we have the unshake -
shiftinger / sll streameth to nas - nugar Q1 † shillston in mynes ( knopage / lhaftnya, toyap und rejuncyana )
", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "\n \n \n \n \n [html]200120001999$15.147$$13.528Assets under management$\n
( in millions except for per share data )
Net income [ 1 ]$507$974$862
Operating income [ 1 ][ 2 ]$724$962$837
Revenues [ 3 ]
14.703
98.047$182.964$ 173.425Diluted Earnings Per Share :Net income [ 1 ]$
2.10$4.34S3.79Operating income [ 1 ]$
\n\n[1] 2001 includes $440 of losses ($1.85 per basic and $1.82 per diluted share) related to the September 11 \nterrorist attack (“September 11”) and a $130 tax benefit ($0.55 per basic and $0.54 per diluted share) at \nHartford Life, Inc. (“HLI”). \n\n[2] Operating income represents after-tax operational results excluding, as applicable, net realized capital gains or \nlosses, extraordinary items, the cumulative effect of accounting changes and certain other items. \n\n[3] 2001 includes a $91 reduction in premiums from reinsurance cessions related to September 11. \n\n**Net Income** **Operating Income** **Revenues**\n\nin millions in millions in billions \n\n$1,000 $15 $1,200 \n\n800 12 960 \n\n600 9 720 \n\n400 6 480 \n\n200 3 240 \n\n2001 2000 1999 2001 2000 1999 2001 2000 1999 \n\nOperating income excluding \nSeptember 11 and HLI \ntax benefit Net income excluding \nSeptember 11 and HLI \ntax benefit", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "insurance was high during the 1990s as the number of \n\nU.S. public corporations tripled. Amid the past year’s \n\ncorporate retrenchment, loss activity led to industry- \n\nwide premium price increases of up to 30 percent. A \n\nflight to quality was inevitable under such conditions, \n\nand a strong brand and superior ratings helped HFP dis- \n\ntance itself from lesser competitors. Even the horrific \n\ncollapse of its World Trade Center headquarters couldn’t \n\nhold HFP back in 2001. It renewed $43 million worth of \n\nbusiness in September alone, fulfilling its commitment \n\nto protecting customers against uncertainty. \n\nstreamlined product-development process maximizes \n\nspeed-to-market so agents have the right products to \n\nsell at the right time. That’s one reason why we esti- \n\nmate The Hartford’s small-business insurance growth \n\nis five to six times the industry average. \n\nDeveloping products for a changing business \n\nenvironment is also a proven skill of HFP. The unit com- \n\npleted its first full year as part of The Hartford after our \n\n2000 acquisition of Reliance Group Holdings, Inc.’s \n\nfinancial products and excess and surplus lines. \n\nIt was quite a year after quite a decade. Demand \n\nfor HFP’s mainstay directors and officers liability \n\n\n\n(cid:4) A**strong brand and superior**\n**ratings help Hartford Financial**\n\n**works with HFP Underwriting**\n**Manager David Garrison, far**\n**right, and financial professionals** **Products (HFP) differentiate its**\n**such as William Gallagher** **directors and officers liability**\n**Associates President and CEO** **insurance from those of competi-**\n**Philip Edmundson, second from** **tors. HFP’s Boston Regional**\n**left, and Principal Richard Leavitt.** **Manager Doreen Lukowski-Rizza**\n\n(cid:5) H**artford Investment Management**\n**Co., which specializes in fixed-**\n**income asset management, has**\n**nearly $75 billion under manage-**\n**ment. Marcie Hayden, money**\n**market trader, and Peter Perrotti,**\n**government portfolio manager, are**\n**two members of a professional**\n**organization whose annual trading**\n**volume exceeds $50 billion.**", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_HIG_2001.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed11.pdf", - "query": "Regarding climate change, to what corresponds the \"average length of flood events ?", - "target_page": 11, - "target_passage": "The average length of flood events (number of days in which the cumulative daily rainfall excess is positive, compared to the 95th percentile of the baseline", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**13**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n–3 \n3 \n0 \nchange in length of average flood event (days) \n–2 –1 1 2 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \nMIROC-ESM-CHEM \n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 6.**Simulated changes in the average length of flood events (number of days in which the cumulative daily rainfall excess \nis positive, compared with the 95th percentile in 1981–2010, at 2°C global warming, for individual HadGEM3 simulations driven \nby SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify \nthe driving CMIP5 model (or ensemble mean). \n\n\n–0.2 0 \n0.2 \n1.0 \n0.6 \nvulnerability to food insecurity \n0.4 0.8 1.2 1.4 \n\n\n\n\n\n**Figure 7.**Hunger and Climate Vulnerability Index calculated for simulated climate states at 2°C global warming for five \nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble \nmean.", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed11.pdf" - }, - { - "text": "**6**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \nvulnerability to food insecurity \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n0.4 0.6 0.8 1.0 1.2 1.4 \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Table 2.**Proxies for flood and drought events used in the HCVI. \n\n\n \n \n \n \n [html]\n
extreme weather eventdescription of proxy
average length of flood eventsnumber of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981 – 2010 average
average length of drought eventsnumber of days in which the cumulative daily rainfall deficit is positive, compared with the 20th percentile in the 1981 – 2010 average
\n\nUN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed11.pdf" - }, - { - "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. \n\nLarge amounts of user-generated data on social media, which have been valued in computer science, \ncommunication, and environmental studies [5,9,15–18], have enabled the acquistion of the social media \nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence \npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009 \nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify \nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to \nobserve the evolution of the two discourses and to measure whether the discrepancy between the two \nhas widened or narrowed within the 10-year period. \n\nTo be specific, we formulated three research questions (RQs) to be explored in this study: \n\nRQ1: What is the difference in how the two the discourses are associated with important climate \nconcepts in people’s minds? \nRQ2: How did the two competing climate discourses evolve from 2009 to 2018? \nRQ3: Did the two competing discourses converge or diverge in this decade? \n\n**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "\n \n \n \n \n [html]No.# Climatechange# Globalwarming\n
HashtagCentralityHashtagCentrality
23co20.174snow0.161
24weather0.169world0.157
25solar0.165gop *0.156
26economy0.164arctic0.150
27auspol0.163 *winter0.145
28education0.155p2 *0.144
29news0.152drought0.142
30drought0.150epa *0.141
31coal0.147global0.137
32sustainable0.147eco0.137
33cdnpoli0.144 *actonclimate0.136
34sdgs0.143 *health0.134
35china0.143un *0.133
36gop0.143 *solar0.132
37food0.141economy0.131
38un0.141 *hoax0.131
39cop24 *0.140california0.130
40agriculture0.138politics0.129
41environmental0.136india0.128
42fossilfuels0.134china0.127
43arctic0.134planet0.127
44epa *0.133parisagreement *0.126
45biodiversity0.132heatwave0.125
46future0.131summer0.121
47canada0.128nyc *0.118
48emissions0.128nasa0.118
49obama0.127future0.118
50politics0.125oil0.117
\n\nThe association networks of #climatechange and #globalwarming are shown in Figure 2. Nodes \nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of \nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and \nfive in the #globalwarming network, where clusters are differentiated by color (resolution is 0.75 for \nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each \ncluster are also summarized and represented in the network depicted in Figure 2. \n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer \nto general facts about global climate issues, sharing words about the causes or effects concerning \nsustainability. The difference is that the largest cluster of #globalwarming (46% of the network) includes \nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the \nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as \nagriculture, biodiversity, education, and politics.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "Article \n**#Climatechange vs. #Globalwarming: Characterizing**\n**Two Competing Climate Discourses on Twitter with**\n**Semantic Network and Temporal Analyses**\n\n**Wen Shi 1, Haohuan Fu 1,2, Peinan Wang 3, Changfeng Chen 3 and Jie Xiong 4,***\n\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, \n\nTsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); \nhaohuan@tsinghua.edu.cn (H.F.) \n\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China \n3 \n\nSchool of Journalism and Communication, Tsinghua University, Beijing 100084, China; \nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.) \nStrategy and Innovation Department, Rennes School of Business, 35065 Rennes, France \n\n4 \n** ***Correspondence: jie.xiong@rennes-sb.com; Tel.:+ 33-(0)-2-99-54-46-79 \n\n**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. \n\n**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed10.pdf" - }, - { - "text": "**11**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n–20 –10 \n0 \ndays \n10 20 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 4.**Simulated changes in the number of consecutive dry days relative to 1981–2010, at 2°C global warming, for individual \nHadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The \nlabels above each panel identify the driving CMIP5 model (or ensemble mean). \n\n**Table 5.**Global mean changes at 2°C global warming compared to present day for individual ensemble members, for the \nClimPACT indices, the flood and drought proxies used as input to the HCVI calculations, and percentage change in mean \nprecipitation (Pmean), mean run-off (Rmean) and low run-off (Rlow). \n\n\n \n \n \n \n [html]\n
IPSL - CMSA - LRGFDL - ESM2MHadGEM2 - ESIPSL - CMSA - MRMIRC - ESM - CHEMACCESS1 - 0ensemble mean
TXx (° C )2.12.82.52.92.42.82.6
TX90p (% time )20.124.324.929.023.527.925.0
CDD− 3.00.9− 3.4− 5.7− 2.0− 5.5− 2.9
RX5day ( mm )3.55.46.96.86.06.75.9
drought proxy0.760.89n. a.0.380.380.660.61
flood proxy0.830.82n. a.0.750.730.780.78
Pmean (%)2.13.45.03.05.32.94.0
Rmean (%)2.46.58.14.48.64.95.8
Rlow (%)− 2.03.811.28.09.45.15.9
\n\nareas are projected to see an increase in flood event lengths of 4 days or more, particularly India \nand Bangladesh, for which such increases are projected in all ensemble members to some extent. \nIncreases of 2–4 days are also projected in parts of Brazil by all ensemble members, although \nthe magnitude and location within the country varied between members. Similar increases are \nprojected in the region of the Horn of Africa and southern Arabian Peninsula in several members. \nThe HCVI calculated for 2°C global warming showed very large geographical variability \n(figure 7) which relates largely to differences in socio-economic factors [22]. Differences in the \nclimate change simulated in different ensemble members leads to some variation in the HCVI at", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed11.pdf" - }, - { - "text": "**5**\n\n\n \n \n \n \n [html]\n
IDdefinitionunitssector of relevance
TXxannual maximum daily maximum temperature° Chealth, agriculture and food security
TX90ppercentage of days above the 90th percentile of daily maximum temperature in the 1981 – 2010 average%health, agriculture and food security, water resources and hydrology
CDDmaximum number of consecutive days with precipitation less than 1 mmdayshealth, agriculture and food security, water resources and hydrology
RX5daymaximum consecutive 5 day precipitationmmhealth, agriculture and food security, water resources and hydrology
\n\nmembers at any given date. Since specific levels of global warming such as 1.5°C or 2°C were \nreached at different times in the different ensemble members, according to the SST forcings used, \nany given level of global warming could be associated with different radiative forcings in different \nensemble members. In any given ensemble member at any specific level of global warming, the \nCO2 concentration and SSTs were the same as in the driving CMIP5 model at that GWL. Land \ncover was fixed in this simulation—there was no dynamic vegetation nor any time-dependent \nanthropogenic land use change. \nSome comparison of the higher-resolution atmospheric simulations with the original CMIP5 \nsimulations, is provided by Wyser*et al.*[20]. \n\n(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index \n\nTo assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. \n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "2. Murphy JM*et al.*2009*UK climate projections science report: climate change projections*. Exeter, UK: \n**26**\nMet Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk. \n\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in \nCopenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference \nof the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ \n11a01.pdf. \n\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, \n30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of \nthe Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ \n10a01.pdf. \n\n5. Hewitson B*et al.*2014 Regional context. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment*\n*report of the Intergovernmental Panel on Climate Change*(eds VR Barros*et al.*), pp. 1133–1197. \nCambridge, UK: Cambridge University Press. \n\n6. Dankers R*et al.*2013 First look at changes in flood hazard in the inter-sectoral impact model \nintercomparison project ensemble.*Proc. Natl Acad. Sci. USA***111**, 3257–3261. (doi:10.1073/ \npnas.1302078110) \n\n7. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al.*), pp. \n1–32. Cambridge, UK: Cambridge University Press. \n8. Schewe J*et al.*2014 Multimodel assessment of water scarcity under climate change.*Proc. Natl*\n*Acad. Sci. USA***111**, 3245–3250. (doi:10.1073/pnas.1222460110) \n\n9. Schleussner C-F*et al.*2015 Differential climate impacts for policy-relevant limits to global \nwarming: the case of 1.5°C and 2°C.*Earth Syst. Dynam. Discuss.***6**, 2447–2505. (doi:10.5194/ \nesdd-6-2447-2015) \n\n10. James R, Washington R, Schleussner C-F, Rogeli J, Conway D. 2017 Characterizing half-a- \ndegree difference: a review of methods for identifying regional climate responses to global \nwarming targets.*WIREs Clim Change***8**, e457. (doi:10.1002/wcc.457) \n11. Haarsma RJ*et al.*2016 High resolution model intercomparison project (HighResMIP v1.0) for \nCMIP6.*Geosci. Model Dev.***9**, 4185–4208. (doi:10.5194/gmd-9-4185-2016) \n\n12. Hewitt HT, Copsey D, Culverwell ID, Harris CM, Hill RSR, Keen AB, McLaren AJ, Hunke \nEC. 2011 Design and implementation of the infrastructure of HadGEM3: the next-generation \nMet Office climate modelling system.*Geosci. Model Dev.***4**, 223–253. (doi:10.5194/gmd-4- \n223-2011). \n13. Martin GM*et al.*2011 The HadGEM2 family of met office unified model climate \n\n30. Wiltshire A, Gornall J, Booth B, Dennis E, Falloon P, Kay G, McNeall D, McSweeney C, \nBetts R. 2013 The importance of population, climate change and CO2 plant physiological \nforcing in determining future global water stress.*Glob. Environ. Change***23**, 1083–1097. \n(doi:10.1016/j.gloenvcha.2013.06.005) \n\n31. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2016 High-end climate change \nimpact on European runoff and low flows – exploring the effects of forcing biases.*Hydrol.*\n*Earth Syst. Sci.***20**, 1785–1808. (doi:10.5194/hess-20-1785) \n32. Milly PCD, Dunne KA. 2016 Potential evapotranspiration and continental drying.*Nat. Clim.*\n*Change***6**, 946–949. (doi:10.1038/nclimate3046) \n\n33. Swann ALS, Hoffman FM, Koven CD, Randerson JT. 2016 Plant responses to increasing \nCO2 reduce estimates of climate impacts on drought severity.*Proc. Natl Acad. Sci. USA***113**, \n10 019–10 024. (doi:10.1073/pnas.1604581113) \n34. Betts RA*et al.*2007 Projected increase in future river runoff through plant responses to carbon \ndioxide rise.*Nature***448**, 1037–1042. (doi:10.1038/nature06045)", - "page_start": 25, - "page_end": 25, - "source_file": "pubmed11.pdf" - }, - { - "text": "A detailed investigation of these factors is beyond the scope of this paper; nevertheless, this \nresult illustrates the important point that the nature and patterns of the climate forcing at a \nparticular level of global warming can play an important role in determining the patterns of \nregional impacts. \n\n**25**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n5. Conclusion \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nThe higher-resolution HadGEM3 simulations project consistent increases in temperature-related \nextremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the \nglobal annual mean. There is a higher degree of spatial variation in our projections compared \nwith CMIP5-based studies. \n\nIn the model projections examined here, changes relating to the water cycle are complex, both \nin their geographical pattern and in the variation between different models. The length of flooding \nevents generally increases across world in all models, but maximum rainfall can either increase or \ndecrease depending on locations. Global patterns of increase and decrease show some consistency \nbetween the different GWLs, but also some local differences. Worldwide, most impacts broadly \ntend to increase with global warming in most areas. For global mean changes, even when the sign \nof change is uncertain, individual realizations generally show reduced impact at 1.5°C compared \nwith 2°C. However, this does not always hold even at the scale of major global river basins. \n\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in \napproximately three-quarters of countries assessed. The vulnerability increase can arise from \nincreases in either flooding or drought. Reduced drought leads to decreased vulnerability in a \nlimited number of cases. \n\nMost simulations here project a general increase in mean streamflow in most of the basins \nexamined, but with a number of notable exceptions in the tropics. While flows in the Ganges are \nconsistently projected to increase by 30–110% at 2°C, Amazon flows could either increase by 3% \nor decrease by 25%. Ensemble-mean changes in river flow often do not give a full impression of \nthe magnitude of changes that may be possible, so adaptation planning in particular should not \nrely on ensemble-mean projections and instead consider a range of outcomes. The seasonal low \nstreamflows also increase in many basins, but not as many as for the mean flows—many basins \nsee decreased low flows in some or all projections. \n\nBroadly, changes in weather extremes at 1.5°C global warming could be estimated by scaling- \nback the impacts at 2°C, if this is done with individual ensemble members rather than the \nensemble mean. However, this was not always the case for impacts that depend on more complex \nprocess or interactions between more than one climate variable, such as run-off and an indicator \nof vulnerability to food insecurity. \n\nData accessibility. This article has no additional data. \nCompeting interests. We declare we have no competing interests. \nFunding. This research received funding from the European Union Seventh Framework Programme FP7/2007– \n2013 under grant agreement no. 603864 (HELIX: \n‘High-End cLimate Impacts and eXtremes’; www. \nhelixclimate.eu). The work of R.A.B., C.B., J.C., L.G., K.L. and K.R. was additionally supported by the Joint \nUK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101). \nAcknowledgements. The authors thank Ed Pope, Jason Lowe and Dann Mitchell for advice and discussion, \nAlissa Haward and Maria Pearce for project management and administration of HELIX, and two anonymous \nreviewers whose comments substantially improved the paper.", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed11.pdf" - }, - { - "text": "**3. Methods**\n\n3.1. Data Source \n\nAs Twitter has been recognized as a popular discussion forum [75] and a social activity platform [76] \nfor climate issues, we followed the literature [5,8,18] and used tweets to investigate distinct perceptions \nof climate issues and evolution on social media. Although Twitter’s ecosystem has been changing \nin terms of the number of active users, user demographics, and tweeting conventions in the past \nyears [77,78], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter \nis one of the most popular social websites, we defined our study as characterizing the perception of \nclimate issues among social media users rather than all the netizens or the whole population. \n\n3.2. Data \n\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. \n\nGiven our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. \n\n**Figure 1.**The number of tweets containing #climatechange or #globalwarming, and their ratio from \n2009 to 2018 (**a**). The number of hashtags contained in the “climate change” or “global warming” \ndatasets, and their ratio from 2009 to 2018 (**b**).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed11.pdf", - "query": "What is the projected situation of India regarding HCVI (Hunger and Climate Vulnerability Index)?", - "target_page": 12, - "target_passage": "India is projected to see increased HCVI by all ensemble members, due to a consistent increase in length of flood events projected in all members, outweighing the beneficial impact of decreased length of drought which is again projected in all members", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "The HCVI consists of three equally weighted components: exposure to climate-related hazards, \nsensitivity of national agricultural production to climate-related hazards, and adaptive capacity— \na measure of a country’s ability to cope with climate-related food shocks. The sensitivity and \nadaptive capacity components are based on data from the World Bank, World Resources Institute,", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "**5**\n\n\n \n \n \n \n [html]\n
IDdefinitionunitssector of relevance
TXxannual maximum daily maximum temperature° Chealth, agriculture and food security
TX90ppercentage of days above the 90th percentile of daily maximum temperature in the 1981 – 2010 average%health, agriculture and food security, water resources and hydrology
CDDmaximum number of consecutive days with precipitation less than 1 mmdayshealth, agriculture and food security, water resources and hydrology
RX5daymaximum consecutive 5 day precipitationmmhealth, agriculture and food security, water resources and hydrology
\n\nmembers at any given date. Since specific levels of global warming such as 1.5°C or 2°C were \nreached at different times in the different ensemble members, according to the SST forcings used, \nany given level of global warming could be associated with different radiative forcings in different \nensemble members. In any given ensemble member at any specific level of global warming, the \nCO2 concentration and SSTs were the same as in the driving CMIP5 model at that GWL. Land \ncover was fixed in this simulation—there was no dynamic vegetation nor any time-dependent \nanthropogenic land use change. \nSome comparison of the higher-resolution atmospheric simulations with the original CMIP5 \nsimulations, is provided by Wyser*et al.*[20]. \n\n(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index \n\nTo assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. \n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "**6**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \nvulnerability to food insecurity \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n0.4 0.6 0.8 1.0 1.2 1.4 \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Table 2.**Proxies for flood and drought events used in the HCVI. \n\n\n \n \n \n \n [html]\n
extreme weather eventdescription of proxy
average length of flood eventsnumber of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981 – 2010 average
average length of drought eventsnumber of days in which the cumulative daily rainfall deficit is positive, compared with the 20th percentile in the 1981 – 2010 average
\n\nUN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed11.pdf" - }, - { - "text": "**14**\n\n\n–1.00 –0.75 –0.50 –0.25 \n\n0 \nchange in vulnerability to food insecurity \n\n0.25 0.50 0.75 1.00 \n\n\n\n\n\n**Figure 8.**Change in Hunger and Climate Vulnerability Index relative to baseline calculated for simulated climate states at 2°C \nglobal warming, for five individual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, \nand the ensemble mean. \n\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher \nthan any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen. \nThe implication of such HCVI values is that climate change at 2°C is projected to cause levels \nof vulnerability to food insecurity that are greater than any seen in the present day. For \nindividual ensemble members, the number of countries with ‘unprecedented’ HCVI values at \n2°C varies from three to seven. Conversely, many countries in the baseline climate have levels \nof vulnerability to food insecurity that are greater than those expected in other countries under \n2°C global warming. This suggests that other factors are already posing greater risk for food \ninsecurity than 2°C climate change is expected to cause in other countries, so the increased risk \nfrom climate change should not overshadow the need to reduce vulnerability to food insecurity \narising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by \naddressing various socio-economic issues in such counties. \n\nincreased run-off over \napproximately half of the land surface (figure 9) and the majority of the major river basins \nassessed (figure 10), but with large regional uncertainties including the possibility of decreased \nflows in many basins. The ensemble-mean change in mean streamflow shows an increase of \nbetween 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing \nan increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and \nsouthcentral USA, which see less than a 5% change in run-off, and the already very dry region of \nthe Sahara Desert where the existing very small run-off become even smaller. \n\nThe JULES simulations show a general tendency towards \n\nEnsemble-mean projected changes in low run-off flows are generally larger (figure 11), with \nthe regions seeing an increase in mean run-off seeing a larger percentage increase in low \nrun-off—over 75% increases over much of North America, Eastern Europe and Asia. Note that \nthis does not necessarily imply a larger increase in absolute low flow compared to absolute mean \nflow, because the baseline is (by definition) smaller for low flows. In western Europe, where the \nchanges in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed11.pdf" - }, - { - "text": "**19**\n\n\n\n\n\n\n\n(*a*) \n6.0 \n5.0 \n\n4.0 \n\n3.0 \n2.0 \n\n1.0 \n\n0 \n\n(*b*) \n10.0 \n\n8.0 \n\n6.0 \n\n4.0 \n\n2.0 \n\n0 \n\n(*c*) \n12.0 \n\n8.0 \n\n4.0 \n\n0.0 \n\n–4.0 \n\nIPS L-C M 5 A-L R \n\n\n\nG F D L-E S M 2 M \n\nM IR O C-E S M -C H E M \n\nA C C E SS1-0 \n\n1.5°C 2°C \n\n**Figure 13.**Global mean percentage changes relative to 1981–2010 in (a) precipitation over land, (b) mean run-off flows, (c) low \nrun-off lows (10th percentile), at 2°C and 1.5°C global warming. \n\nthis comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be \ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at \neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the \npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries. \nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food \ninsecurity generally increases with global warming, and for approximately three-quarters of \ncountries assessed, this increase is larger at 2°C than 1.5°C. \n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global \nwarming compared to 1.5°C (figure 20). This is often the case for both increases and decreases \nin flows—increasing the level of global warming magnifies the pattern of river flow changes, \nalthough not in all cases. \n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, \nbut this was not always the case, with many basins showing similar or smaller ranges at \n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed11.pdf" - }, - { - "text": "**22**\n\nvulnerability to food insecurity \n\n0.4 0.6 0.8 1.0 1.2 1.4 \n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n–0.2 \n. \n. \n. \n. \n**Figure 18.**Hunger and Climate Vulnerability Index at 1.5°C global warming (ensemble mean). \n. \n. \n. \n\n\n\n\n\n\n\n**Figure 19.**Difference in Hunger and Climate Vulnerability Index between 2°C and 1.5°C global warming, for individual ensemble \nmembers and ensemble mean. \n\n4. Discussion \n\nIn most cases, global mean changes at 2°C are larger than those at 1.5°C, not only for individual \nmembers but also for the ensemble as a whole. All ensemble members show increases in TXx at \n2°C which are larger than all changes at 1.5°C, and same true for most other variables.", - "page_start": 21, - "page_end": 21, - "source_file": "pubmed11.pdf" - }, - { - "text": "**18**\n\n\n\n\n\n\n\n\n\n\n\n(*b*) TX90p (% time) \n\n35 \n30 \n25 \n20 \n15 \n10 \n5 \n0 \n\nIPS L-C M 5 A-L R \nG F D L-E S M 2 M \n\nH ad G E M 2-E S \nIPS L-C M 5 A- M R \nM IR O C-E S M -C H E M \n(*d*) RX5day (mm) \n\n8.0 \n\n6.0 \n\n4.0 \n\n2.0 \n\n0 \n\nIPS L-C M 5 A-L R \nG F D L-E S M 2 M \n\nIPS L-C M 5 A- M R \nH ad G E M 2-E S \nM IR O C-E S M -C H E M \n\n(*a*) TXx (°C) \n\n3.5 \n3.0 \n2.5 \n2.0 \n1.5 \n1.0 \n0.5 \n0 \n\nG F D L-E S M 2 M \n\nM IR O C-E S M -C H E M \nIPS L-C M 5 A- M R \nH ad G E M 2-E S \n\nense m ble m ean \nA C C E SS1-0 \nIPS L-C M 5 A-L R \n1.5°C 2°C \n(*c*) CDD (days) \n\n2.0 \n\n0.0 \n\n–2.0 \n\n–4.0 \n\n–6.0 \n\nIPS L-C M 5 A-L R \nG F D L-E S M 2 M \n\nH ad G E M 2-E S \nM IR O C-E S M -C H E M \nIPS L-C M 5 A- M R \n\nA C C E SS1-0 \nense m ble m ean \n\n**Figure 12.**Comparison of global mean changes in climate extremes indices relative to 1981–2010 at 2°C and 1.5°C global \nwarming for individual ensemble members and ensemble mean. (a) Change in annual daily maximum temperature; \n(b) percentage of days with maximum temperature above 90th percentile for 1981–2010; (c) change in consecutive dry days; \n(d) change in annual maximum 5-day rainfall. \n\nFor precipitation, generally similar changes are seen at 1.5°C global warming as at 2°C, but \nsmaller in magnitude (compare figures 16 and 4), suggesting that most of these changes are a \nresponse to radiatively forced climate change as opposed to internal climate variability. However, \nsome localized changes do vary in sign between the GWLs, such as in South Australia, suggesting \na possible dominance of internal variability over the global warming signal in these places. \n\nWhere Rx5day increases, the increases are projected to be larger—in some cases approximately \ndouble—at 2°C global warming than 1.5°C. Where Rx5day decreases, again the decreases are \nprojected to be larger at 2°C global warming than 1.5°C (figure 17). \n\nOf the 122 countries assessed, 93 have smaller ensemble-mean HCVI calculated at 1.5°C global \nwarming than at 2°C, indicating an ensemble consensus that 76% of assessed countries would \nsee a smaller increase in vulnerability to food insecurity if global warming were limited to 1.5°C \n(figures 18 and 19). Conversely, 24% of countries would, by this metric, see the same or higher \nvulnerability to food insecurity at 1.5°C than 2°C. Of these, some are countries where HCVI \nis projected to be lower at 2°C global warming than in the baseline. For example, in Mali the \nensemble-mean baseline HCVI of 0.83 increased slightly to 0.85 at 1.5°C then reduced to 0.81 \nat 2°C. In some countries, the ensemble-mean HCVI happened to be identical at both warming \nlevels. In Chad, for example, the baseline HCVI of 0.89 increased to 0.91 at both 1.5°C and 2°C. \n\nAs noted above, four countries saw ensemble-mean HCVI values at 2°C above any seen \nin the baseline, and this number increased to seven at 1.5°C. The same four countries with \n‘unprecedented’ HCVI values at 2°C also saw ‘unprecedented’ values at 1.5°C; these were Oman, \nBangladesh, Mauritania and Yemen. These were joined by Myanmar, India and Cambodia as \nhaving ‘unprecedented’ values at 1.5°C. The role of internal climate variability in the HCVI \nresults needs to be assessed, as does the effect of potential nonlinear interactions between the \nflood and drought metric. Until the reasons behind these country-specific results are understood,", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed11.pdf" - }, - { - "text": "**2**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nModel Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration \nscenario. To provide more detailed representations of climate processes and impacts, the \nspatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution \nthan the CMIP5 models. We used a set of impacts-relevant indices and a global land surface \nmodel to examine the projected changes in weather extremes and their implications for \nfreshwater availability and vulnerability to food insecurity. Uncertainties in regional climate \nresponses are assessed, examining ranges of outcomes in impacts to inform risk assessments. \nDespite some degree of inconsistency between components of the study due to the need to \ncorrect for systematic biases in some aspects, the outcomes from different ensemble members \ncould be compared for several different indicators. The projections for weather extremes \nindices and biophysical impacts quantities support expectations that the magnitude of change \nis generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with \nincreases being more intense than seen in CMIP5 projections. Precipitation-related extremes \nshow more geographical variation with some increases and some decreases in both heavy \nprecipitation and drought. There are substantial regional uncertainties in hydrological impacts \nat local scales due to different climate models producing different outcomes. Nevertheless, \nhydrological impacts generally point towards wetter conditions on average, with increased \nmean river flows, longer heavy rainfall events, particularly in South and East Asia with the \nmost extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global \nwarming. Some areas are projected to experience shorter meteorological drought events and \nless severe low flows, although longer droughts and/or decreases in low flows are projected \nin many other areas, particularly southern Africa and South America. Flows in the Amazon \nare projected to decline by up to 25%. Increases in either heavy rainfall or drought events \nimply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this \nvulnerability is projected to remain smaller than at 2°C global warming in approximately 76% \nof developing countries. At 2°C, four countries are projected to reach unprecedented levels of \nvulnerability to food insecurity. \n\n1. Introduction \n\nThe majority of climate-change impacts assessments have tended to be framed in terms of future \ntime horizons, e.g. impacts by the middle or end of the twenty-first century [1,2]. However, \nwith international climate policy now largely focused on limiting warming to specific levels of \nglobal mean temperature such as 2°C [3] or 1.5°C [4], policy-relevant climate impacts assessments \nincreasingly need to be framed in terms of such warming levels. \nThere are two major research questions concerning the impacts of climate change at 1.5°C and \n2°C global warming, which are relevant to both mitigation and adaptation policy areas. \n\n(i) How much larger are the impacts at 2°C compared to 1.5°C? This is the primary question \narising from the Paris Agreement [4] and is relevant to mitigation policy, informing \njudgements and actions on holding the global temperature rise to ‘well below 2°C’ and \n‘pursuing efforts to limit the temperature increase to 1.5°C’.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "Faced with climate change, agriculture is the most vulnerable sector, which will experience the largest negative \nimpacts from climatic change and lead to more serious food security in the whole world15–20. Meanwhile, global \nproduction losses might lead to price shocks and trigger export restrictions21–24; an increasingly interconnected \nglobal food system25,26 and the projected fragility of the global food production system due to climatic change \nfurther exacerbate the threats to food security in the worldwide27–29. So, the impacts of climate changes on crop \nyields and prices have been of highly concerned. Numerous studies have revealed that the warming trend has \nnegative impact on crop yields and global trade in most regions all over the world30–32. There are three main \nmethods for impacts assessment of climate change on crops, including environment-controlled experiments, \nstatistical regression analysis and model simulations17,33. Environment-controlled experiments are designed \nto observe the influence of climate factors on crops, such as drought, flood, heat stress, cold damage, elevated \n CO2 concentration, through which the impact mechanism of climate change on crops would be revealed and \n established23,34,35. Crop models and trade models are applied to simulate the response of crop yield and market \nprice under climate change, based on process-based crop growth in daily time steps, either in selected field sites \nor in selected regions36–39. The statistical regression analysis usually explores the relationship between historical \ncrop yields and meteorological records in different sites or counties to establish regression functions for crop \nresponses predictions40–43. These researches have documented that crop yield and price would be threatened \nmuch more seriously by global warming, especially due to the increasing trend of frequency and intensity of \nclimate extreme events in the future. \n\n1Institute of Environment and Sustainable Development in Agriculture, Chinese Academy of Agricultural Sciences, \nBeijing 100081, China. 2International Maize and Wheat Improvement Center, Texcoco, Mexico. 3Peking University, \nBeijing, China.*email: hqlk2000@163.com \n\n**Scientific Reports**| (2022) 12:17268 | https://doi.org/10.1038/s41598-022-22228-7 1", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed9.pdf" - }, - { - "text": "**117**(4), 1935–1940 (2020). \n\n 16. Challinor, A. J. et al. A meta-analysis of crop yield under climate change and adaptation. Nat. Clim. Change**4**, 287–291 (2014). \n 17. Lobell, D. B. et al. Prioritizing climate change adaptation needs for food security in 2030. Science**319**, 607–610 (2017). \n 18. Lv, S. et al. Yield gap simulations using ten maize cultivars commonly planted in Northeast China during the past five decades. \nAgric. For. Meteorol.**205**, 1–10 (2015). \n 19. Chao, W., Kehui, C. & Shah, F. Heat stress decreases rice grain weight: Evidence and physiological mechanisms of heat effects prior \nto flowering. Int. J. Mol. Sci.**23**(18), 10922 (2022). \n 20. Chao, W. et al. Estimating the yield stability of heat-tolerant rice genotypes under various heat conditions across reproductive \nstages: A 5-year case study. Sci. Rep.**11**, 13604 (2021). \n\n 21. IPCC. Food security and food production systems. In Climate Change 2014: Impacts, Adaptation, and Vulnerability. Part A: Global \nand Sectoral Aspects. Contribution of Working Group II to the Fifth Assessment Report of the Intergovernmental Panel of Climate \nChange 485–533 (Cambridge University Press, 2014). \n 22. Tigchelaar, M., Battisti, D. S., Naylor, R. L. & Ray, D. K. Future warming increases probability of globally synchronized maize \nproduction shocks. PNAS**115**(26), 6644–6649 (2018). \n 23. Zhao, C. et al. Temperature increase reduces global yields of major crops in four independent estimates. PNAS**114**, 9326–9331 \n(2017). \n 24. Diffenbaugh, N. S., Hertel, T. W., Scherer, M. & Verma, M. Response of corn markets to climate volatility under alternative energy \nfutures. Nat. Clim. Change**2**, 514–518 (2012). \n 25. Jensen, H. G. & Anderson, K. Grain price spikes and beggar-thy-neighbor policy responses: A global economywide analysis. World \n\nBank Econ. Rev.**31**, 158–175 (2017). \n\n 26. Fraser, E. D. G., Simelton, E., Termansen, M., Gosling, S. N. & South, A. “Vulnerability hotspots”: Integrating socio-economic and \nhydrological models to identify where cereal production may decline in the future due to climate change induced drought. Agric. \nFor. Meteorol.**170**, 195–205 (2013). \n 27. Puma, M. J., Bose, S., Chon, S. Y. & Cook, B. I. Assessing the evolving fragility of the global food system. Environ. Res. Lett.**10**, \n024007 (2015). \n\n 28. Wheeler, T. & Braun, J. V. Climate change impacts on global food security. Science**341**(6145), 508–513 (2013). \n 29. Lunt, T., Jones, A. W., Mulhern, W. S., Lezaks, D. P. M. & Jahn, M. M. Vulnerabilities to agricultural production shocks: An extreme, \nplausible scenario for assessment of risk for the insurance sector. Clim. Risk Manag.**13**, 1–9 (2016). \n 30. Jägermeyr, J. & Frieler, K. Spatial variations in crop growing seasons pivotal to reproduce global fluctuations in maize and wheat \nyields. Sci. Adv.**4**(11), eaat4517 (2018). \n 31. Elliott, J. et al. Characterizing agricultural impacts of recent large-scale US droughts and changing technology and management. \nAgric. Syst.**159**, 275–281 (2017). \n\n 32. Tack, J., Barkley, A. & Nalley, L. L. Effect of warming temperatures on US wheat yields. Proc. Natl. Acad. Sci.**112**, 6931–6936 (2015). \n 33. Tao, F., Zhang, Z., Liu, J. & Yokozawa, M. Modelling the impacts of weather and climate variability on crop productivity over a \nlarge area: A new super-ensemblebased probabilistic projection. Agric. For. Meteorol.**149**, 1266–1278 (2009). \n 34. Parent, B. et al. Maize yields over Europe may increase in spite of climate change, with an appropriate use of the genetic variability", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed11.pdf", - "query": "Regarding climate change simulation, what is JULES ?", - "target_page": 7, - "target_passage": "Impacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "In the present study, processing errors in the input data for one ensemble member, the \nHadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the \nHCVI are, therefore, not presented here. \n\n**7**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n\n(d) Freshwater resources: run-off \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nImpacts on freshwater were assessed with a version of the JULES land surface model [24,25], a \ncoupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes \nof water, energy and carbon in an internally consistent way, typically applied at global scales. \nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System \nModels [26,27] and have been used to assess impacts of climate change on global terrestrial \necosystems and hydrology [28–30] within such models. JULES can also be used outside of the \nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of \na wider range of climate projections [6,8]. Here we use a new, higher-resolution configuration of \nJULES on a global grid of 0.5° resolution [31]. \n\nIt has been noted that hydrological impacts models driven by climate-change projections \nfrom climate models tend to give more severe drying than simulated in the climate models \nthemselves [32–34]. This is largely attributed to the inclusion of plant stomatal closure in \nresponse to elevated CO2 in the climate model land surface schemes, which generally reduces \nevapotranspiration relative to climate projections without this process and hence further increases \nrun-off/streamflow or ameliorates decreases [34]. This process is often omitted from standard \nhydrological models. Plant physiological responses to CO2 are included in the JULES model, so \nour projections of changes in run-off here do account for this process. \n\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to \nthe effects of climate change and CO2 rise on precipitation, evaporation and transpiration. We \nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to \npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for \nthe lowest 10% of time). \n\n(e) Correcting biases in climate model output and implications for defining levels of global \n\nwarming \n\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed \nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there \nwere some differences in how these data were applied, with different approaches to the treatment \nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered \nimportant to assess changes in the raw climate model output, because this directly represents \nthe behaviour of the model itself. The main focus was on the changes relative to the present- \nday baseline climate, defined as 1981–2010, with absolute values in either the baseline or the \nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off \nanalyses, however, it was considered important to correct for systematic biases in the climate \nmodel output, because these can lead to unrealistic representations of the key quantities in the \npresent-day simulation [35]. A bias-correction methodology was, therefore, applied for these two \nparts of the analysis, whereby the model output was adjusted to make it consistent with an \nobserved climatology [36]. We used a multi-segment statistical bias-correction methodology for \nprecipitation [37], and a modification of this for other variables [37].", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "**17**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n\n\n**Figure 11.**Distributions of changes in run-off for low flows (flows for lowest 10% of time) simulated by the JULES ecosystem– \nhydrology model under the ensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show \nthe 25th and 75th percentile changes, whiskers show the range, circles show the four projections that do not define the ends of \nthe range, and crosses show the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, \nin millimetres of rain equivalent. \n\n**Table 6.**Global mean changes at 1.5°C global warming compared to present day for individual ensemble members, for the \nClimPACT indices, the flood and drought proxies used as input to the HCVI calculations, and percentage change in mean \nprecipitation (Pmean), mean run-off (Rmean) and low run-off (Rlow). \n\n\n \n \n \n \n [html]\n
IPSL - CMSA - LRGFDL - ESM2MHadGEM2 - ESIPSL - CMSA - MRMIROC - ESM - CHEMACCESS1 - 0ensemble mean
TXx (° C )1.21.91.72.01.51.91.7
TX90p (% time )10.015.716.219.214.118.315.6
CDD− 1.20.7− 1.3− 5.40.0− 3.8− 1.6
RX5day ( mm )1.13.64.54.64.04.33.6
drought proxy0.740.48n. a.0.390.160.310.42
flood proxy0.750.73n. a.0.730.790.730.75
Pmean (%)1.40.93.11.33.92.42.2
Rmean (%)2.10.75.40.76.75.03.9
Rlow (%)− 3.40.35.92.25.94.92.6
\n\ndays were projected to exceed the baseline 10th percentile, at 1.5°C this reduces by 15–20% or \nmore. Again, the patterns of change at 1.5°C retain a similar geographical pattern of greater \nincreases in the tropics than mid-latitudes (electronic supplementary material).", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed11.pdf" - }, - { - "text": "2. Methods and models \n(a) Global climate simulations at 1.5°C and 2°C global warming \n\nThere are a number of ways in which 1.5°C or 2°C global warming can be defined—one could \nbe the long-term climate state following a stabilization of warming at that level, another could \nbe the state over a shorter period around the time of first reaching that level. Here we choose the \nsecond definition, which is what is seen first and hence needs to be adapted to. There are also \na number of methods with which such changes can be assessed [10]. We take the opportunity \nof availability of a new set of higher-resolutions transient climate and impacts simulations, and \nuse a time-sampling methodology [10] to assess global-scale impacts at these resolutions for the \nfirst time.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" - }, - { - "text": "This difference in approach led to inconsistencies in the definitions of the dates of GWLs \nin the two parts of the study. In the extremes analysis using raw model output, the dates of \npassing GWLs were defined on the basis of the global mean temperatures in the driving CMIP5 \nmodels relative to those models’ simulations of global mean temperature in 1870–1899 (table 3). \nHowever, in the HCVI and JULES analyses which used bias-corrected data, it was considered \nmore appropriate for the GWLs to be defined using the warming in the observational dataset", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "**16**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n\n\n**Figure 10.**Distributions of changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under the \nensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show the 25th and 75th percentile \nchanges, whiskers show the range, circles show the four projections that do not define the ends of the range, and crosses \nshow the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, in millimetres of rain \nequivalent. \n\nall members (figure 12). This is not the case for the precipitation and run-off results; for those \nquantities, there is substantial overlap in the ranges of changes at 2°C and 1.5°C, so there is not a \nconsistent picture of how much wetter or drier the world is projected to be in this ensemble, even \nthough it involves a single atmosphere model. \n\nFor TXx, the difference between 2°C and 1.5°C global warming is larger than the 0.5°C \ndifference in global mean temperature across most of the land surface in all ensemble members \n(figure 14). Although some ensemble members simulate local temperatures to be higher at 1.5°C \nglobal warming than 2°C in some small regions, these are relatively localized and most regions \nare cooler at 1.5°C global warming than 2°C. In many regions, the difference is between 0.5°C and \n1.0°C, but many other regions see larger differences. In several ensemble members, the difference \nis 1.5°C, 2°C or larger in large parts of North America, South America, Europe and China. \nFor example, over parts of Europe, where annual maximum daily temperature was projected \nto increase by over 5°C for a 2°C global warming, the local increase is limited to 3–4°C for \n1.5°C global warming. Limiting global warming by half a degree Celsius would, therefore, limit \nmaximum temperatures by three or four times as much in those areas (figure 14). \n\nAt 1.5°C global warming, although the increases in TXx are smaller than at 2°C, these increases \nshow similar geographical patterns as for 2°C in all ensemble members, with larger changes in \ncontinental interiors especially in the mid-latitudes (not shown). \n\nThe percentage of days exceeding the 90th percentile of daily temperature (Tx90p) also \nincreases less at 1.5°C global warming than at 2°C (figure 15). The largest reductions are in the \ntropics, where the largest increase was seen at 2°C; whereas at 2°C global warming, 50% or more", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed11.pdf" - }, - { - "text": "**23**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–20 –15 –10 –5 \n0 \n% \n5 10 15 20 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n\n**Figure 20.**Difference between 2°C and 1.5°C global warming in percentage changes in mean (top) run-off in JULES simulations \ndriven by the ensemble of HadGEM3 simulations. Note that the use of percentage changes emphasizes changes in regions where \nthe baseline streamflow is small. \n\n. \n. \n. \n\nThe largest regional differences between 2°C and 1.5°C global warming tend to be in the \nregions where the local impact is largest relative to the baseline. For TXx this is generally the mid- \nlatitudes, whereas for TX90p it is generally the tropics. So, broadly, the impacts at 1.5°C global \nwarming could be estimated by scaling-back the impacts at 2°C. \n\nThese results show some similarities with those from the CMIP5 models [9,38], but also some \nnotable differences. The CMIP5 models were at lower spatial resolution than the models used \nhere. Although the general patterns of change in TXx are broadly similar in our study and \nCMIP5, with greater warming in many continental interiors, is notable that our results show more \nmarked geographical variation than those from CMIP5 projections ([9], among others), with the \ncontinental interior warming being more intense in our projections. In particular, our results with \nHadGEM3 show more intense increases in maximum temperature in North America and Europe. \nOur projections of changes in consecutive dry days (CDD) broadly consistent with those found \nin a subset of the CMIP5 ensemble [9], although there are some differences. Our ensemble mean \nsuggests shorter dry spells in the central Amazon, whereas ISIMIP-indicated longer dry spells. \nAlso, as with the temperature indices, our results show greater geographical differentiation in the \nintensity of changes. \n\nThe decrease in Rx5day in some regions in our simulations contrasts with the subset of \nCMIP5 models used for the ISIMIP Fast-Track projections [9] which suggested an increase in \nRx5day almost everywhere where at least 66% of the model ensemble agreed on the sign of the \nchange, including all of northern South America. The reasons for these differences require further \ninvestigation, but some insight into possible reasons may be gained by examining the similarities \nand differences between our own individual ensemble members. \n\nFor all the CLIMPAct variables, the variations in global means between the ensemble members \nwere consistent at 1.5°C and 2°C. That is, the members with the largest changes at 2°C also showed \nthe largest changes at 1.5°C, and the same was true for the smallest changes, and the relative \nproportions of changes in other ensemble members. This suggests that variations between the \nensemble members at any particular GWL were not merely a consequence of internal variability", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed11.pdf" - }, - { - "text": "**Simulation of climate scenarios with global warming by 1.5 °C and 2.0 °C.**\nIn this study, climate \ndata of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models \ndriven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a \ntotal of 20 sets of data under four RCP scenarios of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL- \nCM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sun- \nshine hours (Fig. 1).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - }, - { - "text": "Article \n**#Climatechange vs. #Globalwarming: Characterizing**\n**Two Competing Climate Discourses on Twitter with**\n**Semantic Network and Temporal Analyses**\n\n**Wen Shi 1, Haohuan Fu 1,2, Peinan Wang 3, Changfeng Chen 3 and Jie Xiong 4,***\n\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, \n\nTsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); \nhaohuan@tsinghua.edu.cn (H.F.) \n\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China \n3 \n\nSchool of Journalism and Communication, Tsinghua University, Beijing 100084, China; \nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.) \nStrategy and Innovation Department, Rennes School of Business, 35065 Rennes, France \n\n4 \n** ***Correspondence: jie.xiong@rennes-sb.com; Tel.:+ 33-(0)-2-99-54-46-79 \n\n**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. \n\n**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed10.pdf" - }, - { - "text": "**5**\n\n\n \n \n \n \n [html]\n
IDdefinitionunitssector of relevance
TXxannual maximum daily maximum temperature° Chealth, agriculture and food security
TX90ppercentage of days above the 90th percentile of daily maximum temperature in the 1981 – 2010 average%health, agriculture and food security, water resources and hydrology
CDDmaximum number of consecutive days with precipitation less than 1 mmdayshealth, agriculture and food security, water resources and hydrology
RX5daymaximum consecutive 5 day precipitationmmhealth, agriculture and food security, water resources and hydrology
\n\nmembers at any given date. Since specific levels of global warming such as 1.5°C or 2°C were \nreached at different times in the different ensemble members, according to the SST forcings used, \nany given level of global warming could be associated with different radiative forcings in different \nensemble members. In any given ensemble member at any specific level of global warming, the \nCO2 concentration and SSTs were the same as in the driving CMIP5 model at that GWL. Land \ncover was fixed in this simulation—there was no dynamic vegetation nor any time-dependent \nanthropogenic land use change. \nSome comparison of the higher-resolution atmospheric simulations with the original CMIP5 \nsimulations, is provided by Wyser*et al.*[20]. \n\n(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index \n\nTo assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. \n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "**15**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–75 –50 –10 –1 \n0 \n% \n1 10 50 75 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n\n**Figure 9.**Changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under six climate simulations \nat 2°C global warming. (a) Ensemble mean and (b) percentage of models agreeing on increased flow. \n\n. \n. \n\nand 75%, especially in the Iberian Peninsula. Southern Africa also sees a decrease in low flows \nwhere changes in mean flows were small. Changes in high run-off show similar patterns and \nmagnitudes to those in mean run-off. \n\nThe simulated changes in both mean and low run-off flows show substantial differences \namong the six simulations (figures 10 and 11). In most basins examined here, the range of \noutcomes include both increases and decreases in mean and low flows for any particular basin, \nbut generally with the largest proportion simulating increases in both mean and low flows. In a \nfew cases, notably the Lena in northeast Asia and Ganges in southeast Asia, the ensemble agreed \nentirely or almost entirely on increased flows. Even here, the range of outcomes is large, with the \nprojected flow increases in the Ganges for 2°C global warming ranging from approximately 30% \nto more than 110%. \n\nExceptions to the general picture of consensus on increasing flows are seen in the Amazon, \nOrange, Danube and Guadiana basins where the range of projected extends more towards \ndecreased mean flows. Mean flows in the Amazon are projected to decline by up to 25% for 2°C \nglobal warming. For low flows, the ensemble of projections entirely gives decreased flows at 2°C \nglobal warming for these basins. \n\nThe signal of decreased flows was stronger for low flows than mean flows, and indeed in the \nNiger, the range of mean flow changes extended more towards increases whereas the range of \nlow flow changes extended more towards decreases. \n\n(b) Impacts at 1.5°C global warming compared to 2°C \n\nFor almost all quantities and simulations examined here, global-scale changes in extremes and \nrun-off at 1.5°C global warming (table 6) are smaller than those compared to 2°C (table 5; \nfigures 12 and 13). The exceptions to these are mean and low run-off which each show one \ninstance of a smaller change at 2°C than 1.5°C, but still with a majority of simulations showing \nlarger changes at 2°C (figure 13). For temperature-related indices, the ranges of change at the two \nGWLs do not overlap—the change at 2°C in all members is larger than the change at 1.5°C in", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed10.pdf", - "query": "Which of #climatechange and #globalwarming is the most used ?", - "target_page": 5, - "target_passage": "A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, and 887,731 contained #globalwarming", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Article \n**#Climatechange vs. #Globalwarming: Characterizing**\n**Two Competing Climate Discourses on Twitter with**\n**Semantic Network and Temporal Analyses**\n\n**Wen Shi 1, Haohuan Fu 1,2, Peinan Wang 3, Changfeng Chen 3 and Jie Xiong 4,***\n\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, \n\nTsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); \nhaohuan@tsinghua.edu.cn (H.F.) \n\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China \n3 \n\nSchool of Journalism and Communication, Tsinghua University, Beijing 100084, China; \nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.) \nStrategy and Innovation Department, Rennes School of Business, 35065 Rennes, France \n\n4 \n** ***Correspondence: jie.xiong@rennes-sb.com; Tel.:+ 33-(0)-2-99-54-46-79 \n\n**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. \n\n**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed10.pdf" - }, - { - "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. \n\nLarge amounts of user-generated data on social media, which have been valued in computer science, \ncommunication, and environmental studies [5,9,15–18], have enabled the acquistion of the social media \nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence \npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009 \nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify \nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to \nobserve the evolution of the two discourses and to measure whether the discrepancy between the two \nhas widened or narrowed within the 10-year period. \n\nTo be specific, we formulated three research questions (RQs) to be explored in this study: \n\nRQ1: What is the difference in how the two the discourses are associated with important climate \nconcepts in people’s minds? \nRQ2: How did the two competing climate discourses evolve from 2009 to 2018? \nRQ3: Did the two competing discourses converge or diverge in this decade? \n\n**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "\n \n \n \n \n [html]No.# Climatechange# Globalwarming\n
HashtagCentralityHashtagCentrality
23co20.174snow0.161
24weather0.169world0.157
25solar0.165gop *0.156
26economy0.164arctic0.150
27auspol0.163 *winter0.145
28education0.155p2 *0.144
29news0.152drought0.142
30drought0.150epa *0.141
31coal0.147global0.137
32sustainable0.147eco0.137
33cdnpoli0.144 *actonclimate0.136
34sdgs0.143 *health0.134
35china0.143un *0.133
36gop0.143 *solar0.132
37food0.141economy0.131
38un0.141 *hoax0.131
39cop24 *0.140california0.130
40agriculture0.138politics0.129
41environmental0.136india0.128
42fossilfuels0.134china0.127
43arctic0.134planet0.127
44epa *0.133parisagreement *0.126
45biodiversity0.132heatwave0.125
46future0.131summer0.121
47canada0.128nyc *0.118
48emissions0.128nasa0.118
49obama0.127future0.118
50politics0.125oil0.117
\n\nThe association networks of #climatechange and #globalwarming are shown in Figure 2. Nodes \nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of \nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and \nfive in the #globalwarming network, where clusters are differentiated by color (resolution is 0.75 for \nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each \ncluster are also summarized and represented in the network depicted in Figure 2. \n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer \nto general facts about global climate issues, sharing words about the causes or effects concerning \nsustainability. The difference is that the largest cluster of #globalwarming (46% of the network) includes \nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the \nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as \nagriculture, biodiversity, education, and politics.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "**3. Methods**\n\n3.1. Data Source \n\nAs Twitter has been recognized as a popular discussion forum [75] and a social activity platform [76] \nfor climate issues, we followed the literature [5,8,18] and used tweets to investigate distinct perceptions \nof climate issues and evolution on social media. Although Twitter’s ecosystem has been changing \nin terms of the number of active users, user demographics, and tweeting conventions in the past \nyears [77,78], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter \nis one of the most popular social websites, we defined our study as characterizing the perception of \nclimate issues among social media users rather than all the netizens or the whole population. \n\n3.2. Data \n\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. \n\nGiven our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. \n\n**Figure 1.**The number of tweets containing #climatechange or #globalwarming, and their ratio from \n2009 to 2018 (**a**). The number of hashtags contained in the “climate change” or “global warming” \ndatasets, and their ratio from 2009 to 2018 (**b**).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - }, - { - "text": "Caitlyn Kennedy, R.L. What’s the Difference between Global Warming and Climate Change? 2015. Available \nonline: https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and- \nclimate-change (accessed on 10 October 2019). \nPachauri, R.K.; Allen, M.R.; Barros, V.R.; Broome, J.; Cramer, W.; Christ, R.; Church, J.A.; Clarke, L.; Dahe, Q.; \nDasgupta, P.; et al. Climate Change 2014: Synthesis Report. Contribution of Working Groups I, II and III to the Fifth \nAssessment Report of the Intergovernmental Panel on Climate Change; IPCC: Geneva, Switzerland, 2014. \n9. Whitmarsh, L. What’s in a name? Commonalities and differences in public understanding of “climate \n\n7. \n\n8. \n\nchange” and “global warming”. Public Underst. Sci.**2009**, 18, 401–420. [CrossRef] \nShehata, A.; Hopmann, D.N. Framing climate change: A study of US and Swedish press coverage of global \nwarming. Journal. Stud.**2012**, 13, 175–192. [CrossRef] \nSchuldt, J.P.; Roh, S. Of accessibility and applicability: How heat-related cues affect belief in “global warming” \nversus “climate change”. Soc. Cogn.**2014**, 32, 217–238. [CrossRef] \n\n12. McCright, A.M.; Dunlap, R.E. Challenging global warming as a social problem: An analysis of the conservative \n\nmovement’s counter-claims. Soc. Probl.**2000**, 47, 499–522. [CrossRef] \n\n13. Lineman, M.; Do, Y.; Kim, J.Y.; Joo, G.J. Talking about climate change and global warming. PLoS ONE**2015**, \n\n10, e0138996. [CrossRef] \n\n14. Anderson, J.R. The Architecture of Cognition; Psychology Press: London, UK, 2013. \n15. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of traffic anomalies based on human mobility \nand social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in \nGeographic Information Systems, Orlando, FL, USA, 5–8 November 2013; pp. 344–353. \n\n16. Rogstadius, J.; Vukovic, M.; Teixeira, C.A.; Kostakos, V.; Karapanos, E.; Laredo, J.A. CrisisTracker: \nCrowdsourced social media curation for disaster awareness. IBM J. Res. Dev.**2013**, 57, 4:1–4:13. [CrossRef] \n17. Leetaru, K.; Wang, S.; Cao, G.; Padmanabhan, A.; Shook, E. Mapping the global Twitter heartbeat: The \n\ngeography of Twitter. First Monday**2013**, 18. [CrossRef] \n\n18. Kirilenko, A.P.; Molodtsova, T.; Stepchenkova, S.O. People as sensors: Mass media and local temperature \n\ninfluence climate change discussion on Twitter. Glob. Environ. Chang.**2015**, 30, 92–100. [CrossRef] \n\n19. Gamson, W.A.; Modigliani, A. Media discourse and public opinion on nuclear power: A constructionist \n\napproach. Am. J. Sociol.**1989**, 95, 1–37. [CrossRef] \n\n20. Entman, R.M. Framing: Toward clarification of a fractured paradigm. J. Commun.**1993**, 43, 51–58. [CrossRef] \n21. McCombs, M.; Llamas, J.P.; Lopez-Escobar, E.; Rey, F. Candidate images in Spanish elections: Second-level \n\nagenda-setting effects. Journal. Mass Commun. Q.**1997**, 74, 703–717. [CrossRef] \n\n22. Druckman, J.N. On the limits of framing effects: Who can frame? J. Politics**2001**, 63, 1041–1066. [CrossRef] \n23. Druckman, J.N. The implications of framing effects for citizen competence. Political Behav.**2001**, 23, 225–256. \n\n[CrossRef] \n\n24. Teigen, K.H.; Karevold, K.I. Looking back versus looking ahead: Framing of time and work at different \n\nstages of a project. J. Behav. Decis. Mak.**2005**, 18, 229–246. [CrossRef] \n\n25. McKenzie, C.R.; Nelson, J.D. What a speaker’s choice of frame reveals: Reference points, frame selection, \n\nand framing effects. Psychon. Bull. Rev.**2003**, 10, 596–602. [CrossRef] \n\n26. Du, Y.R. Same events, different stories: Internet censorship in the Arab Spring seen from China. Journal. \n\n27. \n\n28.", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - }, - { - "text": "column name to create two matrices. One matrix was created for the climate change discourse, and we \nfilled the cell whose column name and row name were among the top 50 list in the climate change \ndiscourse with the frequency at which the two hashtags were associated in this discourse, and the \nother cells were filled with 0. This was repeated for the global warming matrix. We thus obtained \ntwo matrices with the same row and column names but different values in the cells. Then, the two \nmatrices were input to the quadratic assignment procedure (QAP) [85] analysis provided by UCINET \nsoftware [86] to assess their correlation for each year. \n\n**4. Results**\n\n4.1. General Descriptions \n\nAssociation networks surrounding #climatechange and #globalwarming showed different \nproperties. The climate change discourse included 38,821 hashtags, whereas the global warming \ndiscourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the \ntwo discourses based on centrality. As some hashtags were used in the form of an abbreviation or \nphrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant \nwords. Hashtags “canada”, “cdnpoli”, “sdgs”, “biodiversity”, “education”, “environmental”, “cop24”, \n“sustainable”, “auspol”, “food”, “agriculture”, “cleanenergy”, “renewableenergy”, “renewables”, \n“emissions”, “coal”, “fossilfuels”, and “cop21” only showed up on the top 50 list of the “climate change” \nnetwork. Hashtags “tcot”, “california”, “p2”, “nyc”, “snow”, “agw”, “summer”, “global”, “winter”, \n“india”, “planet”, “heatwave”, “hoax”, “nasa”, “algore”, “world”, “oil”, and “eco” were unique on the \ntop 50 list of the global warming network. The two lists only shared three out of the top five hashtags. \nIn the #climatechange network, “climateaction” was ranked third place and “sustainability” was \nranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the \n#globalwarming network. In the #globalwarming network, “earth” and “weather” were among the \ntop five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "**Figure 5.**The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to \n2018 (**a**); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to \n2018 (**b**). \n\nAs the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. \n\n**Figure 6.**Rank order correlation between hashtags in the climate change and global warming discourses \nfrom 2009 to 2018 (**a**); correlation between matrices of the climate change discourse and the global \nwarming discourse from 2009 to 2018 (**b**). \n\n**5. Discussion**\n\n5.1. Themes and Structure of the Two Discourses \n\n5.1.1. Phenomenon vs. Mechanism of Action \n\nClimate change and global warming have long been two competing frameworks shaping the \npublic’s perceptions, memory, and interpretations of climate issue by highlighting different aspects of", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed10.pdf" - }, - { - "text": "issues and re-constructing them differently. By comparing the persistent words used related to the two \ndiscourses in the 10-year period in Table 2, we think that global warming showed a relative preference \ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change” \nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”. \n\nStudies have suggested that the public shows a preference for scientific publications with general \nkeywords compared with those with complicated scientific jargon [47], lacking a deep understanding of \nthe complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions \nseem to suit global warming more than climate change according to the current study, which is \nprobably because climate change receives more publicity and recognition than global warming in the \nscientific community. In the association network shown in Figure 2, global warming was found to be \nmore connected with temperature abnormalities. This finding is in accordance with studies reporting \nthat short-term temperature anomalies [87] can increase the public’s belief about global warming by \nincreasing the understanding of this abstract issue [88], although scientists mostly make judgments \nbased on long-term weather statistics [89]. However, none of the four words, “snow”, “summer”, \n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes \nlist of the climate change network. \n\nEven when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. \n\n5.1.3. Discourse Structure", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "**6. Conclusions**\n\nAs social media is gradually overtaking the role of legacy media providing a forum for public \ndiscussion, the semantic associations contained in social media discussions reflect and reinforce how \nindividuals portray global climate issues. By examining hashtag co-occurrence patterns on Twitter \nbetween 2009 and 2018, we identified distinct climate perceptions hidden behind two competing \nclimate discourses and discovered how these two discourses evolved. \n\nWe found that broad scientific, social, political, and international discussions are the topics \nof public climate discourse. Although the semantic difference between climate change and global \nwarming seems subtle, the differences in their cognitive associations are not trivial. Despite some \nshared concerns between the two discourses, “global warming” is more politicized and focuses more on \ngeneral phenomena, especially temperature abnormalities, whereas climate change is a more compact \ntopic with a more scientific perspective and tends to refer to specific issues. The temporal analysis \nrevealed that traditional political discussions decreased in both discourses but climate change started to \nbuild a discourse alliance with diverse domestic issues to show political intentions. Global warming’s \nassociations to extreme events and temperature change were suddenly strengthened around 2012. \nClimate change is becoming dominant compared with global warming in public discussions. Although \nthe two discourses are becoming increasingly similar in the rank order of climate concepts, a notable \ndiscrepancy still exists in the way in which they get concepts associated. These observations may \nprovide climate communicators with theoretical and practical hints to narrow the discrepancy between \ndiverse climate perceptions. \n\nThough big data allowed us to decrease the bias by dealing with the whole set of social media \ndata rather than samples, discrepancies still exist between social media users and the public. As most \nTwitter users do not disclose their age, education, income, and gender in users’ profile, demographics \nwere not introduced as moderator factors in this study. Previous studies noted that in 1970s, global \ncooling was a prominent climate concern amongst the public [105]. While in the 1980s, ozone layer \ndepletion, species extinction and rainforest destruction became salient on the mass media agenda [106]. \nConsidering the historical background of climate issues, age might influence how individuals perceive \nclimate issues. According to the statistics in 2017 [107], only 16 % of older people (older than 60) \nin America use Twitter, while the proportion is 39% for people between 30–59 years old and 47% \nfor people younger than 30 years old (Stastista, 2017). Our results reflect the climate perception of \nolder people who use Twitter, as well as younger people amongst whom Twitter is more popular. \nAlthough some scholars reported that it is statistically reliable to take data on Twitter as a substitute \nand supplement for polling [108], we thought our results should be further examined before being \ngeneralized to the whole population.", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" - }, - { - "text": "conducted to reveal the interactions between public discourse and natural, scientific, social, or political \nevents. In particular, factors promoting public consensus and factors resulting in discourse discrepancy \nshould be further identified to help climate communicators narrow the public cognitive divergence \nabout the global climate issue. \n\n**Supplementary Materials:**The following are available online at http://www.mdpi.com/1660-4601/17/3/1062/s1. \n\n**Author Contributions:**W.S. designed the study, collected the data, conducted the analysis, and wrote the article. \nH.F. offered suggestions to the part of temporal analysis. P.W. contributed to the hashtag co-occurrence part. C.C. \nhelped with the design of the study. J.X. contributed to the framing of the article and helped with the revision. \nAll authors have read and agreed to the published version of the manuscript. \n\n**Funding:**This work was supported in part by the National Key R&D Program of China (Grant No. \n2017YFA0604500), by the National Natural Science Foundation of China (Grant No. 51761135015, 71772142 and \nU1839206), by the National Social Science Foundation of China (Grant No.18ZDA307), by the Center for High \nPerformance Computing and System Simulation, and by the Pilot National Laboratory for Marine Science and \nTechnology (Qingdao). \n\n**Conflicts of Interest:**The authors declare no conflict of interest. \n\n**Appendix A**\n\n#agw, short for anthropogenic global warming, indicating global warming is caused by \n\nhuman activities. \n\n#cdnpoli, short for Canadian politics \n#cop21, the yearly session of COP (short for the Conference of the Parties) held in 2015. \n#cop24, the yearly session of COP (short for the Conference of the Parties) held in 2018. \n#epa, short for the United States Environmental Protection Agency founded in 1970, an agency \n\naiming at protecting environment. \n\n#gop, short for Grand Old Party, the Republican political party in the United States. \n#nyc, short for New York City \n#p2, short for Progressives 2.0, a hashtag used to show progressive political standpoints on Twitter. \n#parisagreement, Paris Agreement, the agreement signed on UNFCCC in 2016 to deal with global \n\nwarming by reducing greenhouse gas emissions. \n\n#sdgs, short for Sustainable Development Goals, containing 17 global goals put forward by the \n\nUnited Nations General Assembly in 2015 and expected to be achieved in 2030. \n\n#tcot, short for Top Conservatives On Twitter, a hashtag used to show conservative political \n\nstandpoints on Twitter. \n\n#un, short for the United Nations \n#us, short for the United States \n\n**References**\n\n1. Nisbet, M.C. Communicating climate change: Why frames matter for public engagement. Environ. Sci. \n\n2. \n\n3. \n\n4. \n\n5. \n\n6. \n\nPolicy Sustain. Dev.**2009**, 51, 12–23. [CrossRef] \nRoxburgh, N.; Guan, D.; Shin, K.J.; Rand, W.; Managi, S.; Lovelace, R.; Meng, J. Characterising climate change \ndiscourse on social media during extreme weather events. Glob. Environ. Chang.**2019**, 54, 50–60. [CrossRef] \nSchuldt, J.P.; Konrath, S.H.; Schwarz, N. “Global warming” or “climate change”? Whether the planet is \nwarming depends on question wording. Public Opin. Q.**2011**, 75, 115–124. [CrossRef] \nVillar, A.; Krosnick, J.A. Global warming vs. climate change, taxes vs. prices: Does word choice matter? \nClim. Chang.**2011**, 105, 1–12. [CrossRef] \nJang, S.M.; Hart, P.S. Polarized frames on “climate change” and “global warming” across countries and \nstates: Evidence from Twitter big data. Glob. Environ. Chang.**2015**, 32, 11–17. [CrossRef] \nUnited States Environmental Protection Agency. Climate Change: Basic Information. Available online: \nhttps://19january2017snapshot.epa.gov/climatechange/climate-change-basic-information_.html (accessed on \n10 October 2019).", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed10.pdf", - "query": "Is the #climateaction hashtag more bound the #globalwarming of #climatechange ?", - "target_page": 7, - "target_passage": "In the #climatechange network, “climateaction” was ranked third place and “sustainability” was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Article \n**#Climatechange vs. #Globalwarming: Characterizing**\n**Two Competing Climate Discourses on Twitter with**\n**Semantic Network and Temporal Analyses**\n\n**Wen Shi 1, Haohuan Fu 1,2, Peinan Wang 3, Changfeng Chen 3 and Jie Xiong 4,***\n\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, \n\nTsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); \nhaohuan@tsinghua.edu.cn (H.F.) \n\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China \n3 \n\nSchool of Journalism and Communication, Tsinghua University, Beijing 100084, China; \nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.) \nStrategy and Innovation Department, Rennes School of Business, 35065 Rennes, France \n\n4 \n** ***Correspondence: jie.xiong@rennes-sb.com; Tel.:+ 33-(0)-2-99-54-46-79 \n\n**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. \n\n**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed10.pdf" - }, - { - "text": "**3. Methods**\n\n3.1. Data Source \n\nAs Twitter has been recognized as a popular discussion forum [75] and a social activity platform [76] \nfor climate issues, we followed the literature [5,8,18] and used tweets to investigate distinct perceptions \nof climate issues and evolution on social media. Although Twitter’s ecosystem has been changing \nin terms of the number of active users, user demographics, and tweeting conventions in the past \nyears [77,78], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter \nis one of the most popular social websites, we defined our study as characterizing the perception of \nclimate issues among social media users rather than all the netizens or the whole population. \n\n3.2. Data \n\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. \n\nGiven our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. \n\n**Figure 1.**The number of tweets containing #climatechange or #globalwarming, and their ratio from \n2009 to 2018 (**a**). The number of hashtags contained in the “climate change” or “global warming” \ndatasets, and their ratio from 2009 to 2018 (**b**).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - }, - { - "text": "\n \n \n \n \n [html]No.# Climatechange# Globalwarming\n
HashtagCentralityHashtagCentrality
23co20.174snow0.161
24weather0.169world0.157
25solar0.165gop *0.156
26economy0.164arctic0.150
27auspol0.163 *winter0.145
28education0.155p2 *0.144
29news0.152drought0.142
30drought0.150epa *0.141
31coal0.147global0.137
32sustainable0.147eco0.137
33cdnpoli0.144 *actonclimate0.136
34sdgs0.143 *health0.134
35china0.143un *0.133
36gop0.143 *solar0.132
37food0.141economy0.131
38un0.141 *hoax0.131
39cop24 *0.140california0.130
40agriculture0.138politics0.129
41environmental0.136india0.128
42fossilfuels0.134china0.127
43arctic0.134planet0.127
44epa *0.133parisagreement *0.126
45biodiversity0.132heatwave0.125
46future0.131summer0.121
47canada0.128nyc *0.118
48emissions0.128nasa0.118
49obama0.127future0.118
50politics0.125oil0.117
\n\nThe association networks of #climatechange and #globalwarming are shown in Figure 2. Nodes \nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of \nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and \nfive in the #globalwarming network, where clusters are differentiated by color (resolution is 0.75 for \nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each \ncluster are also summarized and represented in the network depicted in Figure 2. \n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer \nto general facts about global climate issues, sharing words about the causes or effects concerning \nsustainability. The difference is that the largest cluster of #globalwarming (46% of the network) includes \nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the \nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as \nagriculture, biodiversity, education, and politics.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "column name to create two matrices. One matrix was created for the climate change discourse, and we \nfilled the cell whose column name and row name were among the top 50 list in the climate change \ndiscourse with the frequency at which the two hashtags were associated in this discourse, and the \nother cells were filled with 0. This was repeated for the global warming matrix. We thus obtained \ntwo matrices with the same row and column names but different values in the cells. Then, the two \nmatrices were input to the quadratic assignment procedure (QAP) [85] analysis provided by UCINET \nsoftware [86] to assess their correlation for each year. \n\n**4. Results**\n\n4.1. General Descriptions \n\nAssociation networks surrounding #climatechange and #globalwarming showed different \nproperties. The climate change discourse included 38,821 hashtags, whereas the global warming \ndiscourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the \ntwo discourses based on centrality. As some hashtags were used in the form of an abbreviation or \nphrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant \nwords. Hashtags “canada”, “cdnpoli”, “sdgs”, “biodiversity”, “education”, “environmental”, “cop24”, \n“sustainable”, “auspol”, “food”, “agriculture”, “cleanenergy”, “renewableenergy”, “renewables”, \n“emissions”, “coal”, “fossilfuels”, and “cop21” only showed up on the top 50 list of the “climate change” \nnetwork. Hashtags “tcot”, “california”, “p2”, “nyc”, “snow”, “agw”, “summer”, “global”, “winter”, \n“india”, “planet”, “heatwave”, “hoax”, “nasa”, “algore”, “world”, “oil”, and “eco” were unique on the \ntop 50 list of the global warming network. The two lists only shared three out of the top five hashtags. \nIn the #climatechange network, “climateaction” was ranked third place and “sustainability” was \nranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the \n#globalwarming network. In the #globalwarming network, “earth” and “weather” were among the \ntop five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "**Figure 5.**The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to \n2018 (**a**); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to \n2018 (**b**). \n\nAs the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. \n\n**Figure 6.**Rank order correlation between hashtags in the climate change and global warming discourses \nfrom 2009 to 2018 (**a**); correlation between matrices of the climate change discourse and the global \nwarming discourse from 2009 to 2018 (**b**). \n\n**5. Discussion**\n\n5.1. Themes and Structure of the Two Discourses \n\n5.1.1. Phenomenon vs. Mechanism of Action \n\nClimate change and global warming have long been two competing frameworks shaping the \npublic’s perceptions, memory, and interpretations of climate issue by highlighting different aspects of", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed10.pdf" - }, - { - "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. \n\nLarge amounts of user-generated data on social media, which have been valued in computer science, \ncommunication, and environmental studies [5,9,15–18], have enabled the acquistion of the social media \nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence \npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009 \nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify \nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to \nobserve the evolution of the two discourses and to measure whether the discrepancy between the two \nhas widened or narrowed within the 10-year period. \n\nTo be specific, we formulated three research questions (RQs) to be explored in this study: \n\nRQ1: What is the difference in how the two the discourses are associated with important climate \nconcepts in people’s minds? \nRQ2: How did the two competing climate discourses evolve from 2009 to 2018? \nRQ3: Did the two competing discourses converge or diverge in this decade? \n\n**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "For the climate change discourse, the second-largest cluster (34%) is indicated in red and focuses \non the responsibility to tackle climate change, where several global action hashtags are included, such \nas “un”, “parisagreement”, “cop21”, and “cop24”. The theme of the third largest cluster (20%) in \nthe climate change discourse was energy (in blue). The smallest cluster (6%) in yellow sits in the \ncentral part of the network with a mixed theme composed of three highly ranked hashtags, including \n“environment” (No. 2), “climateaction” (No. 3), and “energy” (No. 6).", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "Caitlyn Kennedy, R.L. What’s the Difference between Global Warming and Climate Change? 2015. Available \nonline: https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and- \nclimate-change (accessed on 10 October 2019). \nPachauri, R.K.; Allen, M.R.; Barros, V.R.; Broome, J.; Cramer, W.; Christ, R.; Church, J.A.; Clarke, L.; Dahe, Q.; \nDasgupta, P.; et al. Climate Change 2014: Synthesis Report. Contribution of Working Groups I, II and III to the Fifth \nAssessment Report of the Intergovernmental Panel on Climate Change; IPCC: Geneva, Switzerland, 2014. \n9. Whitmarsh, L. What’s in a name? Commonalities and differences in public understanding of “climate \n\n7. \n\n8. \n\nchange” and “global warming”. Public Underst. Sci.**2009**, 18, 401–420. [CrossRef] \nShehata, A.; Hopmann, D.N. Framing climate change: A study of US and Swedish press coverage of global \nwarming. Journal. Stud.**2012**, 13, 175–192. [CrossRef] \nSchuldt, J.P.; Roh, S. Of accessibility and applicability: How heat-related cues affect belief in “global warming” \nversus “climate change”. Soc. Cogn.**2014**, 32, 217–238. [CrossRef] \n\n12. McCright, A.M.; Dunlap, R.E. Challenging global warming as a social problem: An analysis of the conservative \n\nmovement’s counter-claims. Soc. Probl.**2000**, 47, 499–522. [CrossRef] \n\n13. Lineman, M.; Do, Y.; Kim, J.Y.; Joo, G.J. Talking about climate change and global warming. PLoS ONE**2015**, \n\n10, e0138996. [CrossRef] \n\n14. Anderson, J.R. The Architecture of Cognition; Psychology Press: London, UK, 2013. \n15. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of traffic anomalies based on human mobility \nand social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in \nGeographic Information Systems, Orlando, FL, USA, 5–8 November 2013; pp. 344–353. \n\n16. Rogstadius, J.; Vukovic, M.; Teixeira, C.A.; Kostakos, V.; Karapanos, E.; Laredo, J.A. CrisisTracker: \nCrowdsourced social media curation for disaster awareness. IBM J. Res. Dev.**2013**, 57, 4:1–4:13. [CrossRef] \n17. Leetaru, K.; Wang, S.; Cao, G.; Padmanabhan, A.; Shook, E. Mapping the global Twitter heartbeat: The \n\ngeography of Twitter. First Monday**2013**, 18. [CrossRef] \n\n18. Kirilenko, A.P.; Molodtsova, T.; Stepchenkova, S.O. People as sensors: Mass media and local temperature \n\ninfluence climate change discussion on Twitter. Glob. Environ. Chang.**2015**, 30, 92–100. [CrossRef] \n\n19. Gamson, W.A.; Modigliani, A. Media discourse and public opinion on nuclear power: A constructionist \n\napproach. Am. J. Sociol.**1989**, 95, 1���37. [CrossRef] \n\n20. Entman, R.M. Framing: Toward clarification of a fractured paradigm. J. Commun.**1993**, 43, 51–58. [CrossRef] \n21. McCombs, M.; Llamas, J.P.; Lopez-Escobar, E.; Rey, F. Candidate images in Spanish elections: Second-level \n\nagenda-setting effects. Journal. Mass Commun. Q.**1997**, 74, 703–717. [CrossRef] \n\n22. Druckman, J.N. On the limits of framing effects: Who can frame? J. Politics**2001**, 63, 1041–1066. [CrossRef] \n23. Druckman, J.N. The implications of framing effects for citizen competence. Political Behav.**2001**, 23, 225–256. \n\n[CrossRef] \n\n24. Teigen, K.H.; Karevold, K.I. Looking back versus looking ahead: Framing of time and work at different \n\nstages of a project. J. Behav. Decis. Mak.**2005**, 18, 229–246. [CrossRef] \n\n25. McKenzie, C.R.; Nelson, J.D. What a speaker’s choice of frame reveals: Reference points, frame selection, \n\nand framing effects. Psychon. Bull. Rev.**2003**, 10, 596–602. [CrossRef] \n\n26. Du, Y.R. Same events, different stories: Internet censorship in the Arab Spring seen from China. Journal. \n\n27. \n\n28.", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - }, - { - "text": "Figure 3 depicts the associations of hashtags in the climate change discourse for each year \nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the \nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg” \n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global \nactions cluster (in yellow) because these hashtags were frequently used in the global action context and \nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags, \nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental \nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change), \nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political \nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political \nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining \n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of \nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased \nin the last two years of the period according to Figure 5a. \n\nFigure 4 describes the evolution of concepts’ associations in the global warming discourse during \nthe 10 years. The red cluster included concepts such as “2012”, “hot”, “summer”, “elnino”, and “snow”, \ndescribing the weather abnormalities related to global warming. A notable finding is that before 2012, \nglobal warming’s association with temperature abnormalities and extreme weather was not salient,", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "**6. Conclusions**\n\nAs social media is gradually overtaking the role of legacy media providing a forum for public \ndiscussion, the semantic associations contained in social media discussions reflect and reinforce how \nindividuals portray global climate issues. By examining hashtag co-occurrence patterns on Twitter \nbetween 2009 and 2018, we identified distinct climate perceptions hidden behind two competing \nclimate discourses and discovered how these two discourses evolved. \n\nWe found that broad scientific, social, political, and international discussions are the topics \nof public climate discourse. Although the semantic difference between climate change and global \nwarming seems subtle, the differences in their cognitive associations are not trivial. Despite some \nshared concerns between the two discourses, “global warming” is more politicized and focuses more on \ngeneral phenomena, especially temperature abnormalities, whereas climate change is a more compact \ntopic with a more scientific perspective and tends to refer to specific issues. The temporal analysis \nrevealed that traditional political discussions decreased in both discourses but climate change started to \nbuild a discourse alliance with diverse domestic issues to show political intentions. Global warming’s \nassociations to extreme events and temperature change were suddenly strengthened around 2012. \nClimate change is becoming dominant compared with global warming in public discussions. Although \nthe two discourses are becoming increasingly similar in the rank order of climate concepts, a notable \ndiscrepancy still exists in the way in which they get concepts associated. These observations may \nprovide climate communicators with theoretical and practical hints to narrow the discrepancy between \ndiverse climate perceptions. \n\nThough big data allowed us to decrease the bias by dealing with the whole set of social media \ndata rather than samples, discrepancies still exist between social media users and the public. As most \nTwitter users do not disclose their age, education, income, and gender in users’ profile, demographics \nwere not introduced as moderator factors in this study. Previous studies noted that in 1970s, global \ncooling was a prominent climate concern amongst the public [105]. While in the 1980s, ozone layer \ndepletion, species extinction and rainforest destruction became salient on the mass media agenda [106]. \nConsidering the historical background of climate issues, age might influence how individuals perceive \nclimate issues. According to the statistics in 2017 [107], only 16 % of older people (older than 60) \nin America use Twitter, while the proportion is 39% for people between 30–59 years old and 47% \nfor people younger than 30 years old (Stastista, 2017). Our results reflect the climate perception of \nolder people who use Twitter, as well as younger people amongst whom Twitter is more popular. \nAlthough some scholars reported that it is statistically reliable to take data on Twitter as a substitute \nand supplement for polling [108], we thought our results should be further examined before being \ngeneralized to the whole population.", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed10.pdf", - "query": "What are two main reasons for one's low climate concern ?", - "target_page": 13, - "target_passage": "As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "issues and re-constructing them differently. By comparing the persistent words used related to the two \ndiscourses in the 10-year period in Table 2, we think that global warming showed a relative preference \ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change” \nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”. \n\nStudies have suggested that the public shows a preference for scientific publications with general \nkeywords compared with those with complicated scientific jargon [47], lacking a deep understanding of \nthe complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions \nseem to suit global warming more than climate change according to the current study, which is \nprobably because climate change receives more publicity and recognition than global warming in the \nscientific community. In the association network shown in Figure 2, global warming was found to be \nmore connected with temperature abnormalities. This finding is in accordance with studies reporting \nthat short-term temperature anomalies [87] can increase the public’s belief about global warming by \nincreasing the understanding of this abstract issue [88], although scientists mostly make judgments \nbased on long-term weather statistics [89]. However, none of the four words, “snow”, “summer”, \n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes \nlist of the climate change network. \n\nEven when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. \n\n5.1.3. Discourse Structure", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames \n\nExisting studies have noted that the subtle difference between climate change and global warming \nevokes different public cognitive responses, where global warming“indicates heat-related impacts, \nhuman causes, increased UV light penetration, ozone depletion, and the greenhouse effect, whereas \nclimate change is more associated with a wide range of influences on climate, including drought and \nagriculture [9]. An N-gram analysis suggested that global warming showed a closer connection with \nice, snow, and sea, whereas climate change was always connected with scientific investigations, such as", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "**6. Conclusions**\n\nAs social media is gradually overtaking the role of legacy media providing a forum for public \ndiscussion, the semantic associations contained in social media discussions reflect and reinforce how \nindividuals portray global climate issues. By examining hashtag co-occurrence patterns on Twitter \nbetween 2009 and 2018, we identified distinct climate perceptions hidden behind two competing \nclimate discourses and discovered how these two discourses evolved. \n\nWe found that broad scientific, social, political, and international discussions are the topics \nof public climate discourse. Although the semantic difference between climate change and global \nwarming seems subtle, the differences in their cognitive associations are not trivial. Despite some \nshared concerns between the two discourses, “global warming” is more politicized and focuses more on \ngeneral phenomena, especially temperature abnormalities, whereas climate change is a more compact \ntopic with a more scientific perspective and tends to refer to specific issues. The temporal analysis \nrevealed that traditional political discussions decreased in both discourses but climate change started to \nbuild a discourse alliance with diverse domestic issues to show political intentions. Global warming’s \nassociations to extreme events and temperature change were suddenly strengthened around 2012. \nClimate change is becoming dominant compared with global warming in public discussions. Although \nthe two discourses are becoming increasingly similar in the rank order of climate concepts, a notable \ndiscrepancy still exists in the way in which they get concepts associated. These observations may \nprovide climate communicators with theoretical and practical hints to narrow the discrepancy between \ndiverse climate perceptions. \n\nThough big data allowed us to decrease the bias by dealing with the whole set of social media \ndata rather than samples, discrepancies still exist between social media users and the public. As most \nTwitter users do not disclose their age, education, income, and gender in users’ profile, demographics \nwere not introduced as moderator factors in this study. Previous studies noted that in 1970s, global \ncooling was a prominent climate concern amongst the public [105]. While in the 1980s, ozone layer \ndepletion, species extinction and rainforest destruction became salient on the mass media agenda [106]. \nConsidering the historical background of climate issues, age might influence how individuals perceive \nclimate issues. According to the statistics in 2017 [107], only 16 % of older people (older than 60) \nin America use Twitter, while the proportion is 39% for people between 30–59 years old and 47% \nfor people younger than 30 years old (Stastista, 2017). Our results reflect the climate perception of \nolder people who use Twitter, as well as younger people amongst whom Twitter is more popular. \nAlthough some scholars reported that it is statistically reliable to take data on Twitter as a substitute \nand supplement for polling [108], we thought our results should be further examined before being \ngeneralized to the whole population.", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" - }, - { - "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. \n\nLarge amounts of user-generated data on social media, which have been valued in computer science, \ncommunication, and environmental studies [5,9,15–18], have enabled the acquistion of the social media \nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence \npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009 \nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify \nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to \nobserve the evolution of the two discourses and to measure whether the discrepancy between the two \nhas widened or narrowed within the 10-year period. \n\nTo be specific, we formulated three research questions (RQs) to be explored in this study: \n\nRQ1: What is the difference in how the two the discourses are associated with important climate \nconcepts in people’s minds? \nRQ2: How did the two competing climate discourses evolve from 2009 to 2018? \nRQ3: Did the two competing discourses converge or diverge in this decade? \n\n**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "Article \n**#Climatechange vs. #Globalwarming: Characterizing**\n**Two Competing Climate Discourses on Twitter with**\n**Semantic Network and Temporal Analyses**\n\n**Wen Shi 1, Haohuan Fu 1,2, Peinan Wang 3, Changfeng Chen 3 and Jie Xiong 4,***\n\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, \n\nTsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); \nhaohuan@tsinghua.edu.cn (H.F.) \n\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China \n3 \n\nSchool of Journalism and Communication, Tsinghua University, Beijing 100084, China; \nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.) \nStrategy and Innovation Department, Rennes School of Business, 35065 Rennes, France \n\n4 \n** ***Correspondence: jie.xiong@rennes-sb.com; Tel.:+ 33-(0)-2-99-54-46-79 \n\n**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. \n\n**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed10.pdf" - }, - { - "text": "For the climate change discourse, the second-largest cluster (34%) is indicated in red and focuses \non the responsibility to tackle climate change, where several global action hashtags are included, such \nas “un”, “parisagreement”, “cop21”, and “cop24”. The theme of the third largest cluster (20%) in \nthe climate change discourse was energy (in blue). The smallest cluster (6%) in yellow sits in the \ncentral part of the network with a mixed theme composed of three highly ranked hashtags, including \n“environment” (No. 2), “climateaction” (No. 3), and “energy” (No. 6).", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "In this study, we characterized the differences between two popular climate discourses and \nexamined how two discourses evolved over a 10-year period. We did not focus on the interactions \nbetween public climate discourse and external factors. However, the evolution of climate discourse \nmight be driven by several external forces such as scientific efforts, natural events, politics and \nonline information (or misinformation) campaigns. The prevalence of certain climate concepts may \ninverse be weaponized to cause rhetorical shifts in politics and science popularization. For instance, \nprevious studies noted that in the 2016 U.S. Presidential Election, state-supported misinformation \ncampaigns took place to manipulate public opinion [109] and fake accounts were involved in spreading \nlow-credibility news on Twitter [110]. How social media climate discourse reflects and interacts with \nother sub-systems of our society should be noticed and explored in future. More studies like [2], who \nexamined the influence of several extreme events on public climate change perception, should be", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" - }, - { - "text": "and framing effects. Psychon. Bull. Rev.**2003**, 10, 596–602. [CrossRef] \n\n26. Du, Y.R. Same events, different stories: Internet censorship in the Arab Spring seen from China. Journal. \n\n27. \n\n28. \n\nMass Commun. Q.**2016**, 93, 99–117. [CrossRef] \nSchuldt, J.P.; Roh, S. Media frames and cognitive accessibility: What do “global warming” and “climate \nchange” evoke in partisan minds? Environ. Commun.**2014**, 8, 529–548. [CrossRef] \nSonnett, J. Climates of risk: A field analysis of global climate change in US media discourse, 1997–2004. \nPublic Underst. Sci.**2010**, 19, 698–716. [CrossRef] \nJaspal, R.; Nerlich, B.; Van Vuuren, K. Embracing and resisting climate identities in the Australian press: \nSceptics, scientists and politics. Public Underst. Sci.**2016**, 25, 807–824. [CrossRef] [PubMed] \nShi, W.; Chen, C.; Xiong, J.; Fu, H. What Framework Promotes Saliency of Climate Change Issues on Online \nPublic Agenda: A Quantitative Study of Online Knowledge Community Quora. Sustainability**2019**, 11, 1619. \n[CrossRef] \n\n31. Gifford, R.; Comeau, L.A. Message framing influences perceived climate change competence, engagement, \n\nand behavioral intentions. Glob. Environ. Chang.**2011**, 21, 1301–1307. [CrossRef] \nJiang, H.; Qiang, M.; Zhang, D.; Wen, Q.; Xia, B.; An, N. Climate Change Communication in an Online Q&A \nCommunity: A Case Study of Quora. Sustainability**2018**, 10, 1509. \n\n32.", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - }, - { - "text": "conducted to reveal the interactions between public discourse and natural, scientific, social, or political \nevents. In particular, factors promoting public consensus and factors resulting in discourse discrepancy \nshould be further identified to help climate communicators narrow the public cognitive divergence \nabout the global climate issue. \n\n**Supplementary Materials:**The following are available online at http://www.mdpi.com/1660-4601/17/3/1062/s1. \n\n**Author Contributions:**W.S. designed the study, collected the data, conducted the analysis, and wrote the article. \nH.F. offered suggestions to the part of temporal analysis. P.W. contributed to the hashtag co-occurrence part. C.C. \nhelped with the design of the study. J.X. contributed to the framing of the article and helped with the revision. \nAll authors have read and agreed to the published version of the manuscript. \n\n**Funding:**This work was supported in part by the National Key R&D Program of China (Grant No. \n2017YFA0604500), by the National Natural Science Foundation of China (Grant No. 51761135015, 71772142 and \nU1839206), by the National Social Science Foundation of China (Grant No.18ZDA307), by the Center for High \nPerformance Computing and System Simulation, and by the Pilot National Laboratory for Marine Science and \nTechnology (Qingdao). \n\n**Conflicts of Interest:**The authors declare no conflict of interest. \n\n**Appendix A**\n\n#agw, short for anthropogenic global warming, indicating global warming is caused by \n\nhuman activities. \n\n#cdnpoli, short for Canadian politics \n#cop21, the yearly session of COP (short for the Conference of the Parties) held in 2015. \n#cop24, the yearly session of COP (short for the Conference of the Parties) held in 2018. \n#epa, short for the United States Environmental Protection Agency founded in 1970, an agency \n\naiming at protecting environment. \n\n#gop, short for Grand Old Party, the Republican political party in the United States. \n#nyc, short for New York City \n#p2, short for Progressives 2.0, a hashtag used to show progressive political standpoints on Twitter. \n#parisagreement, Paris Agreement, the agreement signed on UNFCCC in 2016 to deal with global \n\nwarming by reducing greenhouse gas emissions. \n\n#sdgs, short for Sustainable Development Goals, containing 17 global goals put forward by the \n\nUnited Nations General Assembly in 2015 and expected to be achieved in 2030. \n\n#tcot, short for Top Conservatives On Twitter, a hashtag used to show conservative political \n\nstandpoints on Twitter. \n\n#un, short for the United Nations \n#us, short for the United States \n\n**References**\n\n1. Nisbet, M.C. Communicating climate change: Why frames matter for public engagement. Environ. Sci. \n\n2. \n\n3. \n\n4. \n\n5. \n\n6. \n\nPolicy Sustain. Dev.**2009**, 51, 12–23. [CrossRef] \nRoxburgh, N.; Guan, D.; Shin, K.J.; Rand, W.; Managi, S.; Lovelace, R.; Meng, J. Characterising climate change \ndiscourse on social media during extreme weather events. Glob. Environ. Chang.**2019**, 54, 50–60. [CrossRef] \nSchuldt, J.P.; Konrath, S.H.; Schwarz, N. “Global warming” or “climate change”? Whether the planet is \nwarming depends on question wording. Public Opin. Q.**2011**, 75, 115–124. [CrossRef] \nVillar, A.; Krosnick, J.A. Global warming vs. climate change, taxes vs. prices: Does word choice matter? \nClim. Chang.**2011**, 105, 1–12. [CrossRef] \nJang, S.M.; Hart, P.S. Polarized frames on “climate change” and “global warming” across countries and \nstates: Evidence from Twitter big data. Glob. Environ. Chang.**2015**, 32, 11–17. [CrossRef] \nUnited States Environmental Protection Agency. Climate Change: Basic Information. Available online: \nhttps://19january2017snapshot.epa.gov/climatechange/climate-change-basic-information_.html (accessed on \n10 October 2019).", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed10.pdf" - }, - { - "text": "If you are leaving for personal reasons (such as moving away, starting a \nfamily, or retiring), you may feel sad about leaving. But if you are leaving \nfor a better opportunity, or you’ve simply had enough of your current job, \nyou may be glad to be moving on.", - "page_start": 47, - "page_end": 47, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "infographic3.pdf", - "query": "How many scholarly articles are published every year ?", - "target_page": 1, - "target_passage": "over 3 million scholarly articles published per year", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**193 different languages**\n**included in ORCID records**\n\n**73.6% of records have**\n**granted update permissions**\n\n**1.97 record updates**\n**made per second**\n\n**Connections to ORCID records**\n6M \n5M \n4M \n3M \n2M \n1M \n\n2012 2013 2014 2015 2016 2017 2018 \n\n■**Live ORCID iDs**\n■**w/at least 1 education** ■**w/at least 1 employee**\n■**w/at least 1 work**\nSource: Orcid.org/statistics as of November 2018 \n\n42,500 ACTIVE \nSCHOLARLY PEER- \nREVIEWED JOURNALS \nSource: The STM Report, October 2018 \n\nSponsored by ORCID \n**To learn more go to https://orcid.org** **Institutions must increasingly recognize and demonstrate**\n**the impact of all types of research contributions**", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "42.1 )− 22.01.751.8Number of sites581( 1 )58", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "The two most widely used textbooks in 2023 (see the Open Syllabus (https://explorer.opensyllabus.org/re \nsult/field?id=Computer+Science)): \n\nRussell, Stuart J.; Norvig, Peter (2021).*Artificial Intelligence: A Modern Approach*(4th ed.). \nHoboken: Pearson. ISBN 978-0-1346-1099-3. LCCN 20190474 (https://lccn.loc.gov/201904 \n74). \nRich, Elaine; Knight, Kevin; Nair, Shivashankar B (2010).*Artificial Intelligence*(3rd ed.). \nNew Delhi: Tata McGraw Hill India. ISBN 978-0-0700-8770-5. \n\nThe four most widely used AI textbooks in 2008: \n\nLuger, George; Stubblefield, William (2004).*Artificial Intelligence: Structures and Strategies for*\n*Complex Problem Solving*(https://archive.org/details/artificialintell0000luge) (5th ed.). \nBenjamin/Cummings. ISBN 978-0-8053-4780-7. Archived (https://web.archive.org/web/2020 \n0726220613/https://archive.org/details/artificialintell0000luge) from the original on 26 July \n2020. Retrieved 17 December 2019. \n\nNilsson, Nils (1998).*Artificial Intelligence: A New Synthesis*(https://archive.org/details/artificialin \ntell0000nils). Morgan Kaufmann. ISBN 978-1-5586-0467-4. Archived (https://web.archive.or \ng/web/20200726131654/https://archive.org/details/artificialintell0000nils) from the original on \n26 July 2020. Retrieved 18 November 2019. \n\nRussell, Stuart J.; Norvig, Peter (2003),*Artificial Intelligence: A Modern Approach*(http://aima.c \ns.berkeley.edu/) (2nd ed.), Upper Saddle River, New Jersey: Prentice Hall, ISBN 0-13- \n790395-2. \n\nPoole, David; Mackworth, Alan; Goebel, Randy (1998).*Computational Intelligence: A Logical*\n\n*Approach*(https://archive.org/details/computationalint00pool). New York: Oxford University \nPress. ISBN 978-0-1951-0270-3. Archived (https://web.archive.org/web/20200726131436/ht \ntps://archive.org/details/computationalint00pool) from the original on 26 July 2020. Retrieved \n22 August 2020. Later edition: Poole, David; Mackworth, Alan (2017).*Artificial Intelligence:*\n*Foundations of Computational Agents*(http://artint.info/index.html) (2nd ed.). Cambridge \nUniversity Press. ISBN 978-1-1071-9539-4. Archived (https://web.archive.org/web/2017120 \n7013855/http://artint.info/index.html) from the original on 7 December 2017. Retrieved \n6 December 2017. \n\nOther textbooks: \n\nErtel, Wolfgang (2017).*Introduction to Artificial Intelligence*(2nd ed.). Springer. ISBN 978-3- \n3195-8486-7. \nCiaramella, Alberto; Ciaramella, Marco (2024).*Introduction to Artificial Intelligence: from*\n*data analysis to generative AI*(1st ed.). Intellisemantic Editions. ISBN 978-8-8947-8760-3. \n\n**History of AI**\n\nCrevier, Daniel (1993).*AI: The Tumultuous Search for Artificial Intelligence*. New York, NY: \n\nBasicBooks. ISBN 0-465-02997-3. \n\nMcCorduck, Pamela (2004),*Machines Who Think*(2nd ed.), Natick, Massachusetts: A. K. \n\nPeters, ISBN 1-5688-1205-1 \n\nNewquist, H. P. (1994).*The Brain Makers: Genius, Ego, And Greed In The Quest For Machines*\n\n*That Think*. New York: Macmillan/SAMS. ISBN 978-0-6723-0412-5. \n\nHarmon, Paul; Sawyer, Brian (1990).*Creating Expert Systems for Business and Industry*. New \n\nYork: John Wiley & Sons. ISBN 0471614963.", - "page_start": 51, - "page_end": 51, - "source_file": "wikipedia3.pdf" - }, - { - "text": "2008 \n\nAIFRS \n\n 375 \n 2,507 \n 6.7 \n 977 \n 2,474 \n 1.1 \n 6.8 \n88.4% \n 74,137 \n 232,039 \n\n2007 \n\nAIFRS \n\n 546 \n 4,390 \n 8.0 \n 1,523 \n 2,405 \n 1.2 \n 9.2 \n90.0% \n 85,994 \n 290,897 \n\n2006 \n\nAIFRS \n\n 734 \n 5,121 \n 7.0 \n 1,951 \n 2,000 \n 2.4 \n 14.5 \n90.1% \n 140,071 \n 459,702 \n\n2005 \n\nAIFRS \n\n 588 \n 4,915 \n 8.4 \n 1,521 \n 1,829 \n 2.4 \n 13.0 \n90.8% \n 126,550 \n 353,275 \n\n2004 \n\nAGAAP \n\n 801 \n 4,444 \n 5.5 \n 1,946 \n 1,671 \n 3.1 \n 15.0 \n91.2% \n 149,979 \n 395,346 \n\n 74,285 \n (55,743) \n (4,065) \n 46,653 \n 61,130 \n – \n (9,284) \n 51,846 \n (3,974) \n 47,872 \n (11,675) \n 36,197 \n – \n 36,197 \n\n 52,044 \n (64,908) \n (2,264) \n 10,413 \n (4,715) \n – \n (8,446) \n (13,161) \n (2,544) \n (15,705) \n 3,115 \n (12,590) \n – \n (12,590) \n\n 72,782 \n (47,761) \n (1,158) \n 1,361 \n 25,224 \n – \n (7,805) \n 17,419 \n (757) \n 16,662 \n – \n 16,662 \n – \n 16,662 \n\n 64,299 \n (47,366) \n (1,404) \n 2,471 \n 18,000 \n – \n (8,720) \n 9,280 \n (889) \n 8,391 \n – \n 8,391 \n – \n 8,391 \n\n 84,410 \n (34,343) \n (1,019) \n 2,370 \n 51,418 \n – \n (11,323) \n 40,095 \n (2,416) \n 37,679 \n – \n 37,679 \n – \n 37,679", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Contents \n\nConsolidated Five-Year Summary 70 \n\nBusiness and Other Risks 71 \n\nConsolidated Balance Sheets 72 \n\nConsolidated Statements of Income 74 \n\nConsolidated Statements of Shareholders’ Equity 75 \n\nConsolidated Statements of Cash Flows 76 \n\nNotes to Consolidated Financial Statements 77 \n\nReport of Independent Auditors 104 \n\nNon-consolidated Five-Year Summary 105 \n\n\n\nF \nI \n\nN \nA \nN \nC \nI \nA \nL \n\nS \nE \nC \nT \nI \nO \nN", - "page_start": 70, - "page_end": 70, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "the magnitude of difference, \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed12.pdf" - }, - { - "text": "**4c. Reports about Open Data**\n\nBy clicking on the “**Reports about Open Data**” sub-menu item, the system provides a list of \navailable reports on open data. The list can be filtered by keyword, year of publication, country of \norigin and type of report.", - "page_start": 15, - "page_end": 15, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "Reporting for specific materials, systems and methods \n\nWe require information from authors about some types of materials, experimental systems and methods used in many studies. Here, indicate whether each material, \nsystem or method listed is relevant to your study. If you are not sure if a list item applies to your research, read the appropriate section before selecting a response.", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic3.pdf", - "query": "For what reason a researcher's name is not a good tools to track back its works and affiliations ?", - "target_page": 1, - "target_passage": "Many people have the same name Names may change through marriage or other circumstances Individuals use different alphabets, abbreviations, or naming conventions People use different versions of their name during their career", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**An IDC Infographic, sponsored by ORCID | November 2018**\n\n**The Value of Using Unique Identifiers for Researchers**\n\n**Evidence of Institutional Value**\n**What’s in a Name?**\n**Most names are not unique**\n**Tackling Information Overload**\nExamples of time/staff savings achieved by implementing ORCID from around the world \n\nORCID is a non-profit organization, which provides a fully open and interoperable \nidentifier to reliably connect researchers with their research contributions. The \nORCID iD is a 16-digit identifier that researchers can register for and use for free. \n\n**UK:**0.2 – 0.4 FTEs per institution1 \n**Portugal:**100,000 researcher hours per year2 \n**Australia:**15-30 minutes per grant application3 \n\n**Enables recognition of**\n**all types of research**\n**contributions and**\n**innovation**\n**1. Jisc/ARMA Institutional ORCID Implementation and Cost Benefit Analysis Report 2015**\n**2. Cátia Laranjeira, FCT - Fundação para a Ciência e a Tecnologia 2017**\n**3. Australian Research Council governance meeting, September 2018**\n\n**Names may**\n**change through**\n**marriage or other**\n**circumstances**\n\n**Connects individuals and**\n**their professional**\n**contributions across**\n**disciplines,**\n**organizations, and time**\nMany people have \nthe same name People use different versions of \ntheir name during their career \n\n\"Having ORCID iDs for most of our researchers has helped in providing \nauthoritative accounts in our various databases, ensuring accuracy in \nreviewer identities, and helping editors find reviewers and check expertise.\" **Individuals use different alphabets,**\n**abbreviations, or naming conventions**\n**Helps research institutions, funders,**\n**publishers, and other organizations**\n**better track and support research work** **—Brooks Hanson, Executive Vice President, Science, American Geophysical Union**\n\n**Researchers are mobile!**\n\nFor example, \n**30% OF THE SCIENTISTS WHO GOT**\n**THEIR PhD IN THE UNITED**\n**KINGDOM NOW LIVE ELSEWHERE**\n**How Organizations and**\n**Researchers Benefit**\n\n**How ORCID Works**\n\n**It's a registry of unique persistent**\n**identifiers for researchers**\nSource: Science Magazine \n\n**RESEARCHERS**\nImprove recognition and \ndiscoverability of their \nresearch \n\n**It's a hub that connects researchers with their**\n**professional activities and contributions**\nResearch institutions and organizations therefore find it hard to \n\n**It's a global community that enables**\n**researchers to share their data with other**\n**individuals, organizations, and systems**\n**Benchmark their organization**\n**against others**\n\n**INSTITUTIONS**\n\nSave time and reduce errors \nwith automated \ninformation-sharing and \ncross-system interoperability \n\nSpend more time doing \nresearch, less time managing it \n\n**Identify, track, and report on**\n**researchers’ affiliations and**\n**contributions (publications, peer**\n**reviews, grants, and more)**\nManage your organization \nname and your researchers' \nconnections with it \n\nControl and manage a trusted \nand easily shareable record of \ntheir research activities and \naffiliations – for free \n**Why Connect with ORCID?**\n**Hundreds of members and systems use ORCID globally** Maintain links with your \nresearchers - past, \npresent, and future \n\n**Institutions Face a Rising**\n**Tide of Research**\n**5.5 MILLION+**\n**live ORCID iDs registered since its 2012 launch**\n\n**OVER 3 MILLION**\n**Three Ways to Get Involved**\n**scholarly articles published per year**\nSource: The STM Report, October 2018 \n\n**1. Encourage and support your researchers in getting, sharing, and**\n**using their ORCID iD**\n**2. Invest in integrating ORCID into your systems**\n**3. Connect data to and from your researchers’ ORCID records to**\n**support information use and reuse across organizations**\n\n**3.7 ORCID iDs created**\n**every minute**\n\n**193 different languages**\n**included in ORCID records**\n\n**73.6% of records have**\n**granted update permissions**\n\n**1.97 record updates**\n**made per second**", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "52. \n\n53. Bruns, A.; Stieglitz, S. Quantitative approaches to comparing communication patterns on Twitter. J. Technol. \n\nHum. Serv.**2012**, 30, 160–185. [CrossRef] \n\n54. Yang, G. Narrative agency in hashtag activism: The case of# BlackLivesMatter. Media Commun.**2016**, 4, 13. \n55. Bruns, A.; Burgess, J.E. The use of Twitter hashtags in the formation of ad hoc publics. In Proceedings of the \n6th European Consortium for Political Research (ECPR) General Conference 2011, Reykjavík, Iceland, 25–27 \nAugust 2011. \n\n56. Rzeszotarski, J.M.; Spiro, E.S.; Matias, J.N.; Monroy-Hernández, A.; Morris, M.R. Is anyone out there?: \nUnpacking Q&A hashtags on twitter. In Proceedings of the SIGCHI Conference on Human Factors in \nComputing Systems, Toronto, ON, Canada, 26 April–1 May 2014; pp. 2755–2758. \n\n57. Tsur, O.; Rappoport, A. What’s in a hashtag?: Content based prediction of the spread of ideas in microblogging \ncommunities. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, \nSeattle, WA, USA, 8–12 February 2012; pp. 643–652. \n\n58. Yang, L.; Sun, T.; Zhang, M.; Mei, Q. We know what@ you# tag: Does the dual role affect hashtag adoption? \nIn Proceedings of the 21st international conference on World Wide Web, Lyon, France, 16–20 April 2012; \npp. 261–270. \n\n59. Weller, K.; Dröge, E.; Puschmann, C. Citation Analysis in Twitter: Approaches for Defining and Measuring \nInformation Flows within Tweets during Scientific Conferences. In Proceedings of the Making Sense of \nMicroposts 2011, Heraklion, Greece, 30 May 2011; pp. 1–12. \n\n60. Meraz, S. Hashtag wars and networked framing: The private/public networked protest repertoires of occupy \non twitter. In Between the Public and Private in Mobile Communication; Routledge: Abingdon, UK, 2017; \npp. 303–323. \n\n61. Meraz, S.; Papacharissi, Z. Networked gatekeeping and networked framing on# Egypt. Int. J. Press.**2013**, 18,", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed10.pdf" - }, - { - "text": "?customer ?relation ?relatedToCustomer.} \n\nThis would be much less intuitive than the user defined names. There are good reasons to use auto- \ngenerated names, especially for large ontologies that are implemented in multiple natural languages. \nHowever, for new users, especially those who plan to use SPARQL and SHACL, I think it is more \nintuitive to start with user supplied names and then progress to auto-generated names if and when the \nrequirements show a true need for them. This approach to developing software incrementally rather than \nto attempt to design the perfect system that can scale for all possible future requirements is known as the \nAgile approach to software development. In my experience Agile methods have proven themselves in \ncountless real-world projects to deliver better software on time and on budget than the alternative \nwaterfall approach. For more on Agile methods see: https://www.agilealliance.org/agile101/ \n\nThis just gives you a basic overview of some of the things that can be done with SPARQL. There is a lot \nmore and if you are interested you should check out DuCharme’s book or some of the many SPARQL \ntools and tutorials on the web. Some of these are in the bibliography. \n\nOne final point: features of OWL and SWRL that new users frequently find frustrating are the Open \nWorld Assumption (OWA) and lack of non-monotonic reasoning. The OWA was discussed in chapter \n4.13. Non-monotonic reasoning will be discussed in section 11.1. For now, though remember that \nSPARQL is*not*subject to*either*of these restrictions. With SPARQL one can do non-monotonic \nreasoning and leverage the more common Closed World Assumption (CWA). E.g., one can test if the \nvalue for a property on a specific instance exists or not and can take actions if that property does not exist.", - "page_start": 71, - "page_end": 71, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "I am aware of the above [framework] [specific] contract, especially Articles [I.10 and II.13] \nconcerning intellectual property rights and exploitation of the results and I confirm that I \ntransferred all the relevant rights to [*insert name of contractor or other intermediary right*\n*holder*]. \n\nI declare that [I have received full remuneration] [I agreed to receive remuneration by \n[*insert date*]]. \n\n[As creator, I also confirm that I do not object to the following: \n\n(a) that my name be mentioned or not mentioned when the results are presented to \n\nthe public; \n\n(b) that the results be divulged or not after they have been delivered in their final \n\nversion to the contracting authority; \n\n(c) that the results be adapted, provided that this is done in a manner which is not \nprejudicial to my honour or reputation.] \n\nDate, place, signature", - "page_start": 48, - "page_end": 48, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Many more**national statistics and surveys on working conditions exist**, often with a higher level of \ndetail, but they are rarely used for a comparative view, due to the inevitable methodological differences. \nCostly research work would be needed to cover all relevant national studies and monitoring data in all \nEU languages and conclude from these overviews on the situation in the EU27. \n\nEuropean Agency for Safety and Health at Work – EU-OSHA", - "page_start": 138, - "page_end": 138, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 \n\n See e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary \n16 \nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper \nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. \nAccessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, \nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?”*The Atlantic*, 18 Mar. \n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century- \navailable-as-ebooks/284486/. See also “Google Book Search Settlement and Access to Out of Print \nBooks.”*Google Public Policy Blog*, publicpolicy.googleblog.com/2009/06/google-book-search- \nsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class- \naction settlement between Google, the Authors Guild, and the Association of American Publishers). \nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying \nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at https:// \nweb.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ \ngoogle_final_approval_support.pdf. The Authors Guild and Association of American Publishers also \njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding \ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly \n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether \nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out- \nof-print works anyway — see this brief at https://web.archive.org/web/20130112060213/http:// \nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_of_law.pdf. \n\n In the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce \n\n17 \nworks and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These \nprovisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-of- \ncommerce works or other subject matter permanently in their collections\". The limitation to non- \ncommercial purposes means that works made available under these provisions would be of limited use \nin building a books data commons.", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides \n\nthat those from (properly done) Open Data are a really tiny percentage of the total. \n\nThis is a consequence of the fact that data about us end up online from the most different sources \n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never \n\nmind*prove*, that they've been used against our interest. There have been concerns, for example, that \n\ninsurance companies may charge higher fees for life insurance to those among their customers \n\nwho... put online a family tree from which it shows that they come from families with an average \n\nlife expectancy lower than usual. \n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of \n\ndata, that weren't even published by any Public Administration? Of course, publishing online \n\ncomplete, official Census data of several generations, in a way that would make such automatic \n\nanalysis possible would be a totally different matter. \n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is \n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always \n\nremember and explain that: \n\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air \n\npollution measurements....) \n\n2. The majority of data that are directly related to individuals (e.g. things like names and \n\naddress of people with specific diseases, or who were victims of some crime) have no reason \n\nto be published,**nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to \n\npublic offices, Government and Parliament members etc...) already exist in many countries \n\n4. Very often, in practice, Open Data struggles only happen about*when and how*to make \n\navailable in the most effective way for society information that was*already*recognized as \n\npublic.*What*to declare public, hence open, is indeed a serious issue (more on this in the next \n\nparagraph) but is a separate one. \n\n**3.8. Need to better define what is Public Data**\nTogether with citizens education, there is a huge challenge that Governments and the Open Data \n\nmovement will have to face (hopefully together) in 2011 and beyond. This challenge is to update \n\nand expand the definition of Public Data and to have it accepted by lawmakers and public \n\nadministrators.", - "page_start": 22, - "page_end": 22, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "different rightsholders and authors. Managing opt-outs for so many different interests within \none book may get overly complicated very fast. \n\nIn any event, creating an opt-out system will need some ways of authenticating whether \nsomeone has the relevant authority to make choices about inclusion of a work. \n\n*Who would get to use the books data commons? For what?*\n\nA commons might be made publicly available to all, as has been done with datasets like The \nPile. Another possible design choice is to restrict access only to authorized users and to \nenforce particular responsibilities or obligations in return for authorization. Three particular \ndimensions of permitted uses and users came up in our discussions: \n\n•**Defining and ensuring acceptable and ethical use:**Participants discussed to what \nextent restrictions should be put on use of the resource. In the case of HathiTrust, \nacceptable use is implicitly ensured by limiting access to researchers from member \ninstitutions; other forms of “gated access” are possible, allowing access only to \ncertain types of users and for certain uses. \n One can imagine more fine-grained \nmechanisms, based on a review of the purpose for which datasets are used. This \nimagined resource could become a useful lever to demand responsible development \nand use of AI; alongside “sticks” like legal penalties, this would be a “carrot” that \ncould incentivize good behavior. At the same time, drawing the lines around, let alone \nenforcing, “good behavior” would constitute a significant challenge. \n\n39 \n\n•**Charging for use to support sustainability of the training corpus itself:**While wanting \nto ensure broad access to this resource, it is important to consider economic \nsustainability, including support for continuing to update the resource with new works \nand appropriate tooling for AI training. Requiring some form of payment to use the \nresource could support sustainability, perhaps with different requirements for \ndifferent types of users (e.g., differentiating between non-commercial and \ncommercial users, or high-volume, well-resourced users and others). 40 \n\n•**Ensuring benefits of AI are broadly shared, including with book authors or**\n**publishers:**The creation of a training resource might \nlower barriers to the \ndevelopment of AI tools, and in that way support broadly shared benefits by \nfacilitating greater competition and mitigating concentration of power. On the other \nhand, just as concentration of technology industries is already a significant challenge, \nAI might not look much different, and the benefits of this resource may still simply go \nto a few large firms in “winner takes all-or-most” markets. The workshops discussed \nhow, for instance, large commercial users might be expected to contribute to a fund \nthat supported contributors of training data, or more generally to fund writers, to \nensure everyone contributing to the development of AI benefits. \n\n For examples of gated access to AI models, see https://huggingface.co./docs/hub/en/models-gated. \n39 \n\n As an analogy, consider for instance Wikimedia Enterprise, which “build[s] services for high-volume \n40 \ncommercial reusers of Wikimedia content” and charges for that access. https://meta.wikimedia.org/ \nwiki/Wikimedia_Enterprise.", - "page_start": 18, - "page_end": 18, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "It is also an example predicated on copyright’s limitations and exceptions — in this case, on \nU.S. fair use. While the Authors Guild filed a copyright infringement suit against HathiTrust, \nfederal courts in 2012 and 2014 ruled that HathiTrust’s use of books was fair use. 32 \n\nA nonprofit founded in 2008, HathiTrust grew out of a partnership among major US university \nlibraries and today is “an international community of research libraries committed to the \nlong-term curation and availability of the cultural record.” \n It started in what it calls the “early \ndays of mass digitization” — that is, at a time when it started to become economical to take \nexisting physical artifacts in libraries and turn them into digital files at a large scale. \n\n33 \n\nThe founding members of HathiTrust were among the initial partners for Google’s Book \nSearch product, which allows people to search across and view small snippets of text from \nin-copyright books and read full copies of public domain books scanned from libraries’ \ncollections. The libraries provided Google with books from their collections, Google would \nthen scan the books for use in Book Search, and return to the libraries a digital copy for their \nown uses. These uses included setting up HathiTrust not only to ensure long-term \npreservation of the digital books and their metadata, but also to facilitate other uses, \nincluding full text search of books and accessibility for people with print disabilities. In \nseparate court cases, both Google and HathiTrust’s uses of the books were deemed \nconsistent with copyright law. \n\n34 \n\nThe uses most relevant to this paper are those enabled by what HathiTrust refers to today as \nthe Research Center. The Center grew in part out of a research discipline called “digital \nhumanities,” which, among other things, seeks to use computational resources or other \ndigital technologies to analyze information and contribute to the study of literature, media, \nhistory, and other areas. For instance, imagine you want to understand how a given term \n(e.g., “war on drugs”) became used; one might seek to analyze when the term was first used \nand how often it was used over time by analyzing a vast quantity of sources, searching out \nthe term’s use. The insight here is that there is much to be learned not just from reading or \notherwise consuming specific material, but also from “non-consumptive research,” or \n\"research in which computational analysis is performed on one or more volumes (textual or \nimage objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use. \n\nToday, the Center “[s]upports large-scale computational analysis of the works in the \nHathiTrust Digital Library to facilitate non-profit and educational research.” It includes over 18 \nmillion books in over 400 languages from the HathiTrust Digital Library collection. Roughly \n58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has \nlimitations in terms of its representation across subject matter, language, geography, and \nother dimensions. In terms of subject matter, the corpus is skewed towards humanities \n(64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English, \n\n*Authors Guild v. HathiTrust,*902 F.Supp.2d 445 (SDNY October 10, 2012) and*Authors Guild v.*\n32 \n*HathiTrust*, 755 F.3d 87 (2d Cir. 2014). \n\n\n \n \n \n \n [html]\n
Table
Patients without
Age, years
Table
\n\nTowards a Books Data Commons for AI Training 14", - "page_start": 14, - "page_end": 14, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "During the 2024 Indian elections, US$50 millions was spent on authorized AI-generated content, notably \nby creating deepfakes of allied (including sometimes deceased) politicians to better engage with voters, \nand by translating speeches to various local languages.[182] \n\n**Ethics**\n\nAI has potential benefits and potential risks.[183] AI may be able to advance science and find solutions for \nserious problems: Demis Hassabis of DeepMind hopes to \"solve intelligence, and then use that to solve \neverything else\".[184] However, as the use of AI has become widespread, several unintended \nconsequences and risks have been identified.[185] In-production systems can sometimes not factor ethics \nand bias into their AI training processes, especially when the AI algorithms are inherently unexplainable \nin deep learning.[186] \n\n**Risks and harm**\n\n**Privacy and copyright**\n\nMachine learning algorithms require large amounts of data. The techniques used to acquire this data have \nraised concerns about privacy, surveillance and copyright. \n\nAI-powered devices and services, such as virtual assistants and IoT products, continuously collect \npersonal information, raising concerns about intrusive data gathering and unauthorized access by third \nparties. The loss of privacy is further exacerbated by AI's ability to process and combine vast amounts of \ndata, potentially leading to a surveillance society where individual activities are constantly monitored and \nanalyzed without adequate safeguards or transparency. \n\nSensitive user data collected may include online activity records, geolocation data, video or audio.[187] \nFor example, in order to build speech recognition algorithms, Amazon has recorded millions of private \nconversations and allowed temporary workers to listen to and transcribe some of them.[188] Opinions \nabout this widespread surveillance range from those who see it as a necessary evil to those for whom it is \nclearly unethical and a violation of the right to privacy.[189] \n\nAI developers argue that this is the only way to deliver valuable applications. and have developed several \ntechniques that attempt to preserve privacy while still obtaining the data, such as data aggregation, de- \nidentification and differential privacy.[190] Since 2016, some privacy experts, such as Cynthia Dwork, \nhave begun to view privacy in terms of fairness. Brian Christian wrote that experts have pivoted \"from \nthe question of 'what they know' to the question of 'what they're doing with it'.\"[191] \n\nGenerative AI is often trained on unlicensed copyrighted works, including in domains such as images or \ncomputer code; the output is then used under the rationale of \"fair use\". Experts disagree about how well \nand under what circumstances this rationale will hold up in courts of law; relevant factors may include \n\"the purpose and character of the use of the copyrighted work\" and \"the effect upon the potential market \nfor the copyrighted work\".[192][193] Website owners who do not wish to have their content scraped can \nindicate it in a \"robots.txt\" file.[194] In 2023, leading authors (including John Grisham and Jonathan", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic3.pdf", - "query": "What is an ORCID iD ?", - "target_page": 1, - "target_passage": "ORCID iD is a 16-digit identifier that researchers can register for and use for free.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**An IDC Infographic, sponsored by ORCID | November 2018**\n\n**The Value of Using Unique Identifiers for Researchers**\n\n**Evidence of Institutional Value**\n**What’s in a Name?**\n**Most names are not unique**\n**Tackling Information Overload**\nExamples of time/staff savings achieved by implementing ORCID from around the world \n\nORCID is a non-profit organization, which provides a fully open and interoperable \nidentifier to reliably connect researchers with their research contributions. The \nORCID iD is a 16-digit identifier that researchers can register for and use for free. \n\n**UK:**0.2 – 0.4 FTEs per institution1 \n**Portugal:**100,000 researcher hours per year2 \n**Australia:**15-30 minutes per grant application3 \n\n**Enables recognition of**\n**all types of research**\n**contributions and**\n**innovation**\n**1. Jisc/ARMA Institutional ORCID Implementation and Cost Benefit Analysis Report 2015**\n**2. Cátia Laranjeira, FCT - Fundação para a Ciência e a Tecnologia 2017**\n**3. Australian Research Council governance meeting, September 2018**\n\n**Names may**\n**change through**\n**marriage or other**\n**circumstances**\n\n**Connects individuals and**\n**their professional**\n**contributions across**\n**disciplines,**\n**organizations, and time**\nMany people have \nthe same name People use different versions of \ntheir name during their career \n\n\"Having ORCID iDs for most of our researchers has helped in providing \nauthoritative accounts in our various databases, ensuring accuracy in \nreviewer identities, and helping editors find reviewers and check expertise.\" **Individuals use different alphabets,**\n**abbreviations, or naming conventions**\n**Helps research institutions, funders,**\n**publishers, and other organizations**\n**better track and support research work** **—Brooks Hanson, Executive Vice President, Science, American Geophysical Union**\n\n**Researchers are mobile!**\n\nFor example, \n**30% OF THE SCIENTISTS WHO GOT**\n**THEIR PhD IN THE UNITED**\n**KINGDOM NOW LIVE ELSEWHERE**\n**How Organizations and**\n**Researchers Benefit**\n\n**How ORCID Works**\n\n**It's a registry of unique persistent**\n**identifiers for researchers**\nSource: Science Magazine \n\n**RESEARCHERS**\nImprove recognition and \ndiscoverability of their \nresearch \n\n**It's a hub that connects researchers with their**\n**professional activities and contributions**\nResearch institutions and organizations therefore find it hard to \n\n**It's a global community that enables**\n**researchers to share their data with other**\n**individuals, organizations, and systems**\n**Benchmark their organization**\n**against others**\n\n**INSTITUTIONS**\n\nSave time and reduce errors \nwith automated \ninformation-sharing and \ncross-system interoperability \n\nSpend more time doing \nresearch, less time managing it \n\n**Identify, track, and report on**\n**researchers’ affiliations and**\n**contributions (publications, peer**\n**reviews, grants, and more)**\nManage your organization \nname and your researchers' \nconnections with it \n\nControl and manage a trusted \nand easily shareable record of \ntheir research activities and \naffiliations – for free \n**Why Connect with ORCID?**\n**Hundreds of members and systems use ORCID globally** Maintain links with your \nresearchers - past, \npresent, and future \n\n**Institutions Face a Rising**\n**Tide of Research**\n**5.5 MILLION+**\n**live ORCID iDs registered since its 2012 launch**\n\n**OVER 3 MILLION**\n**Three Ways to Get Involved**\n**scholarly articles published per year**\nSource: The STM Report, October 2018 \n\n**1. Encourage and support your researchers in getting, sharing, and**\n**using their ORCID iD**\n**2. Invest in integrating ORCID into your systems**\n**3. Connect data to and from your researchers’ ORCID records to**\n**support information use and reuse across organizations**\n\n**3.7 ORCID iDs created**\n**every minute**\n\n**193 different languages**\n**included in ORCID records**\n\n**73.6% of records have**\n**granted update permissions**\n\n**1.97 record updates**\n**made per second**", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "*Figure 14-6 Adding a recipient list*\n\n**14.2.3 Adding a report ID**\n\nThe next step is to define the reports to ODF. The report ID identifies the application group \nand application to which the report belongs. Figure 14-7 shows the window where you add \nthe report ID.", - "page_start": 345, - "page_end": 345, - "source_file": "sg246915.pdf" - }, - { - "text": "**193 different languages**\n**included in ORCID records**\n\n**73.6% of records have**\n**granted update permissions**\n\n**1.97 record updates**\n**made per second**\n\n**Connections to ORCID records**\n6M \n5M \n4M \n3M \n2M \n1M \n\n2012 2013 2014 2015 2016 2017 2018 \n\n■**Live ORCID iDs**\n■**w/at least 1 education** ■**w/at least 1 employee**\n■**w/at least 1 work**\nSource: Orcid.org/statistics as of November 2018 \n\n42,500 ACTIVE \nSCHOLARLY PEER- \nREVIEWED JOURNALS \nSource: The STM Report, October 2018 \n\nSponsored by ORCID \n**To learn more go to https://orcid.org** **Institutions must increasingly recognize and demonstrate**\n**the impact of all types of research contributions**", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": " ", - "page_start": 53, - "page_end": 53, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": " ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 58, - "page_end": 58, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": " ", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": " ", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 68, - "page_end": 68, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": " ", - "page_start": 57, - "page_end": 57, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2669.pdf", - "query": "What type of instability causes rims in ruptured polystyrene thin films to decay into small drops ?", - "target_page": 3, - "target_passage": " The rims may further decay into lines of small drops due to a Rayleigh-type instability", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Benard instability,” Phys. Rev. Lett. 88, 164501 (2002). \n\n[50] J. Huang, F. Kim, A. R. Tao, S. Connor, and P. Yang, “Spontaneous formation of nanoparticle stripe \n\n\n \n \n \n \n [html]\n
S. H. Lee, P. 1. Yoo, S. J. Ksvon, and H. H. Lee, “ Solvent - driven dewetting and rim instability,” I.Chem. Phys. 121.4346 – 4351 ( 2004 ).
[ 52 ] L. Xia, T. F. Shi, P. K. Duta, and L. An, ‘ Rim instability by solvent - induced deverting ’. I. Chem. Phys. IZ?, 144704 ( 2007 ).[ 53 ] L. Xia, T. F. Shi, and L. 1 Aax, “ The devetiing dynamics of the polymer thin film by solvent ameale ung ”, I Chens. Phys. I29 ( 44904 ( 2008 ).
[ 54 ] M. Elbaum and S. G. Lipson, “ How does a thin weted lifn dry up ” Phys. Rev. Lett. 72.562 – 3565 ( 1994 ).[ 55 ] N. Samidered, S. G. Lipson, and D. S. Tannhauser, “ Pattern formation in drying water filtes.” Phys. Rev. E. SP, 2906 – 2913 ( 1998 ).
[ 56 ] A. Padmakar, K. Kargupta, and A. Sharma, “ Instability and devetting of exaporating thin water films on partially and completely wertable substrates.” I. Chem. Phys. I188.1735 – 1744 ( 1999 ).[ 57 ] A, V, Lysohin, A, Golovin, and L, M. Pismen, “ Fingering instability of thin evaponating liquid thims,” Phys. Rev, E6K, ( 221602 - 2002 ).
[ 58 ] L. M. Pismen, “ Spinodal devetting in a volatile liquid film,” Phys. Rev. E78.021601 ( 2004 ).[ 59 ] C. Pouland, O. Benichoa, and A. M. Carabat, “ Freely receifing evaporating droplets,” Langmuir B. 8825 – 8834 ( 2003 ).
( 60 ) Y. Gotkis, I. Ivasov, N. Murisic, and L. Kondic, “ Dynamic structure formation at the fronts of volatile faquid drops,” Phys. Rer. Lett. 97.186101 ( 2006 ).( 61 ) E. Paniliae Vasijour and P. Moriary, “ Meniscus - mediated organization of colloidal nanoparticles.” J. Phys. Chem. C IH, 16255 – 16268 ( 207 ).
( 2 ) C : Gigastic K. Dabosk - Veress, and J. R. Docher, “ Changes in the norphology of self - usembled polystyreme microphere monolayers produced by ameading.” I Colloid Interface Sci, 240.14 – 155 ( 2001 ).( 63 ) A. Onn, S. H. Davis, and S. G. Bankoff, “ Long - scale evolution of thin liquid films,” Rev. Mod. Phys. 69 ( 931 – 980 ( 1997 ).
[ 64 ] U. Thiele, “ Thin film evolution equations from ( exporating ) deveting liquid layers to epitaxial growth,” 1 Phys.- Cond. Mat ( 2010 ), ( at press ).
", - "page_start": 28, - "page_end": 28, - "source_file": "1001.2669.pdf" - }, - { - "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. 68, \n\n1084–1088 (1989). \n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real \n\n\n \n \n \n \n [html]\n
[ 7 ] R. Seemann, S. Herminghans, C. Nets, S. Schlagowski, D. Podzimek, R. Kourad, H. Mantz, and K. Iacobs, “ Dysamics and structure formation in thin polymer melt films,” 1. Phys.- Condex. Matter[ 8 ] U. Thiele, “ Structure formation in thin kiquid films,” in S. Kalfudasis and U. Thiele, editors, “ Thin films of Soft Matter,” pages 25 – 93, Springer, Wien ( 2007 ).
[ 9 ] R. Xie. A. Karim, J. F. Ibuglas, C. C. C. C. Hun, and R. A. Weiss, “ Spinodal deverting of thin polymer films.” Phys. Rev. Lett. 8l, 1251 – 1254 ( 198 ).[ 10 ] R. Seenam, S. Herninghass, and K. facobs, “ Deveting patterns and nolecular forces : A mconcilizin, iniot,” Phys, Rev, Lett. 86.5534 – 5537 – 2001.
[ 11 ] U. Thirde. M. G. Velande, and K. Neufee, “ Deverting : Film rupture by nucleation in the spinodal regime,” Phys. Rev. Let. ( 016104 ( 2001 ).[ 12 ] M. Resitborn and K. Neuflex, “ Sarface patterns of laterally extended thin liquid tilms in three dimensions,” Phys. Rev. Lett. 8 ”, 046101 ( 2011 ).
[ 13 ] 1 Becker, G. Grin, R. Seeman, H. Maniz, K. Jacobs, K. Mexke, and R. Blossey, “ Complex deveting scenarios captured by this - tim models.” Nat. Mater 2.59 – 63 ( 2003 ).[ 14 ] C Redon, F. Brochard - Wurt, and F. Rondelez, “ Tronamics of deveting ” Phys. Rev. Lett. 66.715 – 718 ( 1991 ).
[ 15 ] R. Seeman, S. Herminghaus, and K. Jacobs, “ Shape of a liquid front upon develop.” Phys. Rev. Let. 8 ”, 196101 ( 2011 ).[ 10 ] R. Fetzer, K. Jaobs, A. Minch. B. Wagner, and T. P. Witebik, ‘ New slip regimes and the shape of deveting thin liquid films.’ Phys. Rev. Lett. MS, 127801 ( 2305 ).
[ 17 ] F. Brochan - Wyart and C. Redon, “ Dynamics of liquid rim instabilities,” Langmin K, 2124 – 233 ( 1992 ).[ 18 ] G, Reiter and A. Sharma, “ Auto - optimization of deweting rates by rin instabilities in slipping polymer films ” Phys. Rev. Lett. 8 ”, 166103 ( 2001 ).
[ 19 ] A. Minch and B. Wagner, ‘ Contact - line instability of dewetting thin films ’, ‘ Physica DB9.178 – 198 c2005 ).
", - "page_start": 25, - "page_end": 25, - "source_file": "1001.2669.pdf" - }, - { - "text": "[97] U. Thiele, M. G. Velarde, K. Neuffer, and Y. Pomeau, “Film rupture in the diffuse interface model \n\ncoupled to hydrodynamics,” Phys. Rev. E 64, 031602 (2001). \n\n[98] J. Heier, J. Groenewold, F. A. Castro, F. Nueesch, and R. Hany, “Enlarged bilayer interfaces from \n\nliquid-liquid dewetting for photovoltaic applications,” P Soc Photo-Opt Instrum Eng 6999, J9991– \n\nJ9991 (2008). \n\n[99] M. D. Haw, M. Gillie, and W. C. K. Poon, “Effects of phase behavior on the drying of colloidal \n\nsuspensions,” Langmuir 18, 1626–1633 (2002). \n\n[100] L. V. Govor, J. Parisi, G. H. Bauer, and G. Reiter, “Instability and droplet formation in evaporating \n\nthin films of a binary solution,” Phys. Rev. E 71, 051603 (2005). \n\n[101] L. V. Govor, G. Reiter, G. H. Bauer, and J. Parisi, “Self-assembled treelike patterns from an evapo- \n\nrating binary solution,” Phys. Rev. E 74, 061603 (2006). \n\n[102] M. Yamamura, T. Nishio, T. Kajiwara, and K. Adachi, “Evaporation-induced pattern formation in \n\npolymer films via secondary phase separation,” Chem. Eng. Sci. 57, 2901–2905 (2002). \n\n[103] P. M¨uller-Buschbaum, E. Bauer, S. Pfister, S. V. Roth, M. Burghammer, C. Riekel, C. David, and \n\nU. Thiele, “Creation of multi-scale stripe-like patterns in thin polymer blend films,” Europhys. Lett. \n\n73, 35–41 (2006). \n\n[104] E. Bormashenko, R. Pogreb, O. Stanevsky, Y. Bormashenko, T. Stein, and O. Gengelman, “Meso- \n\nscopic patterning in evaporated polymer solutions: New experimental data and physical mecha- \n\nnisms,” Langmuir 21, 9604–9609 (2005). \n\n[105] E. Bormashenko, R. Pogreb, O. Stanevsky, Y. Bormashenko, T. Stein, V. Z. Gaisin, R. Cohen, and \n\nO. V. Gendelman, “Mesoscopic patterning in thin polymer films formed under the fast dip-coating \n\nprocess,” Macromol. Mater. Eng. 290, 114–121 (2005). \n\n[106] J. B. Gibson, K. Zhang, K. Chen, S. Chynoweth, and C. W. Manke, “Simulation of colloid-polymer \n\nsystems using dissipative particle dynamics,” Mol. Simul. 23, 1–41 (1999). \n\n[107] K. Stratford and I. Pagonabarraga, “Parallel simulation of particle suspensions with the lattice Boltz- \n\nmann method,” Comput. Math. Appl. 55, 1585–1593 (2008). \n\n[108] G. Drazer, B. Khusid, J. Koplik, and A. Acrivos, “Wetting and particle adsorption in nanoflows,” \n\nPhys. Fluids 17, 017102 (2005). \n\n[109] J. Kromkamp, D. van den Ende, D. Kandhai, R. van der Sman, and R. Boom, “Lattice Boltzmann \n\nsimulation of 2d and 3d non-Brownian suspensions in Couette flow,” Chem. Eng. Sci. 61, 858–873 \n\n(2006).", - "page_start": 31, - "page_end": 31, - "source_file": "1001.2669.pdf" - }, - { - "text": "The patterns formed in dewetting processes have attracted strong interest since Reiter analysed the \n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in \n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is \n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The \n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a \n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines \n\nof small drops due to a Rayleigh-type instability [1–3]. The related problems of retracting contact \n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also \n\nbeen studied [4, 5]. \n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple \n\nnon-volatile liquids and polymers (for reviews see Refs. [6–8]). All stages of the dewetting of a \n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal \n\ndewetting) [1, 9–13], the growth process of individual holes [14–16], the evolution of the resulting \n\nhole pattern [3, 13], and the stability of the individual dewetting fronts [17–19]. We note in \n\npassing, that descriptions of dewetting patterns may also be found in historic papers, particularly \n\nfor the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40] \n\nconsidered turpentine on water and Marangoni [21, p. 352f] oil on water. \n\nMore recently, interest has turned to the dewetting processes of solutions and suspensions. How- \n\never, these systems have not yet been investigated in any great depth. Such systems are compli- \n\ncated because their behaviour is determined by the interplay between the various solute (or colloid) \n\nand solvent transport processes. Furthermore, the solvents that are used often evaporate, i.e., one \n\nhas to distinguish between ‘normal’ convective dewetting and evaporative dewetting. A number \n\nof experiments have been performed employing (colloidal) solutions of polymers [22–25], macro- \n\nmolecules like collagen and DNA [26–31] and nanoparticles [32–40]. The latter are sometimes \n\nreferred to as ‘nanofluids’. The initial focus of much of the research in the field has been on \n\ninvestigating the structures that are formed which are similar to the ones observed in the ‘classi- \n\ncal’ dewetting of non-volatile liquids. Labyrinthine structures and polygonal networks result from \n\nspinodal dewetting and heterogeneous nucleation and growth, respectively. They are ‘decorated’ \n\nwith the solute and therefore conserve the transient dewetting pattern as a dried-in structure when \n\nall the solvent has evaporated [28, 34]. The picture is, however, not complete. The solute may", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2669.pdf" - }, - { - "text": "fast evaporation [104, 105]. These complex experimental systems all represent systems of high \n\npractical interest that the theories presented here are not (yet) able to describe. Such experiments \n\ndo, however, provide a strong motivation for further work to extend the theories presented here, as \n\nwell as to develop new approaches. \n\nLet us finally mention that several topics were entirely excluded from our discussion here. First, we \n\nfocused on a limited range of descriptions and did, for instance, not mention lattice Boltzmann, \n\nmolecular dynamics or dissipative particle dynamics approaches that may also be employed to \n\ndescribe fluid suspensions [106–109]. Second, we have only discussed spatially homogeneous \n\nsubstrates. Patterned substrates are widely used in dewetting experiments [38, 110–112]. Theoret- \n\nical descriptions are well developed for the dewetting of films of pure non-volatile liquids on such \n\nsubstrates [68, 113–119]. However, in the case of volatile liquids on heterogeneous substrates, \n\nmuch less work has been done. A third topic that we did not touch upon are possible continuum \n\nthin film approaches to demixing dewetting suspensions. We believe it is feasible to extend the \n\ndiffuse interface theories such as model-H [120] to include the influence of evaporation in dewet- \n\nting nanoparticle suspensions. For instance, such models have already been adapted to describe \n\ndemixing free surface films of polymer blends [121–123]. \n\nAJA and MJR gratefully acknowledge RCUK and EPSRC, respectively, for financial support. We \n\nacknowledge support by the European Union via the FP6 and FP7 Marie Curie schemes [Grants \n\nMRTN-CT-2004005728 (PATTERNS) and PITN-GA-2008-214919 (MULTIFLOW)]. \n\n[1] G. Reiter, “Dewetting of thin polymer films,” Phys. Rev. Lett. 68, 75–78 (1992). \n\n[2] G. Reiter, “Mobility of polymers in films thinner than their unperturbed size,” Europhys. Lett. 23, \n\n579–584 (1993). \n\n[3] A. Sharma and G. Reiter, “Instability of thin polymer films on coated substrates: Rupture, dewetting \n\nand drop formation,” J. Colloid Interface Sci. 178, 383–399 (1996). \n\n[4] P.-G. de Gennes, “Wetting: Statics and dynamics,” Rev. Mod. Phys. 57, 827–863 (1985).", - "page_start": 24, - "page_end": 24, - "source_file": "1001.2669.pdf" - }, - { - "text": "[110] L. Rockford, Y. Liu, P. Mansky, T. P. Russell, M. Yoon, and S. G. J. Mochrie, “Polymers on nanope- \n\nriodic, heterogeneous surfaces,” Phys. Rev. Lett. 82, 2602–2605 (1999). \n\n[111] A. Sehgal, V. Ferreiro, J. F. Douglas, E. J. Amis, and A. Karim, “Pattern-directed dewetting of \n\nultrathin polymer films,” Langmuir 18, 7041–7048 (2002). \n\n[112] M. Geoghegan and G. Krausch, “Wetting at polymer surfaces and interfaces,” Prog. Polym. Sci. 28, \n\n261–302 (2003). \n\n[113] P. Lenz and R. Lipowsky, “Morphological transitions of wetting layers on structured surfaces,” Phys. \n\nRev. Lett. 80, 1920–1923 (1998). \n\n[114] C. Bauer, S. Dietrich, and A. O. Parry, “Morphological phase transitions of thin fluid films on chem- \n\nically structured substrates,” Europhys. Lett. 47, 474–480 (1999). \n\n[115] R. Konnur, K. Kargupta, and A. Sharma, “Instability and morphology of thin liquid films on chemi- \n\ncally heterogeneous substrates,” Phys. Rev. Lett. 84, 931–934 (2000). \n\n[116] M. Brinkmann and R. Lipowsky, “Wetting morphologies on substrates with striped surface domains,” \n\nJ. Appl. Phys. 92, 4296–4306 (2002). \n\n[117] L. Brusch, H. K¨uhne, U. Thiele, and M. B¨ar, “Dewetting of thin films on heterogeneous substrates: \n\nPinning vs. coarsening,” Phys. Rev. E 66, 011602 (2002). \n\n[118] U. Thiele, L. Brusch, M. Bestehorn, and M. B¨ar, “Modelling thin-film dewetting on structured sub- \n\nstrates and templates: Bifurcation analysis and numerical simulations,” Eur. Phys. J. E 11, 255–271 \n\n(2003). \n\n[119] U. Thiele, “Open questions and promising new fields in dewetting,” Eur. Phys. J. E 12, 409–416 \n\n(2003). \n\n[120] D. M. Anderson, G. B. McFadden, and A. A. Wheeler, “Diffuse-interface methods in fluid mechan- \n\nics,” Ann. Rev. Fluid Mech. 30, 139–165 (1998). \n\n[121] U. Thiele, S. Madruga, and L. Frastia, “Decomposition driven interface evolution for layers of binary \n\nmixtures: I. Model derivation and stratified base states,” Phys. Fluids 19, 122106 (2007). \n\n[122] O. A. Frolovskaya, A. A. Nepomnyashchy, A. Oron, and A. A. Golovin, “Stability of a two-layer \n\nbinary-fluid system with a diffuse interface,” Phys. Fluids 20, 112105 (2008). \n\n[123] S. Madruga and U. Thiele, “Decomposition driven interface evolution for layers of binary mixtures:", - "page_start": 32, - "page_end": 32, - "source_file": "1001.2669.pdf" - }, - { - "text": "[65] J. P. Burelbach, S. G. Bankoff, and S. H. Davis, “Nonlinear stability of evaporating/condensing liquid \n\nfilms,” J. Fluid Mech. 195, 463–494 (1988). \n\n[66] A. Oron and S. G. Bankoff, “Dewetting of a heated surface by an evaporating liquid film under \n\nconjoining/disjoining pressures,” J. Colloid Interface Sci. 218, 152–166 (1999). \n\n[67] L. W. Schwartz, R. V. Roy, R. R. Eley, and S. Petrash, “Dewetting patterns in a drying liquid film,” \n\nJ. Colloid Interface Sci. 214, 363–374 (2001). \n\n[68] K. Kargupta, R. Konnur, and A. Sharma, “Spontaneous dewetting and ordered patterns in evaporating \n\nthin liquid films on homogeneous and heterogeneous substrates,” Langmuir 17, 1294–1305 (2001). \n\n[69] M. Bestehorn and D. Merkt, “Regular surface patterns on Rayleigh-Taylor unstable evaporating films \n\nheated from below,” Phys. Rev. Lett. 97, 127802 (2006). \n\n[70] G. F. Teletzke, H. T. Davis, and L. E. Scriven, “Wetting hydrodynamics,” Rev. Phys. Appl. 23, 989– \n\n1007 (1988). \n\n[71] J. N. Israelachvili, Intermolecular and Surface Forces, Academic Press, London (1992). \n\n[72] V. S. Mitlin, “Dewetting of solid surface: Analogy with spinodal decomposition,” J. Colloid Interface \n\nSci. 156, 491–497 (1993). \n\n[73] L. M. Pismen and Y. Pomeau, “Disjoining potential and spreading of thin liquid layers in the diffuse \n\ninterface model coupled to hydrodynamics,” Phys. Rev. E 62, 2480–2492 (2000). \n\n[74] L. Onsager, “Crystal statistics. I. A two-dimensional model with an order-disorder transition,” Phys. \n\nRev. 65, 117–149 (1944). \n\n[75] G. Reiter, “Unstable thin polymer films: Rupture and dewetting processes,” Langmuir 9, 1344–1351 \n\n(1993). \n\n[76] C. G. Sztrum, O. Hod, and E. Rabani, “Self-assembly of nanoparticles in three-dimensions: Forma- \n\ntion of stalagmites,” J. Phys. Chem. B 109, 6741–6747 (2005). \n\n[77] G. Yosef and E. Rabani, “Self-assembly of nanoparticles into rings: A lattice-gas model,” J. Phys. \n\nChem. B 110, 20965–20972 (2006). \n\n[78] J. F. Gouyet, M. Plapp, W. Dieterich, and P. Maass, “Description of far-from-equilibrium processes \n\nby mean-field lattice gas models,” Adv. Phys. 52, 523–638 (2003). \n\n[79] U. M. B. Marconi and P. Tarazona, “Dynamic density functional theory of fluids,” J. Chem. Phys. \n\n110, 8032–8044 (1999). \n\n[80] U. M. B. Marconi and P. Tarazona, “Dynamic density functional theory of fluids,” J. Phys.-Condes.", - "page_start": 29, - "page_end": 29, - "source_file": "1001.2669.pdf" - }, - { - "text": "polymers which only result in fingers without side-branches [75] or fields of droplets left behind \n\n[18]. \n\nA quantitative analysis shows that the mean number of fingers depends only very weakly on the av- \n\nerage concentration of the nanoparticles ρav \nn ; only the mean finger width increases with increasing \n\nconcentration. However, decreasing the mobility (i.e., decreasing the diffusivity of the particles) \n\nleads to a much denser finger pattern and also causes the front instability to appear at an earlier \n\nstage, i.e., when the front instability is in its initial linear regime, it has a higher growth rate and a \n\nsmaller characteristic wavelength (cf. Fig. 2(c) and (d)). Decreasing the effective chemical poten- \n\ntial (increasing its absolute value) has a similar but less strong effect. For details see [41]. These \n\nfindings lead to the conclusion that the determining factor for the front instability is the ratio of \n\nthe time-scales of the different transport processes. In particular, the front becomes more unstable \n\nwhen the velocity of the dewetting front increases as compared to the mean diffusion velocity of \n\nthe nanoparticles. \n\nIf the particle diffusivity is low, the front ‘collects’ the particles, resulting in a build up of the \n\nparticles at the front that itself is slowed down. This makes the front unstable and any fluctuation \n\nalong the front will trigger a transverse instability that results in an evolving fingering pattern. This \n\nhappens even when the particle-liquid and particle-particle attractive interactions do not favour \n\nclustering (i.e. demixing of the liquid and the nanoparticles). In this regime, the instability is a \n\npurely dynamic effect and energetics plays no role in determining the number of fingers. We call \n\nthis the ‘transport regime’. \n\nTo illustrate the influence of energetics (characterized by the interaction parameters εij) on finger- \n\ning in Fig. 3 we display the dependence of the mean finger number on particle-liquid interaction \n\nstrength εnl. For εnl ≥ 1.5 the mean finger number < f > is nearly constant; this is the trans- \n\nport regime. However, on decreasing εnl below 1.5, we observe a marked increase in the value \n\nof < f >, indicating that energy plays an important role in determining the number of fingers in \n\nthis regime. In this parameter range, demixing of particles and liquid occurs at the moving front \n\nand increases its transverse instability. In this ‘demixing regime’, the wavelength of the fingering \n\ninstability is determined by the dynamics and the energetics of the system. Decreasing εnl further \n\n(below 1.4 in Fig. 3) one first observes in regime (iii) a slight decrease in the average finger num- \n\nber. This is a geometric effect resulting from our one-dimensional finger counting routine: The \n\nfingers increasingly break up and the dried-in pattern looks progressively isotropic. In regime (iv), \n\nthe measure (cid:104)f (cid:105) does not represent a finger number but instead indicates a decrease in the typical", - "page_start": 11, - "page_end": 11, - "source_file": "1001.2669.pdf" - }, - { - "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. \n\nModels of dewetting thin films of pure liquids or polymers are often based on thin film hydro- \n\ndynamics. Starting from the Stokes equations, together with continuity and boundary conditions \n\nat the substrate and free surface, one applies a long-wave approximation (assuming small surface \n\nslopes and contact angles) [8, 63] and obtains a non-linear evolution equation for the film thickness \n\nprofile h(x, y, t). In the case of volatile liquids one finds [55–58, 64] \n\n(cid:20) \nQc∇ \n\n(cid:21) \n\nδF \nδh δF \nδh \n− Qe \n, \n\nwith the mobility functions Qc(h) = h3/3η ≥ 0 (assuming Poiseuille flow in the film and no slip \n\nat the substrate; η is the dynamic viscosity) and Qe ≥ 0 for the convective and evaporative part \n\nof the dynamics, respectively. Qe is a rate constant that can be obtained from gas kinetic theory \n\nor from experiment [57]. Note that Eq. (1) only applies if the pressure in the vapour above the \n\nfilm is close to the saturation pressure. For alternative expressions that are used to describe the \n\nnon-conserved evaporative dynamics see, e.g., Refs. [56, 57, 65–69]. Finally, ∇ = (∂x, ∂y), and \n\n∂t, ∂x and ∂y denote partial derivatives w.r.t. time and the coordinates. \n\nFocusing on the influence of capillarity and wettability only, the energy functional F [h] is given \n\nby \n(cid:90) (cid:90) \n\n(cid:104) γ \n2 \n(cid:105) \n(∇h)2 + f (h) − µh F [h] = dx dy (2) \n\n7", - "page_start": 6, - "page_end": 6, - "source_file": "1001.2669.pdf" - }, - { - "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle \n\ndeposits. The concentration of particles is much higher at the network nodes – an effect that can \n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid \n\non the substrate where the nanoparticles are. \n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front. \n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be \n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7 \n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger \n\nnumber remains constant, although new branches are continuously created and old branches join \n\neach other. In general, the results on fingering agree well with results obtained using the KMC \n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor \n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion \n\nconstant that is independent of the nanoparticle concentration. The DDFT is better suited than the \n\nKMC for investigations of the early instability stages: they are more easy to discern without the \n\ndiscrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of \n\nthe one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations \n\n(in analogy to the approach used in Refs. [19, 86, 87]). \n\nThe previous two sections focused on two approaches to describe the experimentally observed \n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet- \n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional \n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to \n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the \n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach \n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do \n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface- \n\n\n \n \n \n \n [html]\n
active particies residing in bermal and solutar Maragonistresies, seeker, [ My ]. A lescripton of spreading particle solutions incorporating a structural disjoining pressure has also been considered[ 89 ]. For related work on particle - laden film flow on an incline see Refs. [ 90.91 ].
One starts from the Stokes equations, together with continuity, no - slip boundary conditions at the
\n\n18", - "page_start": 17, - "page_end": 17, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2669.pdf", - "query": "Concerning the dewetting of nanoparticle solutions, how does the concentration of nanoparticle affect the main finger's width ?", - "target_page": 12, - "target_passage": "A quantitative analysis shows that the mean number of fingers depends only very weakly on the av- erage concentration of the nanoparticles ; only the mean finger width increases with increasing concentration", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "polymers which only result in fingers without side-branches [75] or fields of droplets left behind \n\n[18]. \n\nA quantitative analysis shows that the mean number of fingers depends only very weakly on the av- \n\nerage concentration of the nanoparticles ρav \nn ; only the mean finger width increases with increasing \n\nconcentration. However, decreasing the mobility (i.e., decreasing the diffusivity of the particles) \n\nleads to a much denser finger pattern and also causes the front instability to appear at an earlier \n\nstage, i.e., when the front instability is in its initial linear regime, it has a higher growth rate and a \n\nsmaller characteristic wavelength (cf. Fig. 2(c) and (d)). Decreasing the effective chemical poten- \n\ntial (increasing its absolute value) has a similar but less strong effect. For details see [41]. These \n\nfindings lead to the conclusion that the determining factor for the front instability is the ratio of \n\nthe time-scales of the different transport processes. In particular, the front becomes more unstable \n\nwhen the velocity of the dewetting front increases as compared to the mean diffusion velocity of \n\nthe nanoparticles. \n\nIf the particle diffusivity is low, the front ‘collects’ the particles, resulting in a build up of the \n\nparticles at the front that itself is slowed down. This makes the front unstable and any fluctuation \n\nalong the front will trigger a transverse instability that results in an evolving fingering pattern. This \n\nhappens even when the particle-liquid and particle-particle attractive interactions do not favour \n\nclustering (i.e. demixing of the liquid and the nanoparticles). In this regime, the instability is a \n\npurely dynamic effect and energetics plays no role in determining the number of fingers. We call \n\nthis the ‘transport regime’. \n\nTo illustrate the influence of energetics (characterized by the interaction parameters εij) on finger- \n\ning in Fig. 3 we display the dependence of the mean finger number on particle-liquid interaction \n\nstrength εnl. For εnl ≥ 1.5 the mean finger number < f > is nearly constant; this is the trans- \n\nport regime. However, on decreasing εnl below 1.5, we observe a marked increase in the value \n\nof < f >, indicating that energy plays an important role in determining the number of fingers in \n\nthis regime. In this parameter range, demixing of particles and liquid occurs at the moving front \n\nand increases its transverse instability. In this ‘demixing regime’, the wavelength of the fingering \n\ninstability is determined by the dynamics and the energetics of the system. Decreasing εnl further \n\n(below 1.4 in Fig. 3) one first observes in regime (iii) a slight decrease in the average finger num- \n\nber. This is a geometric effect resulting from our one-dimensional finger counting routine: The \n\nfingers increasingly break up and the dried-in pattern looks progressively isotropic. In regime (iv), \n\nthe measure (cid:104)f (cid:105) does not represent a finger number but instead indicates a decrease in the typical", - "page_start": 11, - "page_end": 11, - "source_file": "1001.2669.pdf" - }, - { - "text": "dewetted liquid. The front recedes until all liquid is collected in a central drop. Since no liquid \n\nevaporates [Qnc = 0 in Eq. (1)], the particle concentration does not change during the process. \n\nThe situation changes when allowing for evaporation (Qnc > 0). Now the front may retract \n\nby convection and/or evaporation. Evaporation leads to the possibility of a strong increase in \n\nthe particle concentration at the contact line as evaporation is strongest there. Due to the strong \n\nnonlinear dependence of the viscosity on the particle concentration, this may lead to a dramatic \n\ndecrease of the convective contribution to the front velocity. For moderate evaporation rates, this \n\nmay result in a (temporary) self-pinning of the front. Within the present basic model, the process \n\ncan (after complete dry-in) result in three different basic deposition patterns: (i) for very fast \n\nevaporation rates, all other processes occur over time scales that are much larger. In particular, the \n\neffects of convective redistribution of the liquid are neglectable. As a result one finds that a nearly \n\nhomogeneous film of nanoparticles of thickness hp = φ0h0 is deposited (see Fig. 6(a)). Convection \n\nonly results in the small heap of material visible at the left hand side of Fig. 6(a). The decrease \n\nin hp on the right side of Fig. 6(a) arises due to the diffusion of particles to the right of the initial \n\nfront position; (ii) for very low evaporation rates, the film dynamics is dominated by convective \n\ndewetting as this process acts on a much shorter time scale than evaporation. As a result, all the \n\nliquid is collected into a drop before evaporation slowly removes the remaining solvent. Under \n\nthese conditions most of the nanoparticles are deposited in a single heap (see Fig. 6(c)). Depending \n\non the diffusivity, the heap might be highest at the centre or show a depression there; (iii) at \n\nintermediate evaporation rates, one may observe the deposition of a nanoparticle ring around a \n\nregion with a nanoparticle film of much lower height. At the centre deposition might increase \n\nagain (see Fig. 6(b)). \n\nThe most intriguing feature is the ring formation that has been observed experimentally for sus- \n\npensions of very different particle sizes ranging from nanometers [32, 36, 46, 47] to hundreds of \n\nmicrometers. Pinning of the contact line and thermal Marangoni effects are often mentioned as \n\nnecessary conditions for the ring formation. The contact line pinning is often assumed to result \n\nfrom substrate heterogeneities. Film height and concentration profiles at various instants during \n\nthe dewetting process are displayed in Fig. 7. The profiles are from before, at and after self-pinning \n\nof the contact line. In Fig. 8 we display a space-time plot for the complete process. At first, the \n\nfront recedes in the same manner as when there is no evaporation, but now driven by convection \n\nand evaporation. A small capillary rim forms that collects all the dewetted liquid that does not \n\nevaporate. The particle concentration slowly increases at the contact line (Fig. 7(a) and regime", - "page_start": 20, - "page_end": 20, - "source_file": "1001.2669.pdf" - }, - { - "text": "FIG. 7: (Colour online) A sequence of profiles during a dewetting process with competing evaporation and \n\nconvection that leads to the dried-in ring structure of nanoparticles displayed in Fig. 6(b). Profiles are at (a) \n\nbefore pinning (t = 0.08T ), (b) at self-pinning (t = 0.13T ), and (c) after depinning (t = 0.29T ), where \n\nT = 3 × 1010τ with τ = η0γH/κ2 (T is of order of 1s). The film thickness profiles h are the bold solid \n\nlines, the nanoparticle concentrations φ are the dotted lines and the nanoparticle layer height hp = hφ are \n\nthe dashed lines. The remaining parameters and scalings are as in Fig. 6(b). \n\n(i) in Fig. 8). The concentration increases further and when it approaches random close packing \n\nφc, the viscosity diverges and the front pins itself. When pinned, further retraction only occurs \n\nthrough evaporation (Fig. 7(b) and regime (ii) in Fig. 8). The front eventually depins and starts \n\nto move again, leaving a nanoparticle ring behind (Fig. 7(c) and regime (iii) in Fig. 8). However, \n\nthe velocity is not as large as at the beginning, owing to the fact that the mean concentration of \n\nparticles has increased. The remaining particles are transported to the centre and are deposited \n\n\n \n \n \n \n [html]\n
DECE WIESIThe simple model used here shows, ( i ) that the contact line stops due to self - piming by the de -posited particles and ( ii ) the Marangoni effect is not necessary for the ring formation. The modelcan easily be refined to account for solutal and / or thermal Marangoni effects [ 88 ] but self - pining
", - "page_start": 21, - "page_end": 21, - "source_file": "1001.2669.pdf" - }, - { - "text": "FIG. 6: Profiles of the final dried-in nanoparticle layer for the dewetting of a suspension of nanoparticles \n\nin a volatile solvent that partially wets the substrate for (a) high (Ω = 10−3), (b) medium (Ω = 2 × 10−6) \n\nand (c) low (Ω = 0.78 × 10−8) evaporation rates, for the case when χ = H/l0 = 1.09, the lateral length \nscale is (cid:96) = (cid:112)γ/κH with κ = (Sp/l0) exp(d0/l0)H being an energy scale related to wettability and the \nvertical length scale is H = (cid:112)2SLW /κd0. The remaining dimensionless parameters are the evaporation \nnumber Ω = Qeη0(cid:96)2/H 3, the diffusion number Γ = D(0)η0/Hκ = 10−4 and the dimensionless chemical \n\npotential M = Hµ/κ = −0.0035. The system size is L = 19500(cid:96). Film thickness and hp in the plots are \n\ncircular throughout the dewetting and evaporation process. In this case one should interprete the \n\ncoordinate x as the distance from the centre of the circular film. \n\nWe start with a film of height h0 of finite length sitting on a precursor film and assume that the film \n\ncontains nanoparticles at constant concentration φ0. The chosen parameter values ensure that the \n\nfilm of thickness h0 is linearly stable. As we do not incorporate noise, no nucleation of additional \n\nholes can occur (even with noise the probability would be extremely low). Without evaporation the \n\nfilm dewets ‘classically’ by a retraction of the initially step-like front. After a short time, surface \n\ntension smoothes the profile of the receding front and a capillary rim forms that collects all the", - "page_start": 19, - "page_end": 19, - "source_file": "1001.2669.pdf" - }, - { - "text": "time scales for evaporation and diffusion. A large mobility M indicates fast diffusion as compared \n\nto evaporation. A trial move is accepted with the probability pacc = min[1, exp(−∆E/kT )] where \n\nk is the Boltzmann constant, T the temperature and ∆E is the change in energy resulting from the \n\npotential move. Note that particles are only allowed to move into wet areas of the substrate, i.e., \n\nonto cells with l = 1. This models zero diffusivity of the particles on a dry substrate. The replaced \n\nliquid fills the site left by the nanoparticle. \n\nWithout nanoparticles, the behaviour of the model is well known as it reduces to the classical \n\ntwo-dimensional Ising model [74]. For kT < kTc ≈ 0.567 liquid and vapour coexist when µ = \n\nµcoex = −2. For µ > −2 [µ < −2] eventually the liquid [vapour] dominates. A straight liquid- \n\ngas interface will recede [advance] for µ < −2 [µ > −2], i.e. one finds evaporative dewetting \n\n[wetting] fronts. If one starts, however, with a substrate covered homogeneously by the liquid, \n\nfor µ < −2 the film will dewet via a nucleation or spinodal-like process. If the nanoparticles are \n\npresent, they form dried-in structures when all the liquid evaporates. The final structures do not \n\nnormally change any further – at least on short time scales. However, if the liquid wets the particles \n\n(i.e. is attracted to the particles), over long times there might be a coarsening of the structures, \n\nfacilitated by the adsorbed liquid. The dried-in patterns depend on the particular pathway taken by \n\nthe evaporative dewetting process. They range from labyrinthine to polygonal network structures \n\nor holes in a dense particle layer. Some typical patterns are displayed in Fig. 2, for cases when \n\nthe average surface coverage of the nanoparticles ρav \n\nn = 0.2. Panels (a) and (b) result from a \nspinodal-like and nucleation and growth process, respectively. At first sight they look very similar \n\nto the patterns seen for the pure solvent and one might argue that the particles solely act as passive \n\ntracers and preserve the transient volatile dewetting structures of the solvent. This was suggested \n\nin Refs. [26–28] for dewetting collagen solutions. However, panels (c) and (d) indicate that the \n\nparticles may at times play a rather more significant role. When the diffusion of the particles is \n\nslow, the evaporative dewetting fronts become transversely unstable and may result in strongly \n\nramified patterns. This instability is caused by the nanoparticles. The lower their mobility, the \n\nstronger the fingering effect, i.e., there are more fingers in (c) than in (d) because in the latter the \n\nmobility is larger. \n\nThe front instability is intriguing as it results in strongly branched structures. As the dewetting \n\nfront moves, new branches are continuously created and existing branches merge at the moving \n\ncontact line. However, the mean finger number in the streamwise direction of the resulting ramified \n\npattern is a constant. This behaviour is in contrast to the front instabilities found for dewetting", - "page_start": 9, - "page_end": 9, - "source_file": "1001.2669.pdf" - }, - { - "text": "distance between particle clusters resulting from the demixing process that occurs already in the \n\nbulk liquid and is not related to the front instability at all. Note that one finds a similar sequence \n\nof regimes (i) to (iv) when increasing the particle-particle interaction strengths for fixed εnl (see \n\nRef. [41]) for further details. \n\nFIG. 3: (Colour online) Dependence of the mean finger number left behind by the unstable dewetting \n\nfront on the particle-liquid interaction strength εnl. The regions marked (i) to (iv) are discussed in the \n\nmain text. The insets display typical snapshots obtained in the four different regions. Particles are black, \n\nliquid is grey (green online) and the empty substrate is white. The remaining parameters are kT = 0.2, \n\nM = 20, µ = −2.2, ρav \nn = 0.1, (cid:15)nn = 2.0, domain size 1200 × 1200. For the insets, from left to right, \n\n(cid:15)nl = 1.2, 1.4, 1.45, 1.8. \n\nWe note also that the fingering process may be viewed as self-optimising the front motion – i.e. \n\nthe front keeps its average velocity constant by expelling particles into the fingers. A similar effect \n\nexists for dewetting polymer films [18], where liquid is expelled from the growing moving rim \n\nwhich collects the dewetted polymer. There, the surplus liquid is left on the surface as a droplet \n\npattern. \n\n\n \n \n \n \n [html]\n
The kinetic MonteCarlo modeThere and is a very useful toolAccessions one to understand the patternformation in dryingnanoparticleAssuspensions. One hasPercent, to keep in mind the restrictionsTableTableTableTable
", - "page_start": 12, - "page_end": 12, - "source_file": "1001.2669.pdf" - }, - { - "text": "substrate and force equilibria at the free surface, and applies a long-wave approximation. Under \n\nthe assumption that concentrations equilibrate rapidly over the film thickness, we obtain coupled \n\nnon-linear evolution equations for the film thickness profile h(x, t) and the amount of nanoparticles \n\nper unit length hp = φh, where φ is the volume concentration of the nanoparticles. Note, that hp \n\ncorresponds to the local thickness of the nanoparticle layer when all the solvent is evaporated. The \n\nresulting evolution equation for the film thickness is Eq. (1) above and focusing on the influence \n\nof particle-independent capillarity and wettability only, the energy functional F [h] is given by \n\nEq. (2) above. Note that the viscosity η depends on the particle concentration. Following Refs. \n\n[88, 89, 91, 92] we use the Quemada law for dense suspensions [93–95] \n\n(cid:18) (cid:19)−2 \n\nφ \nφc \nη(φ) = η0 \n1 − (8) \n\nwhere φc = 0.64 corresponds to random close packing of spherical particles. For the nanoparticle \n\nvolume per length hp = φh one obtains the following evolution equation: \n\n(cid:20) (cid:21) \n\nδF \nδh \n∂t(φh) = ∇ · φQc∇ \n+ ∇ · [D(φ)h∇φ] , (9) \n\nwhere the particle concentration dependent diffusion coefficient D(φ) is related to the viscosity by \n\nthe Einstein relation D(φ) = kT /6πRη(φ), where R is the radius of the nanoparticles [96]. \n\nWe illustrate results obtained employing this thin film theory using the single example of a re- \n\nceding dewetting front for a partially wetting film. We use the disjoining pressure and material \n\nconstants for the liquid considered in Ref. [57], where the evaporative and convective dewetting \n\nof a film of volatile liquid is studied. We add, however, the nanoparticles to the system. The \n\nexpression that we employ for the local free energy term in Eq. (2) is: \n\n(cid:18) d0 − h \nl0 \n\n(cid:19) \nSLW d2 \n0 \nf (h) = \nh2 + SP exp \n, (10) \n\nwhere the parameters characterising the interaction between the liquid film and the surface are \n\nthe apolar and polar spreading coefficients SLW and SP , respectively, the Debye length l0 and the \n\nBorn repulsion length d0 [57]. The resulting disjoining pressure Π = −∂hf (h) allows for a stable \n\nprecursor film (thickness hprecursor) and also has a second (larger) thickness (h0) that corresponds \n\nto a secondary minimum of the underlying energy functional. See Refs. [11, 97] for studies of \n\nfilm and drop states for similar disjoining pressures. Our results are calculated for a system where \n\nthe profiles only vary in one Cartesian direction (x), corresponding to a straight dewetting front. \n\nHowever, our results may also be interpreted as applying to a circular flat drop whose front remains \n\n19", - "page_start": 18, - "page_end": 18, - "source_file": "1001.2669.pdf" - }, - { - "text": "FIG. 2: Typical KMC results for the final dried-in nanoparticle structures resulting from the evaporative \n\ndewetting processes of nanoparticle solutions (nanofluids) in the case of (a) a spinodal-like process at µ = \n\n−2.55, (b) nucleation and growth of holes at µ = −2.3, (c) unstable fronts at µ = −2.3 and low mobility \n\nM = 5, and (d) unstable fronts at µ = −2.3 and medium mobility M = 10. The starting configuration in \n\n(a) and (b) is a homogeneous liquid film with uniformly distributed particles whereas in (c) and (d) a hole \n\nat the center is nucleated ‘by hand’. The remaining parameters are (a,b) M = 50, (cid:15)nl = 2.0, (cid:15)nn = 1.5, \n\nn = 0.2, kT = 0.3, MC steps= 500, domain size 1200 × 1200; (c,d) εnn = 2.0, (cid:15)nl = 1.5, ρav \nρav n = 0.2, \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 10, - "page_end": 10, - "source_file": "1001.2669.pdf" - }, - { - "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle \n\ndeposits. The concentration of particles is much higher at the network nodes – an effect that can \n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid \n\non the substrate where the nanoparticles are. \n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front. \n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be \n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7 \n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger \n\nnumber remains constant, although new branches are continuously created and old branches join \n\neach other. In general, the results on fingering agree well with results obtained using the KMC \n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor \n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion \n\nconstant that is independent of the nanoparticle concentration. The DDFT is better suited than the \n\nKMC for investigations of the early instability stages: they are more easy to discern without the \n\ndiscrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of \n\nthe one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations \n\n(in analogy to the approach used in Refs. [19, 86, 87]). \n\nThe previous two sections focused on two approaches to describe the experimentally observed \n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet- \n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional \n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to \n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the \n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach \n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do \n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface- \n\n\n \n \n \n \n [html]\n
active particies residing in bermal and solutar Maragonistresies, seeker, [ My ]. A lescripton of spreading particle solutions incorporating a structural disjoining pressure has also been considered[ 89 ]. For related work on particle - laden film flow on an incline see Refs. [ 90.91 ].
One starts from the Stokes equations, together with continuity, no - slip boundary conditions at the
\n\n18", - "page_start": 17, - "page_end": 17, - "source_file": "1001.2669.pdf" - }, - { - "text": "Benard instability,” Phys. Rev. Lett. 88, 164501 (2002). \n\n[50] J. Huang, F. Kim, A. R. Tao, S. Connor, and P. Yang, “Spontaneous formation of nanoparticle stripe \n\n\n \n \n \n \n [html]\n
S. H. Lee, P. 1. Yoo, S. J. Ksvon, and H. H. Lee, “ Solvent - driven dewetting and rim instability,” I.Chem. Phys. 121.4346 – 4351 ( 2004 ).
[ 52 ] L. Xia, T. F. Shi, P. K. Duta, and L. An, ‘ Rim instability by solvent - induced deverting ’. I. Chem. Phys. IZ?, 144704 ( 2007 ).[ 53 ] L. Xia, T. F. Shi, and L. 1 Aax, “ The devetiing dynamics of the polymer thin film by solvent ameale ung ”, I Chens. Phys. I29 ( 44904 ( 2008 ).
[ 54 ] M. Elbaum and S. G. Lipson, “ How does a thin weted lifn dry up ” Phys. Rev. Lett. 72.562 – 3565 ( 1994 ).[ 55 ] N. Samidered, S. G. Lipson, and D. S. Tannhauser, “ Pattern formation in drying water filtes.” Phys. Rev. E. SP, 2906 – 2913 ( 1998 ).
[ 56 ] A. Padmakar, K. Kargupta, and A. Sharma, “ Instability and devetting of exaporating thin water films on partially and completely wertable substrates.” I. Chem. Phys. I188.1735 – 1744 ( 1999 ).[ 57 ] A, V, Lysohin, A, Golovin, and L, M. Pismen, “ Fingering instability of thin evaponating liquid thims,” Phys. Rev, E6K, ( 221602 - 2002 ).
[ 58 ] L. M. Pismen, “ Spinodal devetting in a volatile liquid film,” Phys. Rev. E78.021601 ( 2004 ).[ 59 ] C. Pouland, O. Benichoa, and A. M. Carabat, “ Freely receifing evaporating droplets,” Langmuir B. 8825 – 8834 ( 2003 ).
( 60 ) Y. Gotkis, I. Ivasov, N. Murisic, and L. Kondic, “ Dynamic structure formation at the fronts of volatile faquid drops,” Phys. Rer. Lett. 97.186101 ( 2006 ).( 61 ) E. Paniliae Vasijour and P. Moriary, “ Meniscus - mediated organization of colloidal nanoparticles.” J. Phys. Chem. C IH, 16255 – 16268 ( 207 ).
( 2 ) C : Gigastic K. Dabosk - Veress, and J. R. Docher, “ Changes in the norphology of self - usembled polystyreme microphere monolayers produced by ameading.” I Colloid Interface Sci, 240.14 – 155 ( 2001 ).( 63 ) A. Onn, S. H. Davis, and S. G. Bankoff, “ Long - scale evolution of thin liquid films,” Rev. Mod. Phys. 69 ( 931 – 980 ( 1997 ).
[ 64 ] U. Thiele, “ Thin film evolution equations from ( exporating ) deveting liquid layers to epitaxial growth,” 1 Phys.- Cond. Mat ( 2010 ), ( at press ).
", - "page_start": 28, - "page_end": 28, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2669.pdf", - "query": "Which of ultrathin film or mesoscale hydrodynamics are best explained by kinetic Monte Carlo models ? ", - "target_page": 18, - "target_passage": "lthough both the kinetic Monte Carlo model and the dynamical density functional theory are able to describe well the processes in the ultrathin film, they can not be employed to describe mesoscale hydrodynamics", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "where γ is the liquid-gas surface tension and f (h) is a local free energy term that describes the \n\nwettability of the surface. Since µ corresponds to a chemical potential, the term µh may either bias \n\nthe system towards the liquid or towards the gas state. The variation of F w.r.t. h gives the pressure. \n\nIt contains the curvature (Laplace) pressure −γ∆h and the disjoining pressure Π(h) = −∂hf (h). \n\nMany different forms for the latter are in use (see, e.g., Refs. [4, 8, 63, 70–73]). \n\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanopar- \n\nticles are not taken into account. However, under certain conditions one can augment equation (1) \n\nfor the evolution of the film thickness by coupling it to an equation for the evolution of the mean \n\nparticle concentration. The resulting model is able to describe the behaviour of an evaporating so- \n\nlution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. \n\nWe should expect such a model to describe the mesoscopic dewetting front discussed above. How- \n\never, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor \n\nfilm. \n\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a dis- \n\ncrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on \n\nevaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The va- \n\nlidity of this strong assumption regarding the relevant transport processes can be confirmed from \n\nan estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The \n\nconvective mobility is proportional to h3, i.e., it is large for thick films but decreases strongly with \n\nreduced film thickness. The evaporative mobility, however, is a constant, implying that evapora- \n\ntion will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] \n\nand a small contact angle (≈ 0.01), the cross-over thickness is in the range of 1-5 nanometers. \n\nThis estimate justifies the neglect of convective transport in a description of the postcursor film \n\nand may explain why one has such good agreement between the experimentally observed patterns \n\nand the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model \n\n[35]. We introduce the KMC model below in Section III A. \n\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its po- \n\ntential applications. For instance, the thermodynamic chemical potential as well as any wetting \n\ninteraction of the solvent with the substrate are collected in a single parameter – an effective chem- \n\nical potential. This implies that any influence of a disjoining pressure is ‘smeared out’ over the \n\nwhole system and that no distinction between the short- and the long-range parts of the disjoining \n\npressure is possible. It is furthermore based on the assumption that evaporation/condensation is", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" - }, - { - "text": "FIG. 8: (Colour online) Space-time plots are given for (left) the film thickness h and (right) the nanoparticle \n\nlayer height hp = hφ. The plot corresponds to the complete evolution resulting in the ring profile of \n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright \n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four \n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning, \n\n(iii) slow motion after depinning, and (iv) final evaporation from the center. \n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating \n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of \n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and \n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics \n\non the mesoscale has been described as well as more microscopic models for the dynamics in the \n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film \n\nmodel. \n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to \n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures \n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic \n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-", - "page_start": 22, - "page_end": 22, - "source_file": "1001.2669.pdf" - }, - { - "text": "on the model (see above). The purely two-dimensional character of the KMC was extended to \n\na ‘pseudo three-dimensional’ one by making the effective chemical potential dependent on the \n\nmean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to \n\nthe introduction of a ‘global’ thickness-dependent disjoining pressure into the evaporation term \n\nwithout an explicit consideration of a film thickness. The amended model can reproduce bimodal \n\nstructures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully three- \n\ndimensional models are also discussed in the literature [76, 77]. \n\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related \n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. \n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid, \n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to \n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the \n\nsubstrate, as all such interactions are absorbed into the effective chemical potential. \n\nHowever, using dynamical density functional theory (DDFT) [78–83] one can develop a model \n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit \n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to \n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes \n\nthe coupled dynamics of the density fields of the liquid ρl and the nanoparticles ρn. The densities \n\nρl and ρn are defined as the probabilities of finding a given lattice site on the surface to be occupied \n\nby a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond \n\nto number densities as we use the lattice spacing σ = 1 as our unit of length. \n\nTo develop the DDFT, one must first derive the underlying free energy functional F [ρl, ρn], and \n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the \n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. \n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) \n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution \n\nand contributions from the interactions between the different species (nanoparticles and liquid). \n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is \n\ncoupled to a reservoir with chemical potential µ), whereas the nanoparticles are treated in the", - "page_start": 13, - "page_end": 13, - "source_file": "1001.2669.pdf" - }, - { - "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion \n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid- \n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ- \n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport \n\nregime where the instability is almost completely independent of the interaction strengths and \n\na demixing regime where particles and liquid demix at the receding front thereby increasing its \n\ntransverse instability. \n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of \n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional \n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo- \n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by \n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend \n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between \n\nshort- and long-range interactions of solvent and/or solute with the substrate. We have, however, \n\nrestricted the examples given here to situations that can also be described using the KMC model. \n\nA further exploration will be presented elsewhere. \n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It \n\nresults from a long-wave approximation and consists of coupled evolution equations for the film \n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning \n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee- \n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the \n\ncombined effects of convection and evaporation. \n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques \n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica- \n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly \n\ntowards increasingly complex systems. For example, there have been investigations of the influ- \n\nence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal \n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap- \n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of \n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102], \n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding \n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. \n\nModels of dewetting thin films of pure liquids or polymers are often based on thin film hydro- \n\ndynamics. Starting from the Stokes equations, together with continuity and boundary conditions \n\nat the substrate and free surface, one applies a long-wave approximation (assuming small surface \n\nslopes and contact angles) [8, 63] and obtains a non-linear evolution equation for the film thickness \n\nprofile h(x, y, t). In the case of volatile liquids one finds [55–58, 64] \n\n(cid:20) \nQc∇ \n\n(cid:21) \n\nδF \nδh δF \nδh \n− Qe \n, \n\nwith the mobility functions Qc(h) = h3/3η ≥ 0 (assuming Poiseuille flow in the film and no slip \n\nat the substrate; η is the dynamic viscosity) and Qe ≥ 0 for the convective and evaporative part \n\nof the dynamics, respectively. Qe is a rate constant that can be obtained from gas kinetic theory \n\nor from experiment [57]. Note that Eq. (1) only applies if the pressure in the vapour above the \n\nfilm is close to the saturation pressure. For alternative expressions that are used to describe the \n\nnon-conserved evaporative dynamics see, e.g., Refs. [56, 57, 65–69]. Finally, ∇ = (∂x, ∂y), and \n\n∂t, ∂x and ∂y denote partial derivatives w.r.t. time and the coordinates. \n\nFocusing on the influence of capillarity and wettability only, the energy functional F [h] is given \n\nby \n(cid:90) (cid:90) \n\n(cid:104) γ \n2 \n(cid:105) \n(∇h)2 + f (h) − µh F [h] = dx dy (2) \n\n7", - "page_start": 6, - "page_end": 6, - "source_file": "1001.2669.pdf" - }, - { - "text": "Abstract \n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions \n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled \n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to \n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model. \n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched \n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic \n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative \n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition \n\nin the film and contact line motion is discussed. \n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ \n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is \n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect. \n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as \n\npossible future developments and extensions. \n\nJ. Phys.-Cond. Mat. 21, 264016 (2009), The paper is published in: \n\nin the Volume “Nanofluids on solid substrates” and can be obtained at \n\nhttp://dx.doi.org/10.1088/0953-8984/21/26/264016", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "the dominant dynamic process, but does not allow one to probe this assumption. In Section III B \n\nwe show how one may develop a dynamical density functional theory (DDFT) that describes the \n\nsystem at a similar level to the KMC. However, the DDFT may also be easily extended to include \n\nother effects such as fluid diffusion, that the KMC does not incorporate. \n\nThe kinetic Monte Carlo model for two-dimensional dewetting nanofluids [33] was first proposed \n\nin Ref. [35] and extended to include next-nearest neighbour interactions in [37]. The two key \n\nassumptions used are: (i) the relevant processes can be mapped on to a two-dimensional lattice \n\ngas model, thereby neglecting continuous changes in the thickness of the evaporating film, and (ii) \n\nall relevant dynamics results from diffusing nanoparticles and evaporating/condensing solvent. \n\nThe model builds on an Ising-type model for the liquid-gas phase transition. The surface is divided \n\nup into a regular array of lattice sites whose size is dictated by the nanoparticles. One then con- \n\nsiders each lattice site to be occupied either by a nanoparticle, liquid or vapour. This effectively \n\nmaps the system onto a two-dimensional two-component lattice gas having two fields n and l. The \n\nresulting three possible states of a cell are: liquid (l = 1, n = 0), nanoparticle (l = 0, n = 1), \n\nand vapour (l = 0, n = 0, i.e., cell empty). The energy of an overall configuration is given by the \n\n(cid:88) (cid:88) \nE = − \nlilj − µ li \n\ni \n\nwhere (cid:80) \n\n denotes a sum over nearest neighbour pairs and εll, εnn and εnl are the liquid-liquid, \nparticle-particle and liquid-particle interaction energies, respectively. Fixing the three interaction \n\nstrength parameters εll, εnn, εnl and the effective chemical potential µ determines the equilibrium \n\nstate of the system. We choose εll as unit of energy – i.e. we set εll = 1. \n\nThe hamiltonian determines the equilibrium state and the energy landscape of the system. How- \n\never, as the system ‘dries in’ during the course of the solvent evaporation, the final nanoparticle \n\nconfigurations do not necessarily represent equilibrium structures. This implies that the system \n\ndynamics is of paramount importance. It is determined by the possible Monte Carlo moves, their \n\nrelative frequencies, and the probabilities for their acceptance. Two types of moves are allowed: (i) \n\nevaporation/condensation of liquid and (ii) diffusion of nanoparticles within the liquid. A mobility \n\nM corresponds to the ratio of cycles of particle and solvent moves and reflects the physical ratio of", - "page_start": 8, - "page_end": 8, - "source_file": "1001.2669.pdf" - }, - { - "text": "FIG. 5: (Colour online) Density profiles for the situation where the substrate is covered by nanoparticles \n\nwith average density ρav \nn = 0.3 and with the liquid excluded from the region y < 0. The top row shows \n\nthe nanoparticle density profiles and bottom row the corresponding liquid density profiles at the times \n\nt/tl = 1000 (left), 10000 (middle) and 30000 (right), where tl = 1/kT M nc \nl σ2. The parameters are \n\nkT /εll = 0.8, εnl/εll = 0.6, εnn = 0, α = 0.2M nc \nl σ4, M c l = 0, ρl(t = 0) = 0.9 ± ξ (where ξ represents \n\nwhite noise of amplitude 0.05) and (µ − µcoex)/kT = −0.78. \n\nThis theory allows us to study the time evolution of the evaporating film of nanoparticle suspension \n\nwithout some of the restrictions of the kinetic Monte Carlo model. Here, however, we illustrate its \n\napplication in similar parameter regimes as used above for the KMC. We focus on two examples: \n\n(i) the spinodal dewetting of a initially flat film of nanoparticle suspension characterised by con- \n\nstant ρl and ρn (Fig. 4); and (ii) the retraction of a dewetting front that is unstable with respect to \n\na fingering instability (Fig. 5). \n\nFig. 4 presents two pairs of snapshots from a purely evaporative dewetting process deep inside the \n\nparameter region of the phase diagram where spinodal dewetting occurs. For small times the film \n\nbecomes unstable showing a typical spinodal labyrinthine pattern with a typical wavelength. The \n\nnanoparticles concentrate where the remaining liquid is situated. However, they are ‘slow’ in their \n\nreaction: when ρl already takes values in the range 0.08 – 0.83, the nanoparticle concentration \n\nhas only deviated by about 25% from its initial value. The film thins strongly forming many", - "page_start": 16, - "page_end": 16, - "source_file": "1001.2669.pdf" - }, - { - "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle \n\ndeposits. The concentration of particles is much higher at the network nodes – an effect that can \n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid \n\non the substrate where the nanoparticles are. \n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front. \n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be \n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7 \n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger \n\nnumber remains constant, although new branches are continuously created and old branches join \n\neach other. In general, the results on fingering agree well with results obtained using the KMC \n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor \n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion \n\nconstant that is independent of the nanoparticle concentration. The DDFT is better suited than the \n\nKMC for investigations of the early instability stages: they are more easy to discern without the \n\ndiscrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of \n\nthe one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations \n\n(in analogy to the approach used in Refs. [19, 86, 87]). \n\nThe previous two sections focused on two approaches to describe the experimentally observed \n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet- \n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional \n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to \n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the \n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach \n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do \n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface- \n\n\n \n \n \n \n [html]\n
active particies residing in bermal and solutar Maragonistresies, seeker, [ My ]. A lescripton of spreading particle solutions incorporating a structural disjoining pressure has also been considered[ 89 ]. For related work on particle - laden film flow on an incline see Refs. [ 90.91 ].
One starts from the Stokes equations, together with continuity, no - slip boundary conditions at the
\n\n18", - "page_start": 17, - "page_end": 17, - "source_file": "1001.2669.pdf" - }, - { - "text": "[81] A. J. Archer and M. Rauscher, “Dynamical density functional theory for interacting brownian parti- \n\ncles: Stochastic or deterministic?” J. Phys. A-Math. Gen. 37, 9325–9333 (2004). \n\n[82] A. J. Archer and R. Evans, “Dynamical density functional theory and its application to spinodal \n\ndecomposition,” J. Chem. Phys. 121, 4246–4254 (2004). \n\n[83] P. A. Monson, “Mean field kinetic theory for a lattice gas model of fluids confined in porous materi- \n\nals,” J. Chem. Phys. 128, 084701 (2008). \n\n[84] P. M. Chaikin and T. C. Lubensky, Principles of condensed matter physics, Cambridge University \n\nPress (1997). \n\n[85] J. S. Langer, “An introduction to the kinetics of first-order phase transitions,” in C. Godreche, editor, \n\n“Solids far from Equilibrium,” pages 297–363, Cambridge University Press (1992). \n\n[86] M. A. Spaid and G. M. Homsy, “Stability of Newtonian and viscoelastic dynamic contact lines,” \n\nPhys. Fluids 8, 460–478 (1996). \n\n[87] U. Thiele and E. Knobloch, “Front and back instability of a liquid film on a slightly inclined plate,” \n\nPhys. Fluids 15, 892–907 (2003). \n\n[88] M. R. E. Warner, R. V. Craster, and O. K. Matar, “Surface patterning via evaporation of ultrathin \n\nfilms containing nanoparticles,” J. Colloid Interface Sci. 267, 92–110 (2003). \n\n[89] O. K. Matar, R. V. Craster, and K. Sefiane, “Dynamic spreading of droplets containing nanoparticles,” \n\nPhys. Rev. E 76, 056315 (2007). \n\n[90] J. J. Zhou, B. Dupuy, A. L. Bertozzi, and A. E. Hosoi, “Theory for shock dynamics in particle-laden \n\nthin films,” Phys. Rev. Lett. 94, 117803 (2005). \n\n[91] B. P. Cook, A. L. Bertozzi, and A. E. Hosoi, “Shock solutions for particle-laden thin films,” SIAM J. \n\nAppl. Math. 68, 760–783 (2008). \n\n[92] R. V. Craster, O. K. Matar, and K. Sefiane, “Pinning, retraction, and terracing of evaporating droplets \n\ncontaining nanoparticles,” Langmuir (2009), online available. \n\n[93] D. Quemada, “Rheology of concentrated disperse systems and minimum energy-dissipation principle \n\nI. Viscosity-concentration relationship,” Rheol. Acta 16, 82–94 (1977). \n\n[94] D. Quemada and C. Berli, “Energy of interaction in colloids and its implications in rheological \n\nmodeling,” Adv. Colloid Interface Sci. 98, 51–85 (2002). \n\n[95] J. J. Stickel and R. L. Powell, “Fluid mechanics and rheology of dense suspensions,” Annu. Rev. \n\nFluid Mech. 37, 129–149 (2005).", - "page_start": 30, - "page_end": 30, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed9.pdf", - "query": "What is AgMERRA ?", - "target_page": 2, - "target_passage": " historical daily weather data (1986–2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series data", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "t \nn \ne \nm \ne \nt \na \nt \nS \ne \nc \nn \na \nn \nr \ne \nv \no \nG \ne \nt \na \nr \no \np \nr \no \nC", - "page_start": 37, - "page_end": 37, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**Investment in LandÑlls**", - "page_start": 47, - "page_end": 47, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "W \nH \nO \n\nW \nE \n\nA \nR \nE", - "page_start": 18, - "page_end": 18, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "W \nH \nO \n\nW \nE \n\nA \nR \nE", - "page_start": 24, - "page_end": 24, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**SHENTEL SERVICE AREAS**", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed9.pdf", - "query": "In 2018, what was the global proportion of maize grown in the US ?", - "target_page": 5, - "target_passage": "According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. The United States accounts for more than 32%", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Figure 5.**Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C. \n\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should \nbe taken from now on. Food security would be a significant challenge in this century. \n\n**Yield change of maize in main countries.**There are huge differences in impacts on maize yield under \nclimate change, which would influence the food crisis in different regions. There are 159 countries in the whole \nworld which plant maize. The gross yield of maize the top 20 countries accounts for more than 90% of the total \nyield in the 159 countries. So, the changes in the top 20 countries under future scenarios would influence the \nfood security of the whole world (Fig. 5). From the results of simulated by CRESE-maize under global warming \nby 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become \n33.5%. There would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly \nincrease. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which \nthe mean yield loss rate is approximate to that under global warming by 1.5 °C. There would be 77 countries \nexperiencing yield increase; however, the mean yield increase is apparently smaller than that under global warm- \ning by 1.5 °C. Generally, the global maize yield would decrease. The results show that the adverse effect of warm- \ning up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to \ndevelop forward-looking adaptation measures to cope with future climate change. \n\n\n \n \n \n \n [html]\n
StatementTableTableTableofofTableTableofofofofTableTableCasesTableTableofofTableTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 8", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed9.pdf" - }, - { - "text": "**The impact of 1.5 °C and 2.0 °C**\n**global warming on global maize**\n**production and trade**\n\n**OPEN**\n\n**Kuo Li1** ***, Jie Pan1, Wei Xiong2, Wei Xie3 & Tariq Ali3**\n\n**Climate change is becoming more and more remarkable which has an obvious impact on crop yields**\n**all over the world. Future climate scenario data was simulated by 5 climate models recommended**\n**by ISI-MIP under 4 RCP scenarios, in which the approximate scenarios with global warming by 1.5 °C**\n**and 2 °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the**\n**world under global warming by 1.5 °C and 2.0 °C were analyzed and the market prices of maize at**\n**national and global levels were simulated. The results showed that, the risk of maize yield reduction**\n**under 2.0 °C scenario was much more serious than 1.5 °C scenario; the ratios of yield changes were**\n**separately 0.18% and − 10.8% under 1.5 °C and 2.0 °C scenarios. The reduction trend of total maize**\n**production is obvious in the top five countries and the main producing regions of the world, especially**\n**under the 2.0 °C scenario. The market price of maize would increase by around 0.7% and 3.4% under**\n**1.5 °C and 2.0 °C scenarios. With the quickly increasing population in the world, it is urgent for all**\n**countries to pay enough attention to the risk of maize yield and take actions of mitigation and**\n**adaptation to climate change.**\n\nIn the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Figure 4.**Distribution of yield loss rates on maize in the world under global warming by 2.0 °C (up: \nNorESM1-M model, RCP 4.5; down: GFDL-ESM2M model, RCP 6.0). The figure has been generated using \nArcGIS 10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com. \n\nsecurity of the whole world would still be attacked violently. There are huge differences among the continents; \nSouth America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming \nby 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, \nit should be cautious to cope with the maize changes under global warming by 1.5 °C. \n\n\n \n \n \n \n [html]\n
Patients with modelStatesStatementControlStatementControlStatementTableTablePatientsSpecificationsStatesTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 7", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Figure 3.**Distribution of yield loss rate on maize in the world under global warming by 1.5 °C (up: IPSL- \nCM5A-LR model, RCP 2.6; down: GFDL-ESM2M model, RCP 4.5). The figure has been generated using ArcGIS \n10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com. \n\nwarming by 1.5 °C and 2.0 °C. So, there are apparent challenges and opportunities for maize production in the \nwhole world under climate change. We should grasp the opportunities and expand the yield increasing poten- \ntials; meanwhile, the threat of maize yield loss should be controlled and compressed to the minimum in the \nhigh-risk regions. \n\n\n \n \n \n \n [html]\n
TablePatientsStatementSpeciesStateStatestedStatementTableStatementStateSpeciesStatementTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 6", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed9.pdf" - }, - { - "text": "of flowering time. PNAS**115**(42), 10642–10647 (2018). \n 35. Yang, C. Y., Fraga, H., Ieperen, W. V. & Santos, J. A. Assessment of irrigated maize yield response to climate change scenarios in \nPortugal. Agric. Water Manag.**184**, 178–190 (2017). \n 36. Miller, S. A. & Moore, F. C. Climate and health damages from global concrete production. Nat. Clim. Change https:// doi. org/ 10. \n1038/ s41558- 020- 0733-0 (2020). \n 37. Kassie, B. T. et al. Exploring climate change impacts and adaptation options for maize production in the Central Rift Valley of \nEthiopia using different climate change scenarios and crop models. Clim. Change**129**, 145–158 (2015). \n 38. Tao, F. & Zhang, Z. Climate change, high-temperature stress, rice productivity, and water use in Eastern China: A new superensem- \nble-based probabilistic projection. J. Appl. Meteorol. Climatol.**52**, 531–551 (2013). \n\n 39. Glotter, M. & Elliott, J. Simulating US agriculture in a modern Dust Bowl drought. Nat. Plants**3**, 16193 (2016). \n 40. Challinor, A. J., Koehler, A. K., Ramirez-Villegas, J., Whitfield, S. & Das, B. Current warming will reduce yields unless maize \nbreeding and seed systems adapt immediately. Nat. Clim. Change**6**, 954–958 (2016). \n 41. Cammarano, D. et al. Using historical climate observations to understand future climate change crop yield impacts in the South- \neastern US. Clim. Change**134**, 311–326 (2016). \n\n 42. Etten, J. V. et al. Crop variety management for climate adaptation supported by citizen science. PNAS**116**(10), 4194–4199 (2019). \n 43. Urban, D. W., Sheffield, J. & Lobell, D. B. The impacts of future climate and carbon dioxide changes on the average and variability \nof US maize yields under two emission scenarios. Environ. Res. Lett.**10**, 045003 (2015). \n\n 44. IPCC. Summary for policymakers. In Global Warming of 1.5°C. An IPCC Special Report on the Impacts of Global Warming of 1.5°C \nAbove Pre-industrial Levels and Related Global Greenhouse Gas Emission Pathways, in the Context of Strengthening the Global \nResponse to the Threat of Climate Change, Sustainable Development, and Efforts to Eradicate Poverty 32 (World Meteorological \nOrganization, 2018). \n 45. Ruane, A. C., Goldberg, R. & Chryssanthacopoulos, J. Climate forcing datasets for agricultural modeling: Merged products for \ngap-filling and historical climate series estimation. Agr. For. Meteorol.**200**, 233–248 (2015). \n 46. Hempel, S., Frieler, K., Warszawski, L., Schewe, J. & Piontek, F. A trendpreserving bias correction-the ISI-MIP approach. Earth \nSyst. Dyn.**4**, 219–236 (2013). \n 47. Monfreda, C., Ramankutty, N. & Foley, J. A. Farming the planet: 2. Geographic distribution of crop areas, yields, physiological \n\ntypes, and net primary production in the year 2000. Glob. Biogeochem. Cycles**22**, 1022 (2008). \n\n 48. You, L.Z., et al. Spatial Production Allocation Model (SPAM) 2000 Version 3.2. http:// mapsp am. info (2015). \n 49. Hoogenboom, G., et al. Decision Support System for Agrotechnology Transfer (DSSAT) Version 4.6 (DSSAT Foundation, 2015). \nhttp:// dssat. net (2015). \n 50. Sacks, W. J., Deryng, D., Foley, J. A. & Ramankutty, N. Crop planting dates: An analysis of global patterns. Glob. Ecol. Biogeogr.**19**, \n607–620 (2010). \n 51. Batjes, H.N. A Homogenized Soil Data File for Global Environmental Research: A Subset of FAO. ISRIC and NRCS Profiles (Version \n1.0). Working Paper and Preprint 95/10b (International Soil Reference and Information Centre, 1995). \n\nhttps://doi.org/10.1038/s41598-022-22228-7", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" - }, - { - "text": "**117**(4), 1935–1940 (2020). \n\n 16. Challinor, A. J. et al. A meta-analysis of crop yield under climate change and adaptation. Nat. Clim. Change**4**, 287–291 (2014). \n 17. Lobell, D. B. et al. Prioritizing climate change adaptation needs for food security in 2030. Science**319**, 607–610 (2017). \n 18. Lv, S. et al. Yield gap simulations using ten maize cultivars commonly planted in Northeast China during the past five decades. \nAgric. For. Meteorol.**205**, 1–10 (2015). \n 19. Chao, W., Kehui, C. & Shah, F. Heat stress decreases rice grain weight: Evidence and physiological mechanisms of heat effects prior \nto flowering. Int. J. Mol. Sci.**23**(18), 10922 (2022). \n 20. Chao, W. et al. Estimating the yield stability of heat-tolerant rice genotypes under various heat conditions across reproductive \nstages: A 5-year case study. Sci. Rep.**11**, 13604 (2021). \n\n 21. IPCC. Food security and food production systems. In Climate Change 2014: Impacts, Adaptation, and Vulnerability. Part A: Global \nand Sectoral Aspects. Contribution of Working Group II to the Fifth Assessment Report of the Intergovernmental Panel of Climate \nChange 485–533 (Cambridge University Press, 2014). \n 22. Tigchelaar, M., Battisti, D. S., Naylor, R. L. & Ray, D. K. Future warming increases probability of globally synchronized maize \nproduction shocks. PNAS**115**(26), 6644–6649 (2018). \n 23. Zhao, C. et al. Temperature increase reduces global yields of major crops in four independent estimates. PNAS**114**, 9326–9331 \n(2017). \n 24. Diffenbaugh, N. S., Hertel, T. W., Scherer, M. & Verma, M. Response of corn markets to climate volatility under alternative energy \nfutures. Nat. Clim. Change**2**, 514–518 (2012). \n 25. Jensen, H. G. & Anderson, K. Grain price spikes and beggar-thy-neighbor policy responses: A global economywide analysis. World \n\nBank Econ. Rev.**31**, 158–175 (2017). \n\n 26. Fraser, E. D. G., Simelton, E., Termansen, M., Gosling, S. N. & South, A. “Vulnerability hotspots”: Integrating socio-economic and \nhydrological models to identify where cereal production may decline in the future due to climate change induced drought. Agric. \nFor. Meteorol.**170**, 195–205 (2013). \n 27. Puma, M. J., Bose, S., Chon, S. Y. & Cook, B. I. Assessing the evolving fragility of the global food system. Environ. Res. Lett.**10**, \n024007 (2015). \n\n 28. Wheeler, T. & Braun, J. V. Climate change impacts on global food security. Science**341**(6145), 508–513 (2013). \n 29. Lunt, T., Jones, A. W., Mulhern, W. S., Lezaks, D. P. M. & Jahn, M. M. Vulnerabilities to agricultural production shocks: An extreme, \nplausible scenario for assessment of risk for the insurance sector. Clim. Risk Manag.**13**, 1–9 (2016). \n 30. Jägermeyr, J. & Frieler, K. Spatial variations in crop growing seasons pivotal to reproduce global fluctuations in maize and wheat \nyields. Sci. Adv.**4**(11), eaat4517 (2018). \n 31. Elliott, J. et al. Characterizing agricultural impacts of recent large-scale US droughts and changing technology and management. \nAgric. Syst.**159**, 275–281 (2017). \n\n 32. Tack, J., Barkley, A. & Nalley, L. L. Effect of warming temperatures on US wheat yields. Proc. Natl. Acad. Sci.**112**, 6931–6936 (2015). \n 33. Tao, F., Zhang, Z., Liu, J. & Yokozawa, M. Modelling the impacts of weather and climate variability on crop productivity over a \nlarge area: A new super-ensemblebased probabilistic projection. Agric. For. Meteorol.**149**, 1266–1278 (2009). \n 34. Parent, B. et al. Maize yields over Europe may increase in spite of climate change, with an appropriate use of the genetic variability", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Figure 6.**Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C. \n\n**Market price of maize in main countries.**\nIn this study, we elaborate on the endogenous response of our \neconomic models. This response can be theoretically elaborated as: due to the effect of climate change on yield \nreduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and \nraising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive \n(cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond \nby changing farm-level management practices and increasing (decreasing) the amount of acreage under these \ncrops. At a global scale, the reallocation of production and consumption through international trade further \nalters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ \nregion due to climate change. \n\nIn response to production changes, the price of each commodity changes under both scenarios. At the global \nlevel, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, \nrespectively, which would vary quite largely among different countries and regions under both climate change \nscenarios (Fig. 7). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C \nscenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed \ndue to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa \nwould decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the \ndomestic production, the climate change will also induce changes in international trade of maize, resulting in \nchanging levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically \nproduced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, \nthe countries that face positive effects on yields and/or are relatively less dependent on imports, are positively \n(less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would \nimprove under both scenarios (Fig. 8). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh \nand Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline. \n\n**Discussion and conclusion**\n**Discussion.**Our analysis highlights the effects of climate change on global- and regional-specific maize \nyields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the \nreduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- \ning by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. \nAlthough the precipitation is also increasing, the evapotranspiration would become more intense. The limitation \nof water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by \n1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought \nand heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed9.pdf" - }, - { - "text": "**30**\n\n**25**\n\n**20**\n\n**15**\n\n**e**\n**g**\n**n**\n**a**\n**h**\n**c**\n**%**\n\n**10**\n\n**5**\n\n**0**\n\n**-5**\n\n**-10**\n\n**-15**\n\n**-20**\n\n**In dia**\n\n**R est of W orld**\n**C a n a d a**\n\n**C hin a**\n**M exic o**\n\n**Arg e ntin a**\n**S o uth Africa**\n**R u ssia**\n**R est of Africa**\n\n**U krain e**\n**Ja p a n**\n**A U S/N Z L**\n**U S A**\n\n**Figure 7.**Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C. \n\n\n\nmeantime, the huge differences in yield changes in different regions provide a small chance for the world, espe- \ncially under global warming by 1.5 °C. In the near future, if the global temperature can be effectively controlled \nunder 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. \nAll regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the \npotentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the \nyield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by \n1.5 °C and 2.0 °C. \n\nMeanwhile, the risk of price fluctuations caused by global corn trade due to future climate change should be \npaid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, \nthe population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, \nthe supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify \nthe contradiction between supply and demand, which would threaten the food security and sustainable develop- \nment in the whole world. \n\nIn this study, 5 climate models are selected, which are recommended by ISI-MIP (The Inter-Sectoral Impact \nModel Intercomparison Project); compared with other climate models, the five models could more effectively \nsupport impact assessment in different sectors and provide more reliable results. Based on the simulation results", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Simulation of maize yield using DSSAT.**According to the data of global warming by 1.5 °C and 2.0 °C \nselected above, we simulated global maize yield changes compared with the average yield during 1986–2005 on \ngrid level using CERES-Maize, which is part of DSSAT version 4.649. \n\nThe inputs for DSSAT simulation include daily weather data, soil parameters, crop calendar data and man- \nagement information. All the inputs are formatted at a 0.5° × 0.5° grid resolution which are computed by high- \nperformance computers. Weather data is from the AgMERRA dataset, including maximum and minimum tem- \nperatures, precipitation, total radiation and humidity. Crop calendar data were from the Center for Sustainability \nand Global Environment (SAGE), in which the existing observations of crop planting and harvesting dates are \ngridded formatted at a resolution of 5 min50. For management information, fertilizer applications, irrigation \nand other management practices are required. A crop-specific gridded dataset of nitrogen fertilizer application \nfor the world was developed by integrating national and subnational fertilizer application data from a variety of \nsources, which is used to set up current fertilizer application rates for maize in each grid cell. Soil parameters \nare from the International Soil Profile Dataset (WISE), including soil texture, bulk density, pH, organic carbon \ncontent and fraction of calcium carbonate for each of five 20 cm thick soil layers51. All the soil data is allocated \nto be in accordance with the request of DSSAT simulation; the missing soil parameters for organic soils were \nadopted from FAO soil dataset. \n\nFirst maize yields across the world during the historical period 1986–2005 were simulated at the 0.5° × 0.5° \ngrid scale with two main production systems, including Spring maize and Summer maize. Historical national \nmaize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from \nthe gridded global dataset by combining two data products47. Second, genetic parameters of specific cultivars of \nmaize from previous works were adopted for the initial parameters; model parameters related to crop genotype \ncharacteristics were calibrated and tuned following the method in Xiong et al.52, in which the simulated yields \nfrom 1986–2005 were comparable to the statistical data. Third, maize yields across the world were simulated \nunder global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from grid- \nded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, \ncomparing maize yield average for 1986–2005. \n\n**Simulation of market price using GTAP.**The yield changes for maize from the DSSAT models under \n1.5 °C and 2.0 °C temperature increase are used to carry out simulations using competitive market for changes \nin production, market price, and self-sufficiency ratio of maize at national and global levels53,54. For this study, we \nuse a comparative static analysis approach to simulate the impact of climate changes on the prices and trade of \nthe major food crops under current economic conditions. Utilizing current economic conditions has the advan- \ntage of minimizing assumptions and model uncertainties related to future economic conditions55,56. \n\nThe original GTAP database doesn’t include maize as a separate sector, rather it is combined with other coarse \ngrains to form an “other coarse grain” sector. For this study, we updated the GTAP database by splitting maize \nfrom the original sector in the database, design an appropriate sectoral and regional aggregation scheme to the \noriginal database. The detailed method is given as follows:", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
ModelResearch instituteCountryHorizontal resolution
GFDL - ESM2MGeophysical Fluid Dynamics LaboratoryThe United States144 × 90
HadGEM2 - ESHodley Center for Climate Prediction and ResearchThe United Kingdom192 × 145
IPSL - CM5A - LR1. Institute Pierre - Simon LaplaceFrance96 × 96
NorESM1 - MNorway Climate CenterNorway144 × 96
MIROC - ESMCenter for Clinate System Research, National Institute for Environmental Studies and Prontier Research Center for Global ChangeJapan128 × 64
\n\n\n\n**Figure 1.**Changes of global temperature of 20 years moving average from 2020 to 2099 simulated by 5 ESMs \nunder 4 RCP scenarios. Note: The black horizontal dashed lines: global warming by 1.5 °C and 2.0 °C; the black \nvertical solid line: the years when global warming reaches 1.5 °C and 2.0 °C simulated by the selected models \nand scenarios. \n\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- \ning the impacts comparison of global warming by 1.5 °C versus 2.0 °C44. It is necessary to do more quantitative \nimpacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research \ngaps and support the requirement of the scientific community and governments. In this paper, the future climate \nsituations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and \n2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. \nThen the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were \nanalyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from \n1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we \nexamine the effects of the resulting maize production shocks in different countries; the market price of maize is \nsimulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of \nmaize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward \nfor maize cultivation. \n\n**Materials and methods**\n**Data processing.**\nIn this study, historical daily weather data (1986–2005) are from the AgMERRA dataset. \nAgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications \n(MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily \ntime-series data45. \n\nFor future (2020–2099), the original climate scenario data (Table 1) were extracted from output archives of \nfive ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) \nunder four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data \nwas interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations \nto remove systematic errors46. The data of maize-planting regions are from the gridded global dataset in 2000 \nby combining two data products47,48.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed9.pdf", - "query": "What would be the price increase resulting from maize production changes due to 1.5°C and 2°C global temperature increase ?", - "target_page": 10, - "target_passage": "In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**The impact of 1.5 °C and 2.0 °C**\n**global warming on global maize**\n**production and trade**\n\n**OPEN**\n\n**Kuo Li1** ***, Jie Pan1, Wei Xiong2, Wei Xie3 & Tariq Ali3**\n\n**Climate change is becoming more and more remarkable which has an obvious impact on crop yields**\n**all over the world. Future climate scenario data was simulated by 5 climate models recommended**\n**by ISI-MIP under 4 RCP scenarios, in which the approximate scenarios with global warming by 1.5 °C**\n**and 2 °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the**\n**world under global warming by 1.5 °C and 2.0 °C were analyzed and the market prices of maize at**\n**national and global levels were simulated. The results showed that, the risk of maize yield reduction**\n**under 2.0 °C scenario was much more serious than 1.5 °C scenario; the ratios of yield changes were**\n**separately 0.18% and − 10.8% under 1.5 °C and 2.0 °C scenarios. The reduction trend of total maize**\n**production is obvious in the top five countries and the main producing regions of the world, especially**\n**under the 2.0 °C scenario. The market price of maize would increase by around 0.7% and 3.4% under**\n**1.5 °C and 2.0 °C scenarios. With the quickly increasing population in the world, it is urgent for all**\n**countries to pay enough attention to the risk of maize yield and take actions of mitigation and**\n**adaptation to climate change.**\n\nIn the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Figure 6.**Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C. \n\n**Market price of maize in main countries.**\nIn this study, we elaborate on the endogenous response of our \neconomic models. This response can be theoretically elaborated as: due to the effect of climate change on yield \nreduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and \nraising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive \n(cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond \nby changing farm-level management practices and increasing (decreasing) the amount of acreage under these \ncrops. At a global scale, the reallocation of production and consumption through international trade further \nalters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ \nregion due to climate change. \n\nIn response to production changes, the price of each commodity changes under both scenarios. At the global \nlevel, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, \nrespectively, which would vary quite largely among different countries and regions under both climate change \nscenarios (Fig. 7). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C \nscenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed \ndue to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa \nwould decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the \ndomestic production, the climate change will also induce changes in international trade of maize, resulting in \nchanging levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically \nproduced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, \nthe countries that face positive effects on yields and/or are relatively less dependent on imports, are positively \n(less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would \nimprove under both scenarios (Fig. 8). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh \nand Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline. \n\n**Discussion and conclusion**\n**Discussion.**Our analysis highlights the effects of climate change on global- and regional-specific maize \nyields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the \nreduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- \ning by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. \nAlthough the precipitation is also increasing, the evapotranspiration would become more intense. The limitation \nof water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by \n1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought \nand heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed9.pdf" - }, - { - "text": "**30**\n\n**25**\n\n**20**\n\n**15**\n\n**e**\n**g**\n**n**\n**a**\n**h**\n**c**\n**%**\n\n**10**\n\n**5**\n\n**0**\n\n**-5**\n\n**-10**\n\n**-15**\n\n**-20**\n\n**In dia**\n\n**R est of W orld**\n**C a n a d a**\n\n**C hin a**\n**M exic o**\n\n**Arg e ntin a**\n**S o uth Africa**\n**R u ssia**\n**R est of Africa**\n\n**U krain e**\n**Ja p a n**\n**A U S/N Z L**\n**U S A**\n\n**Figure 7.**Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C. \n\n\n\nmeantime, the huge differences in yield changes in different regions provide a small chance for the world, espe- \ncially under global warming by 1.5 °C. In the near future, if the global temperature can be effectively controlled \nunder 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. \nAll regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the \npotentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the \nyield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by \n1.5 °C and 2.0 °C. \n\nMeanwhile, the risk of price fluctuations caused by global corn trade due to future climate change should be \npaid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, \nthe population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, \nthe supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify \nthe contradiction between supply and demand, which would threaten the food security and sustainable develop- \nment in the whole world. \n\nIn this study, 5 climate models are selected, which are recommended by ISI-MIP (The Inter-Sectoral Impact \nModel Intercomparison Project); compared with other climate models, the five models could more effectively \nsupport impact assessment in different sectors and provide more reliable results. Based on the simulation results", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Figure 5.**Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C. \n\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should \nbe taken from now on. Food security would be a significant challenge in this century. \n\n**Yield change of maize in main countries.**There are huge differences in impacts on maize yield under \nclimate change, which would influence the food crisis in different regions. There are 159 countries in the whole \nworld which plant maize. The gross yield of maize the top 20 countries accounts for more than 90% of the total \nyield in the 159 countries. So, the changes in the top 20 countries under future scenarios would influence the \nfood security of the whole world (Fig. 5). From the results of simulated by CRESE-maize under global warming \nby 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become \n33.5%. There would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly \nincrease. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which \nthe mean yield loss rate is approximate to that under global warming by 1.5 °C. There would be 77 countries \nexperiencing yield increase; however, the mean yield increase is apparently smaller than that under global warm- \ning by 1.5 °C. Generally, the global maize yield would decrease. The results show that the adverse effect of warm- \ning up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to \ndevelop forward-looking adaptation measures to cope with future climate change. \n\n\n \n \n \n \n [html]\n
StatementTableTableTableofofTableTableofofofofTableTableCasesTableTableofofTableTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 8", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed9.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
ModelResearch instituteCountryHorizontal resolution
GFDL - ESM2MGeophysical Fluid Dynamics LaboratoryThe United States144 × 90
HadGEM2 - ESHodley Center for Climate Prediction and ResearchThe United Kingdom192 × 145
IPSL - CM5A - LR1. Institute Pierre - Simon LaplaceFrance96 × 96
NorESM1 - MNorway Climate CenterNorway144 × 96
MIROC - ESMCenter for Clinate System Research, National Institute for Environmental Studies and Prontier Research Center for Global ChangeJapan128 × 64
\n\n\n\n**Figure 1.**Changes of global temperature of 20 years moving average from 2020 to 2099 simulated by 5 ESMs \nunder 4 RCP scenarios. Note: The black horizontal dashed lines: global warming by 1.5 °C and 2.0 °C; the black \nvertical solid line: the years when global warming reaches 1.5 °C and 2.0 °C simulated by the selected models \nand scenarios. \n\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- \ning the impacts comparison of global warming by 1.5 °C versus 2.0 °C44. It is necessary to do more quantitative \nimpacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research \ngaps and support the requirement of the scientific community and governments. In this paper, the future climate \nsituations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and \n2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. \nThen the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were \nanalyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from \n1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we \nexamine the effects of the resulting maize production shocks in different countries; the market price of maize is \nsimulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of \nmaize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward \nfor maize cultivation. \n\n**Materials and methods**\n**Data processing.**\nIn this study, historical daily weather data (1986–2005) are from the AgMERRA dataset. \nAgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications \n(MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily \ntime-series data45. \n\nFor future (2020–2099), the original climate scenario data (Table 1) were extracted from output archives of \nfive ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) \nunder four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data \nwas interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations \nto remove systematic errors46. The data of maize-planting regions are from the gridded global dataset in 2000 \nby combining two data products47,48.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - }, - { - "text": "There are also several uncertainties and limitations. Firstly, there is no unified understanding of how to cal- \nculate the temperature rise of 1.5 °C and 2.0 °C relative to pre-industrial levels in the worldwide. At present the \nresearch on climate prediction and impact assessment under global warming 1.5 °C and 2.0 °C usually adopts \nmulti-mode ensemble average methods61,62, which could obtain the warming response under the condition of \ninstantaneous change, rather than the warming process under the stable state expected by the long-term goal. If \nwe expect to obtain the accurate results, the model prediction test should be estimated to form proprietary sce- \nnarios for global warming by 1.5 °C and 2.0 °C63,64, which could support for the impacts assessment on different \nsectors. Some institutions are carrying out climate change predictions under the lower emission scenarios (global \nwarming 1.5 °C or 2.0 °C). At the same time, in order to achieve the goal of controlling temperature by 1.5 °C at \nthe end of the twenty-first century, it is urgent to take actions to reduce emissions and develop along the track \nof low energy consumption65,66; but it is a great challenge for human society to achieve this goal. \n\nSecondly, our methodological approach in this study also has some important limitations, including our use \nof a single crop model to estimate maize yields. There are some limitations for the DSSAT model to simulate \nyield loss caused by climate extreme events67, in which the impacts of pests and diseases are also ignored68. \nHowever, the DSSAT model has been applied in a lot of researches to simulate historical maize yield69–71, in \nwhich the results are reliable and credible72. The results of this research could be an important reference to the \nother studies which simulate global maize yield in the future, applying crop models such as APSIM, WOFOST, \nORYZA and so on. \n\nThirdly, there are relatively more researches on the prediction of climate change trend under the background \nof 1.5 °C and 2.0 °C; but the research on the impact assessment of the main grain crops including global trade in \nworldwide is few. In the meantime, we do not assess the effect of future changes on agriculture, such as increases \nin farm productivity due to new technology. The maize planting area in the future is assumed to be the same as \nthe current situation of maize cultivation in the world. \n\n**Conclusion.**According to the simulation results, the yield of maize under global warming by 2.0 °C would \ndecrease between 3.0 and 18.7% in the worldwide relative to 1986–2005; the maize yield would fluctuate between \n− 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 \nhigh-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% \nunder global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price \nfor maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would \nvary quite largely among different countries and regions. So, it is urgent for all countries to pay enough attention \nto the loss risk of maize yield and take actions of mitigation and adaptation to climate change. The time left for \nchanging our minds and actions is becoming less and less.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Figure 4.**Distribution of yield loss rates on maize in the world under global warming by 2.0 °C (up: \nNorESM1-M model, RCP 4.5; down: GFDL-ESM2M model, RCP 6.0). The figure has been generated using \nArcGIS 10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com. \n\nsecurity of the whole world would still be attacked violently. There are huge differences among the continents; \nSouth America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming \nby 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, \nit should be cautious to cope with the maize changes under global warming by 1.5 °C. \n\n\n \n \n \n \n [html]\n
Patients with modelStatesStatementControlStatementControlStatementTableTablePatientsSpecificationsStatesTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 7", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Figure 3.**Distribution of yield loss rate on maize in the world under global warming by 1.5 °C (up: IPSL- \nCM5A-LR model, RCP 2.6; down: GFDL-ESM2M model, RCP 4.5). The figure has been generated using ArcGIS \n10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com. \n\nwarming by 1.5 °C and 2.0 °C. So, there are apparent challenges and opportunities for maize production in the \nwhole world under climate change. We should grasp the opportunities and expand the yield increasing poten- \ntials; meanwhile, the threat of maize yield loss should be controlled and compressed to the minimum in the \nhigh-risk regions. \n\n\n \n \n \n \n [html]\n
TablePatientsStatementSpeciesStateStatestedStatementTableStatementStateSpeciesStatementTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 6", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed9.pdf" - }, - { - "text": "**117**(4), 1935–1940 (2020). \n\n 16. Challinor, A. J. et al. A meta-analysis of crop yield under climate change and adaptation. Nat. Clim. Change**4**, 287–291 (2014). \n 17. Lobell, D. B. et al. Prioritizing climate change adaptation needs for food security in 2030. Science**319**, 607–610 (2017). \n 18. Lv, S. et al. Yield gap simulations using ten maize cultivars commonly planted in Northeast China during the past five decades. \nAgric. For. Meteorol.**205**, 1–10 (2015). \n 19. Chao, W., Kehui, C. & Shah, F. Heat stress decreases rice grain weight: Evidence and physiological mechanisms of heat effects prior \nto flowering. Int. J. Mol. Sci.**23**(18), 10922 (2022). \n 20. Chao, W. et al. Estimating the yield stability of heat-tolerant rice genotypes under various heat conditions across reproductive \nstages: A 5-year case study. Sci. Rep.**11**, 13604 (2021). \n\n 21. IPCC. Food security and food production systems. In Climate Change 2014: Impacts, Adaptation, and Vulnerability. Part A: Global \nand Sectoral Aspects. Contribution of Working Group II to the Fifth Assessment Report of the Intergovernmental Panel of Climate \nChange 485–533 (Cambridge University Press, 2014). \n 22. Tigchelaar, M., Battisti, D. S., Naylor, R. L. & Ray, D. K. Future warming increases probability of globally synchronized maize \nproduction shocks. PNAS**115**(26), 6644–6649 (2018). \n 23. Zhao, C. et al. Temperature increase reduces global yields of major crops in four independent estimates. PNAS**114**, 9326–9331 \n(2017). \n 24. Diffenbaugh, N. S., Hertel, T. W., Scherer, M. & Verma, M. Response of corn markets to climate volatility under alternative energy \nfutures. Nat. Clim. Change**2**, 514–518 (2012). \n 25. Jensen, H. G. & Anderson, K. Grain price spikes and beggar-thy-neighbor policy responses: A global economywide analysis. World \n\nBank Econ. Rev.**31**, 158–175 (2017). \n\n 26. Fraser, E. D. G., Simelton, E., Termansen, M., Gosling, S. N. & South, A. “Vulnerability hotspots”: Integrating socio-economic and \nhydrological models to identify where cereal production may decline in the future due to climate change induced drought. Agric. \nFor. Meteorol.**170**, 195–205 (2013). \n 27. Puma, M. J., Bose, S., Chon, S. Y. & Cook, B. I. Assessing the evolving fragility of the global food system. Environ. Res. Lett.**10**, \n024007 (2015). \n\n 28. Wheeler, T. & Braun, J. V. Climate change impacts on global food security. Science**341**(6145), 508–513 (2013). \n 29. Lunt, T., Jones, A. W., Mulhern, W. S., Lezaks, D. P. M. & Jahn, M. M. Vulnerabilities to agricultural production shocks: An extreme, \nplausible scenario for assessment of risk for the insurance sector. Clim. Risk Manag.**13**, 1–9 (2016). \n 30. Jägermeyr, J. & Frieler, K. Spatial variations in crop growing seasons pivotal to reproduce global fluctuations in maize and wheat \nyields. Sci. Adv.**4**(11), eaat4517 (2018). \n 31. Elliott, J. et al. Characterizing agricultural impacts of recent large-scale US droughts and changing technology and management. \nAgric. Syst.**159**, 275–281 (2017). \n\n 32. Tack, J., Barkley, A. & Nalley, L. L. Effect of warming temperatures on US wheat yields. Proc. Natl. Acad. Sci.**112**, 6931–6936 (2015). \n 33. Tao, F., Zhang, Z., Liu, J. & Yokozawa, M. Modelling the impacts of weather and climate variability on crop productivity over a \nlarge area: A new super-ensemblebased probabilistic projection. Agric. For. Meteorol.**149**, 1266–1278 (2009). \n 34. Parent, B. et al. Maize yields over Europe may increase in spite of climate change, with an appropriate use of the genetic variability", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Simulation of maize yield using DSSAT.**According to the data of global warming by 1.5 °C and 2.0 °C \nselected above, we simulated global maize yield changes compared with the average yield during 1986–2005 on \ngrid level using CERES-Maize, which is part of DSSAT version 4.649. \n\nThe inputs for DSSAT simulation include daily weather data, soil parameters, crop calendar data and man- \nagement information. All the inputs are formatted at a 0.5° × 0.5° grid resolution which are computed by high- \nperformance computers. Weather data is from the AgMERRA dataset, including maximum and minimum tem- \nperatures, precipitation, total radiation and humidity. Crop calendar data were from the Center for Sustainability \nand Global Environment (SAGE), in which the existing observations of crop planting and harvesting dates are \ngridded formatted at a resolution of 5 min50. For management information, fertilizer applications, irrigation \nand other management practices are required. A crop-specific gridded dataset of nitrogen fertilizer application \nfor the world was developed by integrating national and subnational fertilizer application data from a variety of \nsources, which is used to set up current fertilizer application rates for maize in each grid cell. Soil parameters \nare from the International Soil Profile Dataset (WISE), including soil texture, bulk density, pH, organic carbon \ncontent and fraction of calcium carbonate for each of five 20 cm thick soil layers51. All the soil data is allocated \nto be in accordance with the request of DSSAT simulation; the missing soil parameters for organic soils were \nadopted from FAO soil dataset. \n\nFirst maize yields across the world during the historical period 1986–2005 were simulated at the 0.5° × 0.5° \ngrid scale with two main production systems, including Spring maize and Summer maize. Historical national \nmaize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from \nthe gridded global dataset by combining two data products47. Second, genetic parameters of specific cultivars of \nmaize from previous works were adopted for the initial parameters; model parameters related to crop genotype \ncharacteristics were calibrated and tuned following the method in Xiong et al.52, in which the simulated yields \nfrom 1986–2005 were comparable to the statistical data. Third, maize yields across the world were simulated \nunder global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from grid- \nded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, \ncomparing maize yield average for 1986–2005. \n\n**Simulation of market price using GTAP.**The yield changes for maize from the DSSAT models under \n1.5 °C and 2.0 °C temperature increase are used to carry out simulations using competitive market for changes \nin production, market price, and self-sufficiency ratio of maize at national and global levels53,54. For this study, we \nuse a comparative static analysis approach to simulate the impact of climate changes on the prices and trade of \nthe major food crops under current economic conditions. Utilizing current economic conditions has the advan- \ntage of minimizing assumptions and model uncertainties related to future economic conditions55,56. \n\nThe original GTAP database doesn’t include maize as a separate sector, rather it is combined with other coarse \ngrains to form an “other coarse grain” sector. For this study, we updated the GTAP database by splitting maize \nfrom the original sector in the database, design an appropriate sectoral and regional aggregation scheme to the \noriginal database. The detailed method is given as follows:", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia1.pdf", - "query": "What is a formal fallacy ?", - "target_page": 8, - "target_passage": "For formal fallacies, the source of the error is found in the form of the argument", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "burglar broke into the house last night, got hungry on the job, and had a midnight snack, would also \nexplain the state of the kitchen. But this conclusion is not justified because it is not the best or most likely \nexplanation.[82][83] \n\n**Fallacies**\n\nNot all arguments live up to the standards of correct reasoning. When they do not, they are usually \nreferred to as fallacies. Their central aspect is not that their conclusion is false but that there is some flaw \nwith the reasoning leading to this conclusion.[84] So the argument \"it is sunny today; therefore spiders \nhave eight legs\" is fallacious even though the conclusion is true. Some theorists, like John Stuart Mill, \ngive a more restrictive definition of fallacies by additionally requiring that they appear to be correct.[85] \nThis way, genuine fallacies can be distinguished from mere mistakes of reasoning due to carelessness. \nThis explains why people tend to commit fallacies: because they have an alluring element that seduces \npeople into committing and accepting them.[86] However, this reference to appearances is controversial \nbecause it belongs to the field of psychology, not logic, and because appearances may be different for \ndifferent people.[87] \n\n\n\nYoung America's dilemma: Shall I be wise and great, or \nrich and powerful? (poster from 1901) This is an \nexample of a false dilemma: an informal fallacy using a \ndisjunctive premise that excludes viable alternatives. \n\nFallacies are usually divided into formal and \ninformal fallacies.[38] For formal fallacies, the \nsource of the error is found in the*form*of the \nargument. For example, denying the antecedent \nis one type of formal fallacy, as in \"if Othello is a \nbachelor, then he is male; Othello is not a \nbachelor; therefore Othello is not male\".[88] But \nmost fallacies fall into the category of informal \nfallacies, of which a great variety is discussed in \nthe academic literature. The source of their error \nis usually found in the*content*or the*context*of \nthe \nare \nsometimes categorized as fallacies of ambiguity, \nfallacies of presumption, or \nfallacies of \nthe \nrelevance. For \nambiguity and vagueness of natural language are \nresponsible for their flaw, as in \"feathers are light; what is light cannot be dark; therefore feathers cannot \nbe dark\".[90] Fallacies of presumption have a wrong or unjustified premise but may be valid otherwise.[91] \nIn the case of fallacies of relevance, the premises do not support the conclusion because they are not \nrelevant to it.[92] \n\nargument.[89] Informal fallacies \n\n**Definitory and strategic rules**\n\nThe main focus of most logicians is to study the criteria according to which an argument is correct or \nincorrect. A fallacy is committed if these criteria are violated. In the case of formal logic, they are known \nas*rules of inference*.[93] They are definitory rules, which determine whether an inference is correct or \nwhich inferences are allowed. Definitory rules contrast with strategic rules. Strategic rules specify which \ninferential moves are necessary to reach a given conclusion based on a set of premises. This distinction \ndoes not just apply to logic but also to games. In chess, for example, the definitory rules dictate that \nbishops may only move diagonally. The strategic rules, on the other hand, describe how the allowed", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia1.pdf" - }, - { - "text": "new formal systems have been proposed. \nThere are disagreements about what makes a \nformal system a logic.[22] For example, it has \nbeen suggested that only logically complete \nsystems, like first-order logic, qualify as \nlogics. For such reasons, some theorists deny \nthat higher-order logics are logics in the strict \nsense.[23] \n\nFormal logic needs to translate natural language \narguments into a formal language, like first-order logic, to \nassess whether they are valid. In this example, the letter \n\"c\" represents Carmen while the letters \"M\" and \"T\" stand \nfor \"Mexican\" and \"teacher\". The symbol \"∧\" has the \nmeaning of \"and\". \n**Informal logic**\n\nWhen understood in a wide sense, logic \nencompasses both formal and informal logic.[24] Informal logic uses non-formal criteria and standards to \nanalyze and assess the correctness of arguments. Its main focus is on everyday discourse.[25] Its \ndevelopment was prompted by difficulties in applying the insights of formal logic to natural language \narguments.[26] In this regard, it considers problems that formal logic on its own is unable to address.[27] \nBoth provide criteria for assessing the correctness of arguments and distinguishing them from \nfallacies.[28] \n\nMany characterizations of informal logic have been suggested but there is no general agreement on its \nprecise definition.[29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the \nlanguage used to express arguments. On this view, informal logic studies arguments that are in informal \nor natural language.[30] Formal logic can only examine them indirectly by translating them first into a \nformal language while informal logic investigates them in their original form.[31] On this view, the \nargument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is \n; (2) \nexamined by informal logic. But the formal translation \"(1) \n\" is studied by formal logic.[32] The study of natural language \narguments comes with various difficulties. For example, natural language expressions are often \nambiguous, vague, and context-dependent.[33] Another approach defines informal logic in a wide sense as \nthe normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes \nquestions about the role of rationality, critical thinking, and the psychology of argumentation.[34] \n\n; (3) \n\nAnother characterization identifies informal logic with the study of non-deductive arguments. In this way, \nit contrasts with deductive reasoning examined by formal logic.[35] Non-deductive arguments make their \nconclusion probable but do not ensure that it is true. An example is the inductive argument from the \nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are \nblack\".[36] \n\nA further approach is to define informal logic as the study of informal fallacies.[37] Informal fallacies are \nincorrect arguments in which errors are present in the content and the context of the argument.[38] A false \ndilemma, for example, involves an error of content by excluding viable options. This is the case in the \nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\".[39] Some \ntheorists state that formal logic studies the general form of arguments while informal logic studies \nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "**Logic**\n\n**Logic**is the study of correct reasoning. It includes both formal and \ninformal logic. Formal logic is the study of deductively valid \ninferences or logical truths. It examines how conclusions follow \nfrom premises based on the structure of arguments alone, \nindependent of their topic and content. Informal logic is associated \nwith informal fallacies, critical thinking, and argumentation \ntheory. Informal logic examines arguments expressed in natural \nlanguage whereas formal logic uses formal language. When used \nas a countable noun, the term \"a logic\" refers to a specific logical \nformal system that articulates a proof system. Logic plays a \ncentral role in many fields, such as philosophy, mathematics, \ncomputer science, and linguistics. \n\nLogic studies valid forms of \ninference like*modus ponens*. \n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the \nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the \nconclusion \"I don't have to work\".[1] Premises and conclusions express propositions or claims that can be \ntrue or false. An important feature of propositions is their internal structure. For example, complex \npropositions are made up of simpler propositions linked by logical vocabulary like \n(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a \nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically \ntrue propositions. They are true only because of their logical structure independent of the specific \nmeanings of the individual parts. \n\n (and) or \n\nArguments can be either correct or incorrect. An argument is correct if its premises support its \nconclusion. Deductive arguments have the strongest form of support: if their premises are true then their \nconclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new \ninformation not found in the premises. Many arguments in everyday discourse and the sciences are \nampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are \nstatistical generalization—such as inferring that all ravens are black, based on many individual \nobservations of black ravens.[2] Abductive arguments are inferences to the best explanation—for \nexample, when a doctor concludes that a patient has a certain disease, as the best explanation for the \nsymptoms that they are observed to suffer.[3] Arguments that fall short of the standards of correct \nreasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the \ncorrectness of arguments. \n\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, \nand Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the \nmain system of logic in the Western world until it was replaced by modern formal logic, which has its \nroots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly \nused system is classical logic. It consists of propositional logic and first-order logic. Propositional logic \nonly considers logical relations between full propositions. First-order logic also takes the internal parts of", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia1.pdf" - }, - { - "text": "propositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions \nbehind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant \nlogics, on the other hand, reject certain classical intuitions and provide alternative explanations of the \nbasic laws of logic. \n\n**Definition**\n\nThe word \"logic\" originates from the Greek word*logos*, which has a variety of translations, such as \nreason, discourse, or language.[4] Logic is traditionally defined as the study of the laws of thought or \ncorrect reasoning,[5] and is usually understood in terms of inferences or arguments. Reasoning is the \nactivity of drawing inferences. Arguments are the outward expression of inferences.[6] An argument is a \nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. \nwhether their premises support the conclusion.[7] These general characterizations apply to logic in the \nwidest sense, i.e., to both formal and informal logic since they are both concerned with assessing the \ncorrectness of arguments.[8] Formal logic is the traditionally dominant field, and some logicians restrict \nlogic to formal logic.[9] \n\n**Formal logic**\n\nFormal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal \napproach to study reasoning: it replaces concrete expressions with abstract symbols to examine the \nlogical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is \nonly concerned with the abstract structure of arguments and not with their concrete content.[10] \n\nFormal logic is interested in deductively valid arguments, for which the truth of their premises ensures \nthe truth of their conclusion. This means that it is impossible for the premises to be true and the \nconclusion to be false.[11] For valid arguments, the logical structure of the premises and the conclusion \nfollows a pattern called a rule of inference.[12] For example, modus ponens is a rule of inference \naccording to which all arguments of the form \"(1)*p*, (2) if*p*then*q*, (3) therefore*q*\" are valid, independent \nof what the terms*p*and*q*stand for.[13] In this sense, formal logic can be defined as the science of valid \ninferences. An alternative definition sees logic as the study of logical truths.[14] A proposition is logically \ntrue if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible \nworlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is \nnot\".[15] These two definitions of formal logic are not identical, but they are closely related. For example, \nif the inference from*p*to*q*is deductively valid then the claim \"if*p*then*q*\" is a logical truth.[16] \n\nFormal logic uses formal languages to express and analyze arguments.[17] They normally have a very \nlimited vocabulary and exact syntactic rules. These rules specify how their symbols can be combined to \nconstruct sentences, so-called well-formed formulas.[18] This simplicity and exactness of formal logic \nmake it capable of formulating precise rules of inference. They determine whether a given argument is \nvalid.[19] Because of the reliance on formal language, natural language arguments cannot be studied \ndirectly. Instead, they need to be translated into formal language before their validity can be assessed.[20] \n\nThe term \"logic\" can also be used in a slightly different sense as a countable noun. In this sense,*a logic*is \na logical formal system. Distinct logics differ from each other concerning the rules of inference they \naccept as valid and the formal languages used to express them.[21] Starting in the late 19th century, many", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Shermer, Michael (25 October 2022).*Conspiracy: Why the Rational Believe the Irrational*. \nJHU Press. ISBN 978-1-4214-4445-1. \nSider, Theodore (2010).*Logic for Philosophy*. Oxford University Press. ISBN 978-0-19- \n957558-9. \nSiegel, Harvey; Biro, John (1997). \"Epistemic Normativity, Argumentation, and Fallacies\" (htt \nps://philpapers.org/rec/SIEENA).*Argumentation*.**11**(3): 277–292. \ndoi:10.1023/A:1007799325361 (https://doi.org/10.1023%2FA%3A1007799325361). \nS2CID 126269789 (https://api.semanticscholar.org/CorpusID:126269789). Archived (https:// \nweb.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA) from the original \non 28 February 2022. Retrieved 4 January 2022. \nSimpson, R. L. (2008).*Essentials of Symbolic Logic*(3rd ed.). Broadview Press. p. 14. \nISBN 978-1-77048-495-5. \nSmith, Robin (2022). \"Aristotle's Logic\" (https://plato.stanford.edu/entries/aristotle-logic/). \n*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 11 March 2023. \nSpade, Paul Vincent; Panaccio, Claude (2019). \"William of Ockham\" (https://plato.stanford.e \ndu/entries/ockham/#SummLogi).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. \nSpriggs, John (2012).*GSN – The Goal Structuring Notation: A Structured Approach to*\n*Presenting Arguments*. Springer Science & Business Media. pp. 20–22. ISBN 978-1-4471- \n2312-5. \nStairs, Allen (2017).*A Thinker's Guide to the Philosophy of Religion*. Routledge. p. 343. \nISBN 978-1-351-21981-5. \nSternberg, Robert J. \"Thought\" (https://www.britannica.com/topic/thought).*Encyclopædia*\n*Britannica*. Archived (https://web.archive.org/web/20211013145532/https://www.britannica.c \nom/topic/thought) from the original on 13 October 2021. Retrieved 14 October 2021. \nStolyar, Abram Aronovich (1 January 1984).*Introduction to Elementary Mathematical Logic*. \nCourier Corporation. ISBN 978-0-486-64561-2. \nStone, Mark A. (2012). \"Denying the Antecedent: Its Effective Use in Argumentation\" (https:// \nphilpapers.org/rec/STODTA).*Informal Logic*.**32**(3): 327–356. doi:10.22329/il.v32i3.3681 (ht \ntps://doi.org/10.22329%2Fil.v32i3.3681). Archived (https://web.archive.org/web/2022022812 \n3240/https://philpapers.org/rec/STODTA) from the original on 28 February 2022. Retrieved \n8 January 2022. \nStump, David J. \"Fallacy, Logical\" (https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical).*encyclopedia.com*. Archived (https://web. \narchive.org/web/20210215112403/https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical) from the original on 15 February 2021. \nRetrieved 20 March 2021. \nTalbott, William (2016). \"Bayesian Epistemology\" (https://plato.stanford.edu/entries/epistemo \nlogy-bayesian/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20210401034856/https://plato.sta \nnford.edu/entries/epistemology-bayesian/) from the original on 1 April 2021. Retrieved \n6 March 2021. \nTarski, Alfred (1994).*Introduction to Logic and to the Methodology of the Deductive*\n*Sciences*. Oxford University Press. p. 40. ISBN 978-0-19-802139-1. \nTondl, L. (2012).*Problems of Semantics: A Contribution to the Analysis of the Language*\n*Science*. Springer Science & Business Media. p. 111. ISBN 978-94-009-8364-9. \nVelleman, Daniel J. (2006).*How to Prove It: A Structured Approach*. Cambridge University \nPress. p. 8, 103. ISBN 978-0-521-67599-4. \nVickers, John M. (2022). \"Inductive Reasoning\" (https://www.oxfordbibliographies.com/displ \nay/document/obo-9780195396577/obo-9780195396577-0171.xml).*Oxford Bibliographies*. \nOxford University Press. Retrieved 18 January 2023.", - "page_start": 35, - "page_end": 35, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Vidyabhusana, Satis Chandra (1988).*A History of Indian Logic: Ancient, Mediaeval and*\n*Modern Schools*. Motilal Banarsidass Publisher. p. 221. ISBN 978-81-208-0565-1. \nVleet, Van Jacob E. (2010). \"Introduction\".*Informal Logical Fallacies: A Brief Guide*(https://p \nhilpapers.org/rec/VLEILF). Upa. pp. ix–x. ISBN 978-0-7618-5432-6. Archived (https://web.ar \nchive.org/web/20220228035654/https://philpapers.org/rec/VLEILF) from the original on 28 \nFebruary 2022. Retrieved 2 January 2022. \nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ \nentries/logic-higher-order/).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ \nhttps://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. \nRetrieved 23 November 2021. \nWalton, Douglas N. (1987).*Informal Fallacies: Towards a Theory of Argument Criticisms*(htt \nps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http \ns://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the \noriginal on 2 March 2022. Retrieved 2 January 2022. \nWarren, Jared (2020).*Shadows of Syntax: Revitalizing Logical and Mathematical*\n*Conventionalism*(https://global.oup.com/academic/product/shadows-of-syntax-9780190086 \n152). Oxford University Press. ISBN 978-0-19-008615-2. \nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r \nec/WASLLA-3).*Journal of the History of Ideas*.**34**(3): 445–50. doi:10.2307/2708963 (http \ns://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963). \nWasilewska, Anita (2018).*Logics for Computer Science: Classical and Non-Classical*. \nSpringer. pp. 145–6. ISBN 978-3-319-92591-2. \nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/).*Internet Encyclopedia*\n*of Philosophy*. Retrieved 12 December 2021. \nWeddle, Perry (2011). \"Chapter 36. Informal logic and the eductive-inductive distinction\". \n*Across the Lines of Disciplines*(https://www.degruyter.com/document/doi/10.1515/97831108 \n67718.383/html). De Gruyter Mouton. pp. 383–388. doi:10.1515/9783110867718.383 (http \ns://doi.org/10.1515%2F9783110867718.383). ISBN 978-3-11-086771-8. Archived (https://w \neb.archive.org/web/20211231172343/https://www.degruyter.com/document/doi/10.1515/978 \n3110867718.383/html) from the original on 31 December 2021. Retrieved 2 January 2022. \nWesterståhl, Dag (1989). \"Aristotelian Syllogisms and Generalized Quantifiers\" (https://philp \napers.org/rec/WESASA).*Studia Logica*.**48**(4): 577–585. doi:10.1007/BF00370209 (https:// \ndoi.org/10.1007%2FBF00370209). S2CID 32089424 (https://api.semanticscholar.org/Corpu \nsID:32089424). Archived (https://web.archive.org/web/20220104182746/https://philpapers.o \nrg/rec/WESASA) from the original on 4 January 2022. Retrieved 4 January 2022. \nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp \nringer.com/article/10.1007/s10503-009-9131-5).*Argumentation*.**24**(1): 107–124. \ndoi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). \nISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap \ni.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 \n08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on \n8 January 2022. Retrieved 8 January 2022. \nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum \nLogic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved \n11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3.", - "page_start": 36, - "page_end": 36, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Paraconsistent logics are logical systems that can deal with contradictions. They are formulated to avoid \nthe principle of explosion: for them, it is not the case that anything follows from a contradiction.[139] \nThey are often motivated by dialetheism, the view that contradictions are real or that reality itself is \ncontradictory. Graham Priest is an influential contemporary proponent of this position and similar views \nhave been ascribed to Georg Wilhelm Friedrich Hegel.[140] \n\n**Informal**\n\nInformal logic is usually carried out in a less systematic way. It often focuses on more specific issues, like \ninvestigating a particular type of fallacy or studying a certain aspect of argumentation. Nonetheless, some \nframeworks of informal logic have also been presented that try to provide a systematic characterization of \nthe correctness of arguments.[141] \n\nThe*pragmatic*or*dialogical approach*to informal logic sees arguments as speech acts and not merely as \na set of premises together with a conclusion.[142] As speech acts, they occur in a certain context, like a \ndialogue, which affects the standards of right and wrong arguments.[143] A prominent version by Douglas \nN. Walton understands a dialogue as a game between two players. The initial position of each player is \ncharacterized by the propositions to which they are committed and the conclusion they intend to prove. \nDialogues are games of persuasion: each player has the goal of convincing the opponent of their own \nconclusion.[144] This is achieved by making arguments: arguments are the moves of the game.[145] They \naffect to which propositions the players are committed. A winning move is a successful argument that \ntakes the opponent's commitments as premises and shows how one's own conclusion follows from them. \nThis is usually not possible straight away. For this reason, it is normally necessary to formulate a \nsequence of arguments as intermediary steps, each of which brings the opponent a little closer to one's \nintended conclusion. Besides these positive arguments leading one closer to victory, there are also \nnegative arguments preventing the opponent's victory by denying their conclusion.[144] Whether an \nargument is correct depends on whether it promotes the progress of the dialogue. Fallacies, on the other \nhand, are violations of the standards of proper argumentative rules.[146] These standards also depend on \nthe type of dialogue. For example, the standards governing the scientific discourse differ from the \nstandards in business negotiations.[147] \n\nThe*epistemic approach*to informal logic, on the other hand, focuses on the epistemic role of \narguments.[148] It is based on the idea that arguments aim to increase our knowledge. They achieve this \nby linking justified beliefs to beliefs that are not yet justified.[149] Correct arguments succeed at \nexpanding knowledge while fallacies are epistemic failures: they do not justify the belief in their \nconclusion.[150] For example, the fallacy of begging the question is a*fallacy*because it fails to provide \nindependent justification for its conclusion, even though it is deductively valid.[151] In this sense, logical \nnormativity consists in epistemic success or rationality.[149] The Bayesian approach is one example of an \nepistemic approach.[152] Central to Bayesianism is not just whether the agent believes something but the \ndegree to which they believe it, the so-called*credence*. Degrees of belief are seen as subjective \nprobabilities in the believed proposition, i.e. how certain the agent is that the proposition is true.[153] On \nthis view, reasoning can be interpreted as a process of changing one's credences, often in reaction to new", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia1.pdf" - }, - { - "text": "**Notes**\n\na. However, there are some forms of logic, like imperative logic, where this may not be the \n\ncase.[42] \n\nb. Conductive arguments present reasons in favor of a conclusion without claiming that the \n\nreasons are strong enough to decisively support the conclusion. \n\n**Citations**\n\n\n \n \n \n \n [html]\n
3. Nunes 2011, pp. 2066 – 2069.
4. Pepin 2004, Logos ; Online Etymology Staff.
5. Hintika_2019, lead section, SNature and varieties of logic.
6. Hintikka 2013_SNature and varieties of logic ; Haack 2.978, pp. 2 – 20, Phliosophy of logics ; Schleezinger, Kensn - Portnoy & Parush 2001, p. 220.
7. Hintikka & Sandu 2006, p. 13 ; Audi 1999b, Philosophy of logic ; McKeon.
8. Blair & Johnson 2000, pp. 93 – 95 ; Craig 1996 ; Formal and informal logic.
9. Craig 1B95, Formal and informal logic Barres 2007, p. 274, Plasty - Borjour 2012, p. 62 ( https :// fooles. goode. com / books / n5 = 5Eyp / μl / 26AJ / 26AJ / 26A2 ). Fsfri. 2013, p. 25 ( https :// fss. goode. comboks? n5 = 66244 / gCapp? P25 ).
10. MacFarlane 2017 ; Cohum 2015, pp. 763 – 767 ; Blair & Johnson 2000, pp. 95 ; Magnus 2005, pp. 12 – 4.1. 5 Formal languages.
11. McKeon ; Craig 1996, Formal and informal logic.
12. Hintikka & Sandu 2006, p. 13.
13. Magnus 2005, Proofs, p. 102.
14. Himtlika & Sandu Z006, pp. 13 - 16 ; Makridis 2022, pp. 1 - 2 ; Runco & Pritzker 1999, p. 155.
15. Gomez - Torrente 2019 ; Magnus 2005.1. 5 Other logical notions, p. 10.
16. Hintikka & Sandu 2006, p. 16.
LT. Honderich 2005, logic, informal ; Craig 15989, Formal and informal logic ; Johnson 1599.1pp 255 – 258.
18. Craig 1996, Formal languages and systems ; Simpson 2008, p. 14.
", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" - }, - { - "text": "**Bibliography**\n\nAloni, Maria; Dekker, Paul (7 July 2016).*The Cambridge Handbook of Formal Semantics*. \nCambridge University Press. pp. 22–23. ISBN 978-1-316-55273-5. \nAngell, Richard B. (1964).*Reasoning and Logic*. Ardent Media. p. 164. OCLC 375322 (http \ns://search.worldcat.org/oclc/375322). \nAudi, Robert (1999a). \"Informal logic\".*The Cambridge Dictionary of Philosophy*(https://philp \napers.org/rec/AUDTCD-2). Cambridge University Press. p. 435. ISBN 978-1-107-64379-6. \nArchived (https://web.archive.org/web/20210414132344/https://philpapers.org/rec/AUDTCD- \n2) from the original on 14 April 2021. Retrieved 29 December 2021. \nAudi, Robert (1999b). \"Philosophy of logic\".*The Cambridge Dictionary of Philosophy*(http \ns://philpapers.org/rec/AUDTCD-2). Cambridge University Press. pp. 679–681. ISBN 978-1- \n107-64379-6. Archived (https://web.archive.org/web/20210414132344/https://philpapers.org/ \nrec/AUDTCD-2) from the original on 14 April 2021. Retrieved 29 December 2021. \nBackmann, Marius (1 June 2019). \"Varieties of Justification—How (Not) to Solve the \nProblem of Induction\" (https://doi.org/10.1007%2Fs12136-018-0371-6).*Acta Analytica*.**34**\n(2): 235–255. doi:10.1007/s12136-018-0371-6 (https://doi.org/10.1007%2Fs12136-018-037 \n1-6). ISSN 1874-6349 (https://search.worldcat.org/issn/1874-6349). S2CID 125767384 (http \ns://api.semanticscholar.org/CorpusID:125767384). \nBagaria, Joan (2021). \"Set Theory\" (https://plato.stanford.edu/entries/set-theory/).*The*\n*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 23 September 2022. \nBarnes, Jonathan (25 January 2007).*Truth, etc.: Six Lectures on Ancient Logic*. Clarendon \nPress. p. 274. ISBN 978-0-19-151574-3. \nBenthem, Johan van. \"Modal Logic: Contemporary View: 1. Modal Notions and Reasoning \nPatterns: a First Pass\" (https://iep.utm.edu/modal-lo/#H1).*Internet Encyclopedia of*\n*Philosophy*. Retrieved 11 March 2023. \nBerlemann, Lars; Mangold, Stefan (10 July 2009).*Cognitive Radio and Dynamic Spectrum*\n*Access*. John Wiley & Sons. p. 194. ISBN 978-0-470-75443-6. \nBerman, Harold J. (1 July 2009).*Law and Revolution, the Formation of the Western Legal*\n*Tradition*. Harvard University Press. ISBN 978-0-674-02085-6. \nBimbo, Katalin (2 April 2016).*J. Michael Dunn on Information Based Logics*. Springer. \npp. 8–9. ISBN 978-3-319-29300-4. \nBlackburn, Simon (1 January 2008). \"argument\".*The Oxford Dictionary of Philosophy*(http \ns://www.oxfordreference.com/view/10.1093/oi/authority.20110803095423356). Oxford \nUniversity Press. ISBN 978-0-19-954143-0. Archived (https://web.archive.org/web/2022010 \n8194756/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803095423356) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nBlackburn, Simon (24 March 2016). \"rule of inference\".*The Oxford Dictionary of Philosophy*\n(https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990). Oxford \nUniversity Press. ISBN 978-0-19-954143-0. Archived (https://web.archive.org/web/2022010 \n8194809/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nBlair, J. Anthony; Johnson, Ralph H. (1987). \"The Current State of Informal Logic\" (https://ph \nilpapers.org/rec/BLATCS).*Informal Logic*.**9**(2): 147–51. doi:10.22329/il.v9i2.2671 (https://d \noi.org/10.22329%2Fil.v9i2.2671). Archived (https://web.archive.org/web/20211230194638/ht \ntps://philpapers.org/rec/BLATCS) from the original on 30 December 2021. Retrieved \n2 January 2022.", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Haack, Susan (1978). \"1. 'Philosophy of logics' \".*Philosophy of Logics*(https://philpapers.or \ng/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1–10. ISBN 978- \n0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o \nrg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021. \nHaack, Susan (1996).*Deviant Logic, Fuzzy Logic: Beyond the Formalism*. University of \nChicago Press. ISBN 978-0-226-31133-3. \nHaaparanta, Leila (2009). \"1. Introduction\".*The Development of Modern Logic*. Oxford \nUniversity Press. pp. 4–6. ISBN 978-0-19-513731-6. \nHansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Archived (http \ns://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from \nthe original on 29 March 2021. Retrieved 18 March 2021. \nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\".*The Routledge*\n*Companion to Epistemology*(https://philpapers.org/rec/BOVSIO). London: Routledge. \npp. 609–620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 \n5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved \n4 January 2022. \nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" \n(https://plato.stanford.edu/entries/arabic-islamic-influence/).*The Stanford Encyclopedia of*\n*Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023. \nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv \ne/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed \nu/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022. \nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph \ny-of-logic).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2015042810173 \n2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original \non 28 April 2015. Retrieved 21 November 2021. \nHintikka, Jaakko J. (2023). \"Logical systems\" (https://www.britannica.com/topic/logic/Logical \n-systems).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2021120718465 \n6/https://www.britannica.com/topic/logic/Logical-systems) from the original on 7 December \n2021. Retrieved 4 December 2021. \nHintikka, Jaakko (1970). \"Information, Deduction, and the A Priori\".*Noûs*.**4**(2): 135–152. \ndoi:10.2307/2214318 (https://doi.org/10.2307%2F2214318). ISSN 0029-4624 (https://searc \nh.worldcat.org/issn/0029-4624). JSTOR 2214318 (https://www.jstor.org/stable/2214318). \nHintikka, Jaakko; Sandu, Gabriel (2006). \"What is Logic?\". In Jacquette, D. (ed.). \n*Philosophy of Logic*(https://philpapers.org/rec/JAAWIL). North Holland. pp. 13–39. \nISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207235525/https://ph \nilpapers.org/rec/JAAWIL) from the original on 7 December 2021. Retrieved 29 December \n2021. \nHintikka, Jaakko J.; Spade, Paul Vincent. \"History of logic\" (https://www.britannica.com/topi \nc/history-of-logic).*Encyclopædia Britannica*. Retrieved 23 September 2022. \nHonderich, Ted (2005).*The Oxford Companion to Philosophy*(https://philpapers.org/rec/HO \nNTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. \norg/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 \nJanuary 2021. Retrieved 2 January 2022. \nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\".*Logic: The Essentials*. Wadsworth. \npp. 189–237. ISBN 978-1-305-59041-0. \nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http \ns://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia1.pdf", - "query": "In early Chinese philosophy, what were the major influences regarding the philosophy of logic ?", - "target_page": 18, - "target_passage": "In Chinese philosophy, the School of Names and Mohism were particularly influential", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "In Chinese philosophy, the School of Names and Mohism were particularly influential. The School of \nNames focused on the use of language and on paradoxes. For example, Gongsun Long proposed the \nwhite horse paradox, which defends the thesis that a white horse is not a horse. The school of Mohism \nalso acknowledged the importance of language for logic and tried to relate the ideas in these fields to the \nrealm of ethics.[197] \n\nIn India, the study of logic was primarily pursued by the schools of Nyaya, Buddhism, and Jainism. It \nwas not treated as a separate academic discipline and discussions of its topics usually happened in the \ncontext of epistemology and theories of dialogue or argumentation.[198] In Nyaya, inference is understood \nas a source of knowledge (pramāṇa). It follows the perception of an object and tries to arrive at \nconclusions, for example, about the cause of this object.[199] A similar emphasis on the relation to \nepistemology is also found in Buddhist and Jainist schools of logic, where inference is used to expand the \nknowledge gained through other sources.[200] Some of the later theories of Nyaya, belonging to the \nNavya-Nyāya school, resemble modern forms of logic, such as Gottlob Frege's distinction between sense \nand reference and his definition of number.[201] \n\nThe syllogistic logic developed by Aristotle predominated in the West until the mid-19th century, when \ninterest in the foundations of mathematics stimulated the development of modern symbolic logic.[202] \nMany see Gottlob Frege's*Begriffsschrift*as the birthplace of modern logic. Gottfried Wilhelm Leibniz's \nidea of a universal formal language is often considered a forerunner. Other pioneers were George Boole, \nwho invented Boolean algebra as a mathematical system of logic, and Charles Peirce, who developed the \nlogic of relatives. Alfred North Whitehead and Bertrand Russell, in turn, condensed many of these \ninsights in their work*Principia Mathematica*. Modern logic introduced novel concepts, such as functions, \nquantifiers, and relational predicates. A hallmark of modern symbolic logic is its use of formal language \nto precisely codify its insights. In this regard, it departs from earlier logicians, who relied mainly on \nnatural language.[203] Of particular influence was the development of first-order logic, which is usually \ntreated as the standard system of modern logic.[204] Its analytical generality allowed the formalization of \nmathematics and drove the investigation of set theory. It also made Alfred Tarski's approach to model \ntheory possible and provided the foundation of modern mathematical logic.[205]", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Haack, Susan (1978). \"1. 'Philosophy of logics' \".*Philosophy of Logics*(https://philpapers.or \ng/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1–10. ISBN 978- \n0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o \nrg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021. \nHaack, Susan (1996).*Deviant Logic, Fuzzy Logic: Beyond the Formalism*. University of \nChicago Press. ISBN 978-0-226-31133-3. \nHaaparanta, Leila (2009). \"1. Introduction\".*The Development of Modern Logic*. Oxford \nUniversity Press. pp. 4–6. ISBN 978-0-19-513731-6. \nHansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Archived (http \ns://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from \nthe original on 29 March 2021. Retrieved 18 March 2021. \nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\".*The Routledge*\n*Companion to Epistemology*(https://philpapers.org/rec/BOVSIO). London: Routledge. \npp. 609–620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 \n5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved \n4 January 2022. \nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" \n(https://plato.stanford.edu/entries/arabic-islamic-influence/).*The Stanford Encyclopedia of*\n*Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023. \nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv \ne/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed \nu/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022. \nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph \ny-of-logic).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2015042810173 \n2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original \non 28 April 2015. Retrieved 21 November 2021. \nHintikka, Jaakko J. (2023). \"Logical systems\" (https://www.britannica.com/topic/logic/Logical \n-systems).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2021120718465 \n6/https://www.britannica.com/topic/logic/Logical-systems) from the original on 7 December \n2021. Retrieved 4 December 2021. \nHintikka, Jaakko (1970). \"Information, Deduction, and the A Priori\".*Noûs*.**4**(2): 135–152. \ndoi:10.2307/2214318 (https://doi.org/10.2307%2F2214318). ISSN 0029-4624 (https://searc \nh.worldcat.org/issn/0029-4624). JSTOR 2214318 (https://www.jstor.org/stable/2214318). \nHintikka, Jaakko; Sandu, Gabriel (2006). \"What is Logic?\". In Jacquette, D. (ed.). \n*Philosophy of Logic*(https://philpapers.org/rec/JAAWIL). North Holland. pp. 13–39. \nISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207235525/https://ph \nilpapers.org/rec/JAAWIL) from the original on 7 December 2021. Retrieved 29 December \n2021. \nHintikka, Jaakko J.; Spade, Paul Vincent. \"History of logic\" (https://www.britannica.com/topi \nc/history-of-logic).*Encyclopædia Britannica*. Retrieved 23 September 2022. \nHonderich, Ted (2005).*The Oxford Companion to Philosophy*(https://philpapers.org/rec/HO \nNTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. \norg/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 \nJanuary 2021. Retrieved 2 January 2022. \nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\".*Logic: The Essentials*. Wadsworth. \npp. 189–237. ISBN 978-1-305-59041-0. \nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http \ns://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia1.pdf" - }, - { - "text": "11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3. \nWillman, Marshall D. (2022). \"Logic and Language in Early Chinese Philosophy\" (https://plat \no.stanford.edu/entries/chinese-logic-language/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Introduction. Retrieved 11 March 2023.", - "page_start": 36, - "page_end": 36, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Rautenberg, Wolfgang (1 July 2010).*A Concise Introduction to Mathematical Logic*. \nSpringer. p. 15. ISBN 978-1-4419-1221-3. \nRendsvig, Rasmus; Symons, John (2021). \"Epistemic Logic\" (https://plato.stanford.edu/entri \nes/logic-epistemic/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Retrieved 11 March 2023. \nRestall, Greg; Standefer, Shawn (2023).*Logical Methods*. MIT Press. p. 91. ISBN 978-0- \n262-54484-9. \nRichardson, Alan W. (1998).*Carnap's Construction of the World: The Aufbau and the*\n*Emergence of Logical Empiricism*. Cambridge University Press. p. 15. ISBN 978-0-521- \n43008-1. \nRini, Adriane (13 December 2010).*Aristotle's Modal Proofs: Prior Analytics A8-22 in*\n*Predicate Logic*. Springer Science & Business Media. p. 26. ISBN 978-94-007-0050-5. \nRitola, Juho (1 December 2008). \"Walton's Informal Logic: A Pragmatic Approach\" (https://d \noi.org/10.22329%2Fil.v28i4.2856).*Informal Logic*.**28**(4): 335. doi:10.22329/il.v28i4.2856 (h \nttps://doi.org/10.22329%2Fil.v28i4.2856). \nRocci, Andrea (8 March 2017).*Modality in Argumentation: A Semantic Investigation of the*\n*Role of Modalities in the Structure of Arguments with an Application to Italian Modal*\n*Expressions*. Springer. p. 26. ISBN 978-94-024-1063-1. \nRošker, Jana S. (May 2015). \"Classical Chinese Logic: Philosophy Compass\".*Philosophy*\n*Compass*.**10**(5): 301–309. doi:10.1111/phc3.12226 (https://doi.org/10.1111%2Fphc3.1222 \n6). \nRunco, Mark A.; Pritzker, Steven R. (1999).*Encyclopedia of Creativity*. Academic Press. \np. 155. ISBN 978-0-12-227075-8. \nRush, Penelope (2014). \"Introduction\".*The Metaphysics of Logic*(https://philpapers.org/rec/ \nRUSTMO-4). Cambridge University Press. pp. 1–10. ISBN 978-1-107-03964-3. Archived (htt \nps://web.archive.org/web/20211207184954/https://philpapers.org/rec/RUSTMO-4) from the \noriginal on 7 December 2021. Retrieved 8 January 2022. \nSadegh-Zadeh, Kazem (2015).*Handbook of Analytic Philosophy of Medicine*. Springer. \np. 983. ISBN 978-94-017-9579-1. \nSagüillo, José M. (2014). \"Hintikka on Information and Deduction\".*Teorema: Revista*\n*Internacional de Filosofía*.**33**(2): 75–88. ISSN 0210-1602 (https://search.worldcat.org/issn/ \n0210-1602). JSTOR 43047609 (https://www.jstor.org/stable/43047609). \nSarukkai, Sundar; Chakraborty, Mihir Kumar (2022).*Handbook of Logical Thought in India*. \nSpringer Nature. pp. 117–8. ISBN 978-81-322-2577-5. \nSchagrin, Morton L. \"Metalogic\" (https://www.britannica.com/topic/metalogic).*Encyclopædia*\n*Britannica*. Retrieved 23 September 2022. \nSchechter, Joshua. \"Epistemology of Logic – Bibliography\" (https://philpapers.org/browse/ep \nistemology-of-logic).*PhilPapers*. Retrieved 11 September 2022. \nSchlesinger, I. M.; Keren-Portnoy, Tamar; Parush, Tamar (1 January 2001).*The Structure of*\n*Arguments*. John Benjamins Publishing. p. 220. ISBN 978-90-272-2359-3. \nSchreiner, Wolfgang (2021).*Thinking Programs: Logical Modeling and Reasoning About*\n*Languages, Data, Computations, and Executions*. Springer Nature. p. 22. ISBN 978-3-030- \n80507-4. \nScott, John; Marshall, Gordon (2009). \"analytic induction\".*A Dictionary of Sociology*(https:// \nwww.oxfordreference.com/view/10.1093/oi/authority.20110803095410661). Oxford \nUniversity Press. ISBN 978-0-19-953300-8. Archived (https://web.archive.org/web/2022010 \n8173225/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803095410661) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nShapiro, Stewart; Kouri Kissel, Teresa (2022). \"Classical Logic\" (https://plato.stanford.edu/e \nntries/logic-classical/#Sema).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Retrieved 19 July 2023.", - "page_start": 34, - "page_end": 34, - "source_file": "wikipedia1.pdf" - }, - { - "text": "to use logic to analyze mathematical reasoning or to establish \nlogic-based foundations of mathematics.[165] The latter was a \nmajor concern in early 20th-century mathematical logic, which \npursued the program of logicism pioneered by philosopher- \nlogicians such as Gottlob Frege, Alfred North Whitehead, and \nBertrand Russell. Mathematical theories were supposed to be \nlogical tautologies, and their program was to show this by means \nof a reduction of mathematics to logic. Many attempts to realize \nthis program failed, from the crippling of Frege's project in his \n*Grundgesetze*by Russell's paradox, to the defeat of Hilbert's \nprogram by Gödel's incompleteness theorems.[166] \n\nSet theory originated in the study of the infinite by Georg Cantor, \nand it has been the source of many of the most challenging and \nimportant issues in mathematical logic. They include Cantor's \ntheorem, the status of the Axiom of Choice, the question of the \nindependence of the continuum hypothesis, and the modern debate \non large cardinal axioms.[167] \nBertrand Russell made various \ncontributions to mathematical \nlogic.[163] \n\nComputability theory is the branch of mathematical logic that \nstudies effective procedures to solve calculation problems. One of \nits main goals is to understand whether it is possible to solve a given problem using an algorithm. For \ninstance, given a certain claim about the positive integers, it examines whether an algorithm can be found \nto determine if this claim is true. Computability theory uses various theoretical tools and models, such as \nTuring machines, to explore this type of issue.[168] \n\n**Computational logic**\n\nComputational logic is the branch of logic and computer science that studies how to implement \nmathematical reasoning and logical formalisms using computers. This includes, for example, automatic \ntheorem provers, which employ rules of inference to construct a proof step by step from a set of premises \nto the intended conclusion without human intervention.[169] Logic programming languages are designed \nspecifically to express facts using logical formulas and to draw inferences from these facts. For example, \nProlog is a logic programming language based on predicate logic.[170] Computer scientists also apply \nconcepts from logic to problems in computing. The works of Claude Shannon were influential in this \nregard. He showed how Boolean logic can be used to understand and implement computer circuits.[171] \nThis can be achieved using electronic logic gates, i.e. electronic circuits with one or more inputs and \nusually one output. The truth values of propositions are represented by voltage levels. In this way, logic \nfunctions can be simulated by applying the corresponding voltages to the inputs of the circuit and \ndetermining the value of the function by measuring the voltage of the output.[172] \n\n**Formal semantics of natural language**\n\nFormal semantics is a subfield of logic, linguistics, and the philosophy of language. The discipline of \nsemantics studies the meaning of language. Formal semantics uses formal tools from the fields of \nsymbolic logic and mathematics to give precise theories of the meaning of natural language expressions. \nIt understands meaning usually in relation to truth conditions, i.e. it examines in which situations a", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Gamut, L.T.F. (1991).*Logic, Language and Meaning Vol 1: Introduction to Logic*. University \nof Chicago Press. 5.5. ISBN 978-0-226-28085-1. \nGarson, James (2023). \"Modal Logic\" (https://plato.stanford.edu/entries/logic-modal/).*The*\n*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 11 March 2023. \nGensler, Harry J. (2006).*The A to Z of Logic*. Scarecrow Press. pp. xliii–xliv. ISBN 978-1- \n4617-3182-5. \nGoble, Lou (2001). \"Introduction\".*The Blackwell Guide to Philosophical Logic*(https://philpa \npers.org/rec/GOBTBG-2). Wiley-Blackwell. pp. 1–8. ISBN 978-0-631-20692-7. Archived (htt \nps://web.archive.org/web/20211207184959/https://philpapers.org/rec/GOBTBG-2) from the \noriginal on 7 December 2021. Retrieved 4 January 2022. \nGoodman, Lenn Evan (1992).*Avicenna*. Routledge. p. 188. ISBN 978-0-415-01929-3. \nGoodman, Lenn Evan (2003).*Islamic Humanism*. Oxford University Press. p. 155. \nISBN 978-0-19-513580-0. \nGroarke, Louis F. \"Aristotle: Logic\" (https://iep.utm.edu/aris-log/).*Internet Encyclopedia of*\n*Philosophy*. Archived (https://web.archive.org/web/20211229235433/https://iep.utm.edu/aris \n-log/) from the original on 29 December 2021. Retrieved 1 January 2022. \nGroarke, Leo (2021). \"Informal Logic\" (https://plato.stanford.edu/entries/logic-informal/).*The*\n*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nArchived (https://web.archive.org/web/20220112030519/https://plato.stanford.edu/entries/lo \ngic-informal/) from the original on 12 January 2022. Retrieved 31 December 2021. \nGómez-Torrente, Mario (2019). \"Logical Truth\" (https://plato.stanford.edu/entries/logical-trut \nh/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20211002190110/https://plato.stanford.ed \nu/entries/logical-truth/) from the original on 2 October 2021. Retrieved 22 November 2021. \nGödel, Kurt (1984). \"Russell's mathematical logic\". In Benacerraf, Paul; Putnam, Hilary \n(eds.).*Philosophy of Mathematics: Selected Readings*(https://www.cambridge.org/core/boo \nks/abs/philosophy-of-mathematics/russells-mathematical-logic/4D82F215FABFE06149D03 \nEF1EF5BE7E4) (2nd ed.). Cambridge University Press. pp. 447–469. ISBN 978-0-521- \n29648-9. Archived (https://web.archive.org/web/20220111091740/https://www.cambridge.or \ng/core/books/abs/philosophy-of-mathematics/russells-mathematical-logic/4D82F215FABFE \n06149D03EF1EF5BE7E4) from the original on 11 January 2022. Retrieved 9 January 2022. \nHájek, Petr (3 September 2006). \"Fuzzy Logic\" (https://plato.stanford.edu/Archives/Win201 \n2/entries/logic-fuzzy/).*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Retrieved 19 July 2023. \nHájek, Alan; Lin, Hanti (2017). \"A Tale of Two Epistemologies?\" (https://philpapers.org/rec/H \nJEATO).*Res Philosophica*.**94**(2): 207–232. doi:10.11612/resphil.1540 (https://doi.org/10.1 \n1612%2Fresphil.1540). S2CID 160029122 (https://api.semanticscholar.org/CorpusID:16002 \n9122). Archived (https://web.archive.org/web/20220104182746/https://philpapers.org/rec/HJ \nEATO) from the original on 4 January 2022. Retrieved 4 January 2022. \nHall, Cordelia; O'Donnell, John (2000).*Discrete Mathematics Using a Computer*. Springer \nScience & Business Media. p. 48. ISBN 978-1-85233-089-7. \nHoude, R.; Camacho, L. (2003). \"Induction\".*New Catholic Encyclopedia*(https://www.encycl \nopedia.com/science-and-technology/computers-and-electrical-engineering/electrical-engine \nering/induction). ISBN 978-0-7876-4004-0. Archived (https://web.archive.org/web/20220108 \n171720/https://www.encyclopedia.com/science-and-technology/computers-and-electrical-en \ngineering/electrical-engineering/induction) from the original on 8 January 2022. Retrieved \n8 January 2022. \nHaack, Susan (1974).*Deviant Logic: Some Philosophical Issues*. CUP Archive. p. 51. \nISBN 978-0-521-20500-9.", - "page_start": 28, - "page_end": 28, - "source_file": "wikipedia1.pdf" - }, - { - "text": "**Areas of research**\n\nLogic is studied in various fields. In many cases, this is done by applying its formal method to specific \ntopics outside its scope, like to ethics or computer science.[156] In other cases, logic itself is made the \nsubject of research in another discipline. This can happen in diverse ways. For instance, it can involve \ninvestigating the philosophical assumptions linked to the basic concepts used by logicians. Other ways \ninclude interpreting and analyzing logic through mathematical structures as well as studying and \ncomparing abstract properties of formal logical systems.[157] \n\n**Philosophy of logic and philosophical logic**\n*Philosophy of logic*is the philosophical discipline studying the scope and nature of logic.[59] It examines \nmany presuppositions implicit in logic, like how to define its basic concepts or the metaphysical \nassumptions associated with them.[158] It is also concerned with how to classify logical systems and \nconsiders the ontological commitments they incur.[159]*Philosophical logic*is one of the areas within the \nphilosophy of logic. It studies the application of logical methods to philosophical problems in fields like \nmetaphysics, ethics, and epistemology.[160] This application usually happens in the form of extended or \ndeviant logical systems.[161] \n\n**Metalogic**\n\nMetalogic is the field of inquiry studying the properties of formal logical systems. For example, when a \nnew formal system is developed, metalogicians may study it to determine which formulas can be proven \nin it. They may also study whether an algorithm could be developed to find a proof for each formula and \nwhether every provable formula in it is a tautology. Finally, they may compare it to other logical systems \nto understand its distinctive features. A key issue in metalogic concerns the relation between syntax and \nsemantics. The syntactic rules of a formal system determine how to deduce conclusions from premises, \ni.e. how to formulate proofs. The semantics of a formal system governs which sentences are true and \nwhich ones are false. This determines the validity of arguments since, for valid arguments, it is \nimpossible for the premises to be true and the conclusion to be false. The relation between syntax and \nsemantics concerns issues like whether every valid argument is provable and whether every provable \nargument is valid. Metalogicians also study whether logical systems are complete, sound, and consistent. \nThey are interested in whether the systems are decidable and what expressive power they have. \nMetalogicians usually rely heavily on abstract mathematical reasoning when examining and formulating \nmetalogical proofs. This way, they aim to arrive at precise and general conclusions on these topics.[162] \n\n**Mathematical logic**\n\nThe term \"mathematical logic\" is sometimes used as a synonym of \"formal logic\". But in a more \nrestricted sense, it refers to the study of logic within mathematics. Major subareas include model theory, \nproof theory, set theory, and computability theory.[164] Research in mathematical logic commonly \naddresses the mathematical properties of formal systems of logic. However, it can also include attempts", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Vidyabhusana, Satis Chandra (1988).*A History of Indian Logic: Ancient, Mediaeval and*\n*Modern Schools*. Motilal Banarsidass Publisher. p. 221. ISBN 978-81-208-0565-1. \nVleet, Van Jacob E. (2010). \"Introduction\".*Informal Logical Fallacies: A Brief Guide*(https://p \nhilpapers.org/rec/VLEILF). Upa. pp. ix–x. ISBN 978-0-7618-5432-6. Archived (https://web.ar \nchive.org/web/20220228035654/https://philpapers.org/rec/VLEILF) from the original on 28 \nFebruary 2022. Retrieved 2 January 2022. \nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ \nentries/logic-higher-order/).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ \nhttps://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. \nRetrieved 23 November 2021. \nWalton, Douglas N. (1987).*Informal Fallacies: Towards a Theory of Argument Criticisms*(htt \nps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http \ns://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the \noriginal on 2 March 2022. Retrieved 2 January 2022. \nWarren, Jared (2020).*Shadows of Syntax: Revitalizing Logical and Mathematical*\n*Conventionalism*(https://global.oup.com/academic/product/shadows-of-syntax-9780190086 \n152). Oxford University Press. ISBN 978-0-19-008615-2. \nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r \nec/WASLLA-3).*Journal of the History of Ideas*.**34**(3): 445–50. doi:10.2307/2708963 (http \ns://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963). \nWasilewska, Anita (2018).*Logics for Computer Science: Classical and Non-Classical*. \nSpringer. pp. 145–6. ISBN 978-3-319-92591-2. \nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/).*Internet Encyclopedia*\n*of Philosophy*. Retrieved 12 December 2021. \nWeddle, Perry (2011). \"Chapter 36. Informal logic and the eductive-inductive distinction\". \n*Across the Lines of Disciplines*(https://www.degruyter.com/document/doi/10.1515/97831108 \n67718.383/html). De Gruyter Mouton. pp. 383–388. doi:10.1515/9783110867718.383 (http \ns://doi.org/10.1515%2F9783110867718.383). ISBN 978-3-11-086771-8. Archived (https://w \neb.archive.org/web/20211231172343/https://www.degruyter.com/document/doi/10.1515/978 \n3110867718.383/html) from the original on 31 December 2021. Retrieved 2 January 2022. \nWesterståhl, Dag (1989). \"Aristotelian Syllogisms and Generalized Quantifiers\" (https://philp \napers.org/rec/WESASA).*Studia Logica*.**48**(4): 577–585. doi:10.1007/BF00370209 (https:// \ndoi.org/10.1007%2FBF00370209). S2CID 32089424 (https://api.semanticscholar.org/Corpu \nsID:32089424). Archived (https://web.archive.org/web/20220104182746/https://philpapers.o \nrg/rec/WESASA) from the original on 4 January 2022. Retrieved 4 January 2022. \nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp \nringer.com/article/10.1007/s10503-009-9131-5).*Argumentation*.**24**(1): 107–124. \ndoi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). \nISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap \ni.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 \n08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on \n8 January 2022. Retrieved 8 January 2022. \nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum \nLogic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved \n11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3.", - "page_start": 36, - "page_end": 36, - "source_file": "wikipedia1.pdf" - }, - { - "text": "sentence would be true or false. One of its central methodological \nassumptions is the principle of compositionality. It states that the \nmeaning of a complex expression is determined by the meanings \nof its parts and how they are combined. For example, the meaning \nof the verb phrase \"walk and sing\" depends on the meanings of the \nindividual expressions \"walk\" and \"sing\". Many theories in formal \nsemantics rely on model theory. This means that they employ set \ntheory to construct a model and then interpret the meanings of \nexpression in relation to the elements in this model. For example, \nthe term \"walk\" may be interpreted as the set of all individuals in \nthe model that share the property of walking. Early influential \ntheorists in this field were Richard Montague and Barbara Partee, \nwho focused their analysis on the English language.[173] \n\n **Epistemology of logic**\n\nConjunction (AND) is one of the \nbasic operations of Boolean logic. It \ncan be electronically implemented in \nseveral ways, for example, by using \ntwo transistors. \n\nThe epistemology of logic studies how one knows that an \nargument is valid or that a proposition is logically true.[174] This \nincludes questions like how to justify that modus ponens is a valid \nrule of inference or that contradictions are false.[175] The \ntraditionally dominant view \nlogical \nis \nunderstanding belongs to knowledge a priori.[176] In this regard, it \nis often argued that the mind has a special faculty to examine relations between pure ideas and that this \nfaculty is also responsible for apprehending logical truths.[177] A similar approach understands the rules \nof logic in terms of linguistic conventions. On this view, the laws of logic are trivial since they are true by \ndefinition: they just express the meanings of the logical vocabulary.[178] \n\nthat this form of \n\nSome theorists, like Hilary Putnam and Penelope Maddy, object to the view that logic is knowable a \npriori. They hold instead that logical truths depend on the empirical world. This is usually combined with \nthe claim that the laws of logic express universal regularities found in the structural features of the world. \nAccording to this view, they may be explored by studying general patterns of the fundamental sciences. \nFor example, it has been argued that certain insights of quantum mechanics refute the principle of \n is equivalent to \ndistributivity in classical logic, which states that the formula \n. This claim can be used as an empirical argument for the thesis that quantum logic \n\nis the correct logical system and should replace classical logic.[179] \n\n**History**\n\n\n \n \n \n \n [html]\n
DevelopmentTableVellopistTablePatientsPercentage
ControlStage222222222StateStatementMean ( SD )
TableTableTableTableControlTable
Statesand proposilstotelia,TableTableTable
SpecificationSpecificity (%)ParameterStateAge ( years )Parameters
", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia1.pdf" - }, - { - "text": "170. Clocksin & Mellish 2003, pp. 237–238, 252–255, 257, The Relation of Prolog to Logic; \n\nDaintith & Wright 2008, Logic Programming Languages (https://www.encyclopedia.com/com \nputing/dictionaries-thesauruses-pictures-and-press-releases/logic-programming-languages). \n\n171. O'Regan 2016, p. 49; Calderbank & Sloane 2001, pp. 768. \n172. Daintith & Wright 2008, Logic Gate (https://www.encyclopedia.com/computing/dictionaries-th \n\nesauruses-pictures-and-press-releases/logic-gate). \n\n173. Janssen & Zimmermann 2021, pp. 3–4; Partee 2016; King 2009, pp. 557–8; Aloni & Dekker \n\n2016, pp. 22–23 (https://books.google.com/books?id=ltSgDAAAQBAJ&pg=PT22). \n\n174. Warren 2020, 6. The Epistemology of Logic; Schechter. \n175. Warren 2020, 6. The Epistemology of Logic. \n176. Schechter. \n177. Gómez-Torrente 2019. \n178. Warren 2020, 6. The Epistemology of Logic; Gómez-Torrente 2019; Warren 2020, 1. What is \n\nConventionalism. \n\n179. Chua 2017, pp. 631–636; Wilce 2021; Putnam 1969, pp. 216–241. \n180. Lagerlund 2018. \n181. Spade & Panaccio 2019. \n182. Haaparanta 2009, pp. 4–6 (https://books.google.com/books?id=0jXavKsArnIC&pg=PA4), 1. \n\nIntroduction; Hintikka & Spade, Modern logic, Logic since 1900. \n\n183. Kline 1972, \"A major achievement of Aristotle was the founding of the science of logic\", p. \n\n53; Łukasiewicz 1957, p. 7; Liu & Guo 2023, p. 15. \n\n184. Lear 1980, p. 34. \n185. Knuuttila 1980, p. 71; Fisher, Gabbay & Vila 2005, p. 119. \n186. Berman 2009, p. 133. \n187. Frede; Groarke. \n188. Ewald 2019; Smith 2022. \n189. Hasse 2008; Lagerlund 2018. \n190. Washell 1973, pp. 445–50; Kneale & Kneale 1962, pp. 229, 266. \n191. Goodman 2003, p. 155. \n192. Goodman 1992, p. 188. \n193. Hintikka & Spade, Arabic Logic (https://www.britannica.com/topic/history-of-logic/Medieval-lo \n\ngic#ref65928). \n\n194. Iqbal 2013, pp. 99–115, The Spirit of Muslim Culture. \n195. Marenbon 2021, Introduction; 3. The Logical Text-Books; Hintikka & Spade. \n196. Hintikka & Spade; Hasse 2008; Spade & Panaccio 2019. \n197. Willman 2022; Rošker 2015, pp. 301–309. \n198. Sarukkai & Chakraborty 2022, pp. 117–8. \n199. Dasti, Lead section; 1b. Inference; Mills 2018, p. 121 (https://books.google.com/books?id=s \n\nGhqDwAAQBAJ&pg=PA121). \n\n200. Emmanuel 2015, pp. 320–2; Vidyabhusana 1988, p. 221. \n201. Chakrabarti 1976, pp. 554–563. \n202. Groarke; Haaparanta 2009, pp. 3–5 (https://books.google.com/books?id=0jXavKsArnIC&pg \n\n=PA3), 1. Introduction. \n\n203. Haaparanta 2009, pp. 4–6 (https://books.google.com/books?id=0jXavKsArnIC&pg=PA4); \n\nHintikka & Spade, Modern logic, Logic since 1900. \n\n204. Ewald 2019. \n205. Ewald 2019; Schreiner 2021, p. 22.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia1.pdf", - "query": "What is considered a deductively valid argument regarding logic ?", - "target_page": 6, - "target_passage": "A deductively valid argument is one whose premises guarantee the truth of its conclusion", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "argument is made up of a chain of simple arguments. This means that the conclusion of one argument acts \nas a premise of later arguments. For a complex argument to be successful, each link of the chain has to be \nsuccessful.[43] \n\nArguments and inferences are either \ncorrect or incorrect. If they are correct \ntheir \ntheir premises support \nthen \nconclusion. In the incorrect case, this \nsupport \ntake \ndifferent forms corresponding to the \ndifferent types of reasoning.[62] The \nstrongest form of support corresponds \nto deductive reasoning. But even \narguments that are not deductively \nvalid may still be good arguments \ntheir premises offer non- \nbecause \ndeductive support to their conclusions. \nFor such cases, the term*ampliative*or \nused.[63] \n*inductive*\nDeductive arguments are associated \nwith formal logic in contrast to the \nrelation between ampliative arguments and informal logic.[64] \n\nis missing. It can \n\nArgument terminology used in logic \n\n**Deductive**\nA deductively valid argument is one whose premises guarantee the truth of its conclusion.[11] For \ninstance, the argument \"(1) all frogs are amphibians; (2) no cats are amphibians; (3) therefore no cats are \nfrogs\" is deductively valid. For deductive validity, it does not matter whether the premises or the \nconclusion are actually true. So the argument \"(1) all frogs are mammals; (2) no cats are mammals; (3) \ntherefore no cats are frogs\" is also valid because the conclusion follows necessarily from the premises.[65] \n\nAccording to an influential view by Alfred Tarski, deductive arguments have three essential features: (1) \nthey are formal, i.e. they depend only on the form of the premises and the conclusion; (2) they are a \npriori, i.e. no sense experience is needed to determine whether they obtain; (3) they are modal, i.e. that \nthey hold by logical necessity for the given propositions, independent of any other circumstances.[66] \n\nBecause of the first feature, the focus on formality, deductive inference is usually identified with rules of \ninference.[67] Rules of inference specify the form of the premises and the conclusion: how they have to be \nstructured for the inference to be valid. Arguments that do not follow any rule of inference are \ndeductively invalid.[68] The modus ponens is a prominent rule of inference. It has the form \"*p*; if*p*, then \n*q*; therefore*q*\".[69] Knowing that it has just rained ( ) and that after rain the streets are wet ( \n), one \ncan use modus ponens to deduce that the streets are wet ( ).[70] \n\nThe third feature can be expressed by stating that deductively valid inferences are truth-preserving: it is \nimpossible for the premises to be true and the conclusion to be false.[71] Because of this feature, it is often \nasserted that deductive inferences are uninformative since the conclusion cannot arrive at new \ninformation not already present in the premises.[72] But this point is not always accepted since it would \nmean, for example, that most of mathematics is uninformative. A different characterization distinguishes", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia1.pdf" - }, - { - "text": "propositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions \nbehind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant \nlogics, on the other hand, reject certain classical intuitions and provide alternative explanations of the \nbasic laws of logic. \n\n**Definition**\n\nThe word \"logic\" originates from the Greek word*logos*, which has a variety of translations, such as \nreason, discourse, or language.[4] Logic is traditionally defined as the study of the laws of thought or \ncorrect reasoning,[5] and is usually understood in terms of inferences or arguments. Reasoning is the \nactivity of drawing inferences. Arguments are the outward expression of inferences.[6] An argument is a \nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. \nwhether their premises support the conclusion.[7] These general characterizations apply to logic in the \nwidest sense, i.e., to both formal and informal logic since they are both concerned with assessing the \ncorrectness of arguments.[8] Formal logic is the traditionally dominant field, and some logicians restrict \nlogic to formal logic.[9] \n\n**Formal logic**\n\nFormal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal \napproach to study reasoning: it replaces concrete expressions with abstract symbols to examine the \nlogical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is \nonly concerned with the abstract structure of arguments and not with their concrete content.[10] \n\nFormal logic is interested in deductively valid arguments, for which the truth of their premises ensures \nthe truth of their conclusion. This means that it is impossible for the premises to be true and the \nconclusion to be false.[11] For valid arguments, the logical structure of the premises and the conclusion \nfollows a pattern called a rule of inference.[12] For example, modus ponens is a rule of inference \naccording to which all arguments of the form \"(1)*p*, (2) if*p*then*q*, (3) therefore*q*\" are valid, independent \nof what the terms*p*and*q*stand for.[13] In this sense, formal logic can be defined as the science of valid \ninferences. An alternative definition sees logic as the study of logical truths.[14] A proposition is logically \ntrue if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible \nworlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is \nnot\".[15] These two definitions of formal logic are not identical, but they are closely related. For example, \nif the inference from*p*to*q*is deductively valid then the claim \"if*p*then*q*\" is a logical truth.[16] \n\nFormal logic uses formal languages to express and analyze arguments.[17] They normally have a very \nlimited vocabulary and exact syntactic rules. These rules specify how their symbols can be combined to \nconstruct sentences, so-called well-formed formulas.[18] This simplicity and exactness of formal logic \nmake it capable of formulating precise rules of inference. They determine whether a given argument is \nvalid.[19] Because of the reliance on formal language, natural language arguments cannot be studied \ndirectly. Instead, they need to be translated into formal language before their validity can be assessed.[20] \n\nThe term \"logic\" can also be used in a slightly different sense as a countable noun. In this sense,*a logic*is \na logical formal system. Distinct logics differ from each other concerning the rules of inference they \naccept as valid and the formal languages used to express them.[21] Starting in the late 19th century, many", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Paulson, Lawrence C. (February 2018). \"Computational Logic: Its Origins and Applications\" \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832843).*Proceedings of the Royal Society*\n*A: Mathematical, Physical and Engineering Sciences*.**474**(2210): 1–14. arXiv:1712.04375 \n(https://arxiv.org/abs/1712.04375). Bibcode:2018RSPSA.47470872P (https://ui.adsabs.harv \nard.edu/abs/2018RSPSA.47470872P). doi:10.1098/rspa.2017.0872 (https://doi.org/10.109 \n8%2Frspa.2017.0872). PMC 5832843 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832 \n843). PMID 29507522 (https://pubmed.ncbi.nlm.nih.gov/29507522). S2CID 3805901 (http \ns://api.semanticscholar.org/CorpusID:3805901). \nPedemonte, Bettina (25 June 2018). \"Strategic vs Definitory Rules: Their Role in Abductive \nArgumentation and their Relationship with Deductive Proof\" (https://www.ejmste.com/article/ \nstrategic-vs-definitory-rules-their-role-in-abductive-argumentation-and-their-relationship-with \n-5539).*Eurasia Journal of Mathematics, Science and Technology Education*.**14**(9): 1–17. \ndoi:10.29333/ejmste/92562 (https://doi.org/10.29333%2Fejmste%2F92562). ISSN 1305- \n8215 (https://search.worldcat.org/issn/1305-8215). S2CID 126245285 (https://api.semantics \ncholar.org/CorpusID:126245285). Archived (https://web.archive.org/web/20211207195246/h \nttps://www.ejmste.com/article/strategic-vs-definitory-rules-their-role-in-abductive-argumentati \non-and-their-relationship-with-5539) from the original on 7 December 2021. Retrieved \n8 January 2022. \nPickel, Bryan (1 July 2020). \"Structured Propositions and Trivial Composition\" (https://doi.or \ng/10.1007%2Fs11229-018-1853-1).*Synthese*.**197**(7): 2991–3006. doi:10.1007/s11229- \n018-1853-1 (https://doi.org/10.1007%2Fs11229-018-1853-1). hdl:20.500.11820/3427c028- \nf2cb-4216-a199-9679a49ce71c (https://hdl.handle.net/20.500.11820%2F3427c028-f2cb-42 \n16-a199-9679a49ce71c). ISSN 1573-0964 (https://search.worldcat.org/issn/1573-0964). \nS2CID 49729020 (https://api.semanticscholar.org/CorpusID:49729020). \nPietroski, Paul (2021). \"Logical Form: 1. Patterns of Reason\" (https://plato.stanford.edu/entri \nes/logical-form/#pat).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20211002190116/https://plato.sta \nnford.edu/entries/logical-form/#pat) from the original on 2 October 2021. Retrieved \n4 December 2021. \nPlanty-Bonjour, Guy (2012).*The Categories of Dialectical Materialism: Contemporary Soviet*\n*Ontology*. Springer Science & Business Media. p. 62. ISBN 978-94-010-3517-0. \nPossin, Kevin (2016). \"Conductive Arguments: Why is This Still a Thing?\" (https://philpapers. \norg/rec/POSCAW-4).*Informal Logic*.**36**(4): 563–593. doi:10.22329/il.v36i4.4527 (https://do \ni.org/10.22329%2Fil.v36i4.4527). Archived (https://web.archive.org/web/20220108171723/ht \ntps://philpapers.org/rec/POSCAW-4) from the original on 8 January 2022. Retrieved \n8 January 2022. \nPriest, Graham; Tanaka, Koji; Weber, Zach (2018). \"Paraconsistent Logic\" (https://plato.stan \nford.edu/entries/logic-paraconsistent/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Retrieved 14 December 2021. \nPépin, Jean (2004). \"Logos\".*Encyclopedia of Religion*(https://www.encyclopedia.com/philo \nsophy-and-religion/philosophy/philosophy-terms-and-concepts/logos). ISBN 978-0-02- \n865733-2. Archived (https://web.archive.org/web/20211229134626/https://www.encyclopedi \na.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos) from the \noriginal on 29 December 2021. Retrieved 29 December 2021. \nPutnam, H. (1969). \"Is Logic Empirical?\".*Boston Studies in the Philosophy of Science*. \nVol. 5. pp. 216–241. doi:10.1007/978-94-010-3381-7_5 (https://doi.org/10.1007%2F978-94- \n010-3381-7_5). ISBN 978-94-010-3383-1. \nQuine, Willard Van Orman (1981).*Mathematical Logic*. Harvard University Press. p. 1. \nISBN 978-0-674-55451-1.", - "page_start": 33, - "page_end": 33, - "source_file": "wikipedia1.pdf" - }, - { - "text": "**Notes**\n\na. However, there are some forms of logic, like imperative logic, where this may not be the \n\ncase.[42] \n\nb. Conductive arguments present reasons in favor of a conclusion without claiming that the \n\nreasons are strong enough to decisively support the conclusion. \n\n**Citations**\n\n\n \n \n \n \n [html]\n
3. Nunes 2011, pp. 2066 – 2069.
4. Pepin 2004, Logos ; Online Etymology Staff.
5. Hintika_2019, lead section, SNature and varieties of logic.
6. Hintikka 2013_SNature and varieties of logic ; Haack 2.978, pp. 2 – 20, Phliosophy of logics ; Schleezinger, Kensn - Portnoy & Parush 2001, p. 220.
7. Hintikka & Sandu 2006, p. 13 ; Audi 1999b, Philosophy of logic ; McKeon.
8. Blair & Johnson 2000, pp. 93 – 95 ; Craig 1996 ; Formal and informal logic.
9. Craig 1B95, Formal and informal logic Barres 2007, p. 274, Plasty - Borjour 2012, p. 62 ( https :// fooles. goode. com / books / n5 = 5Eyp / μl / 26AJ / 26AJ / 26A2 ). Fsfri. 2013, p. 25 ( https :// fss. goode. comboks? n5 = 66244 / gCapp? P25 ).
10. MacFarlane 2017 ; Cohum 2015, pp. 763 – 767 ; Blair & Johnson 2000, pp. 95 ; Magnus 2005, pp. 12 – 4.1. 5 Formal languages.
11. McKeon ; Craig 1996, Formal and informal logic.
12. Hintikka & Sandu 2006, p. 13.
13. Magnus 2005, Proofs, p. 102.
14. Himtlika & Sandu Z006, pp. 13 - 16 ; Makridis 2022, pp. 1 - 2 ; Runco & Pritzker 1999, p. 155.
15. Gomez - Torrente 2019 ; Magnus 2005.1. 5 Other logical notions, p. 10.
16. Hintikka & Sandu 2006, p. 16.
LT. Honderich 2005, logic, informal ; Craig 15989, Formal and informal logic ; Johnson 1599.1pp 255 – 258.
18. Craig 1996, Formal languages and systems ; Simpson 2008, p. 14.
", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" - }, - { - "text": "**Logic**\n\n**Logic**is the study of correct reasoning. It includes both formal and \ninformal logic. Formal logic is the study of deductively valid \ninferences or logical truths. It examines how conclusions follow \nfrom premises based on the structure of arguments alone, \nindependent of their topic and content. Informal logic is associated \nwith informal fallacies, critical thinking, and argumentation \ntheory. Informal logic examines arguments expressed in natural \nlanguage whereas formal logic uses formal language. When used \nas a countable noun, the term \"a logic\" refers to a specific logical \nformal system that articulates a proof system. Logic plays a \ncentral role in many fields, such as philosophy, mathematics, \ncomputer science, and linguistics. \n\nLogic studies valid forms of \ninference like*modus ponens*. \n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the \nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the \nconclusion \"I don't have to work\".[1] Premises and conclusions express propositions or claims that can be \ntrue or false. An important feature of propositions is their internal structure. For example, complex \npropositions are made up of simpler propositions linked by logical vocabulary like \n(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a \nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically \ntrue propositions. They are true only because of their logical structure independent of the specific \nmeanings of the individual parts. \n\n (and) or \n\nArguments can be either correct or incorrect. An argument is correct if its premises support its \nconclusion. Deductive arguments have the strongest form of support: if their premises are true then their \nconclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new \ninformation not found in the premises. Many arguments in everyday discourse and the sciences are \nampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are \nstatistical generalization—such as inferring that all ravens are black, based on many individual \nobservations of black ravens.[2] Abductive arguments are inferences to the best explanation—for \nexample, when a doctor concludes that a patient has a certain disease, as the best explanation for the \nsymptoms that they are observed to suffer.[3] Arguments that fall short of the standards of correct \nreasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the \ncorrectness of arguments. \n\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, \nand Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the \nmain system of logic in the Western world until it was replaced by modern formal logic, which has its \nroots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly \nused system is classical logic. It consists of propositional logic and first-order logic. Propositional logic \nonly considers logical relations between full propositions. First-order logic also takes the internal parts of", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Haack, Susan (1978). \"1. 'Philosophy of logics' \".*Philosophy of Logics*(https://philpapers.or \ng/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1–10. ISBN 978- \n0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o \nrg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021. \nHaack, Susan (1996).*Deviant Logic, Fuzzy Logic: Beyond the Formalism*. University of \nChicago Press. ISBN 978-0-226-31133-3. \nHaaparanta, Leila (2009). \"1. Introduction\".*The Development of Modern Logic*. Oxford \nUniversity Press. pp. 4–6. ISBN 978-0-19-513731-6. \nHansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Archived (http \ns://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from \nthe original on 29 March 2021. Retrieved 18 March 2021. \nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\".*The Routledge*\n*Companion to Epistemology*(https://philpapers.org/rec/BOVSIO). London: Routledge. \npp. 609–620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 \n5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved \n4 January 2022. \nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" \n(https://plato.stanford.edu/entries/arabic-islamic-influence/).*The Stanford Encyclopedia of*\n*Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023. \nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv \ne/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed \nu/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022. \nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph \ny-of-logic).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2015042810173 \n2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original \non 28 April 2015. Retrieved 21 November 2021. \nHintikka, Jaakko J. (2023). \"Logical systems\" (https://www.britannica.com/topic/logic/Logical \n-systems).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2021120718465 \n6/https://www.britannica.com/topic/logic/Logical-systems) from the original on 7 December \n2021. Retrieved 4 December 2021. \nHintikka, Jaakko (1970). \"Information, Deduction, and the A Priori\".*Noûs*.**4**(2): 135–152. \ndoi:10.2307/2214318 (https://doi.org/10.2307%2F2214318). ISSN 0029-4624 (https://searc \nh.worldcat.org/issn/0029-4624). JSTOR 2214318 (https://www.jstor.org/stable/2214318). \nHintikka, Jaakko; Sandu, Gabriel (2006). \"What is Logic?\". In Jacquette, D. (ed.). \n*Philosophy of Logic*(https://philpapers.org/rec/JAAWIL). North Holland. pp. 13–39. \nISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207235525/https://ph \nilpapers.org/rec/JAAWIL) from the original on 7 December 2021. Retrieved 29 December \n2021. \nHintikka, Jaakko J.; Spade, Paul Vincent. \"History of logic\" (https://www.britannica.com/topi \nc/history-of-logic).*Encyclopædia Britannica*. Retrieved 23 September 2022. \nHonderich, Ted (2005).*The Oxford Companion to Philosophy*(https://philpapers.org/rec/HO \nNTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. \norg/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 \nJanuary 2021. Retrieved 2 January 2022. \nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\".*Logic: The Essentials*. Wadsworth. \npp. 189–237. ISBN 978-1-305-59041-0. \nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http \ns://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Wolf, Robert G. (1978). \"Are Relevant Logics Deviant?\" (https://philpapers.org/rec/WOLAR \nL).*Philosophia*.**7**(2): 327–340. doi:10.1007/BF02378819 (https://doi.org/10.1007%2FBF02 \n378819). S2CID 143697796 (https://api.semanticscholar.org/CorpusID:143697796). \nArchived (https://web.archive.org/web/20211216143955/https://philpapers.org/rec/WOLAR \nL) from the original on 16 December 2021. Retrieved 4 January 2022. \nZegarelli, Mark (2010).*Logic For Dummies*. John Wiley & Sons. p. 30. ISBN 978-1-118- \n05307-2.", - "page_start": 37, - "page_end": 37, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Vidyabhusana, Satis Chandra (1988).*A History of Indian Logic: Ancient, Mediaeval and*\n*Modern Schools*. Motilal Banarsidass Publisher. p. 221. ISBN 978-81-208-0565-1. \nVleet, Van Jacob E. (2010). \"Introduction\".*Informal Logical Fallacies: A Brief Guide*(https://p \nhilpapers.org/rec/VLEILF). Upa. pp. ix–x. ISBN 978-0-7618-5432-6. Archived (https://web.ar \nchive.org/web/20220228035654/https://philpapers.org/rec/VLEILF) from the original on 28 \nFebruary 2022. Retrieved 2 January 2022. \nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ \nentries/logic-higher-order/).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ \nhttps://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. \nRetrieved 23 November 2021. \nWalton, Douglas N. (1987).*Informal Fallacies: Towards a Theory of Argument Criticisms*(htt \nps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http \ns://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the \noriginal on 2 March 2022. Retrieved 2 January 2022. \nWarren, Jared (2020).*Shadows of Syntax: Revitalizing Logical and Mathematical*\n*Conventionalism*(https://global.oup.com/academic/product/shadows-of-syntax-9780190086 \n152). Oxford University Press. ISBN 978-0-19-008615-2. \nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r \nec/WASLLA-3).*Journal of the History of Ideas*.**34**(3): 445–50. doi:10.2307/2708963 (http \ns://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963). \nWasilewska, Anita (2018).*Logics for Computer Science: Classical and Non-Classical*. \nSpringer. pp. 145–6. ISBN 978-3-319-92591-2. \nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/).*Internet Encyclopedia*\n*of Philosophy*. Retrieved 12 December 2021. \nWeddle, Perry (2011). \"Chapter 36. Informal logic and the eductive-inductive distinction\". \n*Across the Lines of Disciplines*(https://www.degruyter.com/document/doi/10.1515/97831108 \n67718.383/html). De Gruyter Mouton. pp. 383–388. doi:10.1515/9783110867718.383 (http \ns://doi.org/10.1515%2F9783110867718.383). ISBN 978-3-11-086771-8. Archived (https://w \neb.archive.org/web/20211231172343/https://www.degruyter.com/document/doi/10.1515/978 \n3110867718.383/html) from the original on 31 December 2021. Retrieved 2 January 2022. \nWesterståhl, Dag (1989). \"Aristotelian Syllogisms and Generalized Quantifiers\" (https://philp \napers.org/rec/WESASA).*Studia Logica*.**48**(4): 577–585. doi:10.1007/BF00370209 (https:// \ndoi.org/10.1007%2FBF00370209). S2CID 32089424 (https://api.semanticscholar.org/Corpu \nsID:32089424). Archived (https://web.archive.org/web/20220104182746/https://philpapers.o \nrg/rec/WESASA) from the original on 4 January 2022. Retrieved 4 January 2022. \nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp \nringer.com/article/10.1007/s10503-009-9131-5).*Argumentation*.**24**(1): 107–124. \ndoi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). \nISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap \ni.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 \n08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on \n8 January 2022. Retrieved 8 January 2022. \nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum \nLogic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved \n11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3.", - "page_start": 36, - "page_end": 36, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Koslowski, Barbara (2017). \"Abductive Reasoning and Explanation\" (https://www.taylorfranci \ns.com/chapters/edit/10.4324/9781315725697-20/abductive-reasoning-explanation-barbara- \nkoslowski).*International Handbook of Thinking and Reasoning*. Routledge. pp. 366–382. \ndoi:10.4324/9781315725697 (https://doi.org/10.4324%2F9781315725697). ISBN 978-1- \n315-72569-7. Archived (https://web.archive.org/web/20220108225144/https://www.taylorfran \ncis.com/chapters/edit/10.4324/9781315725697-20/abductive-reasoning-explanation-barbara \n-koslowski) from the original on 8 January 2022. Retrieved 8 January 2022. \nKusch, Martin (2020). \"Psychologism\" (https://plato.stanford.edu/entries/psychologism/). \n*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nArchived (https://web.archive.org/web/20201229220156/https://plato.stanford.edu/entries/ps \nychologism/) from the original on 29 December 2020. Retrieved 30 November 2021. \nLagerlund, Henrik (27 September 2018). \"Review of The Aftermath of Syllogism: Aristotelian \nLogical Argument from Avicenna to Hegel\" (https://ndpr.nd.edu/reviews/the-aftermath-of-syll \nogism-aristotelian-logical-argument-from-avicenna-to-hegel/).*Notre Dame Philosophical*\n*Reviews*. Retrieved 19 July 2023. \nLear, Jonathan (1980).*Aristotle and Logical Theory*. CUP Archive. p. 34. ISBN 978-0-521- \n31178-6. \nLeary, Christopher C.; Kristiansen, Lars (2015).*A Friendly Introduction to Mathematical*\n*Logic*. Suny. p. 195. ISBN 978-1-942341-07-9. \nLepore, Ernest; Cumming, Sam (14 September 2012).*Meaning and Argument: An*\n*Introduction to Logic Through Language*. John Wiley & Sons. p. 5. ISBN 978-1-118-45521- \n0. \nLi, Wei (26 February 2010).*Mathematical Logic: Foundations for Information Science*. \nSpringer Science & Business Media. p. ix. ISBN 978-3-7643-9977-1. \nLinsky, Bernard (2011).*The Evolution of Principia Mathematica: Bertrand Russell's*\n*Manuscripts and Notes*(2nd ed.). Cambridge University Press. p. 4. ISBN 978-1-139- \n49733-6. \nLiu, Shiyong; Guo, Kaizhong (7 March 2023).*Error Logic: Paving Pathways for Intelligent*\n*Error Identification and Management*. Springer Nature. p. 15. ISBN 978-3-031-00820-7. \nŁukasiewicz, Jan (1957).*Aristotle's Syllogistic from the Standpoint of Modern Formal Logic*\n(2nd ed.). Oxford University Press. p. 7. OCLC 656161566 (https://search.worldcat.org/oclc/ \n656161566). \nMacFarlane, John (2017). \"Logical Constants\" (https://plato.stanford.edu/entries/logical-con \nstants/#SynTer).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20200317180221/https://plato.sta \nnford.edu/entries/logical-constants/#SynTer) from the original on 17 March 2020. Retrieved \n21 November 2021. \nMackie, J. L. (1967). \"Fallacies\" (https://www.encyclopedia.com/humanities/encyclopedias-a \nlmanacs-transcripts-and-maps/fallacies).*encyclopedia.com*. Archived (https://web.archive.or \ng/web/20210415101134/https://www.encyclopedia.com/humanities/encyclopedias-almanacs \n-transcripts-and-maps/fallacies) from the original on 15 April 2021. Retrieved 19 March \n2021. \nMagnus, P. D. (2005).*Forall X: An Introduction to Formal Logic*(https://philpapers.org/rec/M \nAGFXI). Victoria, BC, Canada: State University of New York Oer Services. pp. 8–9. \nISBN 978-1-64176-026-3. Archived (https://web.archive.org/web/20211207200544/https://ph \nilpapers.org/rec/MAGFXI) from the original on 7 December 2021. Retrieved 29 December \n2021. \nMakridis, Odysseus (2022).*Symbolic Logic*. Springer Nature. pp. 1–2. ISBN 978-3-030- \n67396-3. \nMaltby, John; Day, Liz; Macaskill, Ann (2007).*Personality, Individual Differences and*\n*Intelligence*. Prentice Hall. ISBN 978-0-13-129760-9.", - "page_start": 31, - "page_end": 31, - "source_file": "wikipedia1.pdf" - }, - { - "text": "**Bibliography**\n\nAloni, Maria; Dekker, Paul (7 July 2016).*The Cambridge Handbook of Formal Semantics*. \nCambridge University Press. pp. 22–23. ISBN 978-1-316-55273-5. \nAngell, Richard B. (1964).*Reasoning and Logic*. Ardent Media. p. 164. OCLC 375322 (http \ns://search.worldcat.org/oclc/375322). \nAudi, Robert (1999a). \"Informal logic\".*The Cambridge Dictionary of Philosophy*(https://philp \napers.org/rec/AUDTCD-2). Cambridge University Press. p. 435. ISBN 978-1-107-64379-6. \nArchived (https://web.archive.org/web/20210414132344/https://philpapers.org/rec/AUDTCD- \n2) from the original on 14 April 2021. Retrieved 29 December 2021. \nAudi, Robert (1999b). \"Philosophy of logic\".*The Cambridge Dictionary of Philosophy*(http \ns://philpapers.org/rec/AUDTCD-2). Cambridge University Press. pp. 679–681. ISBN 978-1- \n107-64379-6. Archived (https://web.archive.org/web/20210414132344/https://philpapers.org/ \nrec/AUDTCD-2) from the original on 14 April 2021. Retrieved 29 December 2021. \nBackmann, Marius (1 June 2019). \"Varieties of Justification—How (Not) to Solve the \nProblem of Induction\" (https://doi.org/10.1007%2Fs12136-018-0371-6).*Acta Analytica*.**34**\n(2): 235–255. doi:10.1007/s12136-018-0371-6 (https://doi.org/10.1007%2Fs12136-018-037 \n1-6). ISSN 1874-6349 (https://search.worldcat.org/issn/1874-6349). S2CID 125767384 (http \ns://api.semanticscholar.org/CorpusID:125767384). \nBagaria, Joan (2021). \"Set Theory\" (https://plato.stanford.edu/entries/set-theory/).*The*\n*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 23 September 2022. \nBarnes, Jonathan (25 January 2007).*Truth, etc.: Six Lectures on Ancient Logic*. Clarendon \nPress. p. 274. ISBN 978-0-19-151574-3. \nBenthem, Johan van. \"Modal Logic: Contemporary View: 1. Modal Notions and Reasoning \nPatterns: a First Pass\" (https://iep.utm.edu/modal-lo/#H1).*Internet Encyclopedia of*\n*Philosophy*. Retrieved 11 March 2023. \nBerlemann, Lars; Mangold, Stefan (10 July 2009).*Cognitive Radio and Dynamic Spectrum*\n*Access*. John Wiley & Sons. p. 194. ISBN 978-0-470-75443-6. \nBerman, Harold J. (1 July 2009).*Law and Revolution, the Formation of the Western Legal*\n*Tradition*. Harvard University Press. ISBN 978-0-674-02085-6. \nBimbo, Katalin (2 April 2016).*J. Michael Dunn on Information Based Logics*. Springer. \npp. 8–9. ISBN 978-3-319-29300-4. \nBlackburn, Simon (1 January 2008). \"argument\".*The Oxford Dictionary of Philosophy*(http \ns://www.oxfordreference.com/view/10.1093/oi/authority.20110803095423356). Oxford \nUniversity Press. ISBN 978-0-19-954143-0. Archived (https://web.archive.org/web/2022010 \n8194756/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803095423356) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nBlackburn, Simon (24 March 2016). \"rule of inference\".*The Oxford Dictionary of Philosophy*\n(https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990). Oxford \nUniversity Press. ISBN 978-0-19-954143-0. Archived (https://web.archive.org/web/2022010 \n8194809/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nBlair, J. Anthony; Johnson, Ralph H. (1987). \"The Current State of Informal Logic\" (https://ph \nilpapers.org/rec/BLATCS).*Informal Logic*.**9**(2): 147–51. doi:10.22329/il.v9i2.2671 (https://d \noi.org/10.22329%2Fil.v9i2.2671). Archived (https://web.archive.org/web/20211230194638/ht \ntps://philpapers.org/rec/BLATCS) from the original on 30 December 2021. Retrieved \n2 January 2022.", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed8.pdf", - "query": "What was the mean correctness score for LLM-generated handoff notes ?", - "target_page": 7, - "target_passage": "Correctness 4.52", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "unique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested \n\n\n \n \n \n \n [html]βaULM ‐ generatedPhysician - writtenMean score ( SD )Likert rating 1 - 5, No. (%) aMean score ( SD )Likert rating 1 - 5, No. (%) a\n
123AS12345
Completeness4.00 ( 0.88 )012 ( 8 )31 ( 20.7 )69 ( 46 )38 ( 25.3 )4.16 ( 0.84 )03 ( 2 )31 ( 20.7 )48 ( 32 )68 ( 45.3 )
Curation4.24 ( 0.58 )01 ( 0.7 )13 ( 8.7 )85 ( 56.7 )51 ( 34 )4.76 ( 0.48 )006 ( 4 )39 ( 26 )105 ( 70 )
Readability4.00 ( 0.64 )08 ( 5.3 )17 ( 11.3 )87 ( 58 )38 ( 25.3 )4.64 ( 0.49 )005 ( 3.3 )38 ( 25.3 )107 ( 71.3 )
Correctness4.52 ( 0.64 )0013 ( 8.7 )39 ( 26 )98 ( 65.3 )4.90 ( 0.39 )002 ( 1.3 )12 ( 8 )136 ( 90.7 )
Usefulness4.04 ( 0.86 )012 ( 8 )30 ( 20 )59 ( 39.3 )49 ( 32.7 )4.36 ( 0.71 )05 ( 3.3 )13 ( 8.7 )53 ( 35.3 )79 ( 52.7 )
", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "**Original Investigation | Emergency Medicine**\nDeveloping and Evaluating Large Language Model–Generated Emergency Medicine \nHandoff Notes \n\nVince Hartman, MS; Xinyuan Zhang, PhD; Ritika Poddar, MS; Matthew McCarty, MD; Alexander Fortenko, MD, MPH; Evan Sholle, MS; Rahul Sharma, MD, MBA; \nThomas Campion Jr, PhD; Peter A. D. Steel, MA, MBBS \n\n**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n\n**EXPOSURE**LLM-generated EM handoff notes. \n\n**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. \n\n\n \n \n \n \n [html]( EM )- to - inpatient ( IP ) handoff notes that scale for EM care )Eindinasteria, buthin cohort ribioficients, but therapy, but therapy, but therapy, peripherapy, peripherapy, peripherapy, peripheral, peripheral, peripherapy, peripherapy, peripheral, peripheral, peripheral, peripheral, pEM patient medical records using a novel scaling fromounicals, etc.LLM - generated EM - to - IP handoff notes had a mean usefulness of 4.04 out of 5 ( compared with 4.35 forobvoirian - written ) andameannatientsafety of 4.06 out of 5 ( compared with4.50 for physician - written ) with no rritical natient safety risksMeaning These findings suggest thevalue of a manual, patient safety -focused clinical evaluation of LLMmodels and the potential ofLLM - generated handoff notes to create a new standard of care in EM.\n
Question Can a large language model ( 11 M ) Renerate emergency medicine
\n\n**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness \n\n**Open Access.**This is an open access article distributed under the terms of the CC-BY License. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine**\n\ncuration (4.24 [0.58] vs 4.76 [0.48]), readability (4.00 [0.64] vs 4.64 [0.49]), correctness (4.52 \n\n[0.64] vs 4.90 [0.39]), and patient safety (4.06 [0.86] vs 4.50 [0.56]). \n\nIn extrapolating the estimated worst-case scenario impact of these performance gaps on \n\npatient safety, the 3 expert clinicians determined none of the identified model performance issues \n\nwere anticipated to create a level 1 (life-threatening) safety event (see examples of worst case \n\nscenarios in eTable 2 in Supplement 1). While the incompleteness and faulty logic identified in the \n\nautomated summaries received mean (SD) safety scores of 4.20 (0.93) and 4.60 (0.75), respectively; \n\n13 (8.7%) and 11 (7.3%) of these events, respectively, were determined to have the potential to create \n\na level 2 patient safety event following EM-to-IP handoff, substantially higher compared with the \n\nphysician-written summaries (0%). All of the 5 hallucinations had patient safety scores between 4 \n\nand 5 and a mean (SD) score of 4.96 (0.14), which is defined as the hallucinations posing mild to no \n\npatient safety risk. LLM-generated notes demonstrated a higher rate of incorrectness (9.6%) \n\ncompared with the physician-written notes (2.0%), although very few hallucinations. \n\nICC were 0.79 for completeness, 0.70 for curation, 0.59 for readability, 0.76 for correctness, \n\nand 0.74 for usefulness. These numbers suggest good reliability of agreement for completeness, \n\ncuration, correctness, and usefulness and suggest fair reliability for readability among the 3 raters. \n\n**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine**\n\nsubsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written \n\nnote and (2) the LLM-generated note. \n\nOn a Likert scale of 1 to 5, where 1 is unacceptable and 5 is excellent, the 3 physicians rated the \n\ncompleteness, curation, readability, and correctness of the summary as shown in eTable 1 in \n\nSupplement 1. Physicians rated the usefulness of the summary, defined as the capability of the \n\nsummary being incorporated into a workflow where a physician would make edits before final \n\ncompletion, mitigating potential future self-referential learning loops and the downstream adverse \nconsequences.51 Likewise, the raters assessed potential patient safety implications of unmitigated \nmodel errors using a scale from 1 to 5, where 1 denotes life-threatening risks and 5 denotes no \n\nidentified patient safety risk for completeness, curation, readability, and the 4 subcategories within \n\ncorrectness (hallucination, faulty logic, knowledge gap, and bias), as well as the overall patient safety \nrisk.45 Evaluators arrived at prestudy consensus that a usefulness Likert score of at least a 3 out of 5 \nindicated that the LLM-generated summary likely demonstrated baseline acceptability for such a \n\nworkflow. To extrapolate a theoretical worst case scenario, the physicians rated the safety of the \n\nLLM-generated summary as defined as the capability of the summary to fully replace a physician- \n\nwritten note (unmitigated). \n\nTo improve consistency and agreement, the 3 reviewers met to familiarize themselves with the \n\nframework and evaluated 10 separate cases from the test dataset that were not included in the \n\nclinical evaluation results. Additionally, after independently scoring the summaries, they met to \n\nensure consensus interpretation of the multidimensional scoring framework. Interrater reliability was \n\ncalculated using intraclass correlation coefficient (ICC), using a 2-way random effects model for \n\nconsistency with the Pingouin statistical package version 0.5.4 in Python (Python Software \n\nFoundation). The ICC measures the similarity of the 3 raters to confirm the consistency and validity \n\nof the evaluation protocol; the scores are from 0 to 1, where 1 indicates unanimous agreement and 0 \nrepresents no agreement.52 Data were analyzed from October 2023 to March 2024. \n\n**Results**\n\n**Automated Tasks**\nOf 1600 patients, the mean (SD) age was 59.8 (18.9) years and 832 (52%) were female. In**Table 2**, \n\nROUGE and BERTScore compare the summaries with the testing set from our annotations, and \n\nSCALE score compares the summaries with the source notes. From automatic evaluation results, we \n\nobserved that LLM-generated summaries had better scores than the physician summaries, such that \n\nROUGE-2 was 0.322 vs 0.088, BERT-precision was 0.859 vs 0.796, and SCALE was 0.691 vs 0.456, \n\nsuggesting the LLM-generated summaries were more similar and more detailed than the physician \n\nsummaries. \n\n**Clinical Evaluation Tasks**\nThe clinical evaluation results for LLM-generated summaries and physician-written summaries are \n\nshown in**Table 3**and**Table 4**. The mean clinical quality scores of the automated summaries are in a \n\ncomparable range (4-5) to those of the physician summaries. However, the automated summaries \n\nwere observed to be of lower quality compared with the physician-written summaries with regards \n\nto mean (SD) usefulness (4.04 [0.85] vs 4.36 [0.71]), completeness (4.00 [0.88] vs 4.16 [0.84]),", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nrecords and perform manual comparative evaluations of 50 LLM-generated and 50 clinician- \n\ngenerated summary notes within the context of complex ED encounters. This approach is unlikely \n\nscalable, invoking complex postimplementation governance questions that remain unanswered in \n\nthe medical literature and invoke the need for future research focused on the possibility of AI \nperforming the clinical evaluations.56 Lastly, the relatively infrequent but potentially significant \npatient safety implications of model output incorrectness and incompleteness warrants further \n\nmodel refinement and repeat clinical evaluation, as described in the eAppendix 1 in Supplement 1 \n\noverview of our rigorous preimplementation model development and testing framework. \n\n**Conclusions**\n\nThis study’s results suggest promise for future thoughtful integration of LLM-generated EM-to-IP \n\nhandoff notes into clinical admission workflows, as well as the associated potential downstream \n\nquality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective \n\npreimplementation strategy to measure potential patient safety implications of incorrectness \n\nidentified in LLM-generated clinical care summaries, which will guide future model refinement and \n\nimplementation strategies. In the absence of a current written standard of care in EM, this innovation \n\ncould represent a transformative advancement in the quality of EM-to-IP transitions of care. \n\n**ARTICLE INFORMATION**\n**Accepted for Publication:**October 7, 2024.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nAbstract (continued) \n\nand safety via a novel evaluation framework. This study suggests the importance of a physician-in- \n\nloop implementation design for this model and demonstrates an effective strategy to measure \n\npreimplementation patient safety of LLM models. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 \n\n**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, \n\nEHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. \n\nIn recent years there has been an accelerated interest in using LLMs to automate clinical tasks \nin an effort to unburden physicians and reduce burnout.22 Computer-generated text within clinical \nnotes using natural language processing (NLP) have been overall shown to improve note completion \nrates, physician satisfaction, and patient outcomes.23 Since 2018, NLP has made rapid advancements \nin health care with the discovery of the transformer model architecture, the building block of large \nlanguage models (LLMs). LLMs can automate workflows such as discharge summaries,24 radiology \nreports,25 patient messaging,26 after-visit summaries,27 and ambient dictation28 with various levels \nof perceived quality in each workflow.29 LLMs are particularly effective at summarizing large \nunstructured clinical datasets, such as ED patient medical records.30 A common concern of LLMs is \ntheir ability to hallucinate data, or LLMs generating output text that is not factually consistent with \nthe original source content.31 Much work has been done in health care to reduce hallucinations \nthrough building larger-parameter models trained on trillions of datasets, and then instruction fine- \ntuning the LLM on smaller, well-curated datasets.32,33 LLMs can also be designed with explainability \nby citing inferred content back to the reference source notes.34 For short-context length notes, using \nfew-shot prompt engineering approaches with large language models like GPT-4 can produce", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Evaluation**\nIt is critical to ensure that AI systems are safe, ethical, and without bias in the clinical domain. For the \n\nproposed approach, we performed comprehensive automatic evaluations and a novel, rigorous, \n\npatient safety-focused clinical evaluation. The unique clinical evaluation framework was designed to \n\n(1) screen for and identify the common, specific correctness issues in LLMs observed in longform \n\nclinical summarization and (2) assess the potential patient safety implications associated with any \n\nincorrectness identified using a modified version of the World Health Organization’s International \nClassification for Patient Safety.45 \n\n**Automated Evaluations**\nWe used the summarization evaluation metrics of recall-oriented understudy for gisting evaluation \n(ROUGE),46 bidirectional encoder representations from transformers score (BERTScore),47 and \nsource chunking approach for large-scale inconsistency evaluation (SCALE).48 ROUGE computes the \noverlap of n-grams between the generated and reference summaries. For longform document \n\nsummarization, the following ROUGE scores are considered to be close to the reference summaries: \nROUGE-1, above 0.4; ROUGE-2, above 0.2; and ROUGE-L, above 0.3.46 BERTScore leverages the \npretrained contextual embeddings from BERT and matches words to compute a similarity score for \neach token in the candidate sentence with each token in the reference sentence. We used SCALE,48 a \nnatural language inference–based approach, to measure the faithfulness between the source \n\ndocument and the generated text. Further background is provided about SCALE in eAppendix 2 in \n\nSupplement 1. \n\n**Statistical Analysis**\nBased on prior work, 3 board certified EM physician leaders (M.M., A.F., and P.S.) with experience in \n\nformal quality and patient safety review processes performed retrospective reviews of ED-based \nEHR records of 50 individual ED patient encounters, randomly selected from the test dataset.49 \nBased on prior published clinical evaluations of LLM, as well as the study feasibility of using EM \nphysician quality and patient safety leaders, 50 ED patient encounters were evaluated.50 Reviewers \n\nFigure. Data Flow of Generating Emergency Department (ED) Handoff Summary \n\nHPI \nExtract recent HPI \nEHR data \n\nRegex \nprocessing Regex \nprocessing \nTransition of \ncare notes Consult \nnotes \nCourse of treatment \n\nProgress \nnotes Procedure \nnotes \nSalience selection \n\nLLM 1 \ntransformer \n\nLLM 2 \ntransformer \nRemove duplicates \n\nRegex \nprocessing \n\nRadiology \nresults \nLabs \n\nGet most salient medications and \nlaboratory tests, vitals, consults, and \nimages with pattern-matching rules \n\nRegex \nprocessing \n\nAutomated summary \nHPI: \nPatient is a 64-year-old male with history of alcoholic hepatitis sent in \nfrom urgent care for hypotension in setting of N/V/D 3 days ago, also \nwith fall outside of ED \nEvents: \n• Presented to the ED on January 6, 1972, for hypotension in setting of \nN/V/D 4 days \n\n• On January 7, 1972, patient is to be admitted to medicine SDU \nPlans: \nLaboratory tests: CBC, CMP, trop, cultures, VBG, imaging: CTH. Aggressive \nIVF, monitor. \nDisposition: \nAdmit to medicine-general, intermediate care (stepdown), for dizziness \nMedications: \n• Calcium gluconate-NaCl 2-0.67 GM/100ML-% IV solution 2g \n• Octreotide acetate 100 mcg/mL solution (wrapper): 50mcg \nLabs: \nCBC: Hgb: 4.9 panic (!), Hct: 17.2 panic (!), WBC: 14.13 high (!), platelet: \n174 \nVitals: \n• HR: 105, BP: 94/62, RR: 18, SPO2: 100, temp 97.9F \nConsults: \n• IP consult to gastroenterology", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient \n\n**Methods**\n\n**Data Collection**\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was \n\nconducted at an urban academic 840-bed quaternary-care hospital in New York City, with \n\napproximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600 \n\nindividual EM patient encounters leading to acute hospital admission were randomly selected from \n\nvisits occurring between April and September of 2023. We limited our analysis to EM patient \n\nencounters occurring after April 2023, as the study site had updated the EM-handoff at that time. \n\nEncounters before this date used an earlier version of the EM-handoff note that would have provided \n\nsuboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then \n\ngenerated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants), \n\nWeill Cornell Medicine IRB approved a waiver of informed consent because the study used \n\nretrospective data and posed minimal risk to patients. We used Strengthening the Reporting of \n\nObservational Studies in Epidemiology (STROBE) reporting guidelines. \n\n**EM-to-IP Handoff Note Template**\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff \n\nnote structure used at the study site. The generated EM handoff note consists of components \n\ngenerated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult \n\norders, and radiology impressions) and components generated by the trained abstractive \n\nsummarization model (history of present illness [HPI], differential diagnoses, immediate care plans, \n\nin-ED events, and disposition). Each summary also included a header with the timestamp of ED triage \n\nand discharge, patient’s birth date, patient’s unique identifier, patient’s encounter number, and the \n\ntotal time of patient’s stay in the ED. \n\n**Data Curation for Automated ED Note Generation**\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule- \n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail \n\nin eAppendix 1 in Supplement 1. The rule-based framework was designed by the 3 board certified EM \n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in**Table 1**: \n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The \n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nLLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3 \n\nboard certified emergency medicine physician leaders with experience in formal quality and patient \n\nsafety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and \n\nannotation. As the task of EM-handoff note generation is not dependent on racial characteristics of \n\nthe patients, we removed all mentions of race during the annotation stage as a means to avoid race \n\nbias; therefore, the model was trained to generate text without race-based assumptions. Although \n\nresource intensive, a small and carefully curated dataset of at least 1000 examples has been shown \nto be sufficient to produce remarkable results for the language model chosen.42 Given the size of \nour dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data \n\nplaced in the training set and eschewed a validation set to lower the variance of the models. We used \n\nk-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter \n\noptimization of the LLMs. \n\n**Models**\nFor this study, we chose the LLMs Robustly Optimized BERT Approach (RoBERTa; hereafter referred \nto as LLM 1)43 for saliency content selection and Large Language Model Meta AI 2 (Llama-2; hereafter \nreferred to as LLM 2) 7B44 for abstractive summarization. Further information about the models and \ntechnology specifications is provided in detail in eAppendix 1 in Supplement 1. \n\n**Data Processing**\nAs LLM 2 only has a context size of 4096 tokens,44 we used 2 steps to process the EM notes to both \nshorten the input size while maintaining content salience. First, we adopted a number of heuristic \n\nstrategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2) \n\ntime of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1–based saliency \n\nmodel to infer EM note sentences based on likelihood of content contribution to the EM-to-IP \n\nhandoff notes. \n\n**Model Training and Inference**\nOur summarization model is a fine-tuned decoder-only causal language model based on LLM 2. We \n\nused different prompts for the separate types of summarization: HPI and EM handoff. Additional \n\ninformation about the model training and inference process is provided in eAppendix 1 in \n\nSupplement 1. \n\nUsing a combination of generative AI powered by our fine-tuned LLM 2 model and a set of \n\nheuristic rules, our summarization system produced ED handoff notes with various sections for \n\ndownstream clinical tasks. The inference process is shown in the**Figure**.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" - } - ] - }, - { - "references": { - "source_file": "legal1_opengouvernementlicense.pdf", - "query": "What are the improvements made to possible to the HadGEM3 and CMIP5 climate change models by UKCP18 ?", - "target_page": 1, - "target_passage": "mprovements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n\n\n\n\nWhat is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. \n\nWhat improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. \n\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of \nclimate change on their operations and present proposals for adaptation.**https://www.gov.uk/government/collections/climate-change-**\n**adaptationreporting-second-round-reports**\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the \nCommittee on Climate Change (ASC):**https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate \nchange on their operations and present proposals for adaptation:**https://www.gov.uk/government/collections/climate-change-adaptation-**\n**reporting-second-round-reports**\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate \nchange to be assessed consistently over larger study areas. \n5**http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n6 Coupled model intercomparison project phase 5, see**http://cmip-pcmdi.llnl.gov/cmip5/**\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25, \n5791–5806 (2012)**http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. \n\n**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed.", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "The high-resolution simulations were performed using the HadGEM3A Global Atmosphere \n(GA) 3.0 model [12–14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with \ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of \nthe HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of \nclimate models [12]. This represents the third generation of HadGEM configurations, leading \non from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. \nKey improvements over the previous model, HadGEM2, include increased vertical levels in the \natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. \nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met \nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution \nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher \nresolution [18,19]. \n\nRather than using the original CMIP5 ensemble as in previous studies, the aim is to allow for \nan improved representation of atmospheric and land surface processes including extremes by \nusing higher spatial resolution [11]. \n\n**4**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n\nHadGEM3 (Hadley Centre Global Environment Model version 3) is a configuration of the UK \nMet Office Unified Model (MetUM) which has been developed for use for both climate research \nand weather prediction applications. It is the result of converging the development of the Met \nOffice’s weather and climate global atmospheric model components so that, where possible, \natmospheric processes are modelled or parametrized seamlessly across spatial resolutions and \ntimescales. \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nWe ran the model using only its atmosphere and land components, with time-varying sea- \nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This \napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications \nof the higher resolution for projections of climate extremes and impacts—an atmosphere- \nonly simulation requires considerably less computing time than a coupled ocean–atmosphere \ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in \nregional climate changes by using SSTs and SICs from different climate models. To explore these \nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric \nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5 \nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial \ninfluence on regional patterns of climate change over land, so using a range of SST and SIC \npatterns in a single atmosphere model goes some way towards representing the range of regional \nclimate changes that would arise in a set of different coupled ocean–atmosphere GCMs. This \napproach will not capture the full range of uncertainty affecting regional climate changes over \nland, because it still relies on one atmosphere model and one land surface scheme, so responses \nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions \nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that \nour experimental design avoids the reliance on one single realization of climate and hence allows \nsome of the uncertainties in regional climate-change impacts to be illustrated and explored.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. \n\n**OBSERVATIONS**\n**Annual report: State of the UK Climate. Downloadable data.**\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package, \nbringing the observed data right up to date. This annual update8 covers trends, the multi- \ndecade climate record and significant weather events such as the early July 2015 hot spell \nand the exceptionally mild and wet December of the same year. \n\nQuality controlled UK observational datasets from the Met Office observing network, provided \nat spatial resolutions to match the land projections and for pre-defined administrative regions \nand river basins, will be available under an Open Government Licence9. For variables such as \ntemperature and precipitation these data sets will span the late 19th Century to the present \nday and will be provided for daily, monthly, seasonal, annual and long term averages. \n\n**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. \n\n8 The latest update can be found at**http://www.metoffice.gov.uk/climate/uk/about/state-of-climate**\n9**http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n10**https://www.ipcc.ch/report/ar5/**", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "2. Murphy JM*et al.*2009*UK climate projections science report: climate change projections*. Exeter, UK: \n**26**\nMet Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk. \n\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in \nCopenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference \nof the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ \n11a01.pdf. \n\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, \n30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of \nthe Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ \n10a01.pdf. \n\n5. Hewitson B*et al.*2014 Regional context. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment*\n*report of the Intergovernmental Panel on Climate Change*(eds VR Barros*et al.*), pp. 1133–1197. \nCambridge, UK: Cambridge University Press. \n\n6. Dankers R*et al.*2013 First look at changes in flood hazard in the inter-sectoral impact model \nintercomparison project ensemble.*Proc. Natl Acad. Sci. USA***111**, 3257–3261. (doi:10.1073/ \npnas.1302078110) \n\n7. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al.*), pp. \n1–32. Cambridge, UK: Cambridge University Press. \n8. Schewe J*et al.*2014 Multimodel assessment of water scarcity under climate change.*Proc. Natl*\n*Acad. Sci. USA***111**, 3245–3250. (doi:10.1073/pnas.1222460110) \n\n9. Schleussner C-F*et al.*2015 Differential climate impacts for policy-relevant limits to global \nwarming: the case of 1.5°C and 2°C.*Earth Syst. Dynam. Discuss.***6**, 2447–2505. (doi:10.5194/ \nesdd-6-2447-2015) \n\n10. James R, Washington R, Schleussner C-F, Rogeli J, Conway D. 2017 Characterizing half-a- \ndegree difference: a review of methods for identifying regional climate responses to global \nwarming targets.*WIREs Clim Change***8**, e457. (doi:10.1002/wcc.457) \n11. Haarsma RJ*et al.*2016 High resolution model intercomparison project (HighResMIP v1.0) for \nCMIP6.*Geosci. Model Dev.***9**, 4185–4208. (doi:10.5194/gmd-9-4185-2016) \n\n12. Hewitt HT, Copsey D, Culverwell ID, Harris CM, Hill RSR, Keen AB, McLaren AJ, Hunke \nEC. 2011 Design and implementation of the infrastructure of HadGEM3: the next-generation \nMet Office climate modelling system.*Geosci. Model Dev.***4**, 223–253. (doi:10.5194/gmd-4- \n223-2011). \n13. Martin GM*et al.*2011 The HadGEM2 family of met office unified model climate \n\n30. Wiltshire A, Gornall J, Booth B, Dennis E, Falloon P, Kay G, McNeall D, McSweeney C, \nBetts R. 2013 The importance of population, climate change and CO2 plant physiological \nforcing in determining future global water stress.*Glob. Environ. Change***23**, 1083–1097. \n(doi:10.1016/j.gloenvcha.2013.06.005) \n\n31. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2016 High-end climate change \nimpact on European runoff and low flows – exploring the effects of forcing biases.*Hydrol.*\n*Earth Syst. Sci.***20**, 1785–1808. (doi:10.5194/hess-20-1785) \n32. Milly PCD, Dunne KA. 2016 Potential evapotranspiration and continental drying.*Nat. Clim.*\n*Change***6**, 946–949. (doi:10.1038/nclimate3046) \n\n33. Swann ALS, Hoffman FM, Koven CD, Randerson JT. 2016 Plant responses to increasing \nCO2 reduce estimates of climate impacts on drought severity.*Proc. Natl Acad. Sci. USA***113**, \n10 019–10 024. (doi:10.1073/pnas.1604581113) \n34. Betts RA*et al.*2007 Projected increase in future river runoff through plant responses to carbon \ndioxide rise.*Nature***448**, 1037–1042. (doi:10.1038/nature06045)", - "page_start": 25, - "page_end": 25, - "source_file": "pubmed11.pdf" - }, - { - "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
\n\nHow can I get the information and when? \nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available \nthrough a dedicated website. \n\nA dedicated user interface will provide users with a means to download the data and produce customised \nvisualisations. The exact nature of these outputs is still the subject of consultation with users. \n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the \nlatest information visit: \n**http://ukclimateprojections.metoffice.gov.uk/24125**\n\n*UKCP Project Team*\n\n*July 2017*", - "page_start": 3, - "page_end": 3, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "**23**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–20 –15 –10 –5 \n0 \n% \n5 10 15 20 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n\n**Figure 20.**Difference between 2°C and 1.5°C global warming in percentage changes in mean (top) run-off in JULES simulations \ndriven by the ensemble of HadGEM3 simulations. Note that the use of percentage changes emphasizes changes in regions where \nthe baseline streamflow is small. \n\n. \n. \n. \n\nThe largest regional differences between 2°C and 1.5°C global warming tend to be in the \nregions where the local impact is largest relative to the baseline. For TXx this is generally the mid- \nlatitudes, whereas for TX90p it is generally the tropics. So, broadly, the impacts at 1.5°C global \nwarming could be estimated by scaling-back the impacts at 2°C. \n\nThese results show some similarities with those from the CMIP5 models [9,38], but also some \nnotable differences. The CMIP5 models were at lower spatial resolution than the models used \nhere. Although the general patterns of change in TXx are broadly similar in our study and \nCMIP5, with greater warming in many continental interiors, is notable that our results show more \nmarked geographical variation than those from CMIP5 projections ([9], among others), with the \ncontinental interior warming being more intense in our projections. In particular, our results with \nHadGEM3 show more intense increases in maximum temperature in North America and Europe. \nOur projections of changes in consecutive dry days (CDD) broadly consistent with those found \nin a subset of the CMIP5 ensemble [9], although there are some differences. Our ensemble mean \nsuggests shorter dry spells in the central Amazon, whereas ISIMIP-indicated longer dry spells. \nAlso, as with the temperature indices, our results show greater geographical differentiation in the \nintensity of changes. \n\nThe decrease in Rx5day in some regions in our simulations contrasts with the subset of \nCMIP5 models used for the ISIMIP Fast-Track projections [9] which suggested an increase in \nRx5day almost everywhere where at least 66% of the model ensemble agreed on the sign of the \nchange, including all of northern South America. The reasons for these differences require further \ninvestigation, but some insight into possible reasons may be gained by examining the similarities \nand differences between our own individual ensemble members. \n\nFor all the CLIMPAct variables, the variations in global means between the ensemble members \nwere consistent at 1.5°C and 2°C. That is, the members with the largest changes at 2°C also showed \nthe largest changes at 1.5°C, and the same was true for the smallest changes, and the relative \nproportions of changes in other ensemble members. This suggests that variations between the \nensemble members at any particular GWL were not merely a consequence of internal variability", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed11.pdf" - }, - { - "text": "In the present study, processing errors in the input data for one ensemble member, the \nHadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the \nHCVI are, therefore, not presented here. \n\n**7**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n\n(d) Freshwater resources: run-off \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nImpacts on freshwater were assessed with a version of the JULES land surface model [24,25], a \ncoupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes \nof water, energy and carbon in an internally consistent way, typically applied at global scales. \nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System \nModels [26,27] and have been used to assess impacts of climate change on global terrestrial \necosystems and hydrology [28–30] within such models. JULES can also be used outside of the \nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of \na wider range of climate projections [6,8]. Here we use a new, higher-resolution configuration of \nJULES on a global grid of 0.5° resolution [31]. \n\nIt has been noted that hydrological impacts models driven by climate-change projections \nfrom climate models tend to give more severe drying than simulated in the climate models \nthemselves [32–34]. This is largely attributed to the inclusion of plant stomatal closure in \nresponse to elevated CO2 in the climate model land surface schemes, which generally reduces \nevapotranspiration relative to climate projections without this process and hence further increases \nrun-off/streamflow or ameliorates decreases [34]. This process is often omitted from standard \nhydrological models. Plant physiological responses to CO2 are included in the JULES model, so \nour projections of changes in run-off here do account for this process. \n\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to \nthe effects of climate change and CO2 rise on precipitation, evaporation and transpiration. We \nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to \npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for \nthe lowest 10% of time). \n\n(e) Correcting biases in climate model output and implications for defining levels of global \n\nwarming \n\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed \nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there \nwere some differences in how these data were applied, with different approaches to the treatment \nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered \nimportant to assess changes in the raw climate model output, because this directly represents \nthe behaviour of the model itself. The main focus was on the changes relative to the present- \nday baseline climate, defined as 1981–2010, with absolute values in either the baseline or the \nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off \nanalyses, however, it was considered important to correct for systematic biases in the climate \nmodel output, because these can lead to unrealistic representations of the key quantities in the \npresent-day simulation [35]. A bias-correction methodology was, therefore, applied for these two \nparts of the analysis, whereby the model output was adjusted to make it consistent with an \nobserved climatology [36]. We used a multi-segment statistical bias-correction methodology for \nprecipitation [37], and a modification of this for other variables [37].", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "**5**\n\n\n \n \n \n \n [html]\n
IDdefinitionunitssector of relevance
TXxannual maximum daily maximum temperature° Chealth, agriculture and food security
TX90ppercentage of days above the 90th percentile of daily maximum temperature in the 1981 – 2010 average%health, agriculture and food security, water resources and hydrology
CDDmaximum number of consecutive days with precipitation less than 1 mmdayshealth, agriculture and food security, water resources and hydrology
RX5daymaximum consecutive 5 day precipitationmmhealth, agriculture and food security, water resources and hydrology
\n\nmembers at any given date. Since specific levels of global warming such as 1.5°C or 2°C were \nreached at different times in the different ensemble members, according to the SST forcings used, \nany given level of global warming could be associated with different radiative forcings in different \nensemble members. In any given ensemble member at any specific level of global warming, the \nCO2 concentration and SSTs were the same as in the driving CMIP5 model at that GWL. Land \ncover was fixed in this simulation—there was no dynamic vegetation nor any time-dependent \nanthropogenic land use change. \nSome comparison of the higher-resolution atmospheric simulations with the original CMIP5 \nsimulations, is provided by Wyser*et al.*[20]. \n\n(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index \n\nTo assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. \n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
driving SSTs1.5 ° C2.0 ° C
IPSL - CM5A - LR20152030
GFDL - ESM2M20402055
HadGEM2 - ES20272039
IPSL - CM5A - MR20202034
MIR0C - ESM - CHEM20232035
ACCESS1 – 020342046
\n\n**Table 3.**Time of reaching GWLs of 1.5°C and 2°C in the raw output from the HadGEM3 climate simulations, driven by different \nsets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied \nto the calculation of the ClimPACT indices. \n\n**8**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nup to present-day plus model-projected warming thereafter (table 4). While this does lead to \ninconsistent definitions of dates of the GWLs for applications of the climate model output with \nand without bias correction, the focus here is on the level of warming relative to pre-industrial \nrather than the timing of this warming. Therefore, priority is given to an accurate quantification \nof GWLs in all parts of the study, at the expense of inconsistencies in the dates of these warming \nlevels. The inconsistency between the dates of the GWLs ranged from 2 to 9 years depending on \nthe model and warming level. This inconsistency would have consequences if these results were \napplied to time-dependent impacts and adaptation assessments, but that is not the case here so \nthis concern does not apply. However, one issue is that the time-dependent nature of the aerosol \nforcing means that the spatial pattern of regional climate responses varies over time, so this will \nlead to some degree of inconsistency between the analysis of the ClimPACT extremes and the \nHCVI and JULES impacts projections. \n\n3. Results \n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the \nlevel of agreement between models for a particular projected change, and hence an indication \nof potential robustness of the projected changes for informing adaptation. We then make a \ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would \nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in \nregional climate outcomes, we address this in a number of ways. For individual realizations, we \ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C, \neven if the sign of the change is uncertain. We also compare the range of outcomes at different \nGWLs, to see if the regional-scale uncertainty itself increases with global warming. \n\n(a) Climate-change impacts at 2°C global warming", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "legal1_opengouvernementlicense.pdf", - "query": "Which causes of the rise of sea level will be considered by UKCP18 ?", - "target_page": 2, - "target_passage": "Sea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. \n\n**OBSERVATIONS**\n**Annual report: State of the UK Climate. Downloadable data.**\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package, \nbringing the observed data right up to date. This annual update8 covers trends, the multi- \ndecade climate record and significant weather events such as the early July 2015 hot spell \nand the exceptionally mild and wet December of the same year. \n\nQuality controlled UK observational datasets from the Met Office observing network, provided \nat spatial resolutions to match the land projections and for pre-defined administrative regions \nand river basins, will be available under an Open Government Licence9. For variables such as \ntemperature and precipitation these data sets will span the late 19th Century to the present \nday and will be provided for daily, monthly, seasonal, annual and long term averages. \n\n**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. \n\n8 The latest update can be found at**http://www.metoffice.gov.uk/climate/uk/about/state-of-climate**\n9**http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n10**https://www.ipcc.ch/report/ar5/**", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "**UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n\n\n\n\nWhat is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. \n\nWhat improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. \n\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of \nclimate change on their operations and present proposals for adaptation.**https://www.gov.uk/government/collections/climate-change-**\n**adaptationreporting-second-round-reports**\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the \nCommittee on Climate Change (ASC):**https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate \nchange on their operations and present proposals for adaptation:**https://www.gov.uk/government/collections/climate-change-adaptation-**\n**reporting-second-round-reports**\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate \nchange to be assessed consistently over larger study areas. \n5**http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n6 Coupled model intercomparison project phase 5, see**http://cmip-pcmdi.llnl.gov/cmip5/**\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25, \n5791–5806 (2012)**http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "2. Murphy JM*et al.*2009*UK climate projections science report: climate change projections*. Exeter, UK: \n**26**\nMet Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk. \n\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in \nCopenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference \nof the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ \n11a01.pdf. \n\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, \n30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of \nthe Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ \n10a01.pdf. \n\n5. Hewitson B*et al.*2014 Regional context. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment*\n*report of the Intergovernmental Panel on Climate Change*(eds VR Barros*et al.*), pp. 1133–1197. \nCambridge, UK: Cambridge University Press. \n\n6. Dankers R*et al.*2013 First look at changes in flood hazard in the inter-sectoral impact model \nintercomparison project ensemble.*Proc. Natl Acad. Sci. USA***111**, 3257–3261. (doi:10.1073/ \npnas.1302078110) \n\n7. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al.*), pp. \n1–32. Cambridge, UK: Cambridge University Press. \n8. Schewe J*et al.*2014 Multimodel assessment of water scarcity under climate change.*Proc. Natl*\n*Acad. Sci. USA***111**, 3245–3250. (doi:10.1073/pnas.1222460110) \n\n9. Schleussner C-F*et al.*2015 Differential climate impacts for policy-relevant limits to global \nwarming: the case of 1.5°C and 2°C.*Earth Syst. Dynam. Discuss.***6**, 2447–2505. (doi:10.5194/ \nesdd-6-2447-2015) \n\n10. James R, Washington R, Schleussner C-F, Rogeli J, Conway D. 2017 Characterizing half-a- \ndegree difference: a review of methods for identifying regional climate responses to global \nwarming targets.*WIREs Clim Change***8**, e457. (doi:10.1002/wcc.457) \n11. Haarsma RJ*et al.*2016 High resolution model intercomparison project (HighResMIP v1.0) for \nCMIP6.*Geosci. Model Dev.***9**, 4185–4208. (doi:10.5194/gmd-9-4185-2016) \n\n12. Hewitt HT, Copsey D, Culverwell ID, Harris CM, Hill RSR, Keen AB, McLaren AJ, Hunke \nEC. 2011 Design and implementation of the infrastructure of HadGEM3: the next-generation \nMet Office climate modelling system.*Geosci. Model Dev.***4**, 223–253. (doi:10.5194/gmd-4- \n223-2011). \n13. Martin GM*et al.*2011 The HadGEM2 family of met office unified model climate \n\n30. Wiltshire A, Gornall J, Booth B, Dennis E, Falloon P, Kay G, McNeall D, McSweeney C, \nBetts R. 2013 The importance of population, climate change and CO2 plant physiological \nforcing in determining future global water stress.*Glob. Environ. Change***23**, 1083–1097. \n(doi:10.1016/j.gloenvcha.2013.06.005) \n\n31. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2016 High-end climate change \nimpact on European runoff and low flows – exploring the effects of forcing biases.*Hydrol.*\n*Earth Syst. Sci.***20**, 1785–1808. (doi:10.5194/hess-20-1785) \n32. Milly PCD, Dunne KA. 2016 Potential evapotranspiration and continental drying.*Nat. Clim.*\n*Change***6**, 946–949. (doi:10.1038/nclimate3046) \n\n33. Swann ALS, Hoffman FM, Koven CD, Randerson JT. 2016 Plant responses to increasing \nCO2 reduce estimates of climate impacts on drought severity.*Proc. Natl Acad. Sci. USA***113**, \n10 019–10 024. (doi:10.1073/pnas.1604581113) \n34. Betts RA*et al.*2007 Projected increase in future river runoff through plant responses to carbon \ndioxide rise.*Nature***448**, 1037–1042. (doi:10.1038/nature06045)", - "page_start": 25, - "page_end": 25, - "source_file": "pubmed11.pdf" - }, - { - "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
\n\nHow can I get the information and when? \nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available \nthrough a dedicated website. \n\nA dedicated user interface will provide users with a means to download the data and produce customised \nvisualisations. The exact nature of these outputs is still the subject of consultation with users. \n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the \nlatest information visit: \n**http://ukclimateprojections.metoffice.gov.uk/24125**\n\n*UKCP Project Team*\n\n*July 2017*", - "page_start": 3, - "page_end": 3, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "References \n1. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al*.), pp. \n1–32. Cambridge, UK: Cambridge University Press.", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed11.pdf" - }, - { - "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. \n\n**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed.", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "(ii) What regional climate conditions and related hydrological and ecological conditions \ncould occur at a particular level of global warming, such as 2°C? This is relevant to \nadaptation policy and planning—exploring the possible outcomes for these levels of \nwarming will help facilitate adaptation and improved resilience to account for a 1.5°C or \n2°C world. It is recognized that many adaptation decisions require information on timing \nof specific impacts or risks, but nevertheless, framing regional impacts assessments in \nterms of associated global warming levels (GWLs) may help provide context of the levels \nof climate change that may be avoidable or unavoidable (and hence require adaptation).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "35. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2017 The effect of GCM biases \non global runoff simulations of a land surface model.*Hydrol. Earth Syst. Sci.***21**, 4379–4401. \n(doi:10.5194/hess-21-4379-2017) \n\n36. Sheffield J, Goteti G, Wood EF. 2006 Development of a 50-year high-resolution global \ndataset of meteorological forcings for land surface modeling.*J. Climate***19**, 3088–3111. \n(doi:10.1175/JCLI3790.1) \n\n37. Grillakis MG, Koutroulis AG, Tsanis IK. 2013 Multisegment statistical bias correction of daily \nGCM precipitation output.*J. Geophys. Res. Atmos.***118**, 3150–3162. (doi:10.1002/jgrd.50323) \n38. Wartenburger R, Hirschi M, Donat MG, Greve P, Pitman AJ, Seneviratne SI. 2017 Changes in \nregional climate extremes as a function of global mean temperature: an interactive plotting \nframework.*Geosci. Model Dev.***10**, 3609–3634. (doi:10.5194/gmd-10-3609-2017) \n39. Mitchell D, James R, Forster PM, Betts RA, Shiogama H, Allen M. 2016 Realizing the impacts \nof a 1.5°C warmer world.*Nat. Clim. Change***6**, 735–737. (doi:10.1038/nclimate3055) \n40. Cox P*et al.*2008 Increase risk of Amazonian drought due to decreasing aerosol pollution. \n*Nature***453**, 212–216. (doi:10.1038/nature06960) \n\n41. Betts RA, Cox PM, Collins M, Harris PP, Huntingford C, Jones CD. 2004 The role of \necosystem-atmosphere interactions in simulated Amazonian precipitation decrease and forest \ndieback under global climate warming.*Theor. Appl. Climatol.***78**, 157–175. (doi:10.1007/ \ns00704-004-0050-y) \n\n42. Skinner CB, Poulsen CJ, Chadwick R, Diffenbaugh NS, Fiorella RP. 2017 The role of CO2 \nplant physiological forcing in shaping future daily-scale precipitation.*J. Climate***30**, 2319–2340. \n(doi:10.1175/JCLI-D-16-0603.1)", - "page_start": 25, - "page_end": 25, - "source_file": "pubmed11.pdf" - }, - { - "text": "**5**\n\n\n \n \n \n \n [html]\n
IDdefinitionunitssector of relevance
TXxannual maximum daily maximum temperature° Chealth, agriculture and food security
TX90ppercentage of days above the 90th percentile of daily maximum temperature in the 1981 – 2010 average%health, agriculture and food security, water resources and hydrology
CDDmaximum number of consecutive days with precipitation less than 1 mmdayshealth, agriculture and food security, water resources and hydrology
RX5daymaximum consecutive 5 day precipitationmmhealth, agriculture and food security, water resources and hydrology
\n\nmembers at any given date. Since specific levels of global warming such as 1.5°C or 2°C were \nreached at different times in the different ensemble members, according to the SST forcings used, \nany given level of global warming could be associated with different radiative forcings in different \nensemble members. In any given ensemble member at any specific level of global warming, the \nCO2 concentration and SSTs were the same as in the driving CMIP5 model at that GWL. Land \ncover was fixed in this simulation—there was no dynamic vegetation nor any time-dependent \nanthropogenic land use change. \nSome comparison of the higher-resolution atmospheric simulations with the original CMIP5 \nsimulations, is provided by Wyser*et al.*[20]. \n\n(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index \n\nTo assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. \n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "Research \n\n**Cite this article:**Betts RA et al. 2018 Changes \nin climate extremes, fresh water availability \nand vulnerability to food insecurity projected \nat 1.5°C and 2°C global warming with a \nhigher-resolution global climate model. Phil. \nTrans. R. Soc. A**376**: 20160452. \nhttp://dx.doi.org/10.1098/rsta.2016.0452 \n\nAccepted: 13 February 2018 \n\nOne contribution of 20 to a theme issue ‘The \nParis Agreement: understanding the physical \nand social challenges for a warming world of \n1.5°C above pre-industrial levels’. \n\n**Subject Areas:**\nclimatology, hydrology \n\n**Keywords:**\n1.5°C, Paris Agreement, 2°C, global climate \nimpacts, water resources, terrestrial \necosystems \n\n**Author for correspondence:**\nRichard A. Betts \ne-mail: richard.betts@metoffice.gov.uk \n\n\n\nChanges in climate extremes, \nfresh water availability and \nvulnerability to food insecurity \nprojected at 1.5°C and 2°C \nglobal warming with a \nhigher-resolution global \nclimate model \nRichard A. Betts1,2, Lorenzo Alfieri3, Catherine \nBradshaw2, John Caesar2, Luc Feyen3, Pierre \nFriedlingstein4, Laila Gohar2, Aristeidis Koutroulis5, \nKirsty Lewis2, Catherine Morfopoulos1, Lamprini \nPapadimitriou5,6, Katy J. Richardson2, Ioannis Tsanis5 \nand Klaus Wyser7 \n\n1College of Life and Environmental Sciences, University of Exeter, \nExeter EX4 4PS, UK \n2Met Office Hadley Centre, FitzRoy Road, Exeter EX1 3PB, UK \n3European Commission – Joint Research Centre, 21027 Ispra, Italy \n4College of Engineering, Mathematics and Physical Sciences, \nUniversity of Exeter, Exeter EX4 4QE, UK \n5School of Environmental Engineering, Technical University of \nCrete—TUC, Chania 73100, Greece \n6Cranfield Water Science Institute, Cranfield University, Cranfield \nMK43 0AL, UK \n7Rossby Centre, SMHI, 601 76 Norrköping, Sweden \n\nRAB, 0000-0002-4929-0307 \n\nextremes, \nin weather \nWe \nhydrological \nimpacts and vulnerability to food \ninsecurity at global warming of 1.5°C and 2°C relative \nto pre-industrial, using a new global atmospheric \ngeneral circulation model HadGEM3A-GA3.0 driven \nby patterns of sea-surface temperatures and sea \nthe 5th Coupled \nice from selected members of \n\nprojected changes \n\n2018 The Authors. Published by the Royal Society under the terms of the \nCreative Commons Attribution License http://creativecommons.org/licenses/ \nby/4.0/, which permits unrestricted use, provided the original author and \nsource are credited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "legal1_opengouvernementlicense.pdf", - "query": "What perdiod is covered by the 12 km resolution projection data of the UKCP18 ?", - "target_page": 4, - "target_passage": "1981-2080", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "**UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n\n\n\n\nWhat is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. \n\nWhat improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. \n\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of \nclimate change on their operations and present proposals for adaptation.**https://www.gov.uk/government/collections/climate-change-**\n**adaptationreporting-second-round-reports**\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the \nCommittee on Climate Change (ASC):**https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate \nchange on their operations and present proposals for adaptation:**https://www.gov.uk/government/collections/climate-change-adaptation-**\n**reporting-second-round-reports**\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate \nchange to be assessed consistently over larger study areas. \n5**http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n6 Coupled model intercomparison project phase 5, see**http://cmip-pcmdi.llnl.gov/cmip5/**\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25, \n5791–5806 (2012)**http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. \n\n**OBSERVATIONS**\n**Annual report: State of the UK Climate. Downloadable data.**\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package, \nbringing the observed data right up to date. This annual update8 covers trends, the multi- \ndecade climate record and significant weather events such as the early July 2015 hot spell \nand the exceptionally mild and wet December of the same year. \n\nQuality controlled UK observational datasets from the Met Office observing network, provided \nat spatial resolutions to match the land projections and for pre-defined administrative regions \nand river basins, will be available under an Open Government Licence9. For variables such as \ntemperature and precipitation these data sets will span the late 19th Century to the present \nday and will be provided for daily, monthly, seasonal, annual and long term averages. \n\n**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. \n\n8 The latest update can be found at**http://www.metoffice.gov.uk/climate/uk/about/state-of-climate**\n9**http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n10**https://www.ipcc.ch/report/ar5/**", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. \n\n**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed.", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
\n\nHow can I get the information and when? \nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available \nthrough a dedicated website. \n\nA dedicated user interface will provide users with a means to download the data and produce customised \nvisualisations. The exact nature of these outputs is still the subject of consultation with users. \n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the \nlatest information visit: \n**http://ukclimateprojections.metoffice.gov.uk/24125**\n\n*UKCP Project Team*\n\n*July 2017*", - "page_start": 3, - "page_end": 3, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "2. Murphy JM*et al.*2009*UK climate projections science report: climate change projections*. Exeter, UK: \n**26**\nMet Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk. \n\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in \nCopenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference \nof the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ \n11a01.pdf. \n\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, \n30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of \nthe Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ \n10a01.pdf. \n\n5. Hewitson B*et al.*2014 Regional context. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment*\n*report of the Intergovernmental Panel on Climate Change*(eds VR Barros*et al.*), pp. 1133–1197. \nCambridge, UK: Cambridge University Press. \n\n6. Dankers R*et al.*2013 First look at changes in flood hazard in the inter-sectoral impact model \nintercomparison project ensemble.*Proc. Natl Acad. Sci. USA***111**, 3257–3261. (doi:10.1073/ \npnas.1302078110) \n\n7. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al.*), pp. \n1–32. Cambridge, UK: Cambridge University Press. \n8. Schewe J*et al.*2014 Multimodel assessment of water scarcity under climate change.*Proc. Natl*\n*Acad. Sci. USA***111**, 3245–3250. (doi:10.1073/pnas.1222460110) \n\n9. Schleussner C-F*et al.*2015 Differential climate impacts for policy-relevant limits to global \nwarming: the case of 1.5°C and 2°C.*Earth Syst. Dynam. Discuss.***6**, 2447–2505. (doi:10.5194/ \nesdd-6-2447-2015) \n\n10. James R, Washington R, Schleussner C-F, Rogeli J, Conway D. 2017 Characterizing half-a- \ndegree difference: a review of methods for identifying regional climate responses to global \nwarming targets.*WIREs Clim Change***8**, e457. (doi:10.1002/wcc.457) \n11. Haarsma RJ*et al.*2016 High resolution model intercomparison project (HighResMIP v1.0) for \nCMIP6.*Geosci. Model Dev.***9**, 4185–4208. (doi:10.5194/gmd-9-4185-2016) \n\n12. Hewitt HT, Copsey D, Culverwell ID, Harris CM, Hill RSR, Keen AB, McLaren AJ, Hunke \nEC. 2011 Design and implementation of the infrastructure of HadGEM3: the next-generation \nMet Office climate modelling system.*Geosci. Model Dev.***4**, 223–253. (doi:10.5194/gmd-4- \n223-2011). \n13. Martin GM*et al.*2011 The HadGEM2 family of met office unified model climate \n\n30. Wiltshire A, Gornall J, Booth B, Dennis E, Falloon P, Kay G, McNeall D, McSweeney C, \nBetts R. 2013 The importance of population, climate change and CO2 plant physiological \nforcing in determining future global water stress.*Glob. Environ. Change***23**, 1083–1097. \n(doi:10.1016/j.gloenvcha.2013.06.005) \n\n31. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2016 High-end climate change \nimpact on European runoff and low flows – exploring the effects of forcing biases.*Hydrol.*\n*Earth Syst. Sci.***20**, 1785–1808. (doi:10.5194/hess-20-1785) \n32. Milly PCD, Dunne KA. 2016 Potential evapotranspiration and continental drying.*Nat. Clim.*\n*Change***6**, 946–949. (doi:10.1038/nclimate3046) \n\n33. Swann ALS, Hoffman FM, Koven CD, Randerson JT. 2016 Plant responses to increasing \nCO2 reduce estimates of climate impacts on drought severity.*Proc. Natl Acad. Sci. USA***113**, \n10 019–10 024. (doi:10.1073/pnas.1604581113) \n34. Betts RA*et al.*2007 Projected increase in future river runoff through plant responses to carbon \ndioxide rise.*Nature***448**, 1037–1042. (doi:10.1038/nature06045)", - "page_start": 25, - "page_end": 25, - "source_file": "pubmed11.pdf" - }, - { - "text": "The high-resolution simulations were performed using the HadGEM3A Global Atmosphere \n(GA) 3.0 model [12–14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with \ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of \nthe HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of \nclimate models [12]. This represents the third generation of HadGEM configurations, leading \non from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. \nKey improvements over the previous model, HadGEM2, include increased vertical levels in the \natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. \nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met \nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution \nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher \nresolution [18,19]. \n\nRather than using the original CMIP5 ensemble as in previous studies, the aim is to allow for \nan improved representation of atmospheric and land surface processes including extremes by \nusing higher spatial resolution [11]. \n\n**4**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n\nHadGEM3 (Hadley Centre Global Environment Model version 3) is a configuration of the UK \nMet Office Unified Model (MetUM) which has been developed for use for both climate research \nand weather prediction applications. It is the result of converging the development of the Met \nOffice’s weather and climate global atmospheric model components so that, where possible, \natmospheric processes are modelled or parametrized seamlessly across spatial resolutions and \ntimescales. \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nWe ran the model using only its atmosphere and land components, with time-varying sea- \nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This \napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications \nof the higher resolution for projections of climate extremes and impacts—an atmosphere- \nonly simulation requires considerably less computing time than a coupled ocean–atmosphere \ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in \nregional climate changes by using SSTs and SICs from different climate models. To explore these \nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric \nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5 \nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial \ninfluence on regional patterns of climate change over land, so using a range of SST and SIC \npatterns in a single atmosphere model goes some way towards representing the range of regional \nclimate changes that would arise in a set of different coupled ocean–atmosphere GCMs. This \napproach will not capture the full range of uncertainty affecting regional climate changes over \nland, because it still relies on one atmosphere model and one land surface scheme, so responses \nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions \nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that \nour experimental design avoids the reliance on one single realization of climate and hence allows \nsome of the uncertainties in regional climate-change impacts to be illustrated and explored.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "\n \n \n \n \n [html]2121222219.2320.2628283024.3125.3131Category 1 countries and territoriesSCHEDULE 2 — CCategory 2 countries and territoriesCategory 3 countries and territories345055565867687482PART 2Relevant websitesProhibition on the arrival of aircraft and vessels into EnglandAmounts of fixed penaltiesConsequential AmendmentsTransitional provision\n
Records and information16.
Requirement to ensure passengers have completed a Passenger Locator Form17.
Requirement to ensure passengers possess notification of negative test result18.
Requirement to ensure that certain passengers arrive only at designated portsPART 5
Offences, proceedings and informationOffences and penalties
Fixed penalty notices21.
Prosecutions22.
Power to use and disclose information23.
Self - incriminationPART 6
Final provisionsReview of need for requirements
Expiry of Regulations26.
Revocations, transitional provision consequential amendments and savingsSCHEDULES
SCHEDULE 1 — C32
32SCHEDULE 3 — C
32SCHEDULE 4 → Exemptions
SCHEDULE 5 → LList of sporting events
SCHEDULE 6 — PPassenger information
SCHEDULE 7 — TTesting before arrival in England
SCHEDULE 8 —Mandatory testing after arrival in England
SCHEDULE 9 → WWorkforce tests
SCHEDULE 10 − 0Optional testing after arrival in England
SCHEDULE 11 — AAdditional measures applicable to arrivals from category 3 countries and territories
SCHEDULE 12 −− IrInformation for passengers
PART 182
83PART 3
83SCHEDULE 13 — P
84SCHEDULE 14 −
85SCHEDULE 15 — C
88SCHEDULE 16 — T
89
", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**Estimated proportion of OCU population covered by DIP.**\n\n\n \n \n \n \n [html]\n
20052006200720082009201020112012201325
Estimate of DIP ’ s coverage24.50 %94.4 %96.9 %97.4 %94.1 %97.5 %95.8 %98.4 %98.3 %
\n\nThis lends a certain degree of confidence to the findings and suggests that the variation in \ngeographical coverage from 2006 onwards will not bias the findings greatly. However, a few \ncaveats need to be mentioned. \n\ni) The above percentages only excluded LAAs that did not record any cases for the entire \n\nyear. It is possible some LAAs only recorded cases for certain months within a \nparticular year. \n\nii) Many of the findings from the report exclude cases in which no Police National \nComputer (PNC) number was recorded. Looking at the data it is clear that the \nproportion of cases without a PNC number varies across areas. So this will introduce \nsome geographical bias. \n\niii) Using the published OCU figures by LAA to estimate DIP’s geographical coverage \n\ninvolves the assumption that OCUs tend to get arrested in the same area in which they \nlive and receive treatment. \n\n**Supplementary DIP charts, showing age and year-of-birth distributions for the 296,008 PNC**\n**cases with positive opiate/opiate + cocaine tests.**", - "page_start": 40, - "page_end": 40, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Data availability**\nThe historical weather data (1986–2005) that support the analysis with ESMs in this study are publicly available \nonline at https:// data. giss. nasa. gov/ impac ts/ agmip cf/; the future climate scenario data (2006–2099) that support \nthe analysis with ESMs in this study are publicly available online at https:// pcmdi. llnl. gov/? cmip5 and https:// \nesgf- node. llnl. gov/ proje cts/ esgf- llnl/. The spatial data of harvest area, yield, crop calendar, irrigation portion \nand chemical N input for maize that support the simulation with crop model (DSSAT) in this study are publicly \navailable at http:// mapsp am. info/ (SPAM) and http:// www. sage. wisc. edu (SAGE); the soil data that support the \nsimulation with crop model (DSSAT) in this study are publicly available from the WISE database (https:// www. \nisric. online/ index. php/) and the Digital Soil Map of the World (DSMW) (http:// www. fao. org/ land- water/ land/ \nland- gover nance/ land- resou rces- plann ing- toolb ox/ categ ory/ detai ls/ en/c/ 10265 64/). All other relevant data are \navailable from the corresponding authors. \n\n\n \n \n \n \n [html]\n
Species
Alternatives. The consists. Therefolds. Therefolds. Therefolds. They deference systems : mustsis of resistand terms : r ( H10 ) Rechmond such as and emotional
P ‐ Difficult
Derminan, D : VIPS 100.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.0000
Assessment
Global Allobal. Allobal EAF. BB, FITP - 007 ( 2017 ). ( Crommunity ). ( Y ) & B - bibmeter ) $ A reversele of sessions )
0.000
", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed9.pdf" - }, - { - "text": "All rights reserved. No part of this publication may be reproduced or transmitted \n\nin any form or by any means, electronic or mechanical, including photocopying, \n\nrecording, or any information storage or retrieval system, without prior permission in \n\nwriting from the publisher. Subject to any applicable licensing terms and conditions in \n\nthe case of electronically supplied publications, a person may engage in fair dealing \n\nwith a copy of this publication for his or her personal or private use, or his or her \n\nresearch or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978. \n\nThe authors and the publisher have made every effort to obtain permission for and \n\nto acknowledge the use of copyright material. Should any infringement of copyright \n\nhave occurred, please contact the publisher, and every effort will be made to rectify \n\nomissions or errors in the event of a reprint or new edition.", - "page_start": 1, - "page_end": 1, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "arxiv4.pdf", - "query": "How many articles compose the Syntec French collective bargaining agreement ?", - "target_page": 2, - "target_passage": "The Syntec French collective bargaining agree- ment comprises around 90 articles", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Document \n\nid \nurl \n\narticle-14 \nhttps://www.syntec.fr/convention- \ncollective/resiliation-du-contrat- \nde-travail/#article-14 \nArticle 14 : Préavis pendant la péri- \node d’essai \n\nsection Résiliation du contrat de travail \ncontent Modification Avenant n° 7 du \n5/07/1991 Au cours de cette péri- \node, les deux parties peuvent se sé- \nparer avec un préavis d’une journée \nde travail pendant le premier mois. \nAprès le premier mois, le temps \nde préavis réciproque sera d’une \nsemaine par mois complet passé \ndans l’entreprise. Après le pre- \nmier mois, le temps de préavis ré- \nciproque sera d’une semaine par \nmois passé dans l’entreprise. Le \npréavis donne droit au salarié de \ns’absenter pour la recherche d’un \nemploi dans les conditions fixées à \nl’article 16. Le salarié sera payé au \nprorata du temps passé pendant la \npériode d’essai. \nQuery \n\narticle \narticle-14 \nquestion Quel est \nd’essai ? \n\n\"\"\" \nYou will be given a couple of texts in \nEnglish and their translation in French. \n\nYour task is to provide a 'rating' score on \nhow well the system translated the \nEnglish text into French. \n\nGive your answer as a float on a scale of 0 \n\nto 10, where 0 means that the \nsystem_translation is bad and does not \nrepresent what is being said in the \noriginal English text, and 10 means that \nthe translation is good and represents \n\nle préavis en période \n\nthe original English text. \n\nNo need to mind the quality of the text as \noriginal English text may be of bad \nquality. \n\n\n \n \n \n \n [html]\n
hal_idDomainTitle
hal - 02899209shsLa transformation digitale du management des ressources humaines et de ses enjeux pourentreprises
tel - 03993881mathSur l ’ approximation numerique quelques problemes en mecanique des fluides
\n\nProvide your feedback as follows: \n\nFeedback::: \nTotal rating: (your rating, as a float \nbetween 0 and 10) \n\nNow here are the English and French texts. \n\nOriginal text in English: {english_text} \nTranslation in French: {french_translation} \n\nFeedback::: \nTotal rating: \n\"\"\" \n\nFigure 8: Prompt used for LLM as-judge evaluation of \nSummEval dataset translation. \nFigure 6: Extracts of HAL dataset.", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv4.pdf" - }, - { - "text": "HAVE AGREED \n\n**I.1.1.1.1.**Article 1 Subject matter \n\n**1.1**\n\nThis specific contract implements framework contract (FWC) No ECHA/2019/355 \nsigned by the parties on [*complete date*]*.*\n\n**1.2**\n\nIn accordance with the provisions set out in the FWC and in this specific contract \nand [its][their] annex[es], which form an integral part of it, the contractor must \nprovide the [following services:] [services specified in Annex [*complete*]*.*] \n\n**I.1.1.1.2.**Article 2 Entry into force and duration \n\n**2.1** This specific contract enters into force on the date on which the last party signs it. \n\n**2.2**\nThe provision of the services starts from the date of entry into force of this specific \ncontract. \n\n**2.3**\n\nThe provision of the services must not exceed [*complete*]**[**days] [months**]**. The \nparties may extend the duration by written agreement before it elapses and before \nexpiry of the FWC. \n\n**I.1.1.1.3.**Article 3 Price \n\n**3.1**\n\nThe price payable under this specific contract excluding reimbursement of expenses \nis EUR [*amount in figures and in words*]. \n\n[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*]", - "page_start": 43, - "page_end": 43, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "MasakhaNEWSClusteringP2P). Table 3 shows de- \ntails of each task data used for running the bench- \nmark. \n\n2019; Le et al., 2020). Most French models for \nsentence embeddings have been developed by the \nopen-source community2, by fine-tuning models \nlike CamemBERT(Martin et al., 2019) or Crois- \nsantLLM(Faysse et al., 2024). \n\nThis section describes the 3 new datasets we in- \ntroduce, quality checks performed and an analysis \nof the semantic similarities between datasets. \n\nBenchmarks Embedding models are generally \ncompared on specific tasks, such as information \nretrieval, STS or reranking (Thakur et al., 2021; \nAgirre et al., 2016; Wang et al., 2021). Other \nworks evaluate embedding models on multiple \ntasks (Wang et al., 2018; et al., 2022; Conneau and \nKiela, 2018) or compare meta-embeddings (García- \nFerrero et al., 2021). The most comprehensive \nbenchmark to date is MTEB (Muennighoff et al., \n2022). MTEB still has a critical limit: it mainly \nfocuses on English. Some initiatives already ex- \ntended this benchmark to other languages, such as \nChinese (Xiao et al., 2024) and German (Wehrli \net al., 2024). Our work comes with the same am- \nbition for French. It relies on the MTEB structure \nthat provides a solid basis for analysis and extends \nit to a new language. \n\n3.1.1 Syntec (Retrieval) \n\nThe Syntec French collective bargaining agree- \nment3 comprises around 90 articles. Despite its \ntopic, the language used does not feature the speci- \nficity of the legal vocabulary, making the data \nsuitable for benchmarking general-purpose mod- \nels. The articles have been scraped for use as doc- \numents. Four annotators were divided into two \ngroups. Each group was given half of the articles \nand asked to choose an article and write a question \nabout it. Each annotator wrote 25 questions. Thus, \na hundred questions have been manually created \nand paired with the articles containing the answer4. \nExamples of the dataset are available in the ap- \npendix Figure 5. This dataset could also be used \nfor text classification, clustering or topic modeling. \nRegarding quality checks, every article’s integrity \nhas been reviewed while manually creating ques- \ntions. We also manually checked that the questions \ncould only be answered using the annotated article. \n\n3 MTEB for French \n\nIn this section, we describe the datasets and the \nmodels that we propose for the French extension \nof MTEB. We also list the research questions we \nwant to discuss with the results. \n\n3.1.2 HAL (Clustering) \n\nHyper Articles en Ligne (HAL) is a French open \narchive of scholarly documents from all academic \nfields. Scrapping this resource, we fetched 85,000 \npublications in French5. We extracted IDs, titles \nand the author’s choice among domain labels. The \nlast 2 are provided by authors when submitting \ntheir papers to HAL. Since domain annotations are \nprovided, the dataset can be used for many tasks, \nsuch as topic modeling or text classification. To en- \nsure the dataset quality is suitable for a benchmark, \nfurther data cleaning has been performed: \n\n3.1 New Datasets", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv4.pdf" - }, - { - "text": "andthe CEO and summarised incomposition of the Remunerationpresentation to theCommittee and details ofRemuneration Committee of the", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**I.10.3. Provision of list of pre-existing rights and documentary evidence**\n\nThe contractor must provide the contracting authority with a list of*pre-existing rights*as \nset out in Article II.13.4 together with the invoice for payment of the balance at the latest. \n\n**I.11. Termination by either party2**\n\nEither party may terminate the FWC and/or the FWC and specific contracts by sending \n*formal notification*to the other party with three months written notice. \n\nIf the FWC or a specific contract is terminated: \n\na) neither party is entitled to compensation; \n\nb) the contractor is entitled to payment only for the services provided before \ntermination takes effect. \n\nThe second, third and fourth paragraphs of Article II.18.4 apply. \n\n**I.12. Applicable law and settlement of disputes**\n\n**I.12.1**The FWC is governed by Union law, complemented, where necessary, by the law of \n\nFinland. \n\n**I.12.2**The courts of Finland have exclusive jurisdiction over any dispute regarding the \n\ninterpretation, application or validity of the FWC. \n\n**I.13. Interinstitutional FWC**\n\nNot applicable \n\n**I.14. Service provided on the premises of the contracting authority**\n\nNot applicable. \n\n**I.15. Other special conditions**\n\nElectronic documents exchange \n\nIt is intended that the documents exchange (e.g. invoices, deliverables) between the \nAgency and the Contractor will have to be carried out via electronic means. \n\nAt the request of the Agency, the use of such electronic applications will become \nmandatory, upon mutual agreement, during the performance of the contract, at no \nadditional cost for the Agency.", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Contents \n\nConsolidated Five-Year Summary 70 \n\nBusiness and Other Risks 71 \n\nConsolidated Balance Sheets 72 \n\nConsolidated Statements of Income 74 \n\nConsolidated Statements of Shareholders’ Equity 75 \n\nConsolidated Statements of Cash Flows 76 \n\nNotes to Consolidated Financial Statements 77 \n\nReport of Independent Auditors 104 \n\nNon-consolidated Five-Year Summary 105 \n\n\n\nF \nI \n\nN \nA \nN \nC \nI \nA \nL \n\nS \nE \nC \nT \nI \nO \nN", - "page_start": 70, - "page_end": 70, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**No [*complete*]**\n\n**implementing framework contract No ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this specific contract by [*forename, surname, function,*\n*department of authorising officer*], \n\nand \n\n\n \n \n \n \n [html]\n
[ Official legal form ]
[ Statutory registration number or ID or passport number ]
[ Full official address ]
[ VAT registration number ]
\n\n[*repeat these data as many times as there are contractors in case of joint tender and*\n*continue numbering*] \n\n([collectively] \"the contractor\"), represented for the purposes of signing this specific \ncontract by [*forename, surname and function of legal representative*,]", - "page_start": 42, - "page_end": 42, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "(g) if the contractor does not comply with applicable obligations under environmental, \nsocial and labour law established by Union law, national law, collective agreements \nor by the international environmental, social and labour law provisions listed in \nAnnex X to Directive 2014/24/EU; \n\n(h) if the contractor is in a situation that could constitute a*conflict of interest*or a \n\n*professional conflicting interest*as referred to in Article II.7; \n\n(i) if a change to the contractor’s legal, financial, technical, organisational or ownership \nsituation is likely to substantially affect the*implementation of the FWC*or \nsubstantially modify the conditions under which the FWC was initially awarded; \n(j) in the event of*force majeure*, where either resuming implementation is impossible \nor the necessary ensuing amendments to the FWC or a specific contract would mean \nthat the tender specifications are no longer fulfilled or result in unequal treatment \nof tenderers or contractors; \n\n(k) if the needs of the contracting authority change and it no longer requires new \nservices under the FWC; in such cases ongoing specific contracts remain unaffected; \n(l) if the termination of the FWC with one or more of the contractors means that the \nmultiple FWC with reopening of competition no longer has the minimum required \nlevel of competition; \n\n(m) if the contractor is in breach of the data protection obligations resulting from \n\nArticle II.9.2; \n\n(n) if the contractor does not comply with the applicable data protection obligations \nresulting from Regulation (EU) 2016/679. \n\n**II.18.2. Grounds for termination by the contractor**\n\nThe contractor may terminate the FWC or any on-going specific contract if the contracting \nauthority fails to comply with its obligations, in particular the obligation to provide the \ninformation needed for the contractor to implement the FWC or to perform a specific \ncontract as provided for in the tender specifications. \n\n**II.18.3. Procedure for termination**\n\nA party must*formally notify*the other party of its intention to terminate the FWC or a \nspecific contract and the grounds for termination. \n\nThe other party has 30 days following the date of receipt to submit observations, including \nthe measures it has taken or will take to continue fulfilling its contractual obligations. \nFailing that, the decision to terminate becomes enforceable the day after the time limit for \nsubmitting observations has elapsed. \n\nIf the other party submits observations, the party intending to terminate must*formally*\n*notify*it either of the withdrawal of its intention to terminate or of its final decision to \nterminate. \n\nIn the cases referred to in points (a) to (d), (g) to (i), (k) and (l) of Article II.18.1 and in \nArticle II.18.2, the date on which the termination takes effect must be specified in the \n*formal notification*. \n\nIn the cases referred to in points (e), (f) and (j) of Article II.18.1, the termination takes \neffect on the day following the date on which the contractor receives*notification*of \ntermination. \n\nIn addition, at the request of the contracting authority and regardless of the grounds for \ntermination, the contractor must provide all necessary assistance, including information, \ndocuments and files, to allow the contracting authority to complete, continue or transfer \nthe services to a new contractor or internally, without interruption or adverse effect on the", - "page_start": 30, - "page_end": 30, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**Table of Content**\n\n**Table of Content ................................................................................................. 3**\n\n**I. Special Conditions ........................................................................................ 5**\n\nI.1. Order of priority of provisions .......................................................................................... 5 \n\nI.2. Subject matter ............................................................................................................... 5 \n\nI.3. Entry into force and duration of the FWC ........................................................................... 5 \n\nI.4. Appointment of the contractor and implementation of the FWC ............................................ 5 \n\nI.5. Prices............................................................................................................................ 6 \n\nI.6. Payment arrangements ................................................................................................... 7 \n\nI.7. Bank account ................................................................................................................. 8 \n\nI.8. Communication details .................................................................................................... 8 \n\nI.9. Data controller ............................................................................................................... 9 \n\nI.10. Exploitation of the results of the FWC .............................................................................. 9 \n\nI.11. Termination by either party ......................................................................................... 11 \n\nI.12. Applicable law and settlement of disputes ...................................................................... 11 \n\nI.13. Interinstitutional FWC ................................................................................................. 11 \n\nI.14. Service provided on the premises of the contracting authority .......................................... 11 \n\nI.15. Other special conditions .............................................................................................. 11 \n\n**II. GENERAL CONDITIONS FOR THE FRAMEWORK CONTRACT FOR SERVICES . 13**", - "page_start": 2, - "page_end": 2, - "source_file": "EN-Draft FWC for services 0142.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv4.pdf", - "query": "In the context of research publication, what is HAL ?", - "target_page": 3, - "target_passage": "Hyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "All rights reserved. No part of this publication may be reproduced or transmitted \n\nin any form or by any means, electronic or mechanical, including photocopying, \n\nrecording, or any information storage or retrieval system, without prior permission in \n\nwriting from the publisher. Subject to any applicable licensing terms and conditions in \n\nthe case of electronically supplied publications, a person may engage in fair dealing \n\nwith a copy of this publication for his or her personal or private use, or his or her \n\nresearch or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978. \n\nThe authors and the publisher have made every effort to obtain permission for and \n\nto acknowledge the use of copyright material. Should any infringement of copyright \n\nhave occurred, please contact the publisher, and every effort will be made to rectify \n\nomissions or errors in the event of a reprint or new edition.", - "page_start": 1, - "page_end": 1, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "2.6 Data collection \n\nThe interview guide (Table 4) was developed based on literature \nreviews, clinical experience and discussions within the research \ngroup and with user representatives. Two test interviews were", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] \n\nArtificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Harari, Yuval Noah (2023). \"AI and the future of humanity\" (https://www.youtube.com/watch?v= \nLWiM-LuRe6w).*YouTube*. Archived (https://web.archive.org/web/20240930110823/https://w \nww.youtube.com/watch?v=LWiM-LuRe6w) from the original on 30 September 2024. \nRetrieved 5 October 2024. \n\nHaugeland, John (1985).*Artificial Intelligence: The Very Idea*. Cambridge, Mass.: MIT Press. \n\nISBN 978-0-2620-8153-5.", - "page_start": 56, - "page_end": 56, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**36**. Tang L, Sun Z, Idnay B, et al. Evaluating large language models on medical evidence summarization. NPJ Digit \nMed. 2023;6(1):158. doi:10.1038/s41746-023-00896-7 \n\n**37**. Goswami J, Prajapati KK, Saha A, Saha AK. Parameter-efficient fine-tuning large language model approach for \nhospital discharge paper summarization. Appl Soft Comput. 2024;157:111531. doi:10.1016/j.asoc.2024.111531 \n\n**38**. Huang KT, Mehta NH, Gupta S, See AP, Arnaout O. Evaluation of the safety, accuracy, and helpfulness of the \nGPT-4.0 large language model in neurosurgery. J Clin Neurosci. 2024;123:151-156. doi:10.1016/j.jocn.2024.03.021 \n\n**39**. Giuffrè M, Kresevic S, You K, et al. Systematic review: the use of large language models as medical chatbots in \ndigestive diseases. Aliment Pharmacol Ther. 2024;60(2):144-166. doi:10.1111/apt.18058 \n\n**40**. Tailor PD, Dalvin LA, Chen JJ, et al. A comparative study of responses to retina questions from either experts, \nexpert-edited large language models or large language models alone. Ophthalmol Sci. 2024;4(4):100485. doi:10. \n1016/j.xops.2024.100485 \n\n**41**. Zaretsky J, Kim JM, Baskharoun S, et al. Generative artificial intelligence to transform inpatient discharge \nsummaries to patient-friendly language and format. JAMA Netw Open. 2024;7(3):e240357. doi:10.1001/ \njamanetworkopen.2024.0357 \n\n**42**. Zhou C, Liu P, Xu P, et al. Lima: less is more for alignment. arXiv. Preprint posted online May 18, 2023. doi:10. \n48550/arXiv.2305.11206", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed8.pdf" - }, - { - "text": "4 Localizing linguistic knowledge \n\n4.1 BERT embeddings \n\nIn studies of BERT, the term \"embedding\" refers \nto the output of a Transformer layer (typically, the \nfinal one). Both conventional static embeddings \n(Mikolov et al., 2013) and BERT-style embeddings \ncan be viewed in terms of mutual information max- \nimization (Kong et al., 2019), but the latter are \ncontextualized. Every token is represented by a \nvector dependent on the particular context of occur- \nrence, and contains at least some information about \nthat context (Miaschi and Dell’Orletta, 2020).", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Jumper, John; Evans, Richard; Pritzel, Alexander; et al. (26 August 2021). \"Highly accurate \n\nprotein structure prediction with AlphaFold\" (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC \n8371605).*Nature*.**596**(7873): 583–589. Bibcode:2021Natur.596..583J (https://ui.adsabs.ha \nrvard.edu/abs/2021Natur.596..583J). doi:10.1038/s41586-021-03819-2 (https://doi.org/10.10 \n38%2Fs41586-021-03819-2). PMC 8371605 (https://www.ncbi.nlm.nih.gov/pmc/articles/PM \nC8371605). PMID 34265844 (https://pubmed.ncbi.nlm.nih.gov/34265844). \nS2CID 235959867 (https://api.semanticscholar.org/CorpusID:235959867). \n\nLeCun, Yann; Bengio, Yoshua; Hinton, Geoffrey (28 May 2015). \"Deep learning\" (https://www.na \nture.com/articles/nature14539).*Nature*.**521**(7553): 436–444. Bibcode:2015Natur.521..436L \n(https://ui.adsabs.harvard.edu/abs/2015Natur.521..436L). doi:10.1038/nature14539 (https:// \ndoi.org/10.1038%2Fnature14539). PMID 26017442 (https://pubmed.ncbi.nlm.nih.gov/26017 \n442). S2CID 3074096 (https://api.semanticscholar.org/CorpusID:3074096). Archived (https:// \nweb.archive.org/web/20230605235832/https://www.nature.com/articles/nature14539) from \nthe original on 5 June 2023. Retrieved 19 June 2023. \n\nLeffer, Lauren, \"The Risks of Trusting AI: We must avoid humanizing machine-learning models \nused in scientific research\",*Scientific American*, vol. 330, no. 6 (June 2024), pp. 80–81. \nLepore, Jill, \"The Chit-Chatbot: Is talking with a machine a conversation?\",*The New Yorker*, 7 \n\nOctober 2024, pp. 12–16. \n\nMaschafilm (2010). \"Content: Plug & Pray Film – Artificial Intelligence – Robots\" (http://www.plu \ngandpray-film.de/en/content.html).*plugandpray-film.de*. Archived (https://web.archive.org/w \neb/20160212040134/http://www.plugandpray-film.de/en/content.html) from the original on 12 \nFebruary 2016. \n\nMarcus, Gary, \"Artificial Confidence: Even the newest, buzziest systems of artificial general \n\nintelligence are stymmied by the same old problems\",*Scientific American*, vol. 327, no. 4 \n(October 2022), pp. 42–45. \n\nMitchell, Melanie (2019).*Artificial intelligence: a guide for thinking humans*. New York: Farrar, \n\nStraus and Giroux. ISBN 978-0-3742-5783-5. \n\nMnih, Volodymyr; Kavukcuoglu, Koray; Silver, David; et al. (26 February 2015). \"Human-level \n\ncontrol through deep reinforcement learning\" (https://www.nature.com/articles/nature14236). \n*Nature*.**518**(7540): 529–533. Bibcode:2015Natur.518..529M (https://ui.adsabs.harvard.edu/ \nabs/2015Natur.518..529M). doi:10.1038/nature14236 (https://doi.org/10.1038%2Fnature142 \n36). PMID 25719670 (https://pubmed.ncbi.nlm.nih.gov/25719670). S2CID 205242740 (http \ns://api.semanticscholar.org/CorpusID:205242740). Archived (https://web.archive.org/web/20 \n230619055525/https://www.nature.com/articles/nature14236) from the original on 19 June \n2023. Retrieved 19 June 2023. Introduced DQN, which produced human-level performance \non some Atari games. \n\nPress, Eyal, \"In Front of Their Faces: Does facial-recognition technology lead police to ignore \n\ncontradictory evidence?\",*The New Yorker*, 20 November 2023, pp. 20–26. \n\n\"Robots could demand legal rights\" (http://news.bbc.co.uk/2/hi/technology/6200005.stm).*BBC*\n\n*News*. 21 December 2006. Archived (https://web.archive.org/web/20191015042628/http://ne \nws.bbc.co.uk/2/hi/technology/6200005.stm) from the original on 15 October 2019. Retrieved \n3 February 2011. \n\nRoivainen, Eka, \"AI's IQ: ChatGPT aced a [standard intelligence] test but showed that \nintelligence cannot be measured by IQ alone\",*Scientific American*, vol. 329, no. 1 \n(July/August 2023), p. 7. \"Despite its high IQ, ChatGPT fails at tasks that require real \nhumanlike reasoning or an understanding of the physical and social world.... ChatGPT \nseemed unable to reason logically and tried to rely on its vast database of... facts derived \nfrom online texts.\"", - "page_start": 68, - "page_end": 68, - "source_file": "wikipedia3.pdf" - }, - { - "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs \nto be both responsibly managed, and useful for developers of AI models. \n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible, \nand thus obviates the need for each individual actor to acquire, digitize, and format their own \ncorpus of books for AI training. This resource could be collectively and intentionally \nmanaged, though we do not mean to select a particular form of governance in this paper. 4 \n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a \nbooks data commons as defined above and key questions relevant to developers, \nrepositories, and other stakeholders, building on our workshop discussions. We first explain \nwhy books matter for AI training and how broader access could be beneficial. We then \nsummarize two tracks that might be considered for developing such a resource, highlighting \nexisting projects that help foreground both the potential and challenges. Finally, we present \nseveral key design choices, and next steps that could advance further development of this \napproach. 5 \n\n In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis.", - "page_start": 2, - "page_end": 2, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv4.pdf", - "query": "What is the effect of embedding dimension on embedding representation quality ?", - "target_page": 6, - "target_passage": "we observe a performance correla- tion with the embedding dimension and the model’s number of parameters, which are often correlated themselves", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "• The top 10 documents that are not labeled as \n\nrelevant constitute the negative samples. \n\nWe recognize that this process leads to a high cor- \nrelation between the retrieval and reranking tasks. \nWe still think it is essential to make the latter avail- \nable, with an open door to future improvement8. \n• Variety: Diverse model types were included \nto offer an insightful analysis across vari- \nous model characteristics (dimension, training \nstrategy, etc.). \n\nIn line with the third objective, we explicit below \nthe studied characteristics of embedding models \nthat will be discussed with the results. \n\n7SummEvalFr available at: https://huggingface.co./ \ndatasets/lyon-nlp/summarization-summeval-fr-p2p \nhttps: \n8SyntecReranking \n\nat: \n//huggingface.co/datasets/lyon-nlp/ \nmteb-fr-reranking-syntec-s2p \ning available at: \nlyon-nlp/mteb-fr-reranking-alloprof-s2p \n\navailable \n\nand AlloprofRerank- \nhttps://huggingface.co./datasets/ \n\n• Embedding dimension: This critical element \ninfluences the expressiveness of the represen-", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" - }, - { - "text": "4 Localizing linguistic knowledge \n\n4.1 BERT embeddings \n\nIn studies of BERT, the term \"embedding\" refers \nto the output of a Transformer layer (typically, the \nfinal one). Both conventional static embeddings \n(Mikolov et al., 2013) and BERT-style embeddings \ncan be viewed in terms of mutual information max- \nimization (Kong et al., 2019), but the latter are \ncontextualized. Every token is represented by a \nvector dependent on the particular context of occur- \nrence, and contains at least some information about \nthat context (Miaschi and Dell’Orletta, 2020).", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "ies) insufficient (Warstadt et al., 2019). A given \nmethod might also favor one model over another, \ne.g., RoBERTa trails BERT with one tree extraction \nmethod, but leads with another (Htut et al., 2019). \nThe choice of linguistic formalism also matters \n(Kuznetsov and Gurevych, 2020). \n\nSeveral studies reported that distilled contex- \ntualized embeddings better encode lexical se- \nmantic information (i.e. \nthey are better at tra- \nditional word-level tasks such as word similarity). \nThe methods to distill a contextualized represen- \ntation into static include aggregating the informa- \ntion across multiple contexts (Akbik et al., 2019; \nBommasani et al., 2020), encoding \"semantically \nbleached\" sentences that rely almost exclusively on \nthe meaning of a given word (e.g. \"This is <>\") \n(May et al., 2019), and even using contextualized \nembeddings to train static embeddings (Wang et al., \n2020d). \n\nIn view of all that, the alternative is to focus on \nidentifying what BERT actually relies on at infer- \nence time. This direction is currently pursued both \nat the level of architecture blocks (to be discussed \nin detail in subsection 6.3), and at the level of in- \nformation encoded in model weights. Amnesic \nprobing (Elazar et al., 2020) aims to specifically \nremove certain information from the model and see \nhow it changes performance, finding, for example, \nthat language modeling does rely on part-of-speech \ninformation. \n\nBut this is not to say that there is no room for \nimprovement. Ethayarajh (2019) measure how \nsimilar the embeddings for identical words are in \nevery layer, reporting that later BERT layers pro- \nduce more context-specific representations3. They \nalso find that BERT embeddings occupy a narrow \ncone in the vector space, and this effect increases \nfrom the earlier to later layers. That is, two ran- \ndom words will on average have a much higher \ncosine similarity than expected if embeddings \nwere directionally uniform (isotropic). Since \nisotropy was shown to be beneficial for static word \nembeddings (Mu and Viswanath, 2018), this might \nbe a fruitful direction to explore for BERT. \n\nAnother direction is information-theoretic prob- \ning. Pimentel et al. (2020) operationalize prob- \ning as estimating mutual information between the \nlearned representation and a given linguistic prop- \nerty, which highlights that the focus should be not \non the amount of information contained in a rep- \nresentation, but rather on how easily it can be ex- \ntracted from it. Voita and Titov (2020) quantify \nthe amount of effort needed to extract information \nfrom a given representation as minimum descrip- \ntion length needed to communicate both the probe \nsize and the amount of data required for it to do \nwell on a task. \n\nSince BERT embeddings are contextualized, an \ninteresting question is to what extent they cap- \nture phenomena like polysemy and homonymy. \nThere is indeed evidence that BERT’s contextu- \nalized embeddings form distinct clusters corre- \nsponding to word senses (Wiedemann et al., 2019; \nSchmidt and Hofmann, 2020), making BERT suc- \ncessful at word sense disambiguation task. How- \never, Mickus et al. (2019) note that the representa- \ntions of the same word depend on the position \nof the sentence in which it occurs, likely due to \nthe NSP objective. This is not desirable from the \nlinguistic point of view, and could be a promising \n\n3Voita et al. (2019a) look at the evolution of token embed- \ndings, showing that in the earlier Transformer layers, MLM \nforces the acquisition of contextual information at the expense \nof the token identity, which gets recreated in later layers. \n\n4 Localizing linguistic knowledge \n\n4.1 BERT embeddings", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "with respect to model ranking? \nTo go further than the correlation analysis among \ndatasets regarding their topics (see section 3.1.5), \nsubsequent analysis will be conducted regarding \nhow they rank models. Additionally, complemen- \ntary insights will be derived from examining cor- \nrelations of models relative to their strengths and \nweaknesses across different datasets. \n\nfollowing: \n\n• Tuned for sentence similarity: 0.727 \n\n• Finetuned vs pretrained: 0.544 \n\n• Model number of parameters: 0.49 \n\n• Embedding dimension: 0.452 \n\n4 Results and discussion • Closed source: 0.449 \n\nIn this section, we present the results through the \nprism of our research questions. \n• Max sequence length: 0.336 \n\n• Multilingual: 0.103 \n\n• English: 0.025 \n\n• English but tuned on other languages: -0.025 \n\n• French: -0.134 \n\n• Bilingual: -0.135 \n\nAdditionally, all cross-correlations between charac- \nteristics are reported in appendix Figure 10. \n\nQ1: Is there a model that outstands on all \ntasks? \n\nModels performances for each task are presented \nin appendix Tables 9, 10, 11, 12 and 13. Figure \n1 shows the critical difference diagram of average \nscore ranks. \n\nAs in MTEB (Muennighoff et al., 2022), no \nmodel claims state-of-the-art in all tasks even if \nthe text-embedding-3-large model is in first place \nIt ranks \non average on all tasks (see Table 9). \nfirst for the classification and reranking tasks. For \nthe clustering task, text-embedding-ada-002 is the \nbest model. The models voyage-code-2, \ntext- \nembedding-3-small and mistral-embed share the \ntop positions in the retrieval task ranking. For the \npair classification task, laser2 is ahead of its com- \npetitors. Finally, sentence-camembert-large leads \non the STS task and multilingual-e5-small has the \nbest results for summarization. \nAs expected, the score most strongly correlates \nwith whether the evaluated models were trained on \na sentence similarity task. Of course, this criterion \nis connected to the more general Finetuned one. \nThe only top-performing models solely pre-trained \nare from the E5 family, where the pre-training is, \nin fact, contrastive and optimized for similarity. \nConversely, models pre-trained on token-level tasks \nand generating embeddings via pooling appear less \nwell-suited for the benchmark tasks. \n\nFigure 1 shows a global model comparison \nacross all datasets. The models are arranged hori- \nzontally according to their performance, with the \nbest models on the left. The black bars repre- \nsent the statistical equivalence between the mod- \nels’ performances. The statistically equivalent \ntop performers for this benchmark are OpenAI’s \nmodels text-embedding-3-large, text-embedding-3- \nsmall and text-embedding-ada-002. Interestingly, \nmany models do not show a significant perfor- \nmance gap between their base and large flavours. \nSome French models stand out among the multi- \nlingual models, such as Solon-embeddings-large- \n0.1, sentence_croissant_alpha_v0.3 and sentence- \ncamembert-large. \nFurthermore, we observe a performance correla- \ntion with the embedding dimension and the model’s \nnumber of parameters, which are often correlated \nthemselves. This appears very clearly on the rela- \ntive ranking of E5 and T5 models (see Figure 1). \nHowever, some small models perform very well \non the benchmark, such as the standard version \nof the multilingual universal sentence encoder or \nSolon-embeddings-base-1.0. Notably, the maxi- \nmum sequence length, while an important criterion \nfor generative tasks with LLMs, is less correlated \nwith performance than the other dimensions. This \ncan be explained by many datasets containing rel- \natively small texts (see appendix Table 3 showing \nthat 14 datasets have less than 50 tokens). \n\nQ2: Are there any links between model \ncharacteristics and performance?", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv4.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
TableTable
AnalysisMean
Neu CianconeImene Kei
TableRatio
Esker, FranceTable
eu @ wikit. aiimene. kerboua @ eske
TableConstruction
Wissam STable
Riskit, Francewissam. siblini92 @ gmail. com
TablePositions
TablePresence
TableTable
N, nurDemonstrated by their model
Aged on one ’ s specific needs, such as being opde av
Maximum maximum maximum maximum maximum maximum maximumbelling maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maximum maxiP tas
Massive Text IDemonstrated by sensitivity ( included )
SensitivityGR ) has nrimari
ving a small embedding dimension, the abilityTable
Choosing a mocConcess long texts or their performance. To achie
ParametersParameters
s goal, we undertake significant efforts in cPatients
Post - therapy (%)ting datasets to conduct a broad comparison
ParametersMTEB to p
Medicine that the datasets cover variomass
Sensor sensitivitySensor
We gather 15 e1.
in anPrevious expectations
w FreNumber of a global
TaskSensor
Age of models, including prominent French aected
\n\n4 \n2 \n0 \n2 \n\nn \nu \nJ \n\n7 \n1 \n\n] \nL \nC \n. \ns \nc \n[ \n\n2 \nv \n8 \n6 \n4 \n0 \n2 \n. \n5 \n0 \n4 \n2 \n: \nv \ni \nX \nr \na \n\nEmbeddings are dense vector representations that \ncapture the semantics of an input. The first emblem- \natic example is Word2Vec, introduced by Mikolov \net al. (2013). It consists of neural architectures \ntrained to learn high-quality word representations \nfrom contextual relationships in vast amounts of \ntext. Other models were proposed since then, lever- \naging the transformer architecture (Vaswani et al., \n2017) to produce both generic and contextualized \nword embeddings using self-attention. Many mod- \nels now exist with various architectures, mono- \nlingual or multilingual, pre-trained or fine-tuned \n(Naseem et al., 2021; Ding et al., 2023). \n\n2 Related Work \n\nSentence Embeddings Sentence embeddings are \nrequired for many language tasks, such as Semantic \nTextual Similarity (STS) and knowledge retrieval. \nMany models have been proposed in the litera- \nture, leveraging pooling strategies (Devlin et al., \n2019; Muennighoff, 2022) or similarity fine-tuning \n(Reimers and Gurevych, 2019) using a contrastive \nframework (Gao et al., 2021; Neelakantan et al., \n2022; Ni et al., 2021; Wang et al., 2022; Zhang \net al., 2023), leveraging prompts (Wang et al., 2023) \nor a two steps training process (Chen et al., 2024; \nLee et al., 2024). Few French-language models \nhave been proposed in the literature (Martin et al., \n\nIn this work, our primary objective is to in- \ntroduce a large-scale embedding benchmark for", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv4.pdf" - }, - { - "text": "tation and, in practical applications, the under- \nlying storage and compute costs. We selected \nmodels with embedding dimensions ranging \nfrom 384 to 4096. \n\net al., 2019), their variants optimized for semantic \nsimilarity (Reimers and Gurevych, 2019), numer- \nous multilingual models performing at the top on \nMTEB (e.g E5 and T5), Bloom variants (Zhang \net al., 2023), models based on very recent power- \nful LLMs (Wang et al., 2023; Faysse et al., 2024) \nand finally the proprietary models of OpenAI, Co- \nhere and Voyage. Certain models were selected in \nmultiple sizes to isolate the dimensionality effect \neffectively. We provide information on the mod- \nels’ licenses as reported in the Hugging Face hub10. \nHowever, we encourage readers to conduct further \nresearch before utilizing a model. \n• Sequence length: Being the number of to- \nkens that a model can consider as input, the \nsequence length is important as it impacts the \nunit that can be encoded (sentence, paragraph, \ndocument). However, encoding overly long \nsequences requires efficiently storing the rele- \nvant information into a single vector. Among \nthe selected methods, this criterion varies \nfrom 128 tokens to 32768. \n\n3.3 Evaluation \n\n• Model parameters: Often correlated with the \ntwo first characteristics, parameter count is im- \nportant for practical applications as it affects \nusability on resource-efficient machines. The \nselected models have a number of parameters \nranging from 20 million (∼100Mb in float32) \nto 7 billion (∼28Gb). \n\nFor the sake of homogeneity, models are evalu- \nated using the same metrics per task as in MTEB \n(Muennighoff et al., 2022): Classification (Accu- \nracy), Bitext mining (F1 score), Pair classification \n(AP), Clustering (V measure), Reranking (MAP), \nRetrieval (NDCG@10), Summarization and STS \n(Spearman correlation based on cosine similarity). \nBitextMining tasks are excluded from the aver- \nage performance scores and therefore the figures, \nas this task evaluates 2 languages instead of one, \nand this benchmark focuses only on one language \n(French). We present the results for both DiaBlaBi- \ntextMining and FloresBitextMining in Table 12. \n\n• Language: This is a major feature of lan- \nguage models. Some are monolingual, and \nothers are multilingual. Language is usually \nacquired during pre-training, but sometimes, \nmodels familiarize themselves with new lan- \nguages at tuning. For the benchmark, we \nselected French models, as well as bilingual \nor multilingual models. We also included a \nfew ones that claimed to be English (e.g. all- \nMiniLM-L12-v29). \n\nUsing the overall benchmark results, our goal \nwill be to answer the following research questions: \nQ1: Is a model outstanding on all tasks? \nAs we are trying to find out whether one embed- \nding model is statistically better than the others for \nFrench, the objective will also be to analyze the \nperformance of the models by tasks to facilitate \nmodel choice for specific applications. \nQ2: Are there any links between the model charac- \nteristics and performance? \nIn section 3.2, we undertook the substantial task of \ngathering the characteristics of all evaluated mod- \nels. The goal here will be to analyze their impact \non performance and draw conclusions about, for \nexample, the relationship between embedding di- \nmension and model ranking on the benchmark. \nQ3: Do monolingual models have multilingual ca- \npabilities? \nWe interrogate the ability of a model trained exclu- \nsively in one language to perform well in another \nlanguage. \nQ4: Are there any correlations between datasets", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv4.pdf" - }, - { - "text": "computed from another part of the video, x. The pre- \ndictor network Pϕ( \n), which maps the representation of \n· \nx to the representation of y, is trained simultaneously \nwith the encoder, and is provided specification of the \nspatio-temporal positions of y through the conditioning \nvariable z \n\nFeature Prediction versus Pixel Reconstruction. \nApproaches that predict in pixel space must dedicate \nsignificant model capacity and compute to capture all \nthe low-level detail in the visual input. By contrast, ap- \nproaches that predict in latent space have the flexibility \nto eliminate irrelevant or unpredictable pixel-level details \nfrom the target representation (Vondrick et al., 2016). \nPredicting in representation space has been shown to \nlead to versatile representations that perform well across \nmany downstream tasks through linear probing or low- \nshot adaptation (Assran et al., 2023; Oquab et al., 2023; \nAssran et al., 2022), while demonstrating an efficiency \ngain during pretraining compared to pixel level recon- \nstruction (Assran et al., 2023; Baevski et al., 2022b,a). \nThe works of Baevski et al. (2022a,b) additionally show \nthat predicting in representation space results in compet- \nitive end-to-end fine-tuning performance in the image, \naudio and text domains. In this work, we extend these \nfindings to the video modality. \n\n∆y. \n← \nNaively implementing the objective using the regression \n\nminimizeθ,ϕ \nPϕ(Eθ(x), ∆y) \n∥ 1, \nEθ(y) \n∥ − \n\nwould admit a trivial solution, where the encoder out- \nputs a constant representation, regardless of its input. \nIn practice, we use the following modified objective to \nprevent representation collapse, \n\nminimizeθ,ϕ sg(Eθ(y)) \n(1) \nPϕ(Eθ(x), ∆y) \n1, \n∥ ∥ − \n\n) denotes a stop-gradient operation, which \nwhere sg( \n· \ndoes not backpropagate through its argument, and Eθ( \n) \n· \n). \nis an exponential moving average of the network Eθ( \n· \nThe use of an exponential-moving average feature ex- \ntractor along with a stop-gradient and a predictor has \nbeen used as a collapse prevention strategy for image pre- \ntraining (Grill et al., 2020), and studied empirically (Xie \net al., 2021) and theoretically (Tian et al., 2021). In \nfact, the objective in equation (1) is similar to the loss \nof Assran et al. (2023) used for image pretraining, but \nwe modify it to use an ℓ1 regression, which we found to \nbe more stable. \n\nTheoretical motivation. A theoretical motivation for \nthe effectiveness of this collapse prevention strategy was \nproposed in Grill et al. (2020) for the BYOL method. We \nprovide a simple adaptation of their analysis for our ℓ1 \nloss. For ease of exposition, we will disregard the effect of \nthe conditioning variable z and consider one dimensional \nrepresentations. Denote the representation Eθ(y) by \na random variable Y . The optimal predictor under \nequation (1) is thus given by the following functional \nexpression, \n\nFigure 2 Joint-Embedding Predictive Architectures are \ntrained to predict the representation of an input y from \nthe representation of another input x. The additional vari- \nable z provides the predictor with information about the \ntransformation that computes y from x. \n\nOur goal is to explore the effectiveness of feature pre- \ndiction as a stand-alone objective for learning visual \nrepresentations from video. To that end, we use a \njoint-embedding predictive architecture (JEPA) (LeCun, \n2022); see Figure 2. The main idea behind a JEPA is \nto learn by predicting the representation of an input y \nfrom the representation of another input x. The basic \narchitecture is made up of an encoder, Eθ( \n), which com- \n· \nputes the representation of the inputs, and a predictor, \n), which predicts the representation of y from the \nPϕ( \n· \nrepresentation of x, conditioned on a variable z indicat- \ning the transformation (or corruption) between x and \ny. Conditioning on z enables the generation of distinct \npredictions for various transformations of x. \n\nP ⋆(Eθ(x)) = argmin", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv3.pdf" - }, - { - "text": "Niklas Muennighoff, Nouamane Tazi, Loic Magne, and \nNils Reimers. 2022. Mteb: Massive text embedding \nbenchmark. In Conference of the European Chapter \nof the Association for Computational Linguistics. \n\nLiang Wang, Nan Yang, Xiaolong Huang, Binxing \nJiao, Linjun Yang, Daxin Jiang, Rangan Majumder, \nand Furu Wei. 2022. Text embeddings by weakly- \nsupervised contrastive pre-training. arXiv preprint \narXiv:2212.03533. \n\nTomas Mikolov, Kai Chen, Gregory S. Corrado, and \nJeffrey Dean. 2013. Efficient estimation of word \nrepresentations in vector space. In International Con- \nference on Learning Representations. \nAlex Wang, Amanpreet Singh, Julian Michael, Felix \nHill, Omer Levy, and Samuel R. Bowman. 2018. \nGlue: A multi-task benchmark and analysis plat- \nform for natural language understanding. In Black- \nboxNLP@EMNLP. \nNiklas Muennighoff. 2022. \n\nSgpt: Gpt sentence \nembeddings for semantic search. arXiv preprint \narXiv:2202.08904. \n\nKexin Wang, Nils Reimers, and Iryna Gurevych. 2021. \nTSDAE: Using transformer-based sequential denois- \ning auto-encoderfor unsupervised sentence embed- \nIn Findings of the Association for \nding learning. \nComputational Linguistics: EMNLP 2021, pages \n671–688, Punta Cana, Dominican Republic. Associa- \ntion for Computational Linguistics. \n\nUsman Naseem, Imran Razzak, Shah Khalid Khan, \nand Mukesh Prasad. 2021. A comprehensive survey \non word representation models: From classical to \nstate-of-the-art word representation language models. \nTransactions on Asian and Low-Resource Language \nInformation Processing, 20(5):1–35. \n\nLiang Wang, Nan Yang, Xiaolong Huang, Linjun Yang, \nRangan Majumder, and Furu Wei. 2023. Improving \ntext embeddings with large language models. arXiv \npreprint arXiv:2401.00368. \n\nArvind Neelakantan, Tao Xu, Raul Puri, Alec Rad- \nford, Jesse Michael Han, Jerry Tworek, Qiming Yuan, \nNikolas Tezak, Jong Wook Kim, Chris Hallacy, et al. \n2022. Text and code embeddings by contrastive pre- \ntraining. arXiv preprint arXiv:2201.10005. \n\nSilvan Wehrli, Bert Arnrich, and Christopher Irrgang. \n2024. German text embedding clustering benchmark. \n\nJianmo Ni, Gustavo Hernández Ábrego, Noah Constant, \nJi Ma, Keith B. Hall, Daniel Cer, and Yinfei Yang. \n2021. Sentence-t5: Scalable sentence encoders from \npre-trained text-to-text models. \n\nShitao Xiao, Zheng Liu, Peitian Zhang, Niklas Muen- \nnighoff, Defu Lian, and Jian-Yun Nie. 2024. C-pack: \nPackaged resources to advance general chinese em- \nbedding. \n\nKishore Papineni, Salim Roukos, Todd Ward, and Wei- \nJing Zhu. 2002. Bleu: a method for automatic evalu- \nation of machine translation. In Proceedings of the \n40th Annual Meeting of the Association for Compu- \ntational Linguistics, pages 311–318, Philadelphia, \nPennsylvania, USA. Association for Computational \nLinguistics. \n\nYinfei Yang, Yuan Zhang, Chris Tar, and Jason \nBaldridge. 2019. PAWS-X: A cross-lingual adversar- \nial dataset for paraphrase identification. In Proceed- \nings of the 2019 Conference on Empirical Methods \nin Natural Language Processing and the 9th Inter- \nnational Joint Conference on Natural Language Pro- \ncessing (EMNLP-IJCNLP), pages 3687–3692, Hong \nKong, China. Association for Computational Linguis- \ntics. \n\nNils Reimers and Iryna Gurevych. 2019. Sentence-bert: \nSentence embeddings using siamese bert-networks. \nIn Conference on Empirical Methods in Natural Lan- \nguage Processing. \n\nXin Zhang, Zehan Li, Yanzhao Zhang, Dingkun Long, \nPengjun Xie, Meishan Zhang, and Min Zhang. 2023. \nLanguage models are universal embedders. ArXiv, \nabs/2310.08232. \n\nStephen E. Robertson and Karen Spärck Jones. 1976. \nRelevance weighting of search terms. J. Am. Soc. Inf. \nSci., 27:129–146. \n\nLianmin Zheng, Wei-Lin Chiang, Ying Sheng, Siyuan \nZhuang, Zhanghao Wu, Yonghao Zhuang, Zi Lin, \nZhuohan Li, Dacheng Li, Eric P. Xing, Hao Zhang, \nJoseph E. Gonzalez, and Ion Stoica. 2023. Judging \nllm-as-a-judge with mt-bench and chatbot arena.", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv4.pdf" - }, - { - "text": "If the LM or word embeddings derived from it are used as com- \nponents in a text classification system, these biases can lead to \nallocational and/or reputational harms, as biases in the representa- \ntions affect system decisions [125]. This case is especially pernicious \nfor being largely invisible to both the direct user of the system and \nany indirect stakeholders about whom decisions are being made. \nSimilarly, biases in an LM used in query expansion could influence \nsearch results, further exacerbating the risk of harms of the type \ndocumented by Noble in [94], where the juxtaposition of search \nqueries and search results, when connected by negative stereotypes, \nreinforce those stereotypes and cause psychological harm. \n\nThe above cases involve risks that could arise when LMs are de- \nployed without malicious intent. A third category of risk involves \nbad actors taking advantage of the ability of large LMs to produce \nlarge quantities of seemingly coherent texts on specific topics on \ndemand in cases where those deploying the LM have no investment \nin the truth of the generated text. These include prosaic cases, such \nas services set up to ‘automatically’ write term papers or interact on \nsocial media,23 as well as use cases connected to promoting extrem- \nism. For example, McGuffie and Newhouse [80] show how GPT-3 \ncould be used to generate text in the persona of a conspiracy theo- \nrist, which in turn could be used to populate extremist recruitment \nmessage boards. This would give such groups a cheap way to boost \nrecruitment by making human targets feel like they were among \nmany like-minded people. If the LMs are deployed in this way to \nrecruit more people to extremist causes, then harms, in the first \ninstance, befall the people so recruited and (likely more severely) \nto others as a result of violence carried out by the extremists. \n\nYet another risk connected to seeming coherence and fluency in- \nvolves machine translation (MT) and the way that increased fluency \nof MT output changes the perceived adequacy of that output [77]. \nThis differs somewhat from the cases above in that there was an \ninitial human communicative intent, by the author of the source lan- \nguage text. However, MT systems can (and frequently do) produce \noutput that is inaccurate yet both fluent and (again, seemingly) \n\n\n \n \n \n \n [html]\n
Tableusystem ( or the organization deploying the system ) has accountability for the truth
Specificity ( mean )Table toxonomy
\n\n23Such as the GPT-3 powered bot let loose on Reddit; see https://thenextweb.com/ \nneural/2020/10/07/someone-let-a-gpt-3-bot-loose-on-reddit-it-didnt-end-well/amp/.", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "• Model types: There are several strategies to \ngenerate text embeddings such as aggregat- \ning (e.g. with average pooling) token-level \nembeddings from raw pre-trained models, or \nadding an extra contrastive learning step on a \nsentence similarity task with, optionally, ad- \nditional transformation layers. We included \nmodels of all types in our benchmark, summa- \nrizing the model type information under two \nrelevant criteria: finetuned vs pretrained, and \ntrained for sentence similarity or not. \n\nThe selected models are visible in Figure 1, and \nall of their characteristics are summarized in ap- \npendix Table 7. Overall, the selection includes the \nbest models from the sentence transformers frame- \nwork (Reimers and Gurevych, 2019), the most pop- \nular French NLP models (Le et al., 2020; Martin \n\n9https://huggingface.co./sentence-transformers/ \nall-MiniLM-L12-v2", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv4.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Draft FWC for services 0142.pdf", - "query": "What is the maximum amount covered by the FWC of the europeean chemical agency ?", - "target_page": 6, - "target_passage": "The maximum amount covering all purchases under this FWC, including all renewals and reimbursement of expenses is EUR 1 000 000 (one million)", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "HAVE AGREED \n\n**I.1.1.1.1.**Article 1 Subject matter \n\n**1.1**\n\nThis specific contract implements framework contract (FWC) No ECHA/2019/355 \nsigned by the parties on [*complete date*]*.*\n\n**1.2**\n\nIn accordance with the provisions set out in the FWC and in this specific contract \nand [its][their] annex[es], which form an integral part of it, the contractor must \nprovide the [following services:] [services specified in Annex [*complete*]*.*] \n\n**I.1.1.1.2.**Article 2 Entry into force and duration \n\n**2.1** This specific contract enters into force on the date on which the last party signs it. \n\n**2.2**\nThe provision of the services starts from the date of entry into force of this specific \ncontract. \n\n**2.3**\n\nThe provision of the services must not exceed [*complete*]**[**days] [months**]**. The \nparties may extend the duration by written agreement before it elapses and before \nexpiry of the FWC. \n\n**I.1.1.1.3.**Article 3 Price \n\n**3.1**\n\nThe price payable under this specific contract excluding reimbursement of expenses \nis EUR [*amount in figures and in words*]. \n\n[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*]", - "page_start": 43, - "page_end": 43, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "I.4.2. Period of provision of the services \n\nThe period for the provision of the services starts to run from the date on which the specific \ncontract is signed by the last party. \n\nI.4.3. Implementation of FWC in cascade \n\nThe FWC is implemented as follows: the contracting authority orders services by sending \na request for offer for a specific contract to the contractor who is ranked first in the cascade. \n\nWithin 5 working days (unless otherwise stated in the request for offer), the contractor \nmust either: \n\n(a) send the specific tender back to the contracting authority; or \n(b) send an explanation of why it cannot accept the order. \n\nIf the contractor does not accept the order or fails to observe the deadline or to submit an \nacceptable offer for the Agency, or if it is in a situation of conflicting interests that may \nnegatively affect the*performance of the specific contract*(see Article II.7), the contracting \nauthority may place the order with the next contractor on the cascade. \n\nIf the contractor repeatedly refuses to accept requests for offer or repeatedly fails to send \nthem back on time, the contractor may be considered in breach of its obligations under \nthis FWC as set out in Article II.18.1 (c). \n\nWithin a maximum of 5 working days of a specific contract or order form being sent by the \nAgency to the contractor, the Agency shall receive it back, duly signed and dated. The \nperiod allowed for the execution of the tasks shall start to run on the date of signature of \nthe specific contract or order form by both parties. \n\n**I.5. Prices**\n\n**I.5.1. Maximum amount of the FWC and maximum prices**\n\nThe maximum amount covering all purchases under this FWC, including all renewals and \nreimbursement of expenses is**EUR 1 000 000**(one million). However, this does not bind \nthe contracting authority to purchase for the maximum amount. \n\nThe maximum unit prices of the services are: \n\nSenior experts: \nExperts: [ ] EUR per man-day \n[ ] EUR per man-day \n\n**I.5.2. Price revision index**\n\nPrice revision is determined by the formula set out in Article II.20 and using the trend in \nthe harmonised indices of consumer prices (HICP) ‘Euro area (19 countries)’ published at \nhttp://ec.europa.eu/eurostat/web/hicp/data/database under HICP (2015 = 100) - monthly \ndata (index) (prc_hicp_midx).]", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**I. Special Conditions**\n\n**I.1. Order of priority of provisions**\n\nIf there is any conflict between different provisions in this FWC, the following rules must \nbe applied: \n\n(a) The provisions set out in the special conditions take precedence over those in the \n\nother parts of the FWC. \n\n(b) The provisions set out in the general conditions take precedence over those in the \n\n*order form*and specific contract (Annex III) \n\n(c) The provisions set out in the*order form*and specific contract (Annex III) take \n\nprecedence over those in the other annexes. \n\n(d) The provisions set out in the tender specifications (Annex I) take precedence over \n\nthose in the tender (Annex II). \n\n(e) The provisions set out in the FWC take precedence over those in the specific \n\ncontracts. \n\n(f) The provisions set out in the specific contracts take precedence over those in the \n\nrequests for services. \n\nAny reference to specific contracts applies also to order forms. \n\n**I.2. Subject matter**\n\nThe subject matter of the FWC is scientific support to ECHA for work on restrictions, \ndose-response functions, Annex XIV, POPs and dossier evaluation. \n\n**I.3. Entry into force and duration of the FWC**\n\n**I.3.3**The FWC is concluded for a period of 24 months with effect from the date of its \n\n\n \n \n \n \n [html]\n
L3A The parties must sign any specific contract before the FWC expires.The FWC continues to apply to such specific contracts after its expiry. The services relating to such specific contracts must be performed no later than six months after the expiry of the FWC.
1.3. 5 Renewal of the FWCThe FWC is renewed automatically 2 times for 12 months each, unless one of the parties receives formal notification to the contrary at least three months before the end of the ongoing duration. Renewal does not change or postpone any existi
", - "page_start": 4, - "page_end": 4, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**Table of Content**\n\n**Table of Content ................................................................................................. 3**\n\n**I. Special Conditions ........................................................................................ 5**\n\nI.1. Order of priority of provisions .......................................................................................... 5 \n\nI.2. Subject matter ............................................................................................................... 5 \n\nI.3. Entry into force and duration of the FWC ........................................................................... 5 \n\nI.4. Appointment of the contractor and implementation of the FWC ............................................ 5 \n\nI.5. Prices............................................................................................................................ 6 \n\nI.6. Payment arrangements ................................................................................................... 7 \n\nI.7. Bank account ................................................................................................................. 8 \n\nI.8. Communication details .................................................................................................... 8 \n\nI.9. Data controller ............................................................................................................... 9 \n\nI.10. Exploitation of the results of the FWC .............................................................................. 9 \n\nI.11. Termination by either party ......................................................................................... 11 \n\nI.12. Applicable law and settlement of disputes ...................................................................... 11 \n\nI.13. Interinstitutional FWC ................................................................................................. 11 \n\nI.14. Service provided on the premises of the contracting authority .......................................... 11 \n\nI.15. Other special conditions .............................................................................................. 11 \n\n**II. GENERAL CONDITIONS FOR THE FRAMEWORK CONTRACT FOR SERVICES . 13**", - "page_start": 2, - "page_end": 2, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "(a) travel, subsistence, accommodation and shipment expenses; and \n(b) any other expenses provided for in the tender specifications. \n\nThe daily subsistence allowance referred to in Article II.22.4 (d) and the accommodation \nflat-rate ceiling referred to in Article II.22.4(e) are listed in Annex IV \n\n**I.6. Payment arrangements**\n\n**I.6.1. Pre-financing**\n\nPre-financing is not applicable to this FWC. \n\n**I.6.2. Interim payments**\n\nInterim payment is not applicable to this FWC, unless it is provided for under a specific \ncontract. \n\nIf provided for, the contractor (or leader in the case of a joint tender) may claim the interim \npayment equal to the amount specified in the relevant specific contract in accordance with \nArticle II.21.6. \n\nThe contractor (or leader in the case of a joint tender) must send an invoice in paper format \nor via*e-PRIOR*for the interim payment as provided for in the tender specifications, \naccompanied by the following: \n\n a list of all*pre-existing rights*to the*results*or parts of the*results*or a declaration stating \n\nthat there are no such*pre-existing rights*, as provided for in Article II.13.4; \n\n the relevant progress report or deliverable accepted by ECHA \n\n statements of reimbursable expenses in accordance with Article II.22. \n\nThe contracting authority must approve the submitted documents or deliverables and pay \nwithin 30 days from receipt of the invoice. \n\n**I.6.3. Payment of the balance**\n\n1. The contractor (or leader in the case of a joint tender) may claim the payment of the \nbalance in accordance with Article II.21.6. \n\nThe contractor (or leader in the case of a joint tender) must send an invoice in paper format \nor via*e-PRIOR*for payment of the balance due under a specific contract, as provided for \nin the tender specifications and accompanied by the following: \n\n a list of all*pre-existing rights*to the*results*or parts of the*results*or a declaration stating \n\nthat there are no such*pre-existing rights*, as provided for in Article II.13.4; \n\n document of acceptance by ECHA of the deliverables as defined in the*tender*\n\n*specifications or specific contract*\n\n statements of reimbursable expenses in accordance with Article II.22. \n\n2. The contracting authority must approve the submitted documents and pay within 30 \ndays from receipt of the invoice. \n\n3. The contracting authority may suspend the time limit for payment specified in point 2 \nin accordance with Article II.21.7. Once the suspension is lifted, the contracting authority \nshall give its approval and pay within the remainder of the time-limit indicated in point 2 \nunless it rejects partially or fully the submitted documents. \n\n**I.6.4. Performance guarantee**\n\nPerformance guarantee is not applicable to this FWC. \n\n**I.6.5. Retention money guarantee**\n\nRetention money guarantee is not applicable to this FWC. \n\n**I.7. Bank account**\n\nPayments must be made to the contractor’s (or leader’s in the case of a joint tender) bank \naccount denominated in euro, identified as follows: \n\nName of bank: \n\nFull address of branch: \n\nExact denomination of account holder: \n\nFull account number including bank codes: \n\n[IBAN1 code:] \n\n**I.8. Communication details**\n\nFor the purpose of this FWC, communications must be sent to the following addresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \nDirectorate and Unit D3, Risk Management I \nTelakkakatu 6 \n00150 Helsinki \nFinland \nE-mail: [insert functional mailbox]", - "page_start": 6, - "page_end": 6, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "*a specific contract*or any part of it: \n\n(a) if the procedure for awarding the FWC or a specific contract or the*implementation of*\n*the FWC*proves to have been subject to*irregularities, fraud or breach of obligations*; \n\n(b) in order to verify whether the presumed*irregularities, fraud*or*breach of obligations*\nhave actually occurred. \n\nThe contracting authority must*formally notify*the contractor of the suspension and the \nreasons for it. Suspension takes effect on the date of*formal notification*, or at a later date \nif the*formal notification*so provides. \n\nThe contracting authority must*notify*the contractor as soon as the verification is \ncompleted whether: \n\n(a) it is lifting the suspension; or \n(b) it intends to terminate the FWC or a specific contract under Article II.18.1(f) or \n(j). \n\nThe contractor is not entitled to compensation for suspension of any part of the FWC or a \nspecific contract. \n\nThe contracting authority may in addition suspend the time allowed for payments in \naccordance with Article II.21.7. \n\n**II.18. Termination of the FWC**\n\n**II.18.1. Grounds for termination by the contracting authority**\n\nThe contracting authority may terminate the FWC or any on-going specific contract in the \nfollowing circumstances: \n\n(a) if provision of the services under an on-going specific contract has not actually \nstarted within 15 days of the scheduled date and the contracting authority considers \nthat the new date proposed, if any, is unacceptable, taking into account \nArticle II.11.2; \n\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence \n\nrequired for*implementation of the FWC*; \n\n(c) if the contractor does not implement the FWC or perform the specific contract in \naccordance with the tender specifications or*request for service*or is in breach of \nanother substantial contractual obligation or repeatedly refuses to sign specific \ncontracts. Termination of three or more specific contracts in these circumstances \nalso constitutes grounds for termination of the FWC; \n\n(d) if the contractor or any person that assumes unlimited liability for the debts of the \ncontractor is in one of the situations provided for in points (a) and (b) of Article \n136(1) of the Financial Regulation6; \n\n(e) if the contractor or any*related person*is in one of the situations provided for in \npoints (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation; \n(f) if the procedure for awarding the FWC or the*implementation of the FWC*prove to \n\nhave been subject to*irregularities*,*fraud*or*breach of obligations*; \n\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the \nfinancial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) \nNo 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No \n223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No \n966/2012, \nhttps://eur-lex.europa.eu/legal- \ncontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG \nOJ", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**I.9. Data controller**\n\n**I.9.1 Processing of personal data by the contracting authority**\n\nFor the purpose of Article II.9.1, \n\n(a) the data controller is ECHA; \n\n(b) the data protection notice is available at \nhttps://www.echa.europa.eu/documents/10162/13612/annex2_privacy_statement_procu \nrement_procedures_en.pdf/ed81cf95-4056-4bdf-adb5-c0f1bd0d57a5 \n\n**I.9.2 Processing of personal data by the contractor**\n\nThis clause is not applicable to this FWC. \n\n**I.10. Exploitation of the results of the FWC**\n\n**I.10.1. Detailed list of modes of exploitation of the results**\n\nIn accordance with Article II.13.1 whereby the contracting authority acquires ownership of \nthe*results*as defined in this FWC, including the tender specifications, these*results*may \nbe used for any of the following modes of exploitation: \n\n(a) use for its own purposes: \n\n making available to the staff of the contracting authority; \n\n making available to the persons and entities working for the contracting authority \nor cooperating with it, including contractors, subcontractors whether legal or natural \npersons, Union institutions, agencies and bodies, Member States’ institutions; \n\n installing, uploading, processing; \n\n arranging, compiling, combining, retrieving; \n\n copying, reproducing in whole or in part and in unlimited number of copies. \n\n(b) \ninternet including social networks as a downloadable or non-downloadable file; \ndistribution to the public in hard copies, in electronic or digital format, on the \n\n(c) communication through press information services; \n\ninclusion in widely accessible databases or indexes, such as via ‘open access’ \n(d) \nor ‘open data’ portals, or similar repositories, whether freely accessible or accessible only \nupon subscription;", - "page_start": 8, - "page_end": 8, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**I.10.3. Provision of list of pre-existing rights and documentary evidence**\n\nThe contractor must provide the contracting authority with a list of*pre-existing rights*as \nset out in Article II.13.4 together with the invoice for payment of the balance at the latest. \n\n**I.11. Termination by either party2**\n\nEither party may terminate the FWC and/or the FWC and specific contracts by sending \n*formal notification*to the other party with three months written notice. \n\nIf the FWC or a specific contract is terminated: \n\na) neither party is entitled to compensation; \n\nb) the contractor is entitled to payment only for the services provided before \ntermination takes effect. \n\nThe second, third and fourth paragraphs of Article II.18.4 apply. \n\n**I.12. Applicable law and settlement of disputes**\n\n**I.12.1**The FWC is governed by Union law, complemented, where necessary, by the law of \n\nFinland. \n\n**I.12.2**The courts of Finland have exclusive jurisdiction over any dispute regarding the \n\ninterpretation, application or validity of the FWC. \n\n**I.13. Interinstitutional FWC**\n\nNot applicable \n\n**I.14. Service provided on the premises of the contracting authority**\n\nNot applicable. \n\n**I.15. Other special conditions**\n\nElectronic documents exchange \n\nIt is intended that the documents exchange (e.g. invoices, deliverables) between the \nAgency and the Contractor will have to be carried out via electronic means. \n\nAt the request of the Agency, the use of such electronic applications will become \nmandatory, upon mutual agreement, during the performance of the contract, at no \nadditional cost for the Agency.", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "*453 European Centre for Disease Prevention and Control, https://www.ecdc.europa.eu/en*\n454 European Maritime Safety Agency EMSA (http://www.emsa.europa.eu/ ), Section on Safety and Security \nhttp://www.emsa.europa.eu/we-do/safety.html \n455 Fundamental Rights Agency FRA, https://fra.europa.eu/en, Section on ‘Trafficking and labour exploitation, e.g \nthe report from June 2021 titled: Protecting migrants in an irregular situation from labour exploitation – Role of the \nEmployers Sanctions Directive \n456 European Monitoring Centre for Drugs and Drug Addiction EMCDDA (https://www.emcdda.europa.eu/), \nSection ‘Best practice’, Policy and practice briefings: Work places, https://www.emcdda.europa.eu/best- \npractice/briefings/workplace_en \nQuite unknown and difficult to estimate: between one and nine percent of the employees take so-called neuro \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n158", - "page_start": 157, - "page_end": 157, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Draft FWC for services 0142.pdf", - "query": "How can I get compensation if the european chemical agency terminates a contract we have ?", - "target_page": 11, - "target_passage": "If the FWC or a specific contract is terminated: a) neither party is entitled to compensation", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "**No [*complete*]**\n\n**implementing framework contract No ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this specific contract by [*forename, surname, function,*\n*department of authorising officer*], \n\nand \n\n\n \n \n \n \n [html]\n
[ Official legal form ]
[ Statutory registration number or ID or passport number ]
[ Full official address ]
[ VAT registration number ]
\n\n[*repeat these data as many times as there are contractors in case of joint tender and*\n*continue numbering*] \n\n([collectively] \"the contractor\"), represented for the purposes of signing this specific \ncontract by [*forename, surname and function of legal representative*,]", - "page_start": 42, - "page_end": 42, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "HAVE AGREED \n\n**I.1.1.1.1.**Article 1 Subject matter \n\n**1.1**\n\nThis specific contract implements framework contract (FWC) No ECHA/2019/355 \nsigned by the parties on [*complete date*]*.*\n\n**1.2**\n\nIn accordance with the provisions set out in the FWC and in this specific contract \nand [its][their] annex[es], which form an integral part of it, the contractor must \nprovide the [following services:] [services specified in Annex [*complete*]*.*] \n\n**I.1.1.1.2.**Article 2 Entry into force and duration \n\n**2.1** This specific contract enters into force on the date on which the last party signs it. \n\n**2.2**\nThe provision of the services starts from the date of entry into force of this specific \ncontract. \n\n**2.3**\n\nThe provision of the services must not exceed [*complete*]**[**days] [months**]**. The \nparties may extend the duration by written agreement before it elapses and before \nexpiry of the FWC. \n\n**I.1.1.1.3.**Article 3 Price \n\n**3.1**\n\nThe price payable under this specific contract excluding reimbursement of expenses \nis EUR [*amount in figures and in words*]. \n\n[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*]", - "page_start": 43, - "page_end": 43, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**DRAFT FRAMEWORK CONTRACT FOR SERVICES**\n\n**NUMBER — ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this framework contract by [*forename, surname, function,*\n*directorate of authorising officer*], \n\nof the one part and \n\n2. [*Full official name*] \n\n[*Official legal form*] \n\n**[***Statutory registration number or ID or passport number***]**\n\n[*Full official address*] \n\n[*VAT registration number*] \n\n[appointed as the leader of the group by the members of the group that submitted the \njoint tender] \n\n[*For joint tenders,*r*epeat these data as many times as there are contractors and continue*\n*numbering*] \n\n([collectively] ‘the contractor’), represented for the purposes of the signature of this \nframework contract by [*forename, surname, function of legal representative and name of*\n*company in the case of a joint tender*], \n\non the other part, \n\nto the**special conditions,**the**general conditions for framework contracts**for \nservices and the following annexes: \n\n\n \n \n \n \n [html]\n
AnnTender specifications ( reference No [( digniplete ] of [ illigirt / β8 ( e )])
AnneContractor ' s tender ( reference No [ complete ] of [ insert \\ date ])
Ann[ Model for order forms ] [ and ] ( model for specific contracts )
", - "page_start": 0, - "page_end": 0, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "*a specific contract*or any part of it: \n\n(a) if the procedure for awarding the FWC or a specific contract or the*implementation of*\n*the FWC*proves to have been subject to*irregularities, fraud or breach of obligations*; \n\n(b) in order to verify whether the presumed*irregularities, fraud*or*breach of obligations*\nhave actually occurred. \n\nThe contracting authority must*formally notify*the contractor of the suspension and the \nreasons for it. Suspension takes effect on the date of*formal notification*, or at a later date \nif the*formal notification*so provides. \n\nThe contracting authority must*notify*the contractor as soon as the verification is \ncompleted whether: \n\n(a) it is lifting the suspension; or \n(b) it intends to terminate the FWC or a specific contract under Article II.18.1(f) or \n(j). \n\nThe contractor is not entitled to compensation for suspension of any part of the FWC or a \nspecific contract. \n\nThe contracting authority may in addition suspend the time allowed for payments in \naccordance with Article II.21.7. \n\n**II.18. Termination of the FWC**\n\n**II.18.1. Grounds for termination by the contracting authority**\n\nThe contracting authority may terminate the FWC or any on-going specific contract in the \nfollowing circumstances: \n\n(a) if provision of the services under an on-going specific contract has not actually \nstarted within 15 days of the scheduled date and the contracting authority considers \nthat the new date proposed, if any, is unacceptable, taking into account \nArticle II.11.2; \n\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence \n\nrequired for*implementation of the FWC*; \n\n(c) if the contractor does not implement the FWC or perform the specific contract in \naccordance with the tender specifications or*request for service*or is in breach of \nanother substantial contractual obligation or repeatedly refuses to sign specific \ncontracts. Termination of three or more specific contracts in these circumstances \nalso constitutes grounds for termination of the FWC; \n\n(d) if the contractor or any person that assumes unlimited liability for the debts of the \ncontractor is in one of the situations provided for in points (a) and (b) of Article \n136(1) of the Financial Regulation6; \n\n(e) if the contractor or any*related person*is in one of the situations provided for in \npoints (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation; \n(f) if the procedure for awarding the FWC or the*implementation of the FWC*prove to \n\nhave been subject to*irregularities*,*fraud*or*breach of obligations*; \n\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the \nfinancial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) \nNo 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No \n223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No \n966/2012, \nhttps://eur-lex.europa.eu/legal- \ncontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG \nOJ", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "(g) if the contractor does not comply with applicable obligations under environmental, \nsocial and labour law established by Union law, national law, collective agreements \nor by the international environmental, social and labour law provisions listed in \nAnnex X to Directive 2014/24/EU; \n\n(h) if the contractor is in a situation that could constitute a*conflict of interest*or a \n\n*professional conflicting interest*as referred to in Article II.7; \n\n(i) if a change to the contractor’s legal, financial, technical, organisational or ownership \nsituation is likely to substantially affect the*implementation of the FWC*or \nsubstantially modify the conditions under which the FWC was initially awarded; \n(j) in the event of*force majeure*, where either resuming implementation is impossible \nor the necessary ensuing amendments to the FWC or a specific contract would mean \nthat the tender specifications are no longer fulfilled or result in unequal treatment \nof tenderers or contractors; \n\n(k) if the needs of the contracting authority change and it no longer requires new \nservices under the FWC; in such cases ongoing specific contracts remain unaffected; \n(l) if the termination of the FWC with one or more of the contractors means that the \nmultiple FWC with reopening of competition no longer has the minimum required \nlevel of competition; \n\n(m) if the contractor is in breach of the data protection obligations resulting from \n\nArticle II.9.2; \n\n(n) if the contractor does not comply with the applicable data protection obligations \nresulting from Regulation (EU) 2016/679. \n\n**II.18.2. Grounds for termination by the contractor**\n\nThe contractor may terminate the FWC or any on-going specific contract if the contracting \nauthority fails to comply with its obligations, in particular the obligation to provide the \ninformation needed for the contractor to implement the FWC or to perform a specific \ncontract as provided for in the tender specifications. \n\n**II.18.3. Procedure for termination**\n\nA party must*formally notify*the other party of its intention to terminate the FWC or a \nspecific contract and the grounds for termination. \n\nThe other party has 30 days following the date of receipt to submit observations, including \nthe measures it has taken or will take to continue fulfilling its contractual obligations. \nFailing that, the decision to terminate becomes enforceable the day after the time limit for \nsubmitting observations has elapsed. \n\nIf the other party submits observations, the party intending to terminate must*formally*\n*notify*it either of the withdrawal of its intention to terminate or of its final decision to \nterminate. \n\nIn the cases referred to in points (a) to (d), (g) to (i), (k) and (l) of Article II.18.1 and in \nArticle II.18.2, the date on which the termination takes effect must be specified in the \n*formal notification*. \n\nIn the cases referred to in points (e), (f) and (j) of Article II.18.1, the termination takes \neffect on the day following the date on which the contractor receives*notification*of \ntermination. \n\nIn addition, at the request of the contracting authority and regardless of the grounds for \ntermination, the contractor must provide all necessary assistance, including information, \ndocuments and files, to allow the contracting authority to complete, continue or transfer \nthe services to a new contractor or internally, without interruption or adverse effect on the", - "page_start": 30, - "page_end": 30, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "If the Company terminates Mr J C Ellice-Flint’s appointment without cause, the Company may at its option, in lieu of part or all of the notice \nperiod of 24 months, pay to him an amount equal to a proportion or multiple of his annual base salary and the current year’s potential bonus \n(excluding the application of any performance condition) at the time at which notice is given.", - "page_start": 76, - "page_end": 76, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "quality or continuity of the services. The parties may agree to draw up a transition plan \ndetailing the contractor’s assistance unless such plan is already detailed in other \ncontractual documents or in the tender specifications. The contractor must provide such \nassistance at no additional cost, except if it can demonstrate that it requires substantial \nadditional resources or means, in which case it must provide an estimate of the costs \ninvolved and the parties will negotiate an arrangement in good faith. \n\n**II.18.4. Effects of termination**\n\nThe contractor is liable for damage incurred by the contracting authority as a result of the \ntermination of the FWC or a specific contract, including the additional cost of appointing \nand contracting another contractor to provide or complete the services, except if the \ndamage is a result of a termination in accordance with Article II.18.1(j), (k) or (l) or Article \nII.18.2. The contracting authority may claim compensation for such damage. \n\nThe contractor is not entitled to compensation for any loss resulting from the termination \nof the FWC or a specific contract, including loss of anticipated profits, unless the loss was \ncaused by the situation specified in Article II.18.2. \n\nThe contractor must take all appropriate measures to minimise costs, prevent damage and \ncancel or reduce its commitments. \n\nWithin 60 days of the date of termination, the contractor must submit any report, \ndeliverable or*result*and any invoice required for services that were provided before the \ndate of termination. \n\nIn the case of joint tenders, the contracting authority may terminate the FWC or a specific \ncontract with each member of the group separately on the basis of points (d), (e) or (g) \nof Article II.18.1, under the conditions set out in Article II.11.2 \n\n**II.19. Invoices, value added tax and e-invoicing**\n\n**II.19.1. Invoices and value added tax**\n\nInvoices must contain the contractor’s (or leader’s in the case of a joint tender) \nidentification data, the amount, the currency and the date, as well as the FWC reference \nand reference to the specific contract. \n\nInvoices must indicate the place of taxation of the contractor (or leader in the case of a \njoint tender) for value added tax (VAT) purposes and must specify separately amounts not \nincluding VAT and amounts including VAT. \n\nThe contracting authority is exempt from all taxes and duties, including VAT, in accordance \nwith Articles 3 and 4 of the Protocol 7 of the Treaty on the Functioning of the European \nUnion on the privileges and immunities of the European Union. \n\nThe contractor (or leader in the case of a joint tender) must complete the necessary \nformalities with the relevant authorities to ensure that the supplies and services required \nfor*implementation of the FWC*are exempt from taxes and duties, including VAT. \n\n**II.19.2. E-invoicing**\n\nIf provided for in the special conditions, the contractor (or leader in the case of a joint \ntender) submits invoices in electronic format if the conditions regarding electronic \nsignature specified by Directive 2006/112/EC on VAT are fulfilled, i.e. using a qualified", - "page_start": 31, - "page_end": 31, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**I.10.3. Provision of list of pre-existing rights and documentary evidence**\n\nThe contractor must provide the contracting authority with a list of*pre-existing rights*as \nset out in Article II.13.4 together with the invoice for payment of the balance at the latest. \n\n**I.11. Termination by either party2**\n\nEither party may terminate the FWC and/or the FWC and specific contracts by sending \n*formal notification*to the other party with three months written notice. \n\nIf the FWC or a specific contract is terminated: \n\na) neither party is entitled to compensation; \n\nb) the contractor is entitled to payment only for the services provided before \ntermination takes effect. \n\nThe second, third and fourth paragraphs of Article II.18.4 apply. \n\n**I.12. Applicable law and settlement of disputes**\n\n**I.12.1**The FWC is governed by Union law, complemented, where necessary, by the law of \n\nFinland. \n\n**I.12.2**The courts of Finland have exclusive jurisdiction over any dispute regarding the \n\ninterpretation, application or validity of the FWC. \n\n**I.13. Interinstitutional FWC**\n\nNot applicable \n\n**I.14. Service provided on the premises of the contracting authority**\n\nNot applicable. \n\n**I.15. Other special conditions**\n\nElectronic documents exchange \n\nIt is intended that the documents exchange (e.g. invoices, deliverables) between the \nAgency and the Contractor will have to be carried out via electronic means. \n\nAt the request of the Agency, the use of such electronic applications will become \nmandatory, upon mutual agreement, during the performance of the contract, at no \nadditional cost for the Agency.", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**II.14.3**The parties must take all necessary measures to limit any damage due to*force*\n*majeure*. \n\n**II.15. Liquidated damages**\n\n**II.15.1. Delay in delivery**\n\nIf the contractor fails to perform its contractual obligations within the applicable time limits \nset out in this FWC, the contracting authority may claim liquidated damages for each day \nof delay using the following formula: \n\n0.3 x (*V/d*) \n\nwhere: \n\n*V*is the price of the relevant purchase or deliverable or*result*; \n\n*d*is the duration specified in the relevant specific contract for delivery of the relevant \npurchase or deliverable or*result*or, failing that, the period between the date specified in \nArticle I.4.2 and the date of delivery or performance specified in the relevant specific \ncontract, expressed in days. \n\nLiquidated damages may be imposed together with a reduction in price under the \nconditions laid down in Article II.16. \n\n**II.15.2. Procedure**\n\nThe contracting authority must*formally notify*the contractor of its intention to apply \nliquidated damages and the corresponding calculated amount. \n\nThe contractor has 30 days following the date of receipt to submit observations. Failing \nthat, the decision becomes enforceable the day after the time limit for submitting \nobservations has elapsed. \n\nIf the contractor submits observations, the contracting authority, taking into account the \nrelevant observations, must*notify*the contractor: \n\n(a) of the withdrawal of its intention to apply liquidated damages; or \n\n(b) of its final decision to apply liquidated damages and the corresponding amount. \n\n**II.15.3. Nature of liquidated damages**\n\nThe parties expressly acknowledge and agree that any amount payable under this Article \nis not a penalty and represents a reasonable estimate of fair compensation for the damage \nincurred due to failure to provide the services within the applicable time limits set out in \nthis FWC. \n\n**II.15.4. Claims and liability**\n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTable
TableTableTableTableTableTable
Table
", - "page_start": 27, - "page_end": 27, - "source_file": "EN-Draft FWC for services 0142.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Draft FWC for services 0142.pdf", - "query": "According to the european chemical agency contracts, what is considers a grave professional misconduct ?", - "target_page": 14, - "target_passage": "'Grave professional misconduct': a violation of applicable laws or regulations or ethical standards of the profession to which a contractor or a related person belongs, including any conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of the contractor or a related person which has an impact on its professional credibility where such conduct denotes wrongful intent or gross negligence.", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "*453 European Centre for Disease Prevention and Control, https://www.ecdc.europa.eu/en*\n454 European Maritime Safety Agency EMSA (http://www.emsa.europa.eu/ ), Section on Safety and Security \nhttp://www.emsa.europa.eu/we-do/safety.html \n455 Fundamental Rights Agency FRA, https://fra.europa.eu/en, Section on ‘Trafficking and labour exploitation, e.g \nthe report from June 2021 titled: Protecting migrants in an irregular situation from labour exploitation – Role of the \nEmployers Sanctions Directive \n456 European Monitoring Centre for Drugs and Drug Addiction EMCDDA (https://www.emcdda.europa.eu/), \nSection ‘Best practice’, Policy and practice briefings: Work places, https://www.emcdda.europa.eu/best- \npractice/briefings/workplace_en \nQuite unknown and difficult to estimate: between one and nine percent of the employees take so-called neuro \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n158", - "page_start": 157, - "page_end": 157, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**No [*complete*]**\n\n**implementing framework contract No ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this specific contract by [*forename, surname, function,*\n*department of authorising officer*], \n\nand \n\n\n \n \n \n \n [html]\n
[ Official legal form ]
[ Statutory registration number or ID or passport number ]
[ Full official address ]
[ VAT registration number ]
\n\n[*repeat these data as many times as there are contractors in case of joint tender and*\n*continue numbering*] \n\n([collectively] \"the contractor\"), represented for the purposes of signing this specific \ncontract by [*forename, surname and function of legal representative*,]", - "page_start": 42, - "page_end": 42, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Union budget, ii) the non-disclosure of information in violation of a specific obligation, with \nthe same effect or iii) the misapplication of such funds or assets for purposes other than \nthose for which they were originally granted, which damages the Union's financial interests; \n\n**'Grave professional misconduct':**a violation of applicable laws or regulations or ethical \nstandards of the profession to which a contractor or a related person belongs, including \nany conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of \nthe contractor or a related person which has an impact on its professional credibility where \nsuch conduct denotes wrongful intent or gross negligence. \n\n**‘Implementation of the FWC’**: the purchase of services envisaged in the FWC through \nthe signature and*performance of specific contracts*; \n\n**‘Interface control document’**: the guideline document which lays down the technical \nspecifications, message standards, security standards, checks of syntax and semantics, \netc. to facilitate machine-to-machine connection. This document is updated on a regular \nbasis; \n\n**‘Irregularity’**: any infringement of a provision of Union law resulting from an act or \nomission by an economic operator, which has, or would have, the effect of prejudicing the \nUnion’s budget. \n\n**‘Notification’**(or ‘notify’): form of communication between the parties made in writing \nincluding by electronic means; \n\n**‘Order form’**: a simplified form of specific contract by which the contracting authority \norders services under this FWC; \n\n**‘Performance of a specific contract’**: the execution of tasks and delivery of the \npurchased services by the contractor to the contracting authority; \n\n**‘Personnel’**: persons employed directly or indirectly or contracted by the contractor to \nimplement the FWC; \n\n**‘Pre-existing material’**: any material, document, technology or know-how which exists \nprior to the contractor using it for the production of a*result*in the*implementation of the*\n*FWC*; \n\n**‘Pre-existing right’**: any industrial and intellectual property right on*pre-existing*\n*material*; it may consist in a right of ownership, a licence right and/or right of use belonging \nto the contractor, the*creator*, the contracting authority as well as to any other third \nparties; \n\n**‘Professional conflicting interest’**: a situation in which the contractor’s previous or \nongoing professional activities affect its capacity to implement the FWC or to perform a \nspecific contract to an appropriate quality standard. \n\n**‘Related person’**: any natural or legal person who is a member of the administrative, \nmanagement or supervisory body of the contractor, or who has powers of representation, \ndecision or control with regard to the contractor; \n\n**‘Request for services’**: a document from the contracting authority requesting that the \ncontractors in a multiple FWC with re-opening of competition provide a specific tender for \nservices whose terms are not entirely defined under the FWC;", - "page_start": 13, - "page_end": 13, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Many more**national statistics and surveys on working conditions exist**, often with a higher level of \ndetail, but they are rarely used for a comparative view, due to the inevitable methodological differences. \nCostly research work would be needed to cover all relevant national studies and monitoring data in all \nEU languages and conclude from these overviews on the situation in the EU27. \n\nEuropean Agency for Safety and Health at Work – EU-OSHA", - "page_start": 138, - "page_end": 138, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**DRAFT FRAMEWORK CONTRACT FOR SERVICES**\n\n**NUMBER — ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this framework contract by [*forename, surname, function,*\n*directorate of authorising officer*], \n\nof the one part and \n\n2. [*Full official name*] \n\n[*Official legal form*] \n\n**[***Statutory registration number or ID or passport number***]**\n\n[*Full official address*] \n\n[*VAT registration number*] \n\n[appointed as the leader of the group by the members of the group that submitted the \njoint tender] \n\n[*For joint tenders,*r*epeat these data as many times as there are contractors and continue*\n*numbering*] \n\n([collectively] ‘the contractor’), represented for the purposes of the signature of this \nframework contract by [*forename, surname, function of legal representative and name of*\n*company in the case of a joint tender*], \n\non the other part, \n\nto the**special conditions,**the**general conditions for framework contracts**for \nservices and the following annexes: \n\n\n \n \n \n \n [html]\n
AnnTender specifications ( reference No [( digniplete ] of [ illigirt / β8 ( e )])
AnneContractor ' s tender ( reference No [ complete ] of [ insert \\ date ])
Ann[ Model for order forms ] [ and ] ( model for specific contracts )
", - "page_start": 0, - "page_end": 0, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "less environmentally critical processes (see for example, the principles of ‘green engineering’, like \nprevention instead of treatment of waste288). \n\n**Chemical technologies have ousted traditional materials and processes.**The United Nations’ \n(UNEP) ‘Global Chemical Outlook’289 documents a strong growth of chemical production between 1970 \nand 2010. The value of the global chemical production grew from US$171 billion in 1970, to \napproximately US$ 5.7 trillion in 2019, roughly 33 times more. 290 The EU had a share of $1.3 trillion or \nabout 20% of the global value. In less than two decades between 2000 and 2017, the capacity doubled \nand grew from 1,186 million tons to 2,276 million tons.291,292 \n\nThe reasons for this strong growth are: a) the**replacement of traditional materials**(wood, stone, iron \nand other metals, paper, natural fibres) by chemically based products (foremost plastics and multi- \nmaterial products); b)**the replacement of traditional technologies by chemical processes**(e.g. \ngluing instead of screwing of connections in metal, two-component paints); c) the development of**new**\n**products**(e.g. electronic devices, new types of batteries, nano); and d)**new applications**(e.g. specific \nfertilisers and pesticides). \n\n**Table 29: Production and consumption of chemicals by hazard class in the EU in 2019 – Eurostat293**\n\n\n \n \n \n \n [html]\n
HAZARD ( Labels )2021
Hazardous to health214.3
Carcinogenic, mutagenic and reprotoxic ( CMR ) health hazard39.9
Chronic toxic health hazard25.4
Very toxic health hazard59.2
Toxic health hazard35.5
Harmful health hazard54.5
All labels referring to : Hazardous to the environment169.6
Hazardous and non - hazardous – Total278.9
\n\n\n\nAccording to the detailed register data of the Swedish Chemicals Agency, 10 million tonnes of synthetic \nchemicals were used in Sweden in 2019 that were classified as hazardous to health and the environment \n(not counting petrol). That equals approximately 1 ton per citizen of such chemicals. 294 \n\nThe ESENER 2019 survey provides information about**sectors that reported a particularly high**\n**prevalence of dangerous substances**. The percentage of enterprises reporting handling or exposure \nto chemicals are: 50% in ‘Manufacturing’, 49% in ‘Construction, waste management, and water and \nelectricity supply’, and 47% in ‘Human health and social work activities’. 295 \n\nThe prevention of risks from the use of chemicals at workplaces is done according to extensive \nregulatory frameworks. The most relevant pieces of legislation at the EU level are the OSH Framework \nDirective, the Chemical Agents Directive, and the Carcinogens and Mutagens Directive. Legislation in \nother policy areas contributes to the reduction of risks from dangerous substances in workplaces, such \nas EU legislation on chemical substances and mixtures (CLP, the regulation on classification, labelling \nand packaging of chemicals, its predecessor directive was already issued in 1967; REACH the \nregulation on Registration, Evaluation, Authorisation and Restriction of Chemicals from 2007; and also \nspecific EU and international legislation on specific aspects such as chemicals in waste, storage and \ntransport, in specific products like batteries and cars, in specific sectors like agriculture, in natural \nenvironments like in water and soil, and in consumer products like food, detergents and cosmetics).", - "page_start": 106, - "page_end": 106, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Lately, the**WHO and ILO have made joint efforts**to identify the best possible estimates based on the \nsystematic review of scientific literature on such connections. The newest WHO/ILO review of risk \npairs 214 identified several significant relations between specific risks of work conditions and related \ndiseases, for example, long working hours and stroke, or exposure to particulate matter, gases and \nchronic obstructive pulmonary diseases. For some specific chemicals and metals, the AF is very low \nbecause other exposures — nutrition, environment — might have a much bigger impact than workplace \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n81", - "page_start": 80, - "page_end": 80, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "These**types of less formalised work**have gained more and more importance in social reality and \nresearch. There are some prominent examples of EU-wide overviews. The ‘European Platform for \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n133", - "page_start": 132, - "page_end": 132, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "HAVE AGREED \n\n**I.1.1.1.1.**Article 1 Subject matter \n\n**1.1**\n\nThis specific contract implements framework contract (FWC) No ECHA/2019/355 \nsigned by the parties on [*complete date*]*.*\n\n**1.2**\n\nIn accordance with the provisions set out in the FWC and in this specific contract \nand [its][their] annex[es], which form an integral part of it, the contractor must \nprovide the [following services:] [services specified in Annex [*complete*]*.*] \n\n**I.1.1.1.2.**Article 2 Entry into force and duration \n\n**2.1** This specific contract enters into force on the date on which the last party signs it. \n\n**2.2**\nThe provision of the services starts from the date of entry into force of this specific \ncontract. \n\n**2.3**\n\nThe provision of the services must not exceed [*complete*]**[**days] [months**]**. The \nparties may extend the duration by written agreement before it elapses and before \nexpiry of the FWC. \n\n**I.1.1.1.3.**Article 3 Price \n\n**3.1**\n\nThe price payable under this specific contract excluding reimbursement of expenses \nis EUR [*amount in figures and in words*]. \n\n[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*]", - "page_start": 43, - "page_end": 43, - "source_file": "EN-Draft FWC for services 0142.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_GLW_2002.pdf", - "query": "What or Corning's corporate values ?", - "target_page": 12, - "target_passage": "Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "C O R P O R A T E V A L U E S : \nCorning’s Values provide an unchanging moral and ethical \ncompass that guides the actions of everyone in the company. The \ncorporate values are: Quality, Integrity, Performance, Leadership, \nInnovation, Independence, and The Individual. \n\nT O T A L Q U A L I T Y : \nIn alignment with the quality policy of the corporation, our policy is \nto achieve Total Quality performance. Total Quality performance \nmeans understanding who the customer is, what the requirements \nare, and meeting those requirements better than anyone else, \nwithout error, on time, every time.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "S C I E N C E & T E C H N O L O G Y \n\nCorning’s long history of extraordinary innovation continues in \nthe context of managing the sensitive balance between the near-term \nalignment of R&D and business objectives, and longer-range \ndiscovery research and new opportunity creation. \n\nOver the past year, we adjusted our R&D spending to align \nwith business conditions. At the same time, we carefully preserved \nour core technology capabilities to ensure our capacity to lead our \nmarkets and create life-changing innovations. \n\nWe have tightened our focus on high-impact projects and have \nstreamlined our processes to develop and commercialize promising \nopportunities more quickly and efficiently. We have emphasized \nour patent processes to ensure strong competitive positions from the \ncritical intellectual assets of our scientific organization. \n\nOur R&D organization is aligned with our operating goals and \nplays a critical role in meeting them. Our scientists and engineers \nare closely linked to our operations and are focused not only on \nnew product development, but also new process development. They \nare discovering new ways to manufacture innovative products with \nlowered cost and increased quality performance. \n\nInnovation is one of Corning’s core Values. It is the everyday \nlanguage and mindset of the company. Even in the face of difficult \neconomic conditions, we will pursue our tradition of developing \nbreakthrough technologies for the markets we serve — from \ntelecommunications to environmental — and will capitalize on the \ncreation of new market opportunities made possible by our strong \ncommitment to research and development. \n\n\n\nC R I T I C A L T E C H N O L O G I E S : C H E M I C A L V A P O R D E P O S I T I O N", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "We will long remember 2002 as one of the most challenging years — if not the most challenging — in Corning Incorporated’s \n\nlong history. I quickly became even more steeped in these challenges in April when, at the request of our Board of Directors, \n\nI returned to the company as Chairman and Chief Executive Officer. \n\n\n \n \n \n \n [html]\n
Since that time, I am increasingly convinced that, despite our downturn, the long - term fature of Corning remains bright andfilled with opportunity.But in the meantime, we have been living in a very difficult reality – one marked by ongoing quarterly losses and drops inrevenue... Six, our shareholders — dong with our employees and our friends in the communities we serve — felt the pain. We all assessed our breasses opened by hydroplased as sessions?Alasaumino notoxicity relexina, susterin ( r ) # wandeming group activities allowing allowed allows during allows would be next as susted, value continued its seemingly referenties decline.With the severe drop - off in revenues from our telecomminications customers, we knew we could no longer afford to keep up the costly infrastructure of facilities and staff we had in place. Pat simply, we couldn ' s speed more than we were makiWe also keew our strengths — and they were map? We keew were not → not had we ever been − menly atelecomminications company. Rather, we are a technology company, with the materials and process experies to createIde - changing products. That ' s what we ' ve been for all of our 152 years ; that ' s what we ' ll continue to be.And we knew something else... that our Vulues, the historic strength of our company, were alive and well. Quality, Integrity,Performance, Leadership, Imovation, Budependence and The Individual continue to guide our every move, and continue to set to appet from other companies — expecially those caught in the accounting scandals that marred the besiness wors
", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "The optical components market remains very weak and as \na result our photonic technologies business will need to take \nfurther action to reduce costs. In this challenging environment, \nwe have narrowed our product focus and continue to explore \nseveral strategic options. \n\nhave more than 1,000 scientists and researchers in our \nlaboratories. They are at the heart of our innovation engine, \nand they’re going to stay that way! \n\noperations throughout the world. These actions are key to \nreaching this goal of profitability. The optical fiber and cable \nbusiness remains challenging for the short term, but there is \nstill a great deal of long-term value to be realized in this \nbusiness. We believe our cost structure is coming in line with \nour current reduced revenue expectations. \n\nAnd in investing in our future, we are talking about more than \njust our scientific labs. We are continuing to invest in our \npeople — all 23,200 of them, in plants and offices throughout \nthe world — who are continuing to move us forward toward \nour goals. They have been through a lot during this downturn, \nand we have done our best to set a tone of open, honest \ncommunication, even when the news hasn’t been good. In the \nyear ahead, I’ve told our managers to place special emphasis \non our Value of*The Individual*… knowing that, in the end, \nthe commitment and contribution of all our employees will \ndetermine our success. \nLastly, we are continuing to drive down costs in our adminis- \ntrative and staff functions by standardizing processes and \ncentralizing activities wherever possible. \n\n**L O O K I N G A H E A D**\n\nAnd as we reach that goal of profitability — as a smaller, more \nfocused, yet highly diverse and balanced company — we are \nconfident that you, our shareholders, will experience greater \nreturns on your investments. \nAs a company, we have been through an extraordinarily diffi- \ncult time. We continue to face some formidable challenges. \nBut we are facing them with some equally formidable strengths. \n\n**I N V E S T I N G I N O U R F U T U R E**\n\nWe are one company with a proud history of innovation \nspanning more than 150 years. That legacy has created a \ndiverse business portfolio and strong market leadership. \n\nCorning Incorporated is more than the sum of its parts—much \nmore than a commercial enterprise. \n\nI continue to be extremely excited about the future opportunities \nemerging from our 152-year legacy of scientific innovations. \nWe are concentrating our efforts on high-impact, near-term \ngrowth initiatives with emphasis on our liquid-crystal display, \ndiesel filter, and chemical processing projects. \n\nWe have a time-tested set of Values and we rely on them \nto guide our every action. We also hold dear the pride of \nassociation that all who touch our corporation feel. \nShareholders, customers and employees understand that your \ncorporation has, for more than 150 years, produced useful \nand industry-creating products that have changed the lives \nof mankind. \n\nAnd we are certainly not giving up on optical communica- \ntions. We have the biggest share of the optical fiber market, \nby far, and continue to be the low-cost producer for anyone \nneeding to move information from place to place. So while \nwe’ve scaled back on production of fiber and other optical \nproducts, we certainly believe that they will continue to be \nan important part of our product mix again in the future. The \noptical communications industry is still in its infancy and we \nwill capitalize on our leadership position to grow both our \nearnings and return on shareholder equity. \n\nIn our long history, we’ve always come together in the face \nof a tough challenge — and you can count on us to continue \ndoing exactly that. I thank you for your continued confidence \nand assure you that we will succeed!", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "C O R N I N G T E L E C O M M U N I C A T I O N S \n\nThe ongoing malaise of the telecommunications industry led \nCorning to initiate significant restructurings during 2002. Optical \nfiber plant closings and workforce reductions were evidence of our \ncomprehensive plan to align expenses with dramatically lowered \nrevenues in our telecommunications businesses. Despite industry \nweakness, we remain the global leader in the manufacturing and sale \nof optical communications products. Our position will serve us well \nwhen the inevitable growth of this dynamic market returns. \n\nFor the near-term, we are focused on maintaining our leading position \nacross our markets and with our customers. Through our many \ngenerations of manufacturing technology development, we are \nrestoring our businesses to profitability despite continued pricing \npressure and low-volume growth expectations. \n\nLooking further ahead, we remain committed to creating innovative \noptical communications products that meet even tighter quality, \ncapability and cost requirements for our customers. We are empha- \nsizing metro and access segments of the market as our major oppor- \ntunities. And we are watching carefully for signs of market recovery. \nWhen that time comes, we will be poised for growth once again. \n\n\n\n\n\n\n\nC O R N I N G C A B L E S Y S T E M S : C A B L E A N D H A R D W A R E", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": ": 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of securities.CHANGE of ADDRESSCorning is an equal opportunity employer.Report change of address to ComputershareCorning is an equal opportunity employer.Investor Services at the above address.Printed in USAIN DEPENDENT ACCOUNTANTS() Corning Incorporated 2003PricewaterhouseCoopers LLP1301 Avenue of the AmericasNew York, NY 10019Corning IncorporatedOne Riverfront PlazaMean ( SD )Corning, NY 14831 - 000.60.97.9000WWW. Cwww. corning. com02BR24601EN", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "J A M E S B . F L A W S \n\nV I C E C H A I R M A N \nA N D C H I E F F I N A N C I A L O F F I C E R \n\nWe take great pride in saying that Corning continues to be \n\na financially sound company, thanks to the aggressive \n\nstrategies we executed throughout 2002. Although it has \n\nbeen a very painful process, we have dramatically slowed \n\nthe rate at which we are spending cash. We ended the year \n\nwith a balance of cash and short-term investments of \n\n$2.1 billion. And we have access to $2 billion in credit \n\nthat we haven’t touched — and don’t plan to. We also \n\ncontinue to pay down debt each quarter. This, combined \n\nwith our plan to return to profitability in 2003, gives us \n\na high degree of confidence in our ability to meet any \n\nfuture financial obligations. So, we feel very good about our \n\nliquidity position right now. \n\nThe ongoing economic weakness and uncertainty in world \n\nevents continue to make the overall business environment \n\na volatile one. Still, we have greatly improved our ability \n\nto forecast revenues and expenses quarter-to-quarter, and \n\nwe are encouraged by the near-term growth potential of \n\nour non-telecommunications businesses — especially our \n\nliquid-crystal display, environmental and semiconductor \n\nbusinesses. If these markets continue to grow as we expect, \n\nwe are confident that we will be able to meet our goals. \n\nWe know that our shareholders are most eager to see a \n\ngreater return on their investment with Corning, and of \n\ncourse our return to profitability will be key to building back \n\nWall Street’s confidence. We are 100 percent committed \n\nto reaching that goal of profitability in 2003 — and doing \n\nso within the rigorous compliance rules by which we \n\nhave always been guided. Integrity characterizes all our \n\nrelationships, both inside and outside of Corning, and we \n\nwill never compromise that foundation of our reputation. \n\n\n \n \n \n \n [html]\n
W E N D E L LPW E E K SP R E S I D E N T A N D C H IE F
II of heavest justianes, seau, Attitudes, and severe interventions, and interventions, and interventions, and interventions, and interventions, and interventions, and assessments, and assessments, and assessments, and assessmpAt have analysis of heart of caregiverse of caregivers and interests of caregiverses ( increased services ) and intervention of caregiversing and intervention of caregiversity of caregivers, increased interventions ( increased to caAt 300 ( and 100 mg / dl ) of 100 mg / dl ( 2000 ) Totalisation ( 400 mg / dl ) of 300 mg / dl ) Totalisation ( 400 mg / dl ) or 300 mg / dl ) at 300 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 300 mg / dl ) at 300In retrommentations to not sex on plasmong on a readed excesserver in SW, We leve eliped secon strother to researcher developed second stroting exercise to resecurities and securities. The levels after they were to response of onpine cra
Mineral - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - line - linear - linear - line - linear - line - linear - linear - line - linear - line - linear - line - line - line - line - linear -
", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
CORNING TECHNOLOGIES26 ′
Table___
\n\nWe haven’t touched our $2 billion in credit — and we don’t \nintend to. We maintain our access to this credit by keeping our \ndebt-to-capital ratio lower than 60 percent. Our ratio at year \nend was 46.7 percent, well within the compliance range in our \ncredit agreement. And as we execute on our plan to pay down \ndebt, that ratio will drop even further. \n\n**W H A T W E D I D**\n\nSo, armed with full recognition of both our challenges and our \nstrengths, we set out to re-shape the company, adjusting to the \nnew realities of the market. \n\npayments. Beyond severance, our actual cash usage for our \noperations has become very low. We have also added to our \ncash reserves through such actions as our preferred stock \noffering in July, and the sale of our Ohio-based precision lens \nbusiness to 3M late in the year. As a result of all these actions, \nwe were able to end the year with about $2.1 billion in cash \nand short-term investments. \nDuring 2002, we relied on our Values to set the context in \nwhich we operated. From there, we focused relentlessly on a \nvery clear plan with three priorities: \n\nn TO PRESERVE THE FINANCIAL HEALTH OF THE COMPANY; \nn TO RETURN TO PROFITABILITY IN 2003; \nn TO CONTINUE TO INVEST IN OUR FUTURE. \n\nIn keeping with this strategy, we also continue to pay down \ndebt each quarter. Over the course of 2002 and the first month \nof this year, we repaid about $975 million in debt, including \ncommercial paper. \n\nDuring the course of the year — with a recovery in the \ntelecommunications industry still nowhere in sight — we \nrestructured the company and dramatically lowered our cost \nstructure. Meanwhile, we focused our research and develop- \nment efforts and recommitted ourselves to building those \nbusinesses which presented the most attractive near-term \nopportunities for growth — a large part of which are outside \nthe telecommunications segment. Our diverse portfolio and \nwealth of skills across a wide variety of markets had never \nbeen more important. \n\nAll that said, we are preserving what we believe is a strong \nliquidity position. And our balance sheet will continue to \nimprove in 2003 as we gain more benefits from last year’s \nrestructuring actions. We will continue to maintain our focus \non improving our cash flow and reducing our debt levels as \nwe look ahead to our longer-term goal of regaining an invest- \nment-grade debt rating. \n\nThe plan — painful though it is — is working. \n\n**P R E S E R V I N G O U R F I N A N C I A L H E A L T H**\n\nNow, let’s take a look at our financial picture. Our 2002 sales \nfrom continuing operations were $3.2 billion, a significant \ndecline from 2001 sales of $6.1 billion. Losses in our \ntelecommunications segment and significant restructuring \nand impairment charges drove a net loss of $1.3 billion or \n$1.39 per share in 2002. \n\n**R E T U R N I N G T O P R O F I T A B I L I T Y**\n\nIn 2003, we will focus our energy on the plan to return to \nprofitability. We are on track to reach that goal, and let me \nexplain a few of the reasons why. \n\nDespite these lowered revenues and net loss, I take great \npride in saying that Corning continues to be a financially \nsound company. We developed a three-part plan for achieving \nthis goal: maintaining significant cash balances; using excess \ncash to reduce our debt; and continuing to have access to our \n$2 billion revolving line of credit. And we have achieved \nsignificant success in each of these areas.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "[html]to shareholders on or about March 12.2003. The proxy statement can also be accessed electronically through the Investorforward - looking statements involve risks and uncertainties that may cause the outcome to be materially different. SuchRelations category of the Corning home page on the Internet at www. corning. com. A summary report of the proceedingsrisks and uncertainties include, but are not limited to :at the annual meeting will be available without charge uponStrategieswritten request to Ms. Denise A. Hauselt, Secretary andStrategy ( malaria )Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,Specificity, prevention, specification, specification, specification, specification, specification, specification, specification, specification, specification, specialized, specification, specialized, specificatiopCorning, NY 14831.ControllinteractionsADD1T10NAL INFORMAT10N— cost reductions,A copy of Corning ’ s 2002 Annual Report on Form 10 - K filed— availability and costs of critical material :with the Securities and Exchange Commission is available— new product development and commerciupon written request to Ms. Denise A. Hauselt, Secretary and— attracting and retaining key personnel,Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,— order activity and demand from major custorCorning, NY 14831. The Annual Report on Form 10 - K can— fluctuations in capital spending by customersalso be accessed electronically through the Investor Relationsin the telecommunications industry and othercategory of the home page on the Internet at :business segments,www. corning. com− financial condition of customers,IN VESTOR TNFORMAT1ON— changes in the mix of sales between premiumInvestment analysts who need additional information mayand non - premium products,contact Mr. Kenneth C. Sofio, Manager of Investor Relations,— facility expansions and new plant start - up costs,Corning Incorporated, HQ - E2 - 25, Corning, NY 14831 ;— adverse intigalison or regulatory developments, includingTelephone 607.974.9000future or pending tax legislation,C 0 M MO N S TOC K— capital resource and cash flow activities,Corning Incorporated common stock is listed on the− capital spending,New York Stock Exchange and the SWX Swiss Exchange.— equity company activities,In addition, it is traded on the Boston, Midwest, Pacific− interest costs,and Philadelphia stock exchanges. Common stock options— acquisition and divestiture activity,are traded on the Chicago Board Options Exchange. The— the rate of technology change,abbreviated ticker symbol for Corning Incorporated is “ GLW.”— the ability to enforce patents,TRANSFER AGENT AND REGISTRAR— product performance issues,Computershare Investor Services LLLC— stock price fluctuations, andP. O. Box A - 3504— other risks detailed in Corning ’ s SEC filings.Chicago, IL 60690 - 3504Neither this report nor any statement contained herein isTelephone : 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "“We will continue to pursue \nopportunities to grow and \nenhance shareholder value. \nWe plan to actively seek strategic \nacquisitions; look for additional \nbranch locations in higher- \ngrowth areas to expand our \nexisting banks; and increase \nour mortgage and \n.brokerage operations.”", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_GLW_2002.pdf", - "query": "As a Corning's investor, how can I get a summary of the annual meeting of shareholders ?", - "target_page": 11, - "target_passage": "A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "[html]to shareholders on or about March 12.2003. The proxy statement can also be accessed electronically through the Investorforward - looking statements involve risks and uncertainties that may cause the outcome to be materially different. SuchRelations category of the Corning home page on the Internet at www. corning. com. A summary report of the proceedingsrisks and uncertainties include, but are not limited to :at the annual meeting will be available without charge uponStrategieswritten request to Ms. Denise A. Hauselt, Secretary andStrategy ( malaria )Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,Specificity, prevention, specification, specification, specification, specification, specification, specification, specification, specification, specification, specialized, specification, specialized, specificatiopCorning, NY 14831.ControllinteractionsADD1T10NAL INFORMAT10N— cost reductions,A copy of Corning ’ s 2002 Annual Report on Form 10 - K filed— availability and costs of critical material :with the Securities and Exchange Commission is available— new product development and commerciupon written request to Ms. Denise A. Hauselt, Secretary and— attracting and retaining key personnel,Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,— order activity and demand from major custorCorning, NY 14831. The Annual Report on Form 10 - K can— fluctuations in capital spending by customersalso be accessed electronically through the Investor Relationsin the telecommunications industry and othercategory of the home page on the Internet at :business segments,www. corning. com− financial condition of customers,IN VESTOR TNFORMAT1ON— changes in the mix of sales between premiumInvestment analysts who need additional information mayand non - premium products,contact Mr. Kenneth C. Sofio, Manager of Investor Relations,— facility expansions and new plant start - up costs,Corning Incorporated, HQ - E2 - 25, Corning, NY 14831 ;— adverse intigalison or regulatory developments, includingTelephone 607.974.9000future or pending tax legislation,C 0 M MO N S TOC K— capital resource and cash flow activities,Corning Incorporated common stock is listed on the− capital spending,New York Stock Exchange and the SWX Swiss Exchange.— equity company activities,In addition, it is traded on the Boston, Midwest, Pacific− interest costs,and Philadelphia stock exchanges. Common stock options— acquisition and divestiture activity,are traded on the Chicago Board Options Exchange. The— the rate of technology change,abbreviated ticker symbol for Corning Incorporated is “ GLW.”— the ability to enforce patents,TRANSFER AGENT AND REGISTRAR— product performance issues,Computershare Investor Services LLLC— stock price fluctuations, andP. O. Box A - 3504— other risks detailed in Corning ’ s SEC filings.Chicago, IL 60690 - 3504Neither this report nor any statement contained herein isTelephone : 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "Management’s Discussion and Analysis … 32 \n\nConsolidated Financial Statements and Notes … 39 \n\nEleven-Year Summary … 56 \n\nReports of Independent Auditors … 58 \n\nA Message from the Board of Directors … 61 \n\nBoard of Directors and Officers … 62", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": ": 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of securities.CHANGE of ADDRESSCorning is an equal opportunity employer.Report change of address to ComputershareCorning is an equal opportunity employer.Investor Services at the above address.Printed in USAIN DEPENDENT ACCOUNTANTS() Corning Incorporated 2003PricewaterhouseCoopers LLP1301 Avenue of the AmericasNew York, NY 10019Corning IncorporatedOne Riverfront PlazaMean ( SD )Corning, NY 14831 - 000.60.97.9000WWW. Cwww. corning. com02BR24601EN", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "We will long remember 2002 as one of the most challenging years — if not the most challenging — in Corning Incorporated’s \n\nlong history. I quickly became even more steeped in these challenges in April when, at the request of our Board of Directors, \n\nI returned to the company as Chairman and Chief Executive Officer. \n\n\n \n \n \n \n [html]\n
Since that time, I am increasingly convinced that, despite our downturn, the long - term fature of Corning remains bright andfilled with opportunity.But in the meantime, we have been living in a very difficult reality – one marked by ongoing quarterly losses and drops inrevenue... Six, our shareholders — dong with our employees and our friends in the communities we serve — felt the pain. We all assessed our breasses opened by hydroplased as sessions?Alasaumino notoxicity relexina, susterin ( r ) # wandeming group activities allowing allowed allows during allows would be next as susted, value continued its seemingly referenties decline.With the severe drop - off in revenues from our telecomminications customers, we knew we could no longer afford to keep up the costly infrastructure of facilities and staff we had in place. Pat simply, we couldn ' s speed more than we were makiWe also keew our strengths — and they were map? We keew were not → not had we ever been − menly atelecomminications company. Rather, we are a technology company, with the materials and process experies to createIde - changing products. That ' s what we ' ve been for all of our 152 years ; that ' s what we ' ll continue to be.And we knew something else... that our Vulues, the historic strength of our company, were alive and well. Quality, Integrity,Performance, Leadership, Imovation, Budependence and The Individual continue to guide our every move, and continue to set to appet from other companies — expecially those caught in the accounting scandals that marred the besiness wors
", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "The following table sets out the number of directors’ D I R E C T O R S ’ M E E T I N G S \n\nmeetings held during the Financial Year and the number of meetings attended by each director \n\nwhilst they were a director of the Company. During the Financial Year, 12 board meetings were \n\nheld. The only board committee, the audit committee, met twice during the Financial Year. \n\n**Directors** **Shares** **Share Options** **Total**\n\n**Direct** **Indirect** **Indirect**\n\nA G Birchmore - 13,679,300 47,000 13,906,300 \n\nM F Bradley - - - - \n\nJ H Carver 13,631,300 - 20,000 13,651,300 \n\nD A Dillon - 1,510,000 - 1,510,000 \n\nJ A S Mews - 1,500,000 - 1,500,000 \n\nR M Reid - - - - \n\nThe Board reviews the remuneration packages of all directors and D I R E C T O R S ’ R E M U N E R A T I O N \n\nexecutive officers on an annual basis. Remuneration packages may contain as key elements: \n\na. Salary; \n\nb. Benefits - including the provision of motor vehicle and superannuation; and \n\nc. Incentive Schemes - including share options under the Employee Option Plan. \n\nThe table immediately below sets out the total remuneration of directors of the Company. \n\n\n \n \n \n \n [html]NameOffice\n
SalaryOther ( i )Total
$$$
A G BirchmoreChairman144.2314.846149.077
J H CarverExecutive Director184.61521.484206.099
D A DillonExecutive Director149.99912.201162.200
J A S MewsNon - Executive Director28.8462.01930.865
\n\n\n\n\n\nAs at the date of this report, directors’ interests in shares and D I R E C T O R S ’ S H A R E H O L D I N G S \n\noptions of the Company are as follows:", - "page_start": 35, - "page_end": 35, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "**Additional Information**compiled as at 12 March 2015 \n\n**Shareholding**\n\n**Substantial Shareholders**\nThe names of the substantial shareholders in the Company, the number of equity securities to which each substantial \nshareholder and substantial holder’s associates have a relevant interest, as disclosed in substantial holding notices \ngiven to the Company: \n\n**Units**\n305,667 \n3,651,522 \n5,828,311 \n43,133,168 \n 496,432,559 \n 549,351,227 \n\n**% Issued Capital**\n\n**Unlisted Options**\n- \n- \n- \n1 \n 3 \n 4 **Unlisted RSUs**\n1 \n12 \n10 \n20 \n 10 \n 53 0.06 \n0.66 \n1.06 \n7.85 \n 90.37 \n 100.00 \n\n**Name**\n\n**%_**\n6.76 \n5.73 IOOF HOLDINGS LIMITED \nACORN CAPITAL LIMITED \n\n**Distribution of Equity Securities**\n\n**Size of Holding**\n\n**Range**\n1-1,000 \n 1,001-5,000 \n5,001-10,000 \n10,001-100,000 \n100,001-9,999,999 \nTotal **Total Holders**\n673 \n1,196 \n723 \n1,344 \n 240 \n 4,176 \n\nThere are 525 shareholders with less than a marketable parcel of shares. \n\n**Voting Rights**\n*Fully paid ordinary shares*\nAt meetings of members or classes of members: \na) \nb) \n\nEach member entitled to vote may vote in person or by proxy, attorney or representative; \non a show of hands, every person present who is a member or proxy, attorney or representative of a member \nhas one vote; and, \non a poll, every person present who is a member or a proxy, attorney or representative of a member has: c) \n\ni) \n\nfor each fully paid share held by him, or in respect of which he is appointed a proxy, attorney or \nrepresentative, one vote for the share; and, \nfor each partly paid share, only the fraction of one vote which the amount paid (not credited) on \nthe share bears to the total amounts paid and payable on the share (excluding amounts credited) \nsubject to any rights or restrictions attached to any shares or class or classes of shares.", - "page_start": 110, - "page_end": 110, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**PART III**\n\n**Item 10. Directors, Executive Officers and Corporate Governance.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nExecutive Officers \nDirector Elections \nBoard Committees and Charters \nDirector Nominating Process \nWebsite Access to Corporate Governance Documents \nSection 16(a) Beneficial Ownership Reporting Compliance \nCorporate Governance \n\nThe certifications of our President and Chief Financial Officer required pursuant to Sections 302 and 906 of the Sarbanes-Oxley Act of 2002 \nare included as exhibits to this Annual Report on Form 10-K and were included as exhibits to each of our quarterly reports on Form 10-Q. \nOur President certified to the New York Stock Exchange (“NYSE”) on May 15, 2014 pursuant to Section 303A.12(a) of the NYSE’s listing \nstandards, that he was not aware of any violation by the Company of the NYSE’s corporate governance listing standards as of that date. \n\n**Item 11. Executive Compensation.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nCompensation of Executive Officers \nCompensation Discussion and Analysis \nDirector Compensation \nCompensation Committee Interlocks and Insider Participation \n\n**Item 12. Security Ownership of Certain Beneficial Owners and Management and Related Shareholder Matters.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nSecurity Ownership of Certain Beneficial Owners and Management \nEquity Compensation Plans \n\n**Item 13. Certain Relationships and Related Transactions, and Director Independence.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nElection of Directors \nCertain Relationships and Related Transactions \n\n**Item 14. Principal Accounting Fees and Services.**\n\nThe information required under this item is included in the following section of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the section of which is incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nRatification of the Appointment of Independent Registered Public Accounting Firm", - "page_start": 79, - "page_end": 79, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
SCHEDULE OF QUARTERLY RESULTSINVESTOR RELATIONSCOMMON STOCK
Send inquiries to :HON INDUSTRIES common stock tradesThe Company operates on a fiscal year ending
Investor Relationson the New York Stock Exchange under theon the Saturday nearest December 31. Quar -
HON INDUSTRIES Inc.symbol : HNI. Stock price quotations can beterly results are typically announced within 25
414 East Third Streetfound in major daily newspapers and Thedays after the end of each quarter, and audited
Muscatine, IA 52761Wall Street Journal.results are typically announced within 40 days
Telephone : 56 ( 3.264.7400after year - end.Fax : 563.264.7655
TRANSFER AGENTFISCAL zoo4E - mail : investorrelations @ honi. com
Shareholders may report a change of address or make inquiries by writing or calling :QUARTER - END DATESCORPORATE HEADQUARTERS
1st Quarter : Saturday, April 3HON INDUSTRIES Inc.Computershare Investor Services, LLC
2nd Quarter : Saturday, July 3414 East Third Street2 North LaSalle Street
3rd Quarter : Saturday, October 2P. O. Box 1109Chicago, IL 60602
4th Quarter : Saturday, January 1Muscatine, IA 52761 - 0071Telephone : 312.588.4991
AN NUAL MEETINGTelephone : 56 ( 3.264.7400The Company ’ s annual shareholders ’ meeting
Fax : 563.264.7217will be held at 10 : 30 a. m. on May 4.2004, atWebsite : www. honi. com
the Holiday Inn, Highways 61 & 38 North,Muscatine, Iowa. Shareholders and otherINDEPENDENT PUBLIC
interested investors are encouraged to attendPricewaterhouseCoopers LLPthe meeting.
One North Wacker DriveChicago, IL 60606
\n\n**F O R W A R D - L O O K I N G S T A T E M E N T S**\n\nStatements in this report that are not strictly historical, including statements as to **•**changes in demand and order patterns from the Company’s customers, par- \n\nplans, objectives, and future financial performance, are “forward-looking” state- ticularly its top ten customers, which represented approximately 36% of net sales \n\nments that are made pursuant to the safe harbor provisions of the Private Securities in 2003; \n\nLitigation Reform Act of 1995. Forward-looking statements involve known and **•** issues associated with acquisitions and integration of acquisitions; \n\nunknown risks, which may cause the Company’s actual results in the future to dif- **•**the ability of the Company to realize cost savings and productivity improve- \n\nfer materially from expected results. These risks include, among others: ments from its cost containment and business simplification initiatives; \n\n**•**competition within the office furniture and fireplace industries, including **•**the ability of the Company to realize financial benefits from investments in new \n\ncompetition from imported products and competitive pricing; products; \n\n**•** increases in the cost of raw materials, including steel, which is the Company’s **•**the ability of the Company’s distributors and dealers to successfully market \n\nK \nR \nO \nY \n\nW \nE \nN \n,", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**The Directors present their report together with the financial report of Santos Ltd (“the Company”) and the consolidated financial report of**\n**the consolidated entity, being the Company and its controlled entities, for the financial year ended 31 December 2004, and the auditor**\n**report thereon. Information in this Annual Report referred to by page number in this report or contained in a Note to the financial**\n**statements referred to in this report is to be read as part of this report.**\n\n**1. Directors, Directors’ Shareholdings and Directors’ Meetings**\n\nThe names of Directors of the Company in office at the date of this report and details of the relevant interest of each of those Directors in shares in \nthe Company at that date are as set out below: \n\n**Surname** **Other Names**\n**Shareholdings in**\n**Santos Ltd**\n**Surname** **Other Names**\n\n**Shareholdings in**\n**Santos Ltd**\n\n\n \n \n \n \n [html]Shareholdings inShareholdings in\n
SurnameOther NamesSurnameOther Names
Santos LtdSantos LtdOrdinaryFranked
OrdinaryFrankedSharesUnsecuredSharesUnsecuredEquityEquity
ListedListedSecuritiesSecuritiesBarnettPeter Charles12.394-
HardingRichard Michael.--Ellice - FlintJohn CharlesMcGregorGraeme William
\n\nNo Director holds shares in any related body corporate, other than in \ntrust for the Company. \nExcept where otherwise indicated, all shareholdings are of fully paid \nordinary shares. \n\nAt the date of this report, Mr J C Ellice-Flint holds 3,000,000 options under the Santos Executive Share Option Plan and subject to the further terms \ndescribed in Note 18 to the financial statements. \n\nDetails of the qualifications, experience and special responsibilities of each Director are set out on page 41 of this Annual Report. \n\n**Directors’ Meetings**\n\nThe number of Directors’ Meetings and meetings of committees of Directors held during the financial year and the number of meetings attended by \neach Director are as follows: \n**Surname** **Other Names**\n**Directors’**\n**Meetings** **Audit**\n**Committee** **Remuneration**\n**Committee** **Finance**\n**Committee** **Nomination**\n**Committee**", - "page_start": 48, - "page_end": 48, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "andthe CEO and summarised incomposition of the Remunerationpresentation to theCommittee and details ofRemuneration Committee of the", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_GLW_2002.pdf", - "query": "How many employees did Corning company count at the end of 2002 ?", - "target_page": 5, - "target_passage": "We are continuing to invest in our people — all 23,200 of them", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "We will long remember 2002 as one of the most challenging years — if not the most challenging — in Corning Incorporated’s \n\nlong history. I quickly became even more steeped in these challenges in April when, at the request of our Board of Directors, \n\nI returned to the company as Chairman and Chief Executive Officer. \n\n\n \n \n \n \n [html]\n
Since that time, I am increasingly convinced that, despite our downturn, the long - term fature of Corning remains bright andfilled with opportunity.But in the meantime, we have been living in a very difficult reality – one marked by ongoing quarterly losses and drops inrevenue... Six, our shareholders — dong with our employees and our friends in the communities we serve — felt the pain. We all assessed our breasses opened by hydroplased as sessions?Alasaumino notoxicity relexina, susterin ( r ) # wandeming group activities allowing allowed allows during allows would be next as susted, value continued its seemingly referenties decline.With the severe drop - off in revenues from our telecomminications customers, we knew we could no longer afford to keep up the costly infrastructure of facilities and staff we had in place. Pat simply, we couldn ' s speed more than we were makiWe also keew our strengths — and they were map? We keew were not → not had we ever been − menly atelecomminications company. Rather, we are a technology company, with the materials and process experies to createIde - changing products. That ' s what we ' ve been for all of our 152 years ; that ' s what we ' ll continue to be.And we knew something else... that our Vulues, the historic strength of our company, were alive and well. Quality, Integrity,Performance, Leadership, Imovation, Budependence and The Individual continue to guide our every move, and continue to set to appet from other companies — expecially those caught in the accounting scandals that marred the besiness wors
", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "C O R N I N G T E L E C O M M U N I C A T I O N S \n\nThe ongoing malaise of the telecommunications industry led \nCorning to initiate significant restructurings during 2002. Optical \nfiber plant closings and workforce reductions were evidence of our \ncomprehensive plan to align expenses with dramatically lowered \nrevenues in our telecommunications businesses. Despite industry \nweakness, we remain the global leader in the manufacturing and sale \nof optical communications products. Our position will serve us well \nwhen the inevitable growth of this dynamic market returns. \n\nFor the near-term, we are focused on maintaining our leading position \nacross our markets and with our customers. Through our many \ngenerations of manufacturing technology development, we are \nrestoring our businesses to profitability despite continued pricing \npressure and low-volume growth expectations. \n\nLooking further ahead, we remain committed to creating innovative \noptical communications products that meet even tighter quality, \ncapability and cost requirements for our customers. We are empha- \nsizing metro and access segments of the market as our major oppor- \ntunities. And we are watching carefully for signs of market recovery. \nWhen that time comes, we will be poised for growth once again. \n\n\n\n\n\n\n\nC O R N I N G C A B L E S Y S T E M S : C A B L E A N D H A R D W A R E", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
CORNING TECHNOLOGIES26 ′
Table___
\n\nWe haven’t touched our $2 billion in credit — and we don’t \nintend to. We maintain our access to this credit by keeping our \ndebt-to-capital ratio lower than 60 percent. Our ratio at year \nend was 46.7 percent, well within the compliance range in our \ncredit agreement. And as we execute on our plan to pay down \ndebt, that ratio will drop even further. \n\n**W H A T W E D I D**\n\nSo, armed with full recognition of both our challenges and our \nstrengths, we set out to re-shape the company, adjusting to the \nnew realities of the market. \n\npayments. Beyond severance, our actual cash usage for our \noperations has become very low. We have also added to our \ncash reserves through such actions as our preferred stock \noffering in July, and the sale of our Ohio-based precision lens \nbusiness to 3M late in the year. As a result of all these actions, \nwe were able to end the year with about $2.1 billion in cash \nand short-term investments. \nDuring 2002, we relied on our Values to set the context in \nwhich we operated. From there, we focused relentlessly on a \nvery clear plan with three priorities: \n\nn TO PRESERVE THE FINANCIAL HEALTH OF THE COMPANY; \nn TO RETURN TO PROFITABILITY IN 2003; \nn TO CONTINUE TO INVEST IN OUR FUTURE. \n\nIn keeping with this strategy, we also continue to pay down \ndebt each quarter. Over the course of 2002 and the first month \nof this year, we repaid about $975 million in debt, including \ncommercial paper. \n\nDuring the course of the year — with a recovery in the \ntelecommunications industry still nowhere in sight — we \nrestructured the company and dramatically lowered our cost \nstructure. Meanwhile, we focused our research and develop- \nment efforts and recommitted ourselves to building those \nbusinesses which presented the most attractive near-term \nopportunities for growth — a large part of which are outside \nthe telecommunications segment. Our diverse portfolio and \nwealth of skills across a wide variety of markets had never \nbeen more important. \n\nAll that said, we are preserving what we believe is a strong \nliquidity position. And our balance sheet will continue to \nimprove in 2003 as we gain more benefits from last year’s \nrestructuring actions. We will continue to maintain our focus \non improving our cash flow and reducing our debt levels as \nwe look ahead to our longer-term goal of regaining an invest- \nment-grade debt rating. \n\nThe plan — painful though it is — is working. \n\n**P R E S E R V I N G O U R F I N A N C I A L H E A L T H**\n\nNow, let’s take a look at our financial picture. Our 2002 sales \nfrom continuing operations were $3.2 billion, a significant \ndecline from 2001 sales of $6.1 billion. Losses in our \ntelecommunications segment and significant restructuring \nand impairment charges drove a net loss of $1.3 billion or \n$1.39 per share in 2002. \n\n**R E T U R N I N G T O P R O F I T A B I L I T Y**\n\nIn 2003, we will focus our energy on the plan to return to \nprofitability. We are on track to reach that goal, and let me \nexplain a few of the reasons why. \n\nDespite these lowered revenues and net loss, I take great \npride in saying that Corning continues to be a financially \nsound company. We developed a three-part plan for achieving \nthis goal: maintaining significant cash balances; using excess \ncash to reduce our debt; and continuing to have access to our \n$2 billion revolving line of credit. And we have achieved \nsignificant success in each of these areas.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**32**| EMPLOYEES", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "507 )( 73 )7Total assets :2003$ 141.658$33$ 10.340$ 6.721$2002112.76559.55410.9616.2551872001114.28056.09011.4805.373", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "C O R P O R A T E V A L U E S : \nCorning’s Values provide an unchanging moral and ethical \ncompass that guides the actions of everyone in the company. The \ncorporate values are: Quality, Integrity, Performance, Leadership, \nInnovation, Independence, and The Individual. \n\nT O T A L Q U A L I T Y : \nIn alignment with the quality policy of the corporation, our policy is \nto achieve Total Quality performance. Total Quality performance \nmeans understanding who the customer is, what the requirements \nare, and meeting those requirements better than anyone else, \nwithout error, on time, every time.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": ": 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of securities.CHANGE of ADDRESSCorning is an equal opportunity employer.Report change of address to ComputershareCorning is an equal opportunity employer.Investor Services at the above address.Printed in USAIN DEPENDENT ACCOUNTANTS() Corning Incorporated 2003PricewaterhouseCoopers LLP1301 Avenue of the AmericasNew York, NY 10019Corning IncorporatedOne Riverfront PlazaMean ( SD )Corning, NY 14831 - 000.60.97.9000WWW. Cwww. corning. com02BR24601EN", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "J A M E S B . F L A W S \n\nV I C E C H A I R M A N \nA N D C H I E F F I N A N C I A L O F F I C E R \n\nWe take great pride in saying that Corning continues to be \n\na financially sound company, thanks to the aggressive \n\nstrategies we executed throughout 2002. Although it has \n\nbeen a very painful process, we have dramatically slowed \n\nthe rate at which we are spending cash. We ended the year \n\nwith a balance of cash and short-term investments of \n\n$2.1 billion. And we have access to $2 billion in credit \n\nthat we haven’t touched — and don’t plan to. We also \n\ncontinue to pay down debt each quarter. This, combined \n\nwith our plan to return to profitability in 2003, gives us \n\na high degree of confidence in our ability to meet any \n\nfuture financial obligations. So, we feel very good about our \n\nliquidity position right now. \n\nThe ongoing economic weakness and uncertainty in world \n\nevents continue to make the overall business environment \n\na volatile one. Still, we have greatly improved our ability \n\nto forecast revenues and expenses quarter-to-quarter, and \n\nwe are encouraged by the near-term growth potential of \n\nour non-telecommunications businesses — especially our \n\nliquid-crystal display, environmental and semiconductor \n\nbusinesses. If these markets continue to grow as we expect, \n\nwe are confident that we will be able to meet our goals. \n\nWe know that our shareholders are most eager to see a \n\ngreater return on their investment with Corning, and of \n\ncourse our return to profitability will be key to building back \n\nWall Street’s confidence. We are 100 percent committed \n\nto reaching that goal of profitability in 2003 — and doing \n\nso within the rigorous compliance rules by which we \n\nhave always been guided. Integrity characterizes all our \n\nrelationships, both inside and outside of Corning, and we \n\nwill never compromise that foundation of our reputation. \n\n\n \n \n \n \n [html]\n
W E N D E L LPW E E K SP R E S I D E N T A N D C H IE F
II of heavest justianes, seau, Attitudes, and severe interventions, and interventions, and interventions, and interventions, and interventions, and interventions, and assessments, and assessments, and assessments, and assessmpAt have analysis of heart of caregiverse of caregivers and interests of caregiverses ( increased services ) and intervention of caregiversing and intervention of caregiversity of caregivers, increased interventions ( increased to caAt 300 ( and 100 mg / dl ) of 100 mg / dl ( 2000 ) Totalisation ( 400 mg / dl ) of 300 mg / dl ) Totalisation ( 400 mg / dl ) or 300 mg / dl ) at 300 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 300 mg / dl ) at 300In retrommentations to not sex on plasmong on a readed excesserver in SW, We leve eliped secon strother to researcher developed second stroting exercise to resecurities and securities. The levels after they were to response of onpine cra
Mineral - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - line - linear - linear - line - linear - line - linear - linear - line - linear - line - linear - line - line - line - line - linear -
", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "S C I E N C E & T E C H N O L O G Y \n\nCorning’s long history of extraordinary innovation continues in \nthe context of managing the sensitive balance between the near-term \nalignment of R&D and business objectives, and longer-range \ndiscovery research and new opportunity creation. \n\nOver the past year, we adjusted our R&D spending to align \nwith business conditions. At the same time, we carefully preserved \nour core technology capabilities to ensure our capacity to lead our \nmarkets and create life-changing innovations. \n\nWe have tightened our focus on high-impact projects and have \nstreamlined our processes to develop and commercialize promising \nopportunities more quickly and efficiently. We have emphasized \nour patent processes to ensure strong competitive positions from the \ncritical intellectual assets of our scientific organization. \n\nOur R&D organization is aligned with our operating goals and \nplays a critical role in meeting them. Our scientists and engineers \nare closely linked to our operations and are focused not only on \nnew product development, but also new process development. They \nare discovering new ways to manufacture innovative products with \nlowered cost and increased quality performance. \n\nInnovation is one of Corning’s core Values. It is the everyday \nlanguage and mindset of the company. Even in the face of difficult \neconomic conditions, we will pursue our tradition of developing \nbreakthrough technologies for the markets we serve — from \ntelecommunications to environmental — and will capitalize on the \ncreation of new market opportunities made possible by our strong \ncommitment to research and development. \n\n\n\nC R I T I C A L T E C H N O L O G I E S : C H E M I C A L V A P O R D E P O S I T I O N", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_GLW_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", - "query": "What is the shortcut to mute myself in MS teams ?", - "target_page": 3, - "target_passage": "Use [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help \nyou get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team. \n\n**Set up**\n\n**Explore**\nOnce you sign in,**connect**with your team in \nchat, channels, calls, and meetings. \n\n**Download**the app for desktop and mobile to \naccess Teams with the best performance \nanywhere you go. \n\n**Hit the ground running now!**Build confidence by trying things on your own. Go to the meet now button \n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!", - "page_start": 0, - "page_end": 0, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**\n\n\n\n**1**\n\n**8**", - "page_start": 1, - "page_end": 1, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left \npanel along with all its associated channels. You can choose to \"show\" the \nmost relevant chanels and \"hide\" the rest. \n\nBy default, your chats will be arranged along the left-hand side of the chat \npanel, with the most recent messages at the top. You can right-click on any \nchat and select \"Pin,\" which will keep it at the top of your list for quick access. \n\nTo**create a new chat**, press [CTRL] + [N] (or look for the pen symbol at the \ntop of the chat list) and add the names of anyone you want to include. Type \nyour message and select Send or hit [Enter]. \n\n\n\n\n\n\n\n**Teams**\nA**team**is a broad group of people that work together to get something \ndone. You can choose who is part of the team, and people can only access \nshared content by invitation. All teams are created with an associated \nGeneral channel that includes all team members by default. \n\n\n\n\n\n\nDaichi, Eva, +2 \nYes, that should work for us \n11:00 AM \n\nMarketing Sync \nSharing notes after the meeting \n10:45 AM \n\nTo**share a file**select “Attach” under the box where you type messages, select \nthe file location and then the file you want. Depending on the location of the file, \nyou’ll get options for uploading a copy, sharing a link, or other ways to share. \n\n**Channels**\nA**channel**is a central hub for a specific topic, within the larger team, where \npeople can hold focused conversations and organize a library of files. \n\nChannels can be: \n• Standard (visible to everyone on the team) \n• Private (only visible to select team members) \n• Shared (visible to invited team members and external members of your \n\norganization who are not on the team) \n\n\n\nAN \n\n\n\n1:1 Chat \n\nGroup Chat \n\nMeeting Chat", - "page_start": 3, - "page_end": 3, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**Meeting essentials**\n**Meeting controls**\n\nWhen you join meetings, a different window will pop-up. These are the controls you need to know: \n\n**Create meetings**\n\n1. \n\nSelect**+ New meeting**or double-click on a time in your \ncalendar to create a new meeting. \n**1** **2** **3** **4** **5** **6**\n\n2. Add people, a location and any notes. \n\n3. Send your invite. \n\n**Participants**\nClick to see who has been invited to the meeting, or to add new people. \n\n**1**\n\n**Join meetings**\n\n1. From the calendar tab, select the meeting you intend to join, \n\nthen select join. . \n\n2. A new screen will show up. Here you can choose how you \n**3**\n\nwant to appear in the meeting, and your audio preferences. \n\n3. Then select join now. . \n\n**Reactions**\nStay involved without breaking the flow—you can share an emoji reaction to let the \npresenter know how you feel. Reactions also allow you to raise your hand, which \nwill signal that you'd like an opportunity to speak. \n\n**Present in meetings**\n\n**Video**\nTurn your camera on or off. You can also select the … button near the camera \nto access audio and video settings. \n\n**5**\n\n1. Screen share from the Share button at the top of your \n\nmeeting window. \n\n2. Choose what screen or window you want to share. Don't forget \n\n**6**\nto include audio if you're sharing something with sound. \n\n3. When you are finished, use the share button at the top of your \n\nmeeting window to stop sharing.", - "page_start": 2, - "page_end": 2, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**Next Steps**\n\n**Share knowledge**\n\nYou will**get the most out of Teams**when you get to truly connect with your team and \ncollaborate together. Keep practicing until each step of your workflow feels natural. \n\nTeamwork is all about collaboration!**Share with your team**\n**best practices**you learn along the way, tips and tricks for \nhow you can best organize your workflows and ask for their \nown advice to define how you can best use Teams together. \n\n**Test meetings**\n\n**Keep learning**\n1. \n\nUse the Meet now button in the \nCalendar tab \n\nNo matter how you like to learn and practice, we've got \nresources to support and inspire you: \n\nThen select “Start meeting” 2. \n\n3. And then \"Join now” \n\n• \n\nVirtual classes: We have instructors to answer your \nquestions and walk you through all the details. \n\nHere you can try to share your screen, \nstart a whiteboard or even record \nyourself while you are practicing a \npresentation. This is your safe space \nto test everything out! \n\n• \n\nSupport articles and step-by-step guides: To get answers to \nyour most common questions.", - "page_start": 5, - "page_end": 5, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now.", - "page_start": 1, - "page_end": 1, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "*Figure 16-8 Highlighting and selecting documents to apply holds*\n\n**16.3.3 Creating and removing custom holds**\n\nUsers can assign previously created holds to documents or create a hold that can be used \nprivately or publicly, as shown in Figure 16-9. \n\n*Figure 16-9 Creating custom holds*\n\nWhen you want to remove a previously enabled hold, highlight the documents and click \n**Actions**→**Holds**→**Remove Hold**, as shown in Figure 16-10 on page 363.", - "page_start": 385, - "page_end": 385, - "source_file": "sg246915.pdf" - }, - { - "text": "Figure 7-32 Edit throttle \n\n2. \nIn the Edit Throttle window, click**Remove**for the throttle you want to remove. As shown in \nFigure 7-33, we remove the IOPS throttle from the volume. \n\nFigure 7-33 Remove throttle \n\nAfter the Edit Throttle task completes successfully, the Edit Throttle window is shown again. \nYou can now set throttle based on the different metrics, modify throttle, or close the window \nwithout performing any action by clicking**Close**.", - "page_start": 298, - "page_end": 298, - "source_file": "sg247938.pdf" - }, - { - "text": "Figure B-10 PuTTY Auto-login user name \n\n4. \n\nIn the Category pane, on the left side of the PuTTY Configuration window (see \nFigure B-11), click**Connection**→**SSH**to open the PuTTY SSH Configuration window. In \nthe SSH protocol version section, select**2**.", - "page_start": 784, - "page_end": 784, - "source_file": "sg247938.pdf" - }, - { - "text": "Figure 7-31 Filter throttle type \n\n**7.5.3 Modifying or removing a volume throttle**\n\nTo remove a volume throttle, complete the following steps: \n1. From the**Volumes**menu, select the wanted volume to which is attached the throttle that \n\nyou want to remove. From the**Actions**menu, select**Edit Throttle**, as shown in \nFigure 7-32 on page 277.", - "page_start": 297, - "page_end": 297, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", - "query": "How can I make a channel visible to an invited member ?", - "target_page": 4, - "target_passage": "Channels can be: • Shared (visible to invited team members and external members of your organization who are not on the team)", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left \npanel along with all its associated channels. You can choose to \"show\" the \nmost relevant chanels and \"hide\" the rest. \n\nBy default, your chats will be arranged along the left-hand side of the chat \npanel, with the most recent messages at the top. You can right-click on any \nchat and select \"Pin,\" which will keep it at the top of your list for quick access. \n\nTo**create a new chat**, press [CTRL] + [N] (or look for the pen symbol at the \ntop of the chat list) and add the names of anyone you want to include. Type \nyour message and select Send or hit [Enter]. \n\n\n\n\n\n\n\n**Teams**\nA**team**is a broad group of people that work together to get something \ndone. You can choose who is part of the team, and people can only access \nshared content by invitation. All teams are created with an associated \nGeneral channel that includes all team members by default. \n\n\n\n\n\n\nDaichi, Eva, +2 \nYes, that should work for us \n11:00 AM \n\nMarketing Sync \nSharing notes after the meeting \n10:45 AM \n\nTo**share a file**select “Attach” under the box where you type messages, select \nthe file location and then the file you want. Depending on the location of the file, \nyou’ll get options for uploading a copy, sharing a link, or other ways to share. \n\n**Channels**\nA**channel**is a central hub for a specific topic, within the larger team, where \npeople can hold focused conversations and organize a library of files. \n\nChannels can be: \n• Standard (visible to everyone on the team) \n• Private (only visible to select team members) \n• Shared (visible to invited team members and external members of your \n\norganization who are not on the team) \n\n\n\nAN \n\n\n\n1:1 Chat \n\nGroup Chat \n\nMeeting Chat", - "page_start": 3, - "page_end": 3, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**Meeting essentials**\n**Meeting controls**\n\nWhen you join meetings, a different window will pop-up. These are the controls you need to know: \n\n**Create meetings**\n\n1. \n\nSelect**+ New meeting**or double-click on a time in your \ncalendar to create a new meeting. \n**1** **2** **3** **4** **5** **6**\n\n2. Add people, a location and any notes. \n\n3. Send your invite. \n\n**Participants**\nClick to see who has been invited to the meeting, or to add new people. \n\n**1**\n\n**Join meetings**\n\n1. From the calendar tab, select the meeting you intend to join, \n\nthen select join. . \n\n2. A new screen will show up. Here you can choose how you \n**3**\n\nwant to appear in the meeting, and your audio preferences. \n\n3. Then select join now. . \n\n**Reactions**\nStay involved without breaking the flow—you can share an emoji reaction to let the \npresenter know how you feel. Reactions also allow you to raise your hand, which \nwill signal that you'd like an opportunity to speak. \n\n**Present in meetings**\n\n**Video**\nTurn your camera on or off. You can also select the … button near the camera \nto access audio and video settings. \n\n**5**\n\n1. Screen share from the Share button at the top of your \n\nmeeting window. \n\n2. Choose what screen or window you want to share. Don't forget \n\n**6**\nto include audio if you're sharing something with sound. \n\n3. When you are finished, use the share button at the top of your \n\nmeeting window to stop sharing.", - "page_start": 2, - "page_end": 2, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**Adding a Fibre Channel port**\nTo add a Fibre Channel port, complete the following steps: \n\n1. Click**Fibre Channel Port**(see Figure 8-52 on page 362). The Add Fibre Channel Ports \nwindow opens (see Figure 8-53). \n\nFigure 8-53 Add Fibre Channel Ports window \n\n2. Click the drop-down menu to display a list of all discovered Fibre Channel WWPNs. If the \nWWPN of your host is not available in the menu, enter it manually or check the SAN \nzoning to ensure that connectivity is configured. Then, rescan storage from the host.", - "page_start": 384, - "page_end": 384, - "source_file": "sg247938.pdf" - }, - { - "text": "Figure 8-3 Open the host window \n\n2. To create a host, click**Add Host**. If you want to create a Fibre Channel host, continue with \n“Creating Fibre Channel hosts” on page 329. To create an iSCSI host, go to “Creating \niSCSI hosts” on page 331.", - "page_start": 349, - "page_end": 349, - "source_file": "sg247938.pdf" - }, - { - "text": "Figure 4-29 Option to create a user group \n\n2. Enter the details for the new group. Select**Enable for this group**to enable remote \nauthentication, as shown in Figure 4-30. Click**Create**. \n\n**Note:**This option is not available if LDAP authentication is not enabled. \n\nFigure 4-30 Creating a user group with remote authentication enabled", - "page_start": 135, - "page_end": 135, - "source_file": "sg247938.pdf" - }, - { - "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "Figure 8-54 Add a port to list \n\nThis step can be repeated to add other ports to the host. \n\n4. To add an offline port (if the WWPN of your host is not available in the drop-down menu), \nmanually enter the WWPN of the port into the**Fibre Channel Ports**field and click**Add**\n**Port to List**.", - "page_start": 385, - "page_end": 385, - "source_file": "sg247938.pdf" - }, - { - "text": "The content of the welcome message is helpful when you need to notify users about some \nimportant information about the system, such as security warnings or a location description. \nTo define and enable the welcome message by using the GUI, edit the text area with the \nmessage content and click**Save**(see Figure 5-80).", - "page_start": 203, - "page_end": 203, - "source_file": "sg247938.pdf" - }, - { - "text": "*Figure 14-5 Specifying banner page information*\n\n**14.2.2 Adding a recipient list**\n\nIf several recipients must receive the same reports at the same time, you can create a \nrecipient list. With this list, you create a single distribution that is sent to every recipient in the \nlist. \n\nRecipients are added to the list by selecting the ID on the left and clicking**Add**, as shown in \nFigure 14-6 on page 322.", - "page_start": 344, - "page_end": 344, - "source_file": "sg246915.pdf" - }, - { - "text": "Figure 11-112 Partnership panel \n\n**11.9.1 Creating Fibre Channel partnership**\n\n**Intra-cluster Metro Mirror:**If you are creating an intra-cluster Metro Mirror, do not perform \nthis next step to create the Metro Mirror partnership. Instead, see 11.9.2, “Creating remote \ncopy relationships” on page 573. \n\nTo create an FC partnership between IBM Spectrum Virtualize systems by using the GUI, \nopen the Partnerships panel and click**Create Partnership**to create a partnership, as shown \nin Figure 11-113 on page 572.", - "page_start": 592, - "page_end": 592, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", - "query": "How can I notify a collegue mentionned in a chat message in Teams ?", - "target_page": 5, - "target_passage": "Tag a teammate in a message by typing the @ symbol followed by their name. They will receive a special notification calling for their attention.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left \npanel along with all its associated channels. You can choose to \"show\" the \nmost relevant chanels and \"hide\" the rest. \n\nBy default, your chats will be arranged along the left-hand side of the chat \npanel, with the most recent messages at the top. You can right-click on any \nchat and select \"Pin,\" which will keep it at the top of your list for quick access. \n\nTo**create a new chat**, press [CTRL] + [N] (or look for the pen symbol at the \ntop of the chat list) and add the names of anyone you want to include. Type \nyour message and select Send or hit [Enter]. \n\n\n\n\n\n\n\n**Teams**\nA**team**is a broad group of people that work together to get something \ndone. You can choose who is part of the team, and people can only access \nshared content by invitation. All teams are created with an associated \nGeneral channel that includes all team members by default. \n\n\n\n\n\n\nDaichi, Eva, +2 \nYes, that should work for us \n11:00 AM \n\nMarketing Sync \nSharing notes after the meeting \n10:45 AM \n\nTo**share a file**select “Attach” under the box where you type messages, select \nthe file location and then the file you want. Depending on the location of the file, \nyou’ll get options for uploading a copy, sharing a link, or other ways to share. \n\n**Channels**\nA**channel**is a central hub for a specific topic, within the larger team, where \npeople can hold focused conversations and organize a library of files. \n\nChannels can be: \n• Standard (visible to everyone on the team) \n• Private (only visible to select team members) \n• Shared (visible to invited team members and external members of your \n\norganization who are not on the team) \n\n\n\nAN \n\n\n\n1:1 Chat \n\nGroup Chat \n\nMeeting Chat", - "page_start": 3, - "page_end": 3, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**\n\n\n\n**1**\n\n**8**", - "page_start": 1, - "page_end": 1, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help \nyou get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team. \n\n**Set up**\n\n**Explore**\nOnce you sign in,**connect**with your team in \nchat, channels, calls, and meetings. \n\n**Download**the app for desktop and mobile to \naccess Teams with the best performance \nanywhere you go. \n\n**Hit the ground running now!**Build confidence by trying things on your own. Go to the meet now button \n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!", - "page_start": 0, - "page_end": 0, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "In today’s working environment, it is almost guaranteed that \nyou will be required to communicate with colleagues via e-mail \non a regular basis. And due to the large number of e-mails we \nnow send and receive each day, proper e-mail etiquette is \nmore important than ever.", - "page_start": 51, - "page_end": 51, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "**Meeting essentials**\n**Meeting controls**\n\nWhen you join meetings, a different window will pop-up. These are the controls you need to know: \n\n**Create meetings**\n\n1. \n\nSelect**+ New meeting**or double-click on a time in your \ncalendar to create a new meeting. \n**1** **2** **3** **4** **5** **6**\n\n2. Add people, a location and any notes. \n\n3. Send your invite. \n\n**Participants**\nClick to see who has been invited to the meeting, or to add new people. \n\n**1**\n\n**Join meetings**\n\n1. From the calendar tab, select the meeting you intend to join, \n\nthen select join. . \n\n2. A new screen will show up. Here you can choose how you \n**3**\n\nwant to appear in the meeting, and your audio preferences. \n\n3. Then select join now. . \n\n**Reactions**\nStay involved without breaking the flow—you can share an emoji reaction to let the \npresenter know how you feel. Reactions also allow you to raise your hand, which \nwill signal that you'd like an opportunity to speak. \n\n**Present in meetings**\n\n**Video**\nTurn your camera on or off. You can also select the … button near the camera \nto access audio and video settings. \n\n**5**\n\n1. Screen share from the Share button at the top of your \n\nmeeting window. \n\n2. Choose what screen or window you want to share. Don't forget \n\n**6**\nto include audio if you're sharing something with sound. \n\n3. When you are finished, use the share button at the top of your \n\nmeeting window to stop sharing.", - "page_start": 2, - "page_end": 2, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**Compose**\n\n**Tip**Going into format mode will \nprevent your message from sending \nwhen you hit [Enter], so it's a great \nway to draft and preview messages \nbefore sending them. \n\nHi @Daichi. Can you coordinate a time to meet with \n\n**Format**your messages, add bullet points, \ncharts or hyperlinks. \n\nChristie to talk coverage on Brandhaus while Alex is out**next week?**\n\n**Mark as important**to call attention to specific messages.", - "page_start": 4, - "page_end": 4, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "The content of the welcome message is helpful when you need to notify users about some \nimportant information about the system, such as security warnings or a location description. \nTo define and enable the welcome message by using the GUI, edit the text area with the \nmessage content and click**Save**(see Figure 5-80).", - "page_start": 203, - "page_end": 203, - "source_file": "sg247938.pdf" - }, - { - "text": "**Next Steps**\n\n**Share knowledge**\n\nYou will**get the most out of Teams**when you get to truly connect with your team and \ncollaborate together. Keep practicing until each step of your workflow feels natural. \n\nTeamwork is all about collaboration!**Share with your team**\n**best practices**you learn along the way, tips and tricks for \nhow you can best organize your workflows and ask for their \nown advice to define how you can best use Teams together. \n\n**Test meetings**\n\n**Keep learning**\n1. \n\nUse the Meet now button in the \nCalendar tab \n\nNo matter how you like to learn and practice, we've got \nresources to support and inspire you: \n\nThen select “Start meeting” 2. \n\n3. And then \"Join now” \n\n• \n\nVirtual classes: We have instructors to answer your \nquestions and walk you through all the details. \n\nHere you can try to share your screen, \nstart a whiteboard or even record \nyourself while you are practicing a \npresentation. This is your safe space \nto test everything out! \n\n• \n\nSupport articles and step-by-step guides: To get answers to \nyour most common questions.", - "page_start": 5, - "page_end": 5, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "Figure 11-130 Selecting whether copy should start or not \n\n**11.9.4 Renaming remote copy relationships**\n\nTo rename one or multiple remote copy relationships, complete the following steps: \n1. Open the**Copy Services**→**Remote Copy**panel. \n\n2. Right-click the relationships to be renamed and select**Rename**, as shown in \nFigure 11-131.", - "page_start": 607, - "page_end": 607, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "Botswana-constitution.pdf", - "query": "What are the 3 prerequisites to be elligible as president of Botswana ?", - "target_page": 18, - "target_passage": "A person shall be qualified for election as President if, and shall not be qualified unless, he or she- (a) is a citizen of Botswana by birth or descent; (b) has attained the age of 30 years; and (c) is qualified to be elected as a Member of the National Assembly", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "**The Republic (ss 1-2)**\n\n**1.** **Declaration of Republic**\n\nBotswana is a sovereign Republic. \n\n**2.** **Public Seal**\n\nThe Public Seal of the Republic shall be such device as may be prescribed by or \n\nunder an Act of Parliament.", - "page_start": 4, - "page_end": 4, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**\"disciplinary law\"**means a law regulating the discipline of any disciplined force; \n**\"disciplined force\"**means- \na naval, military or air force; \na police force; or \na prison service; (a) \n(b) \n(c) \n\n**\"legal representative\"**means a person entitled to practise in Botswana as an \n\nadvocate or attorney; \n\n**\"member\"**, in relation to a disciplined force, includes any person who, under the \n\nlaw regulating the discipline of that force, is subject to that discipline. \n\n(2) In relation to any person who is a member of a disciplined force raised under \nan Act of Parliament, nothing contained in or done under the authority of the disciplinary \nlaw of that force shall be held to be inconsistent with or in contravention of any of the \nprovisions of this Chapter other than sections 4, 6 and 7. \n\n(3) In relation to any person who is a member of a disciplined force raised \n\notherwise than as aforesaid and lawfully present in Botswana, nothing contained in or \ndone under the authority of the disciplinary law of that force shall be held to be \ninconsistent with or in contravention of any of the provisions of this Chapter. \n\n**CHAPTER III**\n**Citizenship (ss 20-29: repealed)**\n\n**20 to 29 inclusive.** **[Repealed.]**\n\n**CHAPTER IV**\n**The Executive (ss 30-56)**\n**PART I**\n**The President and the Vice-President (ss 30-41)**\n\n**30. Office of President**\n\nThere shall be a President of the Republic of Botswana who shall be the Head of \n\nState. \n**31. First President**\n\n(1) The first President shall be the person who immediately before 30th \n\nSeptember, 1966 holds the office of Prime Minister under the Constitution. \n\n(2) The first President shall be deemed to have assumed office at the coming into \n\noperation of this Constitution.", - "page_start": 15, - "page_end": 15, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**32. Election of President after dissolution of Parliament**\n\n(1) Whenever Parliament is dissolved an election shall be held to the office of \nPresident in such manner as is prescribed by this section and, subject thereto, by or \nunder an Act of Parliament. \n\n(2) Nominations in the election of a President shall be delivered to the returning \nofficer on such day and at such time as may be prescribed by or under any law for the \ntime being in force in Botswana; the nomination of a candidate in an election of a \nPresident shall not be valid unless it is supported, in such manner as may be prescribed \nby or under an Act of Parliament, by not less than 1000 persons registered as voters for \nthe purpose of elections to the Assembly. \n\n(3) The following provisions shall then apply- \n\n(a) \n\na person nominated as a Parliamentary candidate may, at the time of his or her \nnomination and subject to the provisions of paragraph (b), declare in such \nmanner as may be prescribed by or under an Act of Parliament which of the \ncandidates in the election of President he or she supports, but the nomination of \na Parliamentary candidate shall be valid notwithstanding that the nomination \npaper does not contain such a declaration; \nsuch a declaration shall not be made in relation to any Presidential candidate \nunless that candidate has signified, in such manner as may be prescribed by or \nunder an Act of Parliament, his or her consent to the making of a declaration in \nhis or her favour by that Parliamentary candidate; \n\n(c) where the Parliamentary election is contested in any constituency a poll shall be \ntaken in that constituency at which the votes shall be given by ballot, and for the \npurposes of that poll any Parliamentary candidate who declared support in \naccordance with paragraph (a) for a particular Presidential candidate shall use \nthe same voting colour and symbol, if any, as may have been allocated under \nany law for the time being in force in Botswana to that Presidential candidate for \nthe purposes of the Presidential election; \nthe returning officer shall declare to be elected as President any candidate for \nwhom support has been declared in accordance with paragraph (a) above by \nnot less than such number of persons elected as Members of the National \nAssembly in the Parliamentary election as corresponds to more than half the \ntotal number of seats for Elected Members in the Assembly, and if there is no \nsuch person the returning officer shall declare that no candidate has been \nelected. \n\n(d) \n\n(4) Parliament may make provision whereby the time for nominating Presidential \n\ncandidates may be extended in the event of there being no qualified candidate \nnominated at the expiration of the time for the delivery of such nominations. \n\n(5) Where, at the expiration of the time for the delivery of nominations in the \n\nelection of a President, more than one qualified candidate is validly nominated and any \nof those candidates dies before the commencement of the poll in the Parliamentary \nelection, the poll in the Parliamentary election shall be countermanded, fresh \nnominations of Parliamentary candidates shall take place in every constituency and a \nfresh election of a President shall be held in accordance with the foregoing provisions of \nthis section. \n\n(6) Where- \n\n(a) \n\nany candidate in an election of a President dies during the period commencing \nwith the taking of the poll in the Parliamentary election and ending when the \nresult of the election has been ascertained and that candidate would, but for his \nor her death, have been entitled to have been declared elected as President \nunder subsection (3) of this section; or", - "page_start": 16, - "page_end": 16, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**57. Parliament**\n\nThere shall be a Parliament of Botswana which shall consist of the President and \n\na National Assembly. \n**58. Composition of National Assembly**\n\n(1) The President shall be ex-officio a member of the National Assembly, and \n\nshall be entitled to speak and to vote in all proceedings of the National Assembly. \n\n(2) In addition to the President the National Assembly shall consist of- \n\n(a) \n\n57 Elected Members who shall be elected in accordance with the provisions of \nthis Constitution and subject thereto in accordance with the provisions of any \nAct of Parliament; and \nfour Specially Elected Members who shall be elected in accordance with the \nFirst Schedule to this Constitution and subject thereto in accordance with the \nprovisions of any Act of Parliament. \n\n(3) If a person who is not a member of the National Assembly is elected to the \noffice of Speaker of the National Assembly, that person shall, by virtue of holding that \noffice, be a member of the Assembly in addition to the members referred to in \nsubsections (1) and (2) of this section. \n**59. Speaker**\n\n(1) There shall be a Speaker of the National Assembly who shall be elected by \nthe Members of the Assembly from among persons who are Members of the Assembly \nor from among persons who are not Members of the Assembly. \n\n(2) The President, the Vice-President, a Minister, an Assistant Minister or a \n\npublic officer shall not be qualified to be elected as Speaker. \n(3) The Speaker shall vacate his or her office- \n\n(a) \n\nif, having been elected from among the Members of the National Assembly, he \nor she ceases to be a Member of the Assembly otherwise than by reason of a \ndissolution of Parliament or if he or she is required by virtue of section 68(2) to \n(3) of this Constitution, to cease to perform his or her functions as a Member of \nthe Assembly; \nif any circumstances arise that, if he or she were not Speaker, would disqualify \nhim for election as such; \n\n(b) \n\n(c) when the Assembly first sits after any dissolution of Parliament; or \n(d) \n\nif he or she is removed from office by a resolution of the Assembly supported by \nthe votes of not less than two-thirds of all the Members thereof. \n\n(4) No business shall be transacted in the National Assembly (other than an \nelection to the office of Speaker) at any time when the office of Speaker is vacant. \n**60. Deputy Speaker**\n\n(1) There shall be a Deputy Speaker of the National Assembly who shall be \nelected from among the persons who are Members of the Assembly other than the \nPresident, the Vice-President, Ministers or Assistant Ministers. \n\n(2) The Members of the National Assembly shall elect a person to the office of \n\nDeputy Speaker when the Assembly first sits after any dissolution and, if the office \nbecomes vacant otherwise than by reason of the dissolution of the Assembly, at the first \nsitting of the Assembly after the office becomes vacant. \n\n(3) The Deputy Speaker shall vacate his or her office- \n\n(a) \n\nif he or she ceases to be a Member of the National Assembly, otherwise than \nby reason of a dissolution of Parliament; \nif any circumstances arise that, if he or she were not Deputy Speaker, would \ndisqualify him or her for election as such; \nif he or she is required, by virtue of section 68(2) to (3) of this Constitution, to \ncease to perform his or her functions as a Member of the Assembly; \n\n(b) \n\n(c)", - "page_start": 26, - "page_end": 26, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "}\n \n \n \n [html]the result of the electron is associationed or, as the case may be, the declaration that no cardibitate has been electrone ( sected ) as the Speaker shaf appoint, and shafl electra person to the othlice of President in such manner as is preschthat office on the day upon which he or she is declared elected.( 8 ) Without prejudice to the provisions of section 92 of this Constitution, anElected Member of the National Assembly may, in the event of there being one or more successful election petlions following a general election, move, at the first stiffing of the Assembly after the resultant by - elections have been decidemajority of the Elected Members of the Assembly ; and in the voling on that question the Specially Elected Members of the Assembly shall have no vole. If it appears as a resultof the voling on that question that the President does not enjoy the support of a majority of the elected Members of the Assembly, the cffice of President shall become vacant. ( 9 ) Any Elected Member of the Assembly may give notice to the Presehe or she intends to move in the Assembly a motion under subsection ( II ) and notwithstanding any other provision of this Constitution the Presubert shall not after receipl of any such notice be empowered to discover Partiament before thenof this section the axats of the Specially Elected Members of the Assembly shall also become vaccine and the election of a percent to the office of President shall take place before the election of the Specially Elected Members. ( 11 ) In thio\" Parliamentary cardidate \" means a candidate in the Parliamentary election ;\" the Parliamentary election \" means the general election to elect those Members of the National Assembly who are referred to in section S9 ; D1, pI ; D1, pI ; D2 ), Dfollowing any dissolution of Parliament ; \" Presidential candidate \" means a candidate for the office of President ;“ the returning officer ” means the returning officer specified in section 38 of this Constitution.33. Qualification for election as President ( 1 ) A person shall be qualified for election as President if, and shall not bequalified unless, he or she - ( a )( b ) has attained the age of 30 years ; and( c ) is qualified to be elected as a Member of the National Assembly.( 2 ) Notwithstanding any other law to the contrary, for the purposes of this section and section 3B( a ) the term “ olizen by birth ” shall be understood to include only those persons who became citizens of Botswara prior to the amendment of the law relating to citizenship by the Clizenship Act.( d ) gyperson who, although his or her father was a cilizen of Botswana at the time of that person ’ s birth, had, by virtue of his or her having been born outsideBotswana, to be registered as a citizen of Botswana, under the law relating to", - "page_start": 17, - "page_end": 17, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "[html]( 2 ) The President shall case to hold the office of President if at any time during er tenure of office any circumstances arise that would, if he or she were not a. If the National Assembly, cause him or her to be disqualified for election-( 3 ) The President shall cease to hold office of President at the expiry of thescribed under subsection ( 1 ) of this section, or when the person elected at the on of President following a dissolution of Parliament assumes office. acancy in office of President( 1 ) Whenever the President dies, resigns or ceases to hold office, the Vice - Int shall assume office as President with effect from the date of the death, tion or ceasing to be President.( 2 ) If the office of President -becomes vacant in circumstances in which there is no Vice - President ; oris vacant whilst the Vice - President is absent from Botswana or is, by reason of physical or mental infirmity unable to perform the functions of his or her office, actions of the office of President shall, until such time as a new President asaccordance with this section or section 32 of this Constitution. be performed by inister as the Cabinet shall appoint. For the purposes of this subsection, aate of the Onief Justice that the Vice - President is by reason of physical or mentally unable to discharge the functions of his or her cifice, phall, in respect of any which it is in force, be conclusive and shall not be questioned in any court.1.at the election every Member of the Assembly except the Speaker shall be entitled to vote ;the votes of the Members of the Assembly who are entitled to vote shall begiven by ballot in such manner as not to disclose how any particular Member voted, and any person who receives the votes of more than one half of the tonumber of persons entitled to vote shall be declared elected as President ; a person elected as President under this section shall assume the office ofPresident on the day upon which he or she is declared to be elected ;not more than three ballots shall be taken unless in the opinion of the Spoaker the holding of further ballots is likely to result in the election of a President, in< underline >", - "page_start": 18, - "page_end": 18, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "[html]< underline > Copyright Government of Botswana ", - "page_start": 18, - "page_end": 18, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "\n \n \n \n
Tenure of office of President( 1 ) The President shall, subject to the provisions of this section, hold office for an ate period not exceeding 10 years beginning from the date of his or her first plion of office of President after the commercement of this Act.
( 3 ) Any person performing the functions of the office of President by virtue of tion ( 1 ) or ( 2 ) of this section shall not exercise the power of the President to the appointment of Vice - President or to dissolve Parliament.( 4 ) If the office of President becomes vacant, the National Assembly shall, unlessent is dissolved, and notwithstanding that it may be prorogued, meet on theas may after the office of President becomes vacant, or on such earlier day as may ointed by the Speaker, and shall elect a person to the diffice in such manner as is seed by the next following subsection and, subject thereto, by or under an Act o
( 5 ) In an election of a President under this section -the Speaker shall preside at the meeting and conduct the election ;a person may be a candidate if and shall not be a candidate unless he or she has been nominated as a candidate with his or her consent prior to the sitting
that the President is unable to authorize another person under this section to perform the functions of his or her office ; or
( b )the Vice - President is by reason of physical or mental infirmity unable to discharge the functions of his or her office.
shall, in respect of any period for which it is in force, be conclusive and shall not bequestioned in any court :
Provided that any such certificate as is referred to in paragraph ( a ) of this subsection shall casse to have effect if the President notifies any person undersubsection ( 4 ) of this section that he or she is about to resume the functions of the office of President.
37. Oath of PresidentA person assuming the office of President shall, before entering upon the duties
of that office, take and subscribe such caths as may be prescribed by Parliament 38. Returning officer at elections of President( 1 ) The Chief ulce shall be the returning officer for the purposes of elections to
the office of President.( 2 ) Any question which may arise as to whether -
( a )any provision of this Constitution or any law relating to the election of a
President under section 32 or 35 of this Constitution has been complied with ; or( b )
any person has been validly elected as President under those sections,shall be referred to and determined by the returning officer whose decision shall not be questioned in any court.
39. Vice President( 1 ) There shall be a Vice - President who shall be appointed by the President from
among the Elected Members of the National Assembly who are citizens of Botswana bybirth or descent, which appointment shall be endorsed by the said Elected Members. ( 2 ) The Vice - President shall continue in office until a person elected at the next
election of President under section 32 or 35 of this Constitution assumes office :Provided that the office of Vice - President shall become vacant -
( i )if the appointment of the holder of the office is revoked by the President ; or
( ii ) if the holder of the office ceases to be a Member of the National Assembly forany other reason than a dissolution of Parilament.( 3 ) The Vice - President shall not enter upon the duties of his or her office unleas
he or she has taken and subscribed the oath of allegiance and such oath for the due execution of his or her office as may be prescribed by Parliament.( 4 ) If the Vice - President is absent from Botswana or is incapable by reason of
iliness or any other cause of discharging the functions of his or her office, the Presidentmay appoint a person, from among the Members of the Assembly. to perform the
functions of the office of Vice - Preoident and any person so appointed may dischargethose functions accordingly :
Provided that a person appointed under this subsection shall cease to performthe functions of the office of Vice - President -
( i )if his or her appointment is revoked by the President ;
( ii ) if he or she ceases to be a Member of the Assembly otherwise than by reason of a dissolution of Parliament ;( iii )
upon the assumption by any person of the office of President ; or( iv )
upon the President giving him or her notice that the Vice - President is about to resume his or her functions.( 5 ) Where the Vice - President is performing the functions of the office of President
in accordance with section 35 or 36 of this Constitution he or she", - "page_start": 20, - "page_end": 20, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "than three ballots shall be taken unless in the opinion of the Spoaker the holding of further ballots is likely to result in the election of a President, in
\n [html]\n
The President may at any time prongue Parliament. Subject to the provisions of this Constitution, the President may at any timeParliament
Subject to the provisions of subsection ( 4 ) of this section, Parliament, unlessolved, shall continue for five years from the date of the first sitting of the ussembly after any dissolution and shall then stand dissolved.At any time when Botswana is at war, Parliament may from time to time
period of five years specified in subsection ( 3 ) of this section for not more onths at a time :Devided that the life of Parliament shall not be extended under this subsection an five years.
If, after a dissolution of Parliament and before the holding of the generalthe Elected Members of the National Assembly, the President considers that,
≥ 6 : stence of a state of war or a state of emergency in Botswana or anyjt is necessary to recall Parliament, the President may summon the
hat has been dissolved to meet and that Parliament shall be deemed to be ment for the being, but the general election of the Elected Members of thussembly shall proceed and the Parliament that has been recalled shall, if notsolved, again stand dissolved on the day before the day on which the election
of no confidence in the GovernmentNational Assembly at any time passes a resolution supported by a majorityAembers of the Assembly who are entitled to vote declaring that it has no
In the Government of Botswana, Parliament shall stand dissolved on the following the day on which such resolution was passed, unless the Presidhighs his or her office or dissolves Parliament.
ngs of National AssemblyThe President may at any time summon a meeting of the National Assembly.
Subject to the provisions of this Constitution, the sittings of the Nationalin any session of Parliament after the commencement of that session shall be at such times and on such days as the Assembly shall appoint. PART VI
Interpretation ( s 94 )Any reference in this Constitution toof two - thirds of the Members of the Assembly shall be construed as a
to the votes of two - thirds of the Members of the Assembly excluding the slesiong.CHAPTER VI
The Judicature ( ss 95 - 107 )PART I
The High Court ( ss 95 - 98 )sdiction and composition
There shall be for Botswana a High Court which shall have unlimited original10 hear and determine any clvil or criminal proceedings under any law and
jurisdiction and powers as may be conferred on it by this Constitution or anyThe judges of the High Court shall be the Chief Justice and such number of
", - "page_start": 39, - "page_end": 39, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "[html]( 4 )( c ) of this section, the areas of Gharzi and Kgalagada shall each have the option of either selecting one Member under subseclon ( 2 ) of this section or of each selecting two regional Members under subsection ( 4 )( c ) of this section, but m79.Qualifications for membership of Nilla ya Dikgeai ( 1 ) A person shall be qualified to be appointed under section 77 ( 1 )( b ) as aMemof the Ntlo ya Dikgosi if he or she —( a )is a citizen of Botswana ; and( b )has attained the age of 21 years( 2 ) No person shall be qualified to be appointed, selected or designated as aMemNo Manage and asked asked asked asked as a shewisher asknowledgement of allegian obedience or adherence to a foreign power or state ;( b )has been declared insolvent or adjudged or otherwise declared bankrupt under any law in force in any part of the Commonwealth or any country with aTablecomparable legal system and has not been discharged, or has made a composition with his or her creditors and has not paid his or her debts in full ;( c )is certified insane or otherwise adjudged or declared to be of unsound mind under any law for the time being in force in Botswana ;( d )subject to such exceptions as may be prescribed by Parliament, holds any public office, or is acting in any public office by virtue of a contract of service expressed to continue for a period exceeding six months :( e )is under sentence of death imposed on him or him or her by a count in any part of the Commonwealth or any country with a comparable legal system, or is under a sentence of imprisoment ( by whatever name collect ) exceeding six months imposed on hi( f )holds, or is acting in anyoffice the functions ofwhichinvolveary responsibility for, or in connection with, the conduct of any elections to the National Assembly or the complation or revision of any electoral register for the purposese( g )is disqualified for election to the National Assembly by virtue of provision made in pursuance of section 62 ( 2 ) of this Constitution. ( 3 ) For the purposes of this section, two or more terms of imprisonment that arerequiredd to be served consecutively shall be regarded as a single term of imprisonmentfor ththe aggregate period of those terms, and no account shall be taken of a sentence of risonment imposed as an alternative to or in default of the payment of a fine. ( 4 ) A Member of the NIb ya Dikgosi shall not, while he or she is such a Memberparticipantsin party politics, but active participation in politics prior to being a Member of Ntlo ya Dikgosi shall not bar any person from being such a Member.80.Every Member of the Ntic ya Dikgool shall, before taking his or her seat therein,takeand subscribe before the Ntlo ya Dikgosi the oath of allegiance.81.Secretary to Ntlo ya DikgosiThere shall be a Secretary to the NIIo ya Dikgosi whose office shall be an office ublic penvice.82.enure of office of Members of Ntlo ya Dikgool 11 ) A Member of the Ntlo", - "page_start": 35, - "page_end": 35, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "Botswana-constitution.pdf", - "query": "What is the condition to be allowing to access the position of Director of public prosecution in Botswana ?", - "target_page": 25, - "target_passage": "A person shall not be qualified to be appointed to the Office of Director of Public Prosecutions unless he or she is qualified to be appointed to the Office of a Judge of the High Court", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "holding or acting in such offices shall, subject to the provisions of sections 113 and 114 \nof this Constitution, vest in the President. \n\n(2) The offices to which this section applies are- \n\n(a) Ambassador, High Commissioner or other principal representative of Botswana \n\nin any other country or accredited to any international organisation; \n\n(b) Secretary to the Cabinet; \n(c) Attorney-General; \n(cA) Director of Public Prosecutions; \n(d) Permanent Secretary; \n(e) Commissioner of Police; and \n(f) \n\nany other superscale office (other than an office to which this Constitution \nmakes specific provision for appointment or an office to which appointment is \nmade under the provisions of section 104 of this Constitution) which may be \nprescribed by Act of Parliament. \n\n**113. Tenure of office of Director of Public Prosecutions**\nprovisions of this section, a person appointed as Director of Public Prosecutions shall \nhold office for a 5 year renewable term or until he or she attains the age of 60 years, \nwhichever is the earlier. \n\n(1) Subject to the \n\n(2) A person holding the office of Director of Public Prosecutions may be \nremoved from office only for inability to perform the functions of his or her office (whether \narising from infirmity of body or mind or any other cause) or for misbehaviour or for \nincompetence and shall not be so removed except in accordance with the provisions of \nthis section. \n\n(3) If the President considers that the question of removing a person holding the \n\noffice of Director of Public Prosecutions from office ought to be investigated then- \n\n(a) \n\nhe or she shall appoint a tribunal which shall consist of a Chairman and not less \nthan two other members, who hold or have held high judicial office; and \nthe tribunal shall enquire into the matter and report on the facts thereof to the \nPresident and advise the President whether the person holding the office of \nDirector of Public Prosecutions ought to be removed from office under this \nsection for inability as aforesaid or for misbehaviour or for incompetence. \n(4) Where a tribunal appointed under subsection (3) of this section advises the \n\n(b) \n\nPresident that a person holding the office of Director of Public Prosecutions \nought to be removed from office for inability as aforesaid or for misbehaviour or \nfor incompetence, the President shall remove such person from office. \n\n(5) If the question of removing a person holding the office of Director of Public \n\nProsecutions from office has been referred to a tribunal under this section, the President \nmay suspend that person from performing the functions of his or her office, and any such \nsuspension may at any time be revoked by the President and shall in any case cease to \nhave effect if the tribunal advises the President that the person ought not to be removed \nfrom office. \n**114. Tenure of office of Auditor-General**\n\n(1) Subject to the provisions of this section, a person holding the office of Auditor- \nGeneral shall vacate his or her office when he or she attains the age of 60 years or such \nother age as may be prescribed by Parliament. \n\n(2) A person holding the office of Auditor-General may be removed from office \n\nonly for inability to perform the functions of his or her office (whether arising from \ninfirmity of body or mind or any other cause) or for misbehaviour and shall not be so \nremoved except in accordance with the provisions of this section. \n\n(3) If the National Assembly resolves that the question of removing a person \n\nholding the office of Auditor-General from office under this section ought to be", - "page_start": 48, - "page_end": 48, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]", - "page_start": 24, - "page_end": 24, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**\"disciplinary law\"**means a law regulating the discipline of any disciplined force; \n**\"disciplined force\"**means- \na naval, military or air force; \na police force; or \na prison service; (a) \n(b) \n(c) \n\n**\"legal representative\"**means a person entitled to practise in Botswana as an \n\nadvocate or attorney; \n\n**\"member\"**, in relation to a disciplined force, includes any person who, under the \n\nlaw regulating the discipline of that force, is subject to that discipline. \n\n(2) In relation to any person who is a member of a disciplined force raised under \nan Act of Parliament, nothing contained in or done under the authority of the disciplinary \nlaw of that force shall be held to be inconsistent with or in contravention of any of the \nprovisions of this Chapter other than sections 4, 6 and 7. \n\n(3) In relation to any person who is a member of a disciplined force raised \n\notherwise than as aforesaid and lawfully present in Botswana, nothing contained in or \ndone under the authority of the disciplinary law of that force shall be held to be \ninconsistent with or in contravention of any of the provisions of this Chapter. \n\n**CHAPTER III**\n**Citizenship (ss 20-29: repealed)**\n\n**20 to 29 inclusive.** **[Repealed.]**\n\n**CHAPTER IV**\n**The Executive (ss 30-56)**\n**PART I**\n**The President and the Vice-President (ss 30-41)**\n\n**30. Office of President**\n\nThere shall be a President of the Republic of Botswana who shall be the Head of \n\nState. \n**31. First President**\n\n(1) The first President shall be the person who immediately before 30th \n\nSeptember, 1966 holds the office of Prime Minister under the Constitution. \n\n(2) The first President shall be deemed to have assumed office at the coming into \n\noperation of this Constitution.", - "page_start": 15, - "page_end": 15, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this \nsection. \n\n(3) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nfor the imposition of restrictions that are reasonably required in the interests of \ndefence, public safety, public order, public morality or public health or the \nimposition of restrictions on the acquisition or use by any person of land or \nother property in Botswana and except so far as that provision or, as the case \nmay be, the thing done under the authority thereof, is shown not to be \nreasonably justifiable in a democratic society; \nfor the imposition of restrictions on the freedom of movement of any person who \nis not a citizen of Botswana; \nfor the imposition of restrictions on the entry into or residence within defined \nareas of Botswana of persons who are not Bushmen to the extent that such \nrestrictions are reasonably required for the protection or well-being of Bushmen; \nfor the imposition of restrictions upon the movement or residence within \nBotswana of public officers; or \n....... \n\n(b) \n\n(c) \n\n(4) If any person whose freedom of movement has been restricted by order \n\nunder such a provision as is referred to in subsection (3)(a) of this section (other than a \nrestriction which is applicable to persons generally or to general classes of persons) so \nrequests at any time during the period of that restriction not earlier than six months after \nthe order was made or six months after he or she last made such request, as the case \nmay be, his or her case shall be reviewed by an independent and impartial tribunal \npresided over by a person, qualified to be enrolled as an advocate in Botswana, \nappointed by the Chief Justice. \n\n(5) On any review by a tribunal in pursuance of this section of the case of a \n\nperson whose freedom of movement has been restricted, the tribunal may make \nrecommendations, concerning the necessity or expediency of continuing the restriction \nto the authority by which it was ordered but, unless it is otherwise provided by law, that \nauthority shall not be obliged to act in accordance with any such recommendations. \n**15. Protection from discrimination on the grounds of race, etc.**\n\n(1) Subject to the provisions of subsections (4), (5) and (7) of this section, no law \n\nshall make any provision that is discriminatory either of itself or in its effect. \n\n(2) Subject to the provisions of subsections (6), (7) and (8) of this section, no \n\nperson shall be treated in a discriminatory manner by any person acting by virtue of any \nwritten law or in the performance of the functions of any public office or any public \nauthority. \n\n(3) In this section, the expression \"discriminatory\" means affording different \n\ntreatment to different persons, attributable wholly or mainly to their respective \ndescriptions by race, tribe, place of origin, political opinions, colour, creed or sex \nwhereby persons of one such description are subjected to disabilities or restrictions to \nwhich persons of another such description are not made subject or are accorded \nprivileges or advantages which are not accorded to persons of another such description. \n\n(4) Subsection (1) of this section shall not apply to any law so far as that law \n\nmakes provision- \n\n(a) \n(b) with respect to persons who are not citizens of Botswana; \n(c) with respect to adoption, marriage, divorce, burial, devolution of property on \n\nfor the appropriation of public revenues or other public funds; \n\ndeath or other matters of personal law;", - "page_start": 12, - "page_end": 12, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "(2) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nthat is reasonably required in the interests of defence, public safety, public \norder, public morality, public health, town and country planning, the \ndevelopment and utilization of mineral resources, for the purpose of any census \nor in order to secure the development or utilization of any property for a purpose \nbeneficial to the community; \nthat is reasonably required for the purpose of protecting the rights or freedoms \nof other persons; \nthat authorizes an officer or agent of the Government of Botswana, a local \ngovernment authority or a body corporate established by law for a public \npurpose to enter on the premises of any person in order to inspect those \npremises or anything thereon for the purpose of any tax, rate or duty or in order \nto carry out work connected with any property that is lawfully on those premises \nand that belongs to that Government, authority or body corporate, as the case \nmay be; or \nthat authorizes, for the purpose of enforcing the judgment or order of a court in \nany civil proceedings, the search of any person or property by order of a court \nor entry upon any premises by such order, \n\n(d) \n\nand except so far as that provision or, as the case may be, anything done under the \nauthority thereof is shown not to be reasonably justifiable in a democratic society. \n**10. Provisions to secure protection of law**\n\n(1) If any person is charged with a criminal offence, then, unless the charge is \n\nwithdrawn, the case shall be afforded a fair hearing within a reasonable time by an \nindependent and impartial court established or recognized by law. \n\n(2) Every person who is charged with a criminal offence- \n\n(a) \n\n(b) \n\n(c) \n\n(d) \n\n(e) \n\nshall be presumed to be innocent until he or she is proved or has pleaded \nguilty; \nshall be informed as soon as reasonably practicable, in a language that he or \nshe understands and in detail, of the nature of the offence charged; \nshall be given adequate time and facilities for the preparation of his or her \ndefence; \nshall be permitted to defend himself or herself before the court in person or, at \nhis or her own expense, by a legal representative of his or her own choice; \nshall be afforded facilities to examine in person or by his or her legal \nrepresentative the witnesses called by the prosecution before the court, and to \nobtain the attendance and carry out the examination of witnesses to testify on \nhis or her behalf before the court on the same conditions as those applying to \nwitnesses called by the prosecution; and \nshall be permitted to have without payment the assistance of an interpreter if he \nor she cannot understand the language used at the trial of the charge, \nand except with his or her own consent the trial shall not take place in his or her absence \nunless he or she so conducts himself or herself as to render the continuance of the \nproceedings in his or her presence impracticable and the court has ordered him or her to \nbe removed and the trial to proceed in his or her absence. \n\n(f) \n\n(3) When a person is tried for any criminal offence, the accused person or any \n\nperson authorized by him or her in that behalf shall, if he or she so requires and subject \nto payment of such reasonable fee as may be prescribed by law, be given within a \nreasonable time after judgment a copy for the use of the accused person of any record \nof the proceedings made by or on behalf of the court.", - "page_start": 8, - "page_end": 8, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "font-size: 10px;\n }\n \n \n
General unless he or she is qualified to be appointed to the Office of a Judge of the High Count.( 3 ) The Attomay - General shall be the principal legal adviser to the Government. ( 4 ) A person holding the Office of Attomay - General shall vaccin the of her office when he or she attains the age of 6 ) years or such other age as may be prescribea
S1A. Director of Public Prosecutions ( 1 ) There shall be a Director of Prablic Prosecutions appointed by the President whose child be a public effice and whice shall be adjusted to the administrative supervision of the Attemney - Centeral( 2 ) A person shall not be qualified to be appointed to the Office of Director of Public Prosecutions unless he or she is qualified to be appointed to the Office of a Judge of the High Court.
( 3 ) The Director of Public Prosecutions shall have power in any case in which he or she considers it desirable to do so -( a ) to institute and undertake criminal proceedings against any person before any count ( other than a court martial ) in respect of any offence alleged to have been committed by that person ;
( b )to take over and continue any such criminal proceedings that have been instituted or undertaken by any other person or authority ; and
( c )to discontinue, at any stage before judgment is delivered, any such criminal proceedings instituted or undertaken by himself or herself or any other person or authority.
be exerciseed by him or her in person or by officers subordinate to him or her acting in accordance with his or her general or special authority. ( S ) For the purposes of this section any appeal from any judgment in any criminal proceedings bedpurpose of any such proceedings, to any other count shall be deemed to be part of those proceedings : Provided that the power conterred on the Director of Public Prosecutions by
subsection ( 3 )( c ) of this section shall not be exercised in relation to any appeal by a person convicted in any criminal proceedings or to any case stated or question of lareserved at the instance of such person.( 6 ) In the exercise of the functions vested in him or her by subsection ( 3 ) of this section the Director of Public Prosecutions shall not be subject to the direction or control
of any other person or authority : Provided that -( a )
where any other person or authority has instituted criminal proceedings, nothing in this subsection shall prevent the withdrawal of those proceedings by or at the instance of that person or authority, and with the leave of the court, and( b )
before exercising his or her powers in relation to cases considered by the Attory - General to be of national importance, the Director of Public Prosecutione shall consult the Attorney - General.52.
Permanent SecretariesWhere any Minister has been charged with responsibility for any department ofGovernment, he or she shall exercise general direction and control over that department and, subject to such direction and control, the department shall be under the supervision of a Permanent Secretary whose office shall be a public ofi
53.Prerogative of Mercy The President may -
\n [html]freedoms of the individual, that is to say, the right, whatever his or her race, place oforigin, political opinions, colour, creed or sex, but subject to respect for the rights and( 1 ) No person shall be deprived of his or her life intentionally save in execution ofthe sentence of a court in respect of an offence under the law in force in Botswana of which he or she has been convicted.( 2 ) A person shall not be regarded as having been deprived of his or her life infor the purpose of suppressing a riot, insurrection or mutiny ; or( d )( d )for the purpose of bringing him or her before a court in execution of the order of a court ;", - "page_start": 4, - "page_end": 4, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "\n \n \n \n
Protection of Fundamental Rights and Freedoms of the Individual ( ss 3 - 19 )
3.Fundamental rights and freedoms of the individual
Whereas every person in Botswana is entitled to the fundamental rights and
freedoms of others and for the public interest to each and all of the following, namely -( a )life, liberty, security of the person and the protection of the law ;
( b )freedom of conscience, of expression and of assembly and association ; and( c )
protection for the privacy of his or home and other property and from deprivation of property without compensation,the provisions of this Chapter shall have effect for the purpose of affording protection tothose rights and freedoms subject to such limitations of that protection as are contained
in those provisions, being limitations designed to ensure that the enjoyment of the said rights and freedoms by any individual does not prejudion the rights and freedoms of others or the public interest.4. Protection of right to life
contravention of subsection ( 1 ) of this section if he or she dies as the result of the use, to such extent and in such circumstances as are permitted by law, of such force as sis reasonable -( a )for the defence of any person from violence or for the defence of property ;
( b )in order to effect a lawful arrest or to prevent the escape of a person lawfully detained ;( c )
in order to prevent the commission by that person of a criminal offence,or if he or she dies as the result of a lawful act of war.5. Protection
Protection of right to personal liberty( 1 ) No person shall be deprived of his or her personal liberty save as may beauthorized by law in any of the following cases, that is to saya
( a )in execution of the senterce or order of a court, whether established for Extowana or some other country, in respect of a criminal offence of which she has been convicted ;( b )
in execution of the order of a court of record punishing him or her for contempt of that or another court ;( c )in execution of the order of a court made to secure the fulfilment of any obligation imposed on him or her by law ;
( e )upon reasonable suspicion of his or her having committed, or being about to commit, a criminal offerice under the law in force in Botswana ;( f )
under the order of a court or with the consent of his or her parent or guardian,
\n [html]\n
( 2 ) The resignation of any person from any office established by this Constitutionshall be effect on the date or at the limite educated in the verbing soping the resignalition or, I ' re outl date or time is so indicated, at the lime the writing is received by the parason or authority to whom II is addressed or by any person auta
or she may. If qualified, again be appointed or elected to hold that office in accordance with the provisions of this Constitution. ( 2 ) Where a power is conferred by this Constitution upon any percon to make anyappointment to any office, a person may be appointed to that office nohwithstanding that some other person may be holding that office, when that other person is on leave of absence person the relinquishment of the office, and where two or mo
holding the same office by reason of an appointment made in pursuace of this subseclin, then, for the purposes of any function conferred upon the holder of that office, the person last appointed shall be deemed to be the sole holder of the ofi( 1 ) In this Constitution unless the context atherwise requires -“ the Assembly ” means the National Assembly :
\" Elotswana \" means the territory that, on 28th September, 1956, was comprised omer Protectorate of Bechuanaland ;\" Tinancial year \" means the period of 12 months ending on 31st March in any year or on such other day as Parliament may prescribe ;
“ The Gazette ” means the Botswana Government Gazetter, \" high judicial office \" means the office of a judge of a coujuntadiction in civil and criminal matters in Botswana, a Commonwealth country or in any country outside the Commonwealth that may be prescribed by Parliament or the office of judge of a count having jurisdiction in appeals from such a cou
“ Kgosana ” ( pl. Dikgosana ) means Headman ; “ Kgosi ” ( pl. Dikgosi ) means Chief or Sub - Chie\" cath \" includes affirmation :
\" the cath of allegiance \" means such cath of allegiance as may be prescribedby law1 * public office * means, subject to the provisions of subsections ( 2 ) and ( 3 ) of this
section, an office of emolument in the public service ; \" public officer \" means a person holding or acting in any public office ; \"\" the public service \" means the civil service of the Government ;\" session \" means the sittings of the National Assembly beginning when it first
sits after the coming into operation of the Constitution or after Parliament is prorogued or dissolved at any time and ending when Parliament is prorogued or is dissolved without having been pronogued ;\" sitting \" means a period during which the National Assembly is sitting without
adjournment and includes any period during which it is in committee ; “ subordinate court ” means any court established for Botswana other than -( a ) the Court of Appeal ;
( b ) the High Court ;( c )
a court martial ; or
", - "page_start": 53, - "page_end": 53, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "has more than one residence in Botswana in the constituency in which he or \nshe has his or her principal residence; or \nin the case of a person who does not have a residence in Botswana but is able \nto register in person, in the constituency in which he or she last resided, or in \nwhich he or she was born; or \nin the case of a person who is not resident in Botswana and is unable to \nregister in person, at such place as may be prescribed by Parliament and \nregistration at such place shall be treated as registration in the constituency in \nwhich he or she last resided, or in which he or she was born in Botswana. \n\n(b) \n\n(c) \n\n(4) A person shall be entitled to be registered as a voter in one constituency only. \n(5) Every person who is registered in any constituency as a voter for the \npurposes of elections of the Elected Members of the National Assembly shall, unless he \nor she is disqualified by Parliament from voting in such elections on the grounds of his or \nher having been convicted of an offence in connection with the elections or on the \ngrounds of his or her having been reported guilty of such an offence by the court trying \nan election petition or on the grounds of his or her being in lawful custody at the date of \nthe election, be entitled so to vote in that constituency in accordance with the provisions \nmade by or under a law in that behalf; and no other person may so vote. \n**68. Tenure of office of Members**\n\n(1) The seat of an Elected Member or a Specially Elected Member of the \n\nNational Assembly shall become vacant- \n\n(a) \n(b) \n\nupon the dissolution of Parliament; \nif he or she is absent from the sittings of the Assembly for such period and in \nsuch circumstances as may be prescribed in the rules of procedure of the \nAssembly; \nsubject to the provisions of subsections (2) to (3) of this section, if any \ncircumstances arise that, if he or she were not a Member of the Assembly, \nwould cause him or her to be disqualified for election thereto. \n\n(c) \n\n(2) If circumstances such as are referred to in paragraph (c) of the preceding \n\nsubsection arise in relation to a Member of the Assembly by virtue of the fact that he or \nshe is declared insolvent, adjudged to be of unsound mind, sentenced to death or \nimprisonment, or convicted of an election offence and it is open to the Member to appeal \nagainst the decision (either with the leave of the court or other authority or without such \nleave), he or she shall forthwith cease to perform his or her functions as a Member of the \nAssembly but, subject to the next following subsection, he or she shall not vacate his or \nher seat until the expiration of a period of 30 days thereafter: \n\nProvided that the Speaker may, at the request of the Member, from time to time \n\nextend that period for further periods of 30 days to enable the Member to pursue an \nappeal against the decision, so, however, that extensions of time exceeding in the \naggregate 150 days shall not be given without the approval of the Assembly signified by \nresolution. \n\n(3) If, on the determination of any appeal, such circumstances continue to exist \n\nand no further appeal is open to the Member of the Assembly, or if, by reason of the \nexpiration of any period for entering an appeal or notice thereof or the refusal of leave to \nappeal or for any other reason, it ceases to be open to the Member to appeal, he or she \nshall forthwith vacate his or her seat. \n\n(4) If at any time before the Member of the Assembly vacates his or her seat \n\nsuch circumstances as aforesaid cease to exist, his or her seat shall not become vacant \nby reason of those circumstances, and he or she may resume the performance of his or \nher functions as a Member of the Assembly. \n**69. Determination of questions as to membership of National Assembly**", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "(d) the Industrial Court. \n\n(2) In this Constitution, unless the context otherwise requires, references to \n\noffices in the public service shall be construed as including references to the offices of \njudges of the Court of Appeal and judges of the High Court and the offices of members \nof all subordinate courts (being offices the emoluments attaching to which, or any part of \nthe emoluments attaching to which, are paid directly out of moneys provided by \nParliament). \n\n(3) For the purposes of this Constitution a person shall not be considered to be a \npublic officer by reason only that he or she is in receipt of any remuneration or allowance \nas the President, Vice-President, a Minister or Assistant Minister, Speaker, Deputy \nSpeaker or Member of the Assembly, a Member of the Ntlo ya Dikgosi or a member of \nany Commission established by this Constitution. \n\n(4) For the purposes of this Constitution, a person shall not be considered as \n\nholding a public office by reason only of the fact that he or she is in receipt of a pension \nor other like allowance in respect of service under the Government of Botswana or the \nformer Protectorate of Bechuanaland. \n\n(5) In this Constitution, unless the context otherwise requires, a reference to the \n\nholder of an office by the term designating his or her office shall be construed as \nincluding a reference to any person for the time being lawfully acting in or performing the \nfunctions of that office: \n\nProvided that nothing in this subsection shall apply to references to the President \n\nor Vice-President in section 35, 36 or 39 of this Constitution. \n\n(6) In this Constitution, unless it is otherwise provided or required by the context, \n\na reference to the power to make appointments to any office shall be construed as \nincluding a reference to the power to make appointments on promotion and transfer and \nto confirm appointments and to the power to appoint a person to act in or perform the \nfunctions of that office at any time when the office is vacant or the holder thereof is \nunable (whether by reason of absence or infirmity of mind or body or any other cause) to \nperform the functions of that office. \n\n(7) References in this Constitution to the power to remove a public officer from \nhis or her office shall be construed as including references to any power conferred by \nany law to require or permit that officer to retire from the public service: \n\nProvided that nothing in this subsection shall be construed as conferring on any \n\nperson or authority power to require a judge of the Court of Appeal or the High Court, the \nAuditor-General or the Director of Public Prosecutions to retire from the public service. \n(8) Any provision in this Constitution that vests in any person or authority power \n\nto remove any public officer from his or her office shall be without prejudice to the power \nof any person or authority to abolish any office or to any law providing for the compulsory \nretirement of public officers generally or in any class of public officer on attaining an age \nspecified therein. \n\n(9) Where power is vested by this Constitution in any person or authority to \nappoint any person to act in or perform the functions of any office if the holder thereof is \nhimself unable to perform those functions, no such appointment shall be called in \nquestion on the ground that the holder of the office was not unable to perform those \nfunctions. \n\n(10) No provision of this Constitution that any person or authority shall not be \n\nsubject to the direction or control of any other person or authority in the exercise of any \nfunctions under this Constitution shall be construed as precluding a court of law from \nexercising jurisdiction in relation to any question whether that person or authority has \nperformed those functions in accordance with this Constitution or any other law.", - "page_start": 54, - "page_end": 54, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "(1) The Chief Justice shall be appointed by the President. \n(2) The other judges of the High Court shall be appointed by the President, acting \n\nin accordance with the advice of the Judicial Service Commission. \n\n(3) A person shall not be qualified to be appointed as a judge of the High Court \n\nunless- \n(a) \n\nhe or she holds, or has held office, as a judge of a court having unlimited \njurisdiction in civil and criminal matters in Botswana, in a Commonwealth \ncountry or in any country outside the Commonwealth that may be prescribed by \nParliament or a court having jurisdiction in appeals from such a court; or \nhe or she is qualified to practise as an advocate or attorney in such a court and \nhas been qualified for not less than ten years to practise as an advocate or \nattorney in such a court; \nhe or she is qualified to practise as an advocate or attorney and he or she has \nhad the experience in the teaching of law in a recognised university for not less \nthan ten years; or \nhe or she is a Chief Magistrate who has held that office for not less than five \nyears. \n\n(b) \n\n(4) In computing, for the purposes of subsection (3) of this section, the period \n\nduring which any person has been qualified to practise as an advocate or attorney any \nperiod during which he or she has held judicial office after becoming so qualified shall be \nincluded. \n\n(5) If the office of Chief Justice is vacant or if the Chief Justice is for any reason \n\nunable to perform the functions of his or her office, then, until a person has been \nappointed to and has assumed the functions of that office or until the Chief Justice has \nresumed those functions, as the case may be, those functions shall be performed by \nsuch one of the judges of the High Court or such other person qualified for appointment \nas a judge of the High Court as the President may appoint for that purpose: \n\nProvided that- \n\n(i) a person may be appointed under this subsection notwithstanding that he or \nshe has attained the age of 70 years or such other age as may be prescribed \nfor the purposes of section 97 of this Constitution; \n\n(ii) a person appointed under this subsection, who is not a judge of the High Court, \nmay, notwithstanding the assumption or resumption of the functions of the office \nof Chief Justice by the holder of that office, continue to act as a judge of the", - "page_start": 40, - "page_end": 40, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "Botswana-constitution.pdf", - "query": "What are considered \"disciplined force\" according to Botswana constitution ?", - "target_page": 16, - "target_passage": "\"disciplined force\" means- (a) a naval, military or air force; (b) a police force; or (c) a prison service", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**\"disciplinary law\"**means a law regulating the discipline of any disciplined force; \n**\"disciplined force\"**means- \na naval, military or air force; \na police force; or \na prison service; (a) \n(b) \n(c) \n\n**\"legal representative\"**means a person entitled to practise in Botswana as an \n\nadvocate or attorney; \n\n**\"member\"**, in relation to a disciplined force, includes any person who, under the \n\nlaw regulating the discipline of that force, is subject to that discipline. \n\n(2) In relation to any person who is a member of a disciplined force raised under \nan Act of Parliament, nothing contained in or done under the authority of the disciplinary \nlaw of that force shall be held to be inconsistent with or in contravention of any of the \nprovisions of this Chapter other than sections 4, 6 and 7. \n\n(3) In relation to any person who is a member of a disciplined force raised \n\notherwise than as aforesaid and lawfully present in Botswana, nothing contained in or \ndone under the authority of the disciplinary law of that force shall be held to be \ninconsistent with or in contravention of any of the provisions of this Chapter. \n\n**CHAPTER III**\n**Citizenship (ss 20-29: repealed)**\n\n**20 to 29 inclusive.** **[Repealed.]**\n\n**CHAPTER IV**\n**The Executive (ss 30-56)**\n**PART I**\n**The President and the Vice-President (ss 30-41)**\n\n**30. Office of President**\n\nThere shall be a President of the Republic of Botswana who shall be the Head of \n\nState. \n**31. First President**\n\n(1) The first President shall be the person who immediately before 30th \n\nSeptember, 1966 holds the office of Prime Minister under the Constitution. \n\n(2) The first President shall be deemed to have assumed office at the coming into \n\noperation of this Constitution.", - "page_start": 15, - "page_end": 15, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "\n \n \n \n \n [html]for his or her education or wellare during any period ending not later than the date when he or she attains the age of 18 years ;reasonably practicable, in a language that he or she understands, of the reasons for his or her arrest or detention.upon reasonable suspicion of his or her having committed, or being about to commit, a criminal offence under the law in force in Botswana,include( b )\n
( g )for the purpose of preventing the spread of an infectious or contagious disease ; in the case of a person who is, or an easonably suspected to be, of unsoured mind, addicted to drugs or alcohol, or a vagrant, for the purpose of his or her care ore
( i )for the purpose of preventing the unlawed ventry of that person into Battwana, or for the purpose of effecting the expulsion, extradition or other lawful removal of that person from Bobwara, or for the purpose of restricting that person wh
( j )to such extent as may be necessary it the execution of a larkeful order requiring that person to remain within a specified area within 800waras or prohebring from for hier from being within tootch an areas, or it is such exercise to they do res
( k )for the purpose of ensuring the safety of aircraft in flight. 2 : Any person who is arrested or detained shall be informed as soon as
( 3 ) Any person who is arrested or detained -( a )
for the purpose of bringing him or her before a court in execution of the order of a court ; or( b )
and who and released, shall be brought as soon as is neasonatily practicable before a count ; and if any person arreasonaled or detailed as mentioned in paragraphy [ 6 ] of this subsection is not tried whitine a reasonable time, then, without( 4 ) Any person who is unlawfully arrested or detained by any other person shall be entitled to compensation therefor from that other person. 6. Protection from slavery and forceed labour
( 1 ) No person shall be held in slavery or servitude( 2 ) No person shall be required to perform forced labour. ( 3 ) For the purposes of this section, the expression “ force
( a )any labour required in consequence of the serilence or order of a court ;
Ideasur required if any person while he or she is lawfully detamed that, frough not required in consequence of the sentence or order of a court, is reasonably necessary in the interests of hyperne or for the maintenance of the place at whichi( c )
any labour required of a member of a disciplined force in pursuance of his or her dules as such or, in the case of a person who has conscientious objections to eervice as a member of a navali, military or air force, any labour that that person is r
", - "page_start": 5, - "page_end": 5, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "font-size: 10px;\n }\n \n \n \n [html]freedoms of the individual, that is to say, the right, whatever his or her race, place oforigin, political opinions, colour, creed or sex, but subject to respect for the rights and( 1 ) No person shall be deprived of his or her life intentionally save in execution ofthe sentence of a court in respect of an offence under the law in force in Botswana of which he or she has been convicted.( 2 ) A person shall not be regarded as having been deprived of his or her life infor the purpose of suppressing a riot, insurrection or mutiny ; or( d )( d )for the purpose of bringing him or her before a court in execution of the order of a court ;", - "page_start": 4, - "page_end": 4, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this \nsection. \n\n(3) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nfor the imposition of restrictions that are reasonably required in the interests of \ndefence, public safety, public order, public morality or public health or the \nimposition of restrictions on the acquisition or use by any person of land or \nother property in Botswana and except so far as that provision or, as the case \nmay be, the thing done under the authority thereof, is shown not to be \nreasonably justifiable in a democratic society; \nfor the imposition of restrictions on the freedom of movement of any person who \nis not a citizen of Botswana; \nfor the imposition of restrictions on the entry into or residence within defined \nareas of Botswana of persons who are not Bushmen to the extent that such \nrestrictions are reasonably required for the protection or well-being of Bushmen; \nfor the imposition of restrictions upon the movement or residence within \nBotswana of public officers; or \n....... \n\n(b) \n\n(c) \n\n(4) If any person whose freedom of movement has been restricted by order \n\nunder such a provision as is referred to in subsection (3)(a) of this section (other than a \nrestriction which is applicable to persons generally or to general classes of persons) so \nrequests at any time during the period of that restriction not earlier than six months after \nthe order was made or six months after he or she last made such request, as the case \nmay be, his or her case shall be reviewed by an independent and impartial tribunal \npresided over by a person, qualified to be enrolled as an advocate in Botswana, \nappointed by the Chief Justice. \n\n(5) On any review by a tribunal in pursuance of this section of the case of a \n\nperson whose freedom of movement has been restricted, the tribunal may make \nrecommendations, concerning the necessity or expediency of continuing the restriction \nto the authority by which it was ordered but, unless it is otherwise provided by law, that \nauthority shall not be obliged to act in accordance with any such recommendations. \n**15. Protection from discrimination on the grounds of race, etc.**\n\n(1) Subject to the provisions of subsections (4), (5) and (7) of this section, no law \n\nshall make any provision that is discriminatory either of itself or in its effect. \n\n(2) Subject to the provisions of subsections (6), (7) and (8) of this section, no \n\nperson shall be treated in a discriminatory manner by any person acting by virtue of any \nwritten law or in the performance of the functions of any public office or any public \nauthority. \n\n(3) In this section, the expression \"discriminatory\" means affording different \n\ntreatment to different persons, attributable wholly or mainly to their respective \ndescriptions by race, tribe, place of origin, political opinions, colour, creed or sex \nwhereby persons of one such description are subjected to disabilities or restrictions to \nwhich persons of another such description are not made subject or are accorded \nprivileges or advantages which are not accorded to persons of another such description. \n\n(4) Subsection (1) of this section shall not apply to any law so far as that law \n\nmakes provision- \n\n(a) \n(b) with respect to persons who are not citizens of Botswana; \n(c) with respect to adoption, marriage, divorce, burial, devolution of property on \n\nfor the appropriation of public revenues or other public funds; \n\ndeath or other matters of personal law;", - "page_start": 12, - "page_end": 12, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "\n \n \n \n
Protection of Fundamental Rights and Freedoms of the Individual ( ss 3 - 19 )
3.Fundamental rights and freedoms of the individual
Whereas every person in Botswana is entitled to the fundamental rights and
freedoms of others and for the public interest to each and all of the following, namely -( a )life, liberty, security of the person and the protection of the law ;
( b )freedom of conscience, of expression and of assembly and association ; and( c )
protection for the privacy of his or home and other property and from deprivation of property without compensation,the provisions of this Chapter shall have effect for the purpose of affording protection tothose rights and freedoms subject to such limitations of that protection as are contained
in those provisions, being limitations designed to ensure that the enjoyment of the said rights and freedoms by any individual does not prejudion the rights and freedoms of others or the public interest.4. Protection of right to life
contravention of subsection ( 1 ) of this section if he or she dies as the result of the use, to such extent and in such circumstances as are permitted by law, of such force as sis reasonable -( a )for the defence of any person from violence or for the defence of property ;
( b )in order to effect a lawful arrest or to prevent the escape of a person lawfully detained ;( c )
in order to prevent the commission by that person of a criminal offence,or if he or she dies as the result of a lawful act of war.5. Protection
Protection of right to personal liberty( 1 ) No person shall be deprived of his or her personal liberty save as may beauthorized by law in any of the following cases, that is to saya
( a )in execution of the senterce or order of a court, whether established for Extowana or some other country, in respect of a criminal offence of which she has been convicted ;( b )
in execution of the order of a court of record punishing him or her for contempt of that or another court ;( c )in execution of the order of a court made to secure the fulfilment of any obligation imposed on him or her by law ;
( e )upon reasonable suspicion of his or her having committed, or being about to commit, a criminal offerice under the law in force in Botswana ;( f )
under the order of a court or with the consent of his or her parent or guardian,
\n [html]\n
( 2 ) The resignation of any person from any office established by this Constitutionshall be effect on the date or at the limite educated in the verbing soping the resignalition or, I ' re outl date or time is so indicated, at the lime the writing is received by the parason or authority to whom II is addressed or by any person auta
or she may. If qualified, again be appointed or elected to hold that office in accordance with the provisions of this Constitution. ( 2 ) Where a power is conferred by this Constitution upon any percon to make anyappointment to any office, a person may be appointed to that office nohwithstanding that some other person may be holding that office, when that other person is on leave of absence person the relinquishment of the office, and where two or mo
holding the same office by reason of an appointment made in pursuace of this subseclin, then, for the purposes of any function conferred upon the holder of that office, the person last appointed shall be deemed to be the sole holder of the ofi( 1 ) In this Constitution unless the context atherwise requires -“ the Assembly ” means the National Assembly :
\" Elotswana \" means the territory that, on 28th September, 1956, was comprised omer Protectorate of Bechuanaland ;\" Tinancial year \" means the period of 12 months ending on 31st March in any year or on such other day as Parliament may prescribe ;
“ The Gazette ” means the Botswana Government Gazetter, \" high judicial office \" means the office of a judge of a coujuntadiction in civil and criminal matters in Botswana, a Commonwealth country or in any country outside the Commonwealth that may be prescribed by Parliament or the office of judge of a count having jurisdiction in appeals from such a cou
“ Kgosana ” ( pl. Dikgosana ) means Headman ; “ Kgosi ” ( pl. Dikgosi ) means Chief or Sub - Chie\" cath \" includes affirmation :
\" the cath of allegiance \" means such cath of allegiance as may be prescribedby law1 * public office * means, subject to the provisions of subsections ( 2 ) and ( 3 ) of this
section, an office of emolument in the public service ; \" public officer \" means a person holding or acting in any public office ; \"\" the public service \" means the civil service of the Government ;\" session \" means the sittings of the National Assembly beginning when it first
sits after the coming into operation of the Constitution or after Parliament is prorogued or dissolved at any time and ending when Parliament is prorogued or is dissolved without having been pronogued ;\" sitting \" means a period during which the National Assembly is sitting without
adjournment and includes any period during which it is in committee ; “ subordinate court ” means any court established for Botswana other than -( a ) the Court of Appeal ;
( b ) the High Court ;( c )
a court martial ; or
", - "page_start": 53, - "page_end": 53, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "(7) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision whereby persons of any such description as is mentioned in \nsubsection (3) of this section may be subjected to any restriction on the rights and \nfreedoms guaranteed by sections 9, 11, 12, 13 and 14 of this Constitution, being such a \nrestriction as is authorized by section 9(2), 11(5), 12(2) 13(2), or 14(3), as the case may \nbe. \n\n(8) Nothing in subsection (2) of this section shall affect any discretion relating to \n\nthe institution, conduct or discontinuance of civil or criminal proceedings in any court that \nis vested in any person by or under this Constitution or any other law. \n\n(9) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with the provisions of this section- \n\n(a) \n\nif that law was in force immediately before the coming into operation of this \nConstitution and has continued in force at all times since the coming into \noperation of this Constitution; or \nto the extent that the law repeals and re-enacts any provision which has been \ncontained in any written law at all times since immediately before the coming \ninto operation of this Constitution. \n\n(b) \n\n**16. Derogation from fundamental rights and freedoms**\n\n(1) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of section 5 or 15 of this Constitution to the \nextent that the law authorizes the taking during any period when Botswana is at war or \nany period when a declaration under section 17 of this Constitution is in force, of \nmeasures that are reasonably justifiable for the purpose of dealing with the situation that \nexists during that period. \n\n(2) Where a person is detained by virtue of such an authorization as is referred to \n\nin subsection (1) of this section the following provisions shall apply- \n\n(a) \n\nhe or she shall, as soon as reasonably practicable and in any case not more \nthan five days after the commencement of his or her detention, be furnished \nwith a statement in writing in a language that he or she understands specifying \nin detail the grounds upon which he or she is detained; \nnot more than 14 days after the commencement of his or her detention, a \nnotification shall be published in the Gazette stating that he or she has been \ndetained and giving particulars of the provision of law under which his or her \n\n(b)", - "page_start": 13, - "page_end": 13, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "\n \n [html]justifiable in the circumstances of any situation arising or existing during that period or as a result of that other emergency or calamity, for the purpose of dealing with that situation ; orany labour reasonably required as part of reasonable and normal communal or other civic obligations.7.( 1 ) No person shall be subjected to torture or to inhuman or degrading ment or other treatment.be inconsistent with or in contravention of this section to the extent that the law inB. Protection from deprivation of propertyno interest in or right over property of any description shall be compulsorily acquired, except where the following conditions are satisfied, that is to say -the taking of possession or acquisition is necessary or expedient -in the interests of defence, public safety, public order, public morality, public health, town and country planning or land settlement ;in order to secure the development or utilization of that, or other, property for a purpose beneficial to the community ; orin order to secure the development or utilization of the mineral resources of Botswana ; andprovision is made by a law applicable to that taking of possession or acquisition -for the prompt payment of adequate compensation ; andsecuring to any percein having an interest in or right over the property a right of secones to the High Count withine direct or on appeak from any other authority, for the determination of his or her interest or right, the legally of the taking", - "page_start": 6, - "page_end": 6, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**The Republic (ss 1-2)**\n\n**1.** **Declaration of Republic**\n\nBotswana is a sovereign Republic. \n\n**2.** **Public Seal**\n\nThe Public Seal of the Republic shall be such device as may be prescribed by or \n\nunder an Act of Parliament.", - "page_start": 4, - "page_end": 4, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "\n \n \n \n
( e )
Protection from inhuman treatment
( 2 ) Nothing contained in or done under the authority of any law shall be held to
question authorizes the infliction of any description of punishment that was lawful in the country immediately before the coming into operation of this Constitution.
( 1 ) No property of any description shall be compulsorily taken possession of, and
( a )
( i )
( ii )
( iii )
( b )
( i )
( ii )
( 2 ) No person who is entitled to compensation under this section shall be
prevented from remttiting, within a reasonable forme after has reashed any amount of that compensation, the whole of that amount ( hee from any deduction, charge or tax made or level in respect of its remission ) to any country of his or her coto any Lew applicable to the taking of possession of minerals or the acquisition of rights to minerals if that law makes provision for the payment at reasonable intervals of adequate royatilies.( 4 ) Nothing contained in or done under the authority of any law shall be held to
be inconsistent with or in contravention of subsection ( 2 ) of this section to the extent that the law in question authorizes -( a )the attachment, by order of a court, of any amount of compensation to which a person is entitled in satisfaction of the judgment of a count or pending the determination of civil proceedings to which he or she is a party ; or
( b )the imposition of reasonable restrictions on the manner in which any amount of
\n [html]\n
The President may at any time prongue Parliament. Subject to the provisions of this Constitution, the President may at any timeParliament
Subject to the provisions of subsection ( 4 ) of this section, Parliament, unlessolved, shall continue for five years from the date of the first sitting of the ussembly after any dissolution and shall then stand dissolved.At any time when Botswana is at war, Parliament may from time to time
period of five years specified in subsection ( 3 ) of this section for not more onths at a time :Devided that the life of Parliament shall not be extended under this subsection an five years.
If, after a dissolution of Parliament and before the holding of the generalthe Elected Members of the National Assembly, the President considers that,
≥ 6 : stence of a state of war or a state of emergency in Botswana or anyjt is necessary to recall Parliament, the President may summon the
hat has been dissolved to meet and that Parliament shall be deemed to be ment for the being, but the general election of the Elected Members of thussembly shall proceed and the Parliament that has been recalled shall, if notsolved, again stand dissolved on the day before the day on which the election
of no confidence in the GovernmentNational Assembly at any time passes a resolution supported by a majorityAembers of the Assembly who are entitled to vote declaring that it has no
In the Government of Botswana, Parliament shall stand dissolved on the following the day on which such resolution was passed, unless the Presidhighs his or her office or dissolves Parliament.
ngs of National AssemblyThe President may at any time summon a meeting of the National Assembly.
Subject to the provisions of this Constitution, the sittings of the Nationalin any session of Parliament after the commencement of that session shall be at such times and on such days as the Assembly shall appoint. PART VI
Interpretation ( s 94 )Any reference in this Constitution toof two - thirds of the Members of the Assembly shall be construed as a
to the votes of two - thirds of the Members of the Assembly excluding the slesiong.CHAPTER VI
The Judicature ( ss 95 - 107 )PART I
The High Court ( ss 95 - 98 )sdiction and composition
There shall be for Botswana a High Court which shall have unlimited original10 hear and determine any clvil or criminal proceedings under any law and
jurisdiction and powers as may be conferred on it by this Constitution or anyThe judges of the High Court shall be the Chief Justice and such number of
", - "page_start": 39, - "page_end": 39, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "\n \n \n \n \n [html]CONSTITUTION OF BOTSWANAARRANGEMENT OF SECTIONS CHAPTER IPublic SealCHAPTER IV The ExecutivePART IMinisters and Assistant Ministers\n
The Republic1.
Declaration of Republic2.
CHAPTER IIProtection of Fundamental Rights and Freedoms of the Individual
3.Fundamental rights and freedoms of the individual
4.Protection of right to life
5.Protection of right to personal liberty
6.Protection from slavery and forced labour
7.Protection from inhuman treatment
8.Protection from deprivation of property
9.Protection for privacy of home and other property
10.Provisions to secure protection of law
11.Protection of freedom of conscience
12.Protection of freedom of expression
13.Protection of freedom of assembly and association
14.Protection of freedom of movement
15.Protection from discrimination on the grounds of race, etc.
16.Derogation from fundamental rights and freedoms
17.Declarations relating to emergencies
18.Enforcement of protective provisions
19.Interpretation and savings
CHAPTER III Citizenship20 to 29.......
The President and the Vice - President30.
Office of President31.
First President32.
Election of President after dissolution of Parliament33.
Qualification for election as President34.
Tenure of office of President35.
Vacancy in office of President36.
Discharge of functions of President during absence, illness, etc.37.
Oath of President38.
Returning officer at elections of President39.
Vice - President40.
Salary and allowances of President41.
Protection of President in respect of legal proceedingsPART II
The Cabinet42.
43.Tenure of office of Ministers and Assistant Ministers
44.Cabinet
45.Oaths to be taken by Ministers and Assistant Ministers
46.Secretary to the Cabinet
", - "page_start": 0, - "page_end": 0, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "serverless-core.pdf", - "query": "How much does AWS lambda charge when the function is not running ?", - "target_page": 52, - "target_passage": "there is no charge when your code is not running", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Unlike traditional servers, Lambda functions do not run constantly. When a function is triggered by \n\nan event, this is called an*invocation*. Lambda functions are limited to 15 minutes in duration, but \n\non average, across all AWS customers, most invocations last for less than a second. \n\nThere are many types of invocation events. Some examples: \n\n• HTTP request from API Gateway \n\n• Schedule managed by an EventBridge rule \n\n• Message from an IOT device \n\n• Notification that a file was uploaded to an S3 bucket \n\n**How Lambda invokes your function (runtime environment)**\n\nLambda invokes your function in an*execution environment*, which contains a secure and isolated \n\n*runtime environment*. \n\n• A*runtime*provides a language-specific environment which relays invocation events, context \n\ninformation, and responses between the Lambda and your functions. \n\n• An*execution environment*manages the processes and resources that are required to run the \n\nfunction.", - "page_start": 55, - "page_end": 55, - "source_file": "serverless-core.pdf" - }, - { - "text": "Serverless \n\ncould be listening. The handler function might create and send another event to an SNS queue so \n\nthat alerts for high temperature are sent to users through SMS messages. \n\nThe function finally wraps up the JSON weather data into a new event and sends it back to API \n\ngateway. Afterward, the function continues to handle hundreds of additional requests. Request \n\nfrom users slow down after 2AM, so after some time the Lambda service will tear down the \n\nfunction execution environment to conserve resources. As a Customer, you will only be charged for \n\nfunction usage.", - "page_start": 38, - "page_end": 38, - "source_file": "serverless-core.pdf" - }, - { - "text": "Next, API Gateway integrates with Lambda, a compute service, to handle the new event. Lambda \n\nfunction code parses the parameters in the inbound event, connects to the data store, and retrieves \n\nthe cart. The function queries the database API through an SDK library. Because the DynamoDB \n\ndatabase is also serverless and built to respond with low latency, there is no need for a connection \n\npool. \n\nAfter converting currency to USD and removing unavailable items, the function sends the result as \n\na new event to API Gateway. \n\nFinally, API Gateway converts the event into a response to send to the waiting client. \n\nThe method with which a function is invoked should be informed by your application archecture \n\nand needs. For example, batch-processing patterns have different applications to on-demand data \n\nprocessing. Understanding these paradigm differences can also help customers decide between \n\nAWS services. \n\nDeploying a microservice as a containerized application on Fargate could be more appropriate if \n\nthe microservice is primarily used for batch data processing. Whereas a Lambda function would be \n\nmuch more straight-forward to deploy and maintain in applications that require on-demand data \n\nprocessing.", - "page_start": 29, - "page_end": 29, - "source_file": "serverless-core.pdf" - }, - { - "text": "Serverless \n\nYou can use runtimes that Lambda provides for JavaScript (Node.js), TypeScript, Python, Java, \n\nPython, Go, C#, and PowerShell, or you can build your own custom runtime environment inside of a \ncontainer. \n\nIf you package your code as a .zip file archive, you must configure your function to use a runtime \n\nthat matches your programming language. For a container image, you include the runtime when \n\nyou build the image. \n\n**How to process events with a Lambda handler**\n\nConceptually, there are only three steps to processing events with Lambda: \n\n1. Configure the entry point to your function, known as the*handler*, and deploy the function. \n\n2. Lambda service initializes the function, then it invokes the*handler*with an invocation event and \n\ncontext. \n\n3. Your handler function processes the event and returns a response event. \n\nSubsequent events will invoke the handler again, without the initialization delay. During this cycle, \n\nthe function stays in memory, so clients and variables declared outside of the handler method can \n\nbe reused. \n\nAfter a period of time, Lambda will eventually tear down the runtime. This can happen for a variety \n\nof reasons; some examples: scaling down to conserve resources, updating the function, updating \n\nthe runtime. \n\nThe function**handler**is the essential component of your function code. As noted previously, the \nhandler is the entry point, but it may not be the only function in your code. In fact, a best practice \n\nis keeping the handler sparse and doing the actual processing in other functions in your code. \n\nHere are some example**handlers**: \n\nPython", - "page_start": 56, - "page_end": 56, - "source_file": "serverless-core.pdf" - }, - { - "text": "Within the Lambda service, your function code is stored in a code package, deployed as a .zip or a \n\ncontainer image. All interaction with the code occurs through the Lambda API. There is no direct \ninvocation of functions from outside of the Lambda service. \n\nWhat you will learn on your journey to building applications with Lambda: \n\n• How the event-driven programming model invokes Lambda functions \n\n• How to create, invoke, test, update, package, and secure functions \n\n• How the execution and runtime environment runs your functions \n\n• How to view logs and monitor your functions \n\n• Where to find hands-on opportunities to learn how to invoke functions", - "page_start": 51, - "page_end": 51, - "source_file": "serverless-core.pdf" - }, - { - "text": "Handlers in interpreted languages can be deployed directly through the web-based AWS \n\nManagement Console. Compiled languages, such as Java and C#, or functions that use external \n\nlibraries are deployed using .zip file archives or container images. Because of that additional \n\nprocess, this guide will focus on Python for examples. \n\nRegardless of language, Lambda functions will generally return a*response event*on successful \n\ncompletion. The following program listing is an example response event to send back to API \n\nGateway so that it can handle a request: \n\n{ \n\n \"statusCode\": 200, \n\n \"headers\": { \n\n \"Content-Type\": \"application/json\" \n\n }, \n\n \"isBase64Encoded\": false, \n\n \"multiValueHeaders\": { \n\n \"X-Custom-Header\": [\"My value\", \"My other value\"], \n\n }, \n\n \"body\": \"{\\n \\\"TotalCodeSize\\\": 104330022,\\n \\\"FunctionCount\\\": 26\\n}\" \n\n} \n\n**How to write logs with serverless applications**\n\nYou might have noticed the logging statements in the preceding handler code. Where do those log \n\nmessages go? \n\nDuring invocation, the Lambda runtime automatically captures function output to Amazon \n\nCloudWatch. \n\nIn addition to logging your function's output, the runtime also logs entries when function \n\ninvocation starts and ends. This includes a report log with the request ID, billed duration,", - "page_start": 58, - "page_end": 58, - "source_file": "serverless-core.pdf" - }, - { - "text": "Many traditional systems are designed to run periodically and process batches of transactions that \n\nhave built up over time. For example, a banking application may run every hour to process ATM \n\ntransactions into central ledgers. In Lambda-based applications, the custom processing should be \ntriggered by every event, allowing the service to scale up concurrency as needed, to provide near- \n\nreal time processing of transactions. \n\nWhile you can run cron tasks in serverless applications by using Amazon EventBridge Scheduler, \n\nconsider the size of each batch of data that your event sends to Lambda. In this scenario, there \n\nis potential for the volume of transactions to grow beyond what can be processed within the 15- \n\nminute Lambda timeout. If the limitations of external systems force you to use a scheduler, you \n\nshould generally schedule for the shortest reasonable recurring time period. \n\nFor example, it’s not best practice to use a batch process that triggers a Lambda function to fetch \n\na list of new Amazon S3 objects. This is because the service might receive more new objects in \n\nbetween batches than can be processed within a 15-minute Lambda function.", - "page_start": 24, - "page_end": 24, - "source_file": "serverless-core.pdf" - }, - { - "text": "**Workshop - Intro to Serverless**- Before diving too deep, you can choose to try out serverless in \na workshop or tutorial. Connect to a data source and create a REST API with your first Lambda \n\nfunction.” \n\n• Services used: AWS Management Console, Lambda, DynamoDB, API Gateway \n\n**Programming Model**\n\nThe Lambda service provides the same event-based programming model for all languages. The \n\nLambda runtime passes an*invocation event*and*context*to your Lambda function*handler*which \n\ndoes some work and produces a resulting event: \n\nThe*invocation event*contains data, as a JSON packet, which varies from service to service. For \n\nexample, API gateway events include path, HTTP method, query string parameters, headers, \ncookies, and more. DynamoDB events could contain updated or delete record data. S3 events \n\ninclude the bucket name and object key, among other things. \n\n*The context*contains information about the environment the function is running inside. Additional \n\ncontextual information can be set in familiar environment variables (ENV). \n\nThe function*handler*is a method in your function code that processes the inbound event. The \n\nhandler, which is a standard function in your language of choice, does some work and emits a*result*\n\n*event*.", - "page_start": 54, - "page_end": 54, - "source_file": "serverless-core.pdf" - }, - { - "text": "Serverless \n\ninitialization duration, and other details. If your function throws an error, the runtime returns that \n\nerror to the invoker. \n\nTo help simplify troubleshooting, the AWS Serverless Application Model CLI (AWS SAM CLI) has \n\na command called sam logs which will show you CloudWatch Logs generated by your Lambda \n\nfunction. \n\nFor example, the following terminal command would show the live tail of logs generated by the \n\n*YourLambdaFunctionName*Lambda function: \n\nLogging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for \n\ndebugging. \n\n**Securing functions**\n\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. \n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function \n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions \n\nin Lambda functions: \n\n•*resource policy*: Defines which events are authorized to invoke the function. \n\n•*execution role policy*: Limits what the Lambda function is authorized to do. \n\nUsing IAM roles to describe a Lambda function’s permissions, decouples security configuration \n\nfrom the code. This helps reduce the complexity of a lambda function, making it easier to maintain. \n\nA Lambda function’s resource and execution policy should be granted the minimum required \n\npermissions for the function to perform it’s task effectively. This is sometimes referred to as the \n\nrule of least privilege. As you develop a Lambda function, you expand the scope of this policy to \n\nallow access to other resources as required.", - "page_start": 59, - "page_end": 59, - "source_file": "serverless-core.pdf" - }, - { - "text": "**Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, \n\ntypically with no changes to your function code. The largest contributor to startup latency (often \n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which \n\nincludes loading the function's code, starting the runtime, and initializing the function code. \n\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda \n\ntakes a Firecracker microVM snapshot of the memory and disk state of the initialized execution \n\nenvironment, encrypts the snapshot, and caches it for low-latency access. \n\nRelated resources: \n\n• Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by \n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly \n\nsix seconds init time to 142 milliseconds of restore time with SnapStart", - "page_start": 62, - "page_end": 62, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "serverless-core.pdf", - "query": "What is the role of resource policies of lambda functions ?", - "target_page": 60, - "target_passage": "resource policy: Defines which events are authorized to invoke the function.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Serverless \n\ninitialization duration, and other details. If your function throws an error, the runtime returns that \n\nerror to the invoker. \n\nTo help simplify troubleshooting, the AWS Serverless Application Model CLI (AWS SAM CLI) has \n\na command called sam logs which will show you CloudWatch Logs generated by your Lambda \n\nfunction. \n\nFor example, the following terminal command would show the live tail of logs generated by the \n\n*YourLambdaFunctionName*Lambda function: \n\nLogging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for \n\ndebugging. \n\n**Securing functions**\n\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. \n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function \n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions \n\nin Lambda functions: \n\n•*resource policy*: Defines which events are authorized to invoke the function. \n\n•*execution role policy*: Limits what the Lambda function is authorized to do. \n\nUsing IAM roles to describe a Lambda function’s permissions, decouples security configuration \n\nfrom the code. This helps reduce the complexity of a lambda function, making it easier to maintain. \n\nA Lambda function’s resource and execution policy should be granted the minimum required \n\npermissions for the function to perform it’s task effectively. This is sometimes referred to as the \n\nrule of least privilege. As you develop a Lambda function, you expand the scope of this policy to \n\nallow access to other resources as required.", - "page_start": 59, - "page_end": 59, - "source_file": "serverless-core.pdf" - }, - { - "text": "Serverless \n\n**Advanced topics**\n\nYou can do a lot just using AWS managed policies. As you progress on your journey, you should \n\nexplore the following more advanced topics. \n\n**Resource-based policies**\n\nWhen you create a permissions policy to restrict access to a resource, you can choose an*identity-*\n*based policy*or a*resource-based policy*. \n\n**Identity-based policies**are attached to a user, group, or role. These policies let you specify what \nthat identity can do (its permissions). For example, you can attach the policy to the group named \n\nRemoteDataMinders, stating that group members are allowed to get items from an Amazon \n\nDynamoDB table named MyCompany. \n\n**Resource-based policies**are attached to a resource. For example, you can attach resource-based \npolicies to Amazon S3 buckets, Amazon Simple Queue Service queues, VPC endpoints, and AWS \n\nKey Management Service encryption keys. \n\nWith resource-based policies, you can specify who has access to the resource and what actions they \n\ncan perform on it. \n\n**Related resource(s):**\n\n• Identity-based and resource-based policies in the official documentation \n\n• AWS Services that work with IAM is a comprehensive list of services, including which ones \n\nsupport resource-based policies \n\n**IAM permissions boundaries**\n\nWith a permissions boundary, you set the maximum permissions that an identity-based policy can \ngrant to an IAM entity. \n\nWhen you set a permissions boundary for an entity, the entity can perform only the actions \n\nthat are allowed by both its identity-based policies and its permissions boundaries. Permissions \n\nboundaries limit the maximum permissions for the user or role. \n\nFor example, assume that the role named CoreServiceAdmin should be allowed to manage only \nAmazon S3, Amazon CloudWatch, and AWS Lambda. To enforce this rule, you can set a policy to set \n\nthe permissions boundary for the CoreServiceAdmin role.", - "page_start": 48, - "page_end": 48, - "source_file": "serverless-core.pdf" - }, - { - "text": "Unlike traditional servers, Lambda functions do not run constantly. When a function is triggered by \n\nan event, this is called an*invocation*. Lambda functions are limited to 15 minutes in duration, but \n\non average, across all AWS customers, most invocations last for less than a second. \n\nThere are many types of invocation events. Some examples: \n\n• HTTP request from API Gateway \n\n• Schedule managed by an EventBridge rule \n\n• Message from an IOT device \n\n• Notification that a file was uploaded to an S3 bucket \n\n**How Lambda invokes your function (runtime environment)**\n\nLambda invokes your function in an*execution environment*, which contains a secure and isolated \n\n*runtime environment*. \n\n• A*runtime*provides a language-specific environment which relays invocation events, context \n\ninformation, and responses between the Lambda and your functions. \n\n• An*execution environment*manages the processes and resources that are required to run the \n\nfunction.", - "page_start": 55, - "page_end": 55, - "source_file": "serverless-core.pdf" - }, - { - "text": "**Additional resources**\n\nOfficial AWS documentation: \n\n• AWS Identity and Access Management Documentation \n\n• Example IAM identity-based policies - an extensive list of example policies, including AWS \n\nLambda: Allows a lambda function to access an Amazon DynamoDB table which is useful in \n\nmicroservices \n\n• Grant least privilege section of the*Policies and permissions*chapter suggests a method to refine \n\npermissions for increased security \n\nResources from the serverless community: \n\n• Simplifying serverless permissions with AWSAWS SAM Connectors - AWS Compute blog post \n\nby Kurt Tometich, Senior Solutions Architect, AWS, from Oct 2022 that introduces a AWS SAM \n\nabstraction that creates minimally scoped IAM policies \n\n• Building AWS Lambda governance and guardrails - AWS Compute blog post by Julian Wood, \n\nSenior Solutions Architect, AWS, from Aug 2022 that highlights how Lambda, as a serverless \n\nservice, simplifies cloud security and compliance so you can concentrate on your business logic. \n\n**Next Steps**\n\n• Work through the Getting Started Resource Center 30-45 min tutorial on Setting Up Your AWS \n\nEnvironment to properly set up your AWS account, secure the root user, create an IAM user, and \nsetup AWS CLI and (optionally) Cloud9 environment.", - "page_start": 49, - "page_end": 49, - "source_file": "serverless-core.pdf" - }, - { - "text": "Serverless \n\n**Connect to functions with Function URLs**\n\nA function URL is a dedicated HTTP(S) endpoint for your Lambda function. You can create and \n\nconfigure a function URL through the Lambda console or the Lambda API. When you create a \n\nfunction URL, Lambda automatically generates a unique URL endpoint for you. Once you create a \n\nfunction URL, its URL endpoint never changes. Function URL endpoints have the following format: \n\n**Learn serverless techniques in an online workshop**\n\nLearn by doing in the**Serverless Patterns Workshop**. The first module introduces a \nserverless microservice to retrieve data from DynamoDB with Lambda and API Gateway. \n\nAdditional modules provide practical examples of unit and integration testing, using \n\ninfrastructure as code to deploy resources, and how to build common architectural patterns \n\nused in serverless solutions.", - "page_start": 63, - "page_end": 63, - "source_file": "serverless-core.pdf" - }, - { - "text": "**Workshop - Intro to Serverless**- Before diving too deep, you can choose to try out serverless in \na workshop or tutorial. Connect to a data source and create a REST API with your first Lambda \n\nfunction.” \n\n• Services used: AWS Management Console, Lambda, DynamoDB, API Gateway \n\n**Programming Model**\n\nThe Lambda service provides the same event-based programming model for all languages. The \n\nLambda runtime passes an*invocation event*and*context*to your Lambda function*handler*which \n\ndoes some work and produces a resulting event: \n\nThe*invocation event*contains data, as a JSON packet, which varies from service to service. For \n\nexample, API gateway events include path, HTTP method, query string parameters, headers, \ncookies, and more. DynamoDB events could contain updated or delete record data. S3 events \n\ninclude the bucket name and object key, among other things. \n\n*The context*contains information about the environment the function is running inside. Additional \n\ncontextual information can be set in familiar environment variables (ENV). \n\nThe function*handler*is a method in your function code that processes the inbound event. The \n\nhandler, which is a standard function in your language of choice, does some work and emits a*result*\n\n*event*.", - "page_start": 54, - "page_end": 54, - "source_file": "serverless-core.pdf" - }, - { - "text": "Next, API Gateway integrates with Lambda, a compute service, to handle the new event. Lambda \n\nfunction code parses the parameters in the inbound event, connects to the data store, and retrieves \n\nthe cart. The function queries the database API through an SDK library. Because the DynamoDB \n\ndatabase is also serverless and built to respond with low latency, there is no need for a connection \n\npool. \n\nAfter converting currency to USD and removing unavailable items, the function sends the result as \n\na new event to API Gateway. \n\nFinally, API Gateway converts the event into a response to send to the waiting client. \n\nThe method with which a function is invoked should be informed by your application archecture \n\nand needs. For example, batch-processing patterns have different applications to on-demand data \n\nprocessing. Understanding these paradigm differences can also help customers decide between \n\nAWS services. \n\nDeploying a microservice as a containerized application on Fargate could be more appropriate if \n\nthe microservice is primarily used for batch data processing. Whereas a Lambda function would be \n\nmuch more straight-forward to deploy and maintain in applications that require on-demand data \n\nprocessing.", - "page_start": 29, - "page_end": 29, - "source_file": "serverless-core.pdf" - }, - { - "text": "This guide will highlight what you need to know right away and link to service documentation for \n\nmore service-specific details. \n\nFor example, you will learn that the Lambda service creates an*execution environment*to run \n\ncompute functions. For more information on how Lambda manages function scaling or reduces \n\nstart-up time, we will link you to relevant sections of the Lambda developer guide. \n\nThe topics in this guide will cover the prerequisites for understanding serverless development on \n\nAWS, such as account creation and an overview of AWS cloud infrastructure. Then, you will learn \n\nhow to shift from a traditional development model to a serverless, event-driven architecture with \n\nwhich to develop applications on the cloud. \n\nAlong the way, this guide will introduce core services, workshops, and tutorials, you can choose to \nreinforce your learning with hands-on activities. \n\n• AWS Identity and Access Management — for securely accessing resources on AWS.", - "page_start": 5, - "page_end": 5, - "source_file": "serverless-core.pdf" - }, - { - "text": "In traditional applications, you write code to do these tasks. You organize that code into**functions**. \nYou put the function code inside an application framework. Whichever framework you picked will \n\nrun inside a language dependent runtime environment. Finally, that runtime environment will be \n\nhosted on a virtual or physical server. \n\nSetting up, configuring and maintaining the frameworks, runtime environments, and virtual or \n\nphysical infrastructure slows down your delivery of features, bug fixes, and improvements. \n\n**What is Lambda?**\n\nIn Lambda, you write function code. Lambda runs the functions. That’s it. There are no servers.", - "page_start": 50, - "page_end": 50, - "source_file": "serverless-core.pdf" - }, - { - "text": "**Protect your API**\n\nTo authenticate and authorize access to your Rest APIs, you can choose from the following: \n\n• Amazon Cognito user pools as an identity source for who access the API. \n\n• Lambda functions to control access to APIs by using a variety of identity sources. \n\n• Resource-based policies to allow or deny specified access from source IP addresses or VPC \n\nendpoints. \n\n• AWS Identity and Access Management roles, policies, and IAM tags to control access for who can \n\ninvoke certain APIs. \n\n**Advanced Topics**\n\nYou can connect a microservice with a REST API and a single integration to a Lambda function. As \n\nyou progress on your journey, you should explore the following advanced topics. \n\n• Choose between REST and HTTP APIs \n\n• Explore non-proxy custom integrations and data transformation \n\n• Optimize your API with caching \n\n• Explore HTTP APIs \n\n• Learn how to use proxy routes and resources \n\n• Send binary media types \n\n• Explore bidirectional connections using WebSocket APIs \n\n• Build and export your API using an OpenAPI 3 definition", - "page_start": 70, - "page_end": 70, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "serverless-core.pdf", - "query": "Why can't I use SnapStart on my function tagged with $LATEST ?", - "target_page": 63, - "target_passage": " You can use SnapStart only on published function versions and aliases that point to versions. You can't use SnapStart on a function's unpublished version ($LATEST)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, \n\ntypically with no changes to your function code. The largest contributor to startup latency (often \n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which \n\nincludes loading the function's code, starting the runtime, and initializing the function code. \n\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda \n\ntakes a Firecracker microVM snapshot of the memory and disk state of the initialized execution \n\nenvironment, encrypts the snapshot, and caches it for low-latency access. \n\nRelated resources: \n\n• Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by \n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly \n\nsix seconds init time to 142 milliseconds of restore time with SnapStart", - "page_start": 62, - "page_end": 62, - "source_file": "serverless-core.pdf" - }, - { - "text": "To avoid any significant impact on performance because of multiple targets, FlashCopy \ncreates dependencies between the targets. Dependencies can be considered as “hidden” \nFlashCopy mappings that are not visible to and cannot be managed by the user. A \ndependency is created between the most recent target and the previous one (in order of start \ntime). Figure 11-13 shows an example of a source volume with three targets. \n\nWhen the three targets are started, Target T0 was started first and considered the “oldest.” \nTarget T1 was started next and is considered “next oldest,” and finally Target T2 was started \nlast and considered the “most recent” or “newest.” The “next oldest” target for T2 is T1. The \n“next oldest” target for T1 is T0. T1 is newer than T2, and T0 is newer than T1. \n\nFigure 11-13 FlashCopy dependencies example \n\n**Source read with Multiple target FlashCopy**\nThere is no specific behavior for read operations on source volumes when there are multiple \ntargets for that volume. The data is always read from the source. \n\n**Source write with Multiple Target FlashCopy (Copy on Write)**\nA write to the source volume does not cause its data to be copied to all of the targets. Instead, \nit is copied to the most recent target volume only. For example, consider the sequence of \nevents that are listed in Table 11-3, for a source volume and three targets started at different \ntimes. In this example, there is no background copy. The “most recent” target is indicated with \nan asterisk. \n\nTable 11-3 Sequence example of write IOs on a source with multiple targets \n\n\n \n \n \n \n [html]\n
Source VolumeTarget T0Target T1Target T2
Time 0 : mapping with T0 is startedA B CD E F_____Not startedNot started
Time 1 : change of “ A ” is made on source (->“ G ”)G B CD E FA − _ *Not startedNot started
Time 2 : mapping with T1 is startedG B CD E FA − −– – –Not started
", - "page_start": 475, - "page_end": 475, - "source_file": "sg247938.pdf" - }, - { - "text": "4. The procedure to generate the snap on a Storwize V7000 system, including the most \n\nrecent statesave from each node canister, starts. This process might take a few minutes \n(see Figure 13-70). \n\nFigure 13-70 Task detail window \n\n**13.9.2 Collecting logs using the CLI**\n\nThe CLI can be used to collect and upload a support package as requested by IBM Support \nby performing the following steps: \n\n1. Log in to the CLI and issue the**svc_snap**command that matches the type of snap \nrequested by IBM Support: \n\n– Standard logs (type 1): \n\nsvc_snap upload pmr=ppppp,bbb,ccc gui1 \n\n– Standard logs plus one existing statesave (type 2): \n\nsvc_snap upload pmr=ppppp,bbb,ccc gui2 \n\n– Standard logs plus most recent statesave from each node (type 3): \n\nsvc_snap upload pmr=ppppp,bbb,ccc gui3 \n\n– Standard logs plus new statesaves: \n\nsvc_livedump -nodes all -yes \nsvc_snap upload pmr=ppppp,bbb,ccc gui3", - "page_start": 751, - "page_end": 751, - "source_file": "sg247938.pdf" - }, - { - "text": "As you progress on your journey, you should explore the following more advanced topics. \n\n• Connect services with event source mapping \n\n• Deploy code in containers \n\n• Add additional code with layers \n\n• Augment functions with extensions \n\n• Launch functions faster with SnapStart \n\n• Connect to functions with Function URLs \n\n**Event source mapping**\n\nSome services can trigger Lambda functions directly, for example, when an image is added to an \n\nS3 bucket, a Lambda can be triggered to resize it. Some services cannot invoke Lambda directly; \n\nbut you can instead use an*event source mapping*which is a polling mechanism that reads from an \n\nevent source and invokes a Lambda function. \n\nYou can use event source mappings to process items from a stream or queue in the following \n\nservices: \n\n• Amazon DynamoDB \n\n• Amazon Kinesis \n\n• Amazon MQ \n\n• Amazon Managed Streaming for Apache Kafka (Amazon MSK) \n\n• Self-managed Apache Kafka \n\n• Amazon Simple Queue Service", - "page_start": 60, - "page_end": 60, - "source_file": "serverless-core.pdf" - }, - { - "text": "[html]•Register* 00230000*Convention :R1 po1nts to the Parameter 11st* 00240000*: 12 base register00250000•* 00260000*Patch Label :PSPACE* 00270000** 00280000*Input :Parameter 11st po1nted to by Reg1ster 1* 00290000*Parameter 11st contains addresses of :* 00300000*- message 1ength* 00310000*- message text* 00320000** 00330000*Output :None* 00340000** 00350000*Return codes :* 00360000** 00370000•NORMAL :R15 – return code from WT0* 00380000** 00390000*Ex1 ts :Return to caller v1a BR 14* 00400000** 00410000*Externa1References :* 00420000** 00430000*ChangeAct 1 v1 ty :See below* 00440000** 00450000*Ver ReModDateDescription of Change* 00460000** 00470000*00004 / 05 / 00Release 7.2* 00480000** 00490000******A + A + A +END OF MODULE SPECIFICATIONS********************************************************************************************************************************************************************************************************00500000ARSLOGcsect00510000ARSL0Grrmode any00520000ARSL0Gamode3100530000using*, r1500540000bpastcopy00550000dcC ' ARSLOG ' s date '00560000dcC ' 5622 - 662 ( C ) COPYR1GHT 1BM CORP. 2013 '00570000dcC * ALL RIGHTS RESERVED00580000dcC ' LICENSED MATERIALS - PROPERTY OF IBM '00590000pastcopyds0h00600000s tm14.12.12 ( r13 )006100011 rr12, r15006200001 rr2, r100630000us ingp11 st, r200640000dropr1500650000usingARSL0G, r1200660000storaQBTA1N, 1ength = work1.1oc = ANY, cond = YES006700001 trr15, r1500680000JinZbag1t0069000str13.4 (, r1 )00700000str1.8 (, r13 )007100001 rr13, r100720000us ingworkarea, r1300730000*00740000* Detnee", - "page_start": 278, - "page_end": 278, - "source_file": "sg246915.pdf" - }, - { - "text": "[html]Example 7 - 20Deleting Pod and maintaining the data[ root @ dcocp01 “]# oc get podsNAMETableTableREADYSTATUSRESTARTSAGEappmongo – i bm – mongob - dev1 / 1Running021hdocker - registry - 2 -dxwx1 / 1Running113drouter - 1 - g9btn1 / 1Runni ng113d[ root @ dcocp01 “]#c de1te pod appmongo - 1bm - mongodb - devpod “ appmongo – ibm – mongod– development deleted[ root @ dcocp01 “]# 1 total 146028- 1an † smongof ' s / mongo /drwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------mong4096Nov1012 : 07.drwxr - xr - x. 4 rootroot40960ct3112 : 28.- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter16384Nov1012 : 07co11ection - 0 -- 16295157678663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter24576Nov1012 : 07co11ection - 0 - 77444872703060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameters32768Nov1012 : 07co11ection - 2 --- 16295157678663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter145391616Nov1012 : 07co11ecti1on - 3 - 77444872703060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Patients16384Nov1012 : 07co11ection - 4 -- 16295157678663310. wtdrwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter4096Nov1012 : 07diagnostc. d- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Patients16384Nov1012 : 07index - 1", - "page_start": 195, - "page_end": 195, - "source_file": "sg248459.pdf" - }, - { - "text": ": 10 : 03.419 ***********neonatal nether_tature : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 19 : 18 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 1Ensure openshift - ans1bTe instalTer package deps aropensh1ft_excluder : Insta11 docker excluder - yunopensitif1_tepas :: hefresh cache --------------------------------------------------------------------------------------------------------------------------------------------------------------------------canta / ner_rantine : Start the Docker service.................................................................................................................................................................cantalner_runtite : Create credentials for aregur1 ~ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6opensh1ft_repos :: Ensure 11bse11nux - python 1.1nsta1ledcantalner_runt. tire : F1xap SELInux pemI ss1ans for dacker.....................................................................................................................................................α_1Yrexil1 | :: [ nstal1 | firexil1d patkeges : -----------------------------------------------------------------------------------------------------------------------------------------------------------------Gather ’ ttg Facts “----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------container_runtine : Get current 1nstal1ed Docker vers10nGather † tg Tacts →~~~~~–‐–‐–‐–‐–‐–‐–‐–>–>––––––––––––––––––––––––––––––––––––Start and enable rtp0 / ctmttryd - envent - envent - envent - envent - envent - envent - envent - relatedas_firexil1 : Ensure tptables services are not enabled ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐Check for NetworkNatuger Service ‐ concentration ‐ concentration ‐ concentration ‐ concentrationscontalner_runtine : Setup the docker - storage for overlay--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐", - "page_start": 148, - "page_end": 148, - "source_file": "sg248459.pdf" - }, - { - "text": "\n \n \n \n \n [html]CERTRAL ADATUSTRERTS DEPARTMERT\n
IRICOMIMG0UTG0X8GKBEMDPOINTDTITEMCASHLETTER
R0UTIMGSEQ M0.IDSEQIDAMOUNTAHOUWTTRABSIT
P00000007221593.3410000 – 0032TR50.0021593.340000 – 0371
P0000000732151.3910000 – 0194TR50.002151.390000 – 0040
P0000000742151.3920000 – 0194TR20.002151.390000 – 0040
Poopoongocys2151.3930000 – 0194TR10.002151.390000 – 0040
Popo0000762151.3940000 – 0194TR40.002151.390000 – 0040
Po000000772151.39s0000 – 0194TR296.002151.390000 – 0040
Poodoodocys2151.3960000 – 0194TR77.332151.390000 – 0040
P000000802151.3970000 – 0194TR127.002151.390000 – 0040
P000000812151.3980000 – 0194TR25.002151.390000 – 0040
P000000822151.3990000 – 0194TR135.002151.390000 – 0040
P000000842151.39100000 – 0194TR300.002151.390000 – 0040
Po000000852151.39110000 – 0194TR25.002151.390000 – 0040
Po000000862151.39120000 – 0194TR11.002151.390000 – 0040
Poopooneous2151.39130000 – 0194TR206.002151.390000 – 0040
P0000000910175.1210000 – 0372TR264.750175.120000 – 7083
Poopoongog32151.39140000 – 0194TR233.002151.390000 – 0040
Poodoodo942151.39150000 – 0194TR96.902151.390000 – 0040
Poodoodo951802.2410000 – 0502TR638.001802.240000 – 1544
\n\nThe transaction data field selects the*first*and*last*values from a group of pages and only \nthese group level values are inserted into the database. Content Manager OnDemand \nqueries the database by comparing the search value that is entered by the user to two \ndatabase fields, the beginning value and the ending value. If the value that is entered by the \nuser falls within the range of both database fields, Content Manager OnDemand adds the \nitem to the document list.", - "page_start": 332, - "page_end": 332, - "source_file": "sg246915.pdf" - }, - { - "text": "$ ( 8 , 1 2 0 ) $ ( 2 1 , 3 6 5 ) $( 1 8 , 8 7 8 ) $ ( 4 8 , 3 6 3 ) \n\n3 , 6 5 2. \n1 , 6 8 2. \n1 , 1 0 0. \n— $ 4 6 , 1 0 4. \n3 0 , 5 3 4. \n7 , 9 6 1. \n7 7 8. \n\n$ 9 , 4 3 3. \n9 6 8. \n2 , 2 1 5. \n1 1 , 1 9 0 $ 5 , 3 5 3. \n1 5 5. \n2 0 8. \n—. $ 6 0 , 8 9 0. \n3 1 , 6 5 7. \n1 0 , 3 8 4. \n1 1 , 9 6 8. \n\n\n \n \n \n \n [html]Network ServicesEurope\n
Network ServicesProposedCorporateCentralWestern
PatientsPatientsSolutionsServicesTotalEurope
Total( in thousnns )Total Revermes812.664TableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "\n \n \n \n \n [html]Subscr1pt10n - managerTeTTesnA111oca1 data refreshed\n
subscription - manager - 1ist-- available --- matches '* 0penShift **
Subscription Name :Red Nat OpenSh1ft Container Flatform for Power, LE Bus / ness Partner
NFR, Se1f - Supported
Prov1des :Red Ket Enterprise Linux for Power, 11ttle end / an – Extended Update
Support
Red Hat : Enterprise L1nux Fast Datapath Beta for Power, 11ttleend1an
Red Hat Enterprise L1nux for Power, 11ttle end1an
Red Hat Ans1b1e Eng1neRed Hat OpenSh1ft Enterprise App11cat1on Node
Red Hat Enterprise Linux for Power 9Red flat 50ftware Col1ections ( for RREL Server for 1BM Power Lt )
Red Hat OpenSh1ft Container Platform for PowerRed Hat Software Col1ections Beta ( for RIEL Server for IBR Power
LE )RHEL for SAP HANA for Power, 11ttle end1an - Extended Update
SupportRed Hat Beta
Red Nat OpenSh1ft Container Platform C1ient Tools for PowerRed Rat. Enterpr1se L1nux Fast Datapath ( for RHEL Server for 1BM
Power LE )
RHEL for SAP for Pover, 11ttle end1an - Extended Update SupportRed Hat Enterprise Linux for Power, 11ttle endian Beta
Red Hat Conta1ner Nat1ve Virtual1zat1on
Update SupportSKU :
111111111
Contract :111111111
Pool ID :
< P00L_IDaProvides Management :
NoAvailable :
Un11m1 tedSuggested :
1Service Level :
Standard
Service Type :L1 - L3
Subscription Type :Stackab1e
Starts :05 / 31 / 2019
Ends :05 / 31 / 2020
System Type :Virtual
\n\n**subscription-manager attach --pool=**\nSuccessfully attached a subscription for: Red Hat OpenShift Container Platform for \nPower, LE Business Partner NFR, Self-Supported \n\nd. Enable only the repositories that are required by OpenShift Container Platform 3.11. \nFor IBM POWER9, run the commands that are shown in Example 6-2. For IBM \nPOWER8, run the commands that are shown in Example 6-3 on page 107. \n\nExample 6-2 OpenShift repositories for POWER9 servers \n\n**# subscription-manager repos --disable=\"*\"**\n**# subscription-manager repos \\**\n**--enable=\"rhel-7-for-power-9-rpms\" \\**\n**--enable=\"rhel-7-for-power-9-extras-rpms\" \\**", - "page_start": 121, - "page_end": 121, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_SHEN_2003.pdf", - "query": "At Shentel company, what determines an employees pension ?", - "target_page": 22, - "target_passage": "Pension benefits are based primarily on the employee's compensation and years of service", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Significant estimates are involved in determining pension related \nbalances. Actuarial estimates are based on projections of employees’ \ncompensation levels at the time of retirement. Maximum retirement \nbenefits are primarily based on career average earnings, subject to \ncertain adjustments. The most \nrecent actuarial valuations were \ncompleted as at January 1, 2013.", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "NOTE 22: PENSIONS \n\nWe have contributory and non-contributory defined benefit pension \nplans that are made available to most of our employees. The plans \nprovide pensions based on years of service, years of contributions and \nearnings. We do not provide any non-pension post-retirement benefits. \nWe also provide unfunded supplemental pension benefits to certain \nexecutives. \n\nThe assets of the defined benefit pension plans are held in segregated \naccounts isolated from our assets. We administer the defined benefit \npension plans pursuant to applicable regulations, the Statement of \nInvestment Policies and Procedures and to the mandate of the Pension \nCommittee of the Board of Directors. The Pension Committee of the \nBoard of Directors oversees our administration of the defined benefits \npension plans, which includes the following principal areas: \n(cid:129) overseeing the funding, administration, communication and \ninvestment management of the plans \n(cid:129) selecting and monitoring the performance of all \n\nthird parties \nperforming duties in respect of the plans, including audit, actuarial \nand investment management services \n(cid:129) proposing, considering and approving amendments to the defined \nbenefit pension plans \n(cid:129) proposing, considering and approving amendments of the Statement \nof Investment Policies and Procedures \n(cid:129) reviewing management and actuarial reports prepared in respect of \nthe administration of the defined benefit pension plans \n(cid:129) reviewing and approving the audited financial statements of the \ndefined benefit pension plan funds.", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
The cost of pensions is actuarially determined and takes into account
the following assumptions and methods for pension accounting related to our defined benefit plans :
• the expected rates of salary increases for calculating increases in future benefits
• mortality rates for calculating the life expectancy of plan members, and
• past service costs from plan amendments are immediately expensed in net income.
We recognize contributions to defined contribution plans as an employee benefit experse in operating costs in the consolidated statements of income in the periods the employees provide the related senices.
See note 22 for more information about our pension plans.
Termination Benefits
We recognize termination benefits as an expense when we are committed to a formal detailed plan to terminate employment before the normal retirement date and it is not realistic that we will withdraw it.
Property, Plant and Equipment
Recognition and Measurement
We recognize property, plant and equipment at cost, less accumulated depreciation and accumulated impairment losses.
Cost includes expenditures that are directly attributable to the acquisition of the asset. The cost of self - constructed assets also includes :
• the cost of materials and direct labour
· costs directly associated with bringing the assets to a working condition for their intended use
· costs of dismantling and removing the items and restoring the site where they are located ( see Provisions, above ), and • borrowing costs on qualifying assets.
We use estimates to determine certain costs that are directly attributable to self - constructed assets. These estimates primarily includecertain internal and external direct labour associated with the acquisition, construction, d
They also include interest costs, which we capitalize to certain property, plant and equipment during construction and development.
We use significant estimates to determine the estimated useful lives of property, plant and equipment, considering industry tends such as technological advancements, our past experience, our expected use and our review of asset lives
", - "page_start": 101, - "page_end": 101, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Net amount recognized at \nyear-end **$** **(493)** $ (9,784) $ (8,882) \n\n*Amounts recognized in the*\n**Retirement Benefits**\n\n*statement of financial position*\n*consist of:*\nThe Company has defined contribution profit-sharing plans cover- \n Accrued benefit liability **$** **(493)** $ (9,784) $ (8,882) \ning substantially all employees who are not participants in certain \n Net amount recognized at \nyear-end, included in \ndefined benefit plans. The Company’s annual contribution to the de- \n Other Liabilities **$** **(493)** $ (9,784) $ (8,882) \nfined contribution plans is based on employee eligible earnings and \nEstimated Future Benefit Payments (In thousands) \nresults of operations and amounted to $26,489,000, $23,524,000, \n$ \nand $24,826,000 in 2003, 2002, and 2001, respectively. \n\nThe Company sponsors defined benefit plans which include \n\na limited number of salaried and hourly employees at certain subsidiar- \n\n Fiscal 2004 \n Fiscal 2005 \n Fiscal 2006 \n Fiscal 2007 \n Fiscal 2008 \n Fiscal 2009 – 2013 1,133 \n1,189 \n1,195 \n1,217 \n 1,265 \n 6,874 \nies. The Company’s funding policy is generally to contribute annually \n\n*Expected Contributions During Fiscal 2004*\n Total $ 12,873 \nthe minimum actuarially computed amount. Net pension costs relating \n\nto these plans were $176,000; $0; and $0 for 2003, 2002, and 2001, \nPlan Assets – Percentage of Fair Value by Category \n**2003**\nrespectively. The actuarial present value of obligations, less related plan \n\n Equity \n Debit \n Other **0%**\n**0%**\n**100%**\n\nassets at fair value, is not significant. \n\nThe Company also participates in a multiemployer plan, \n Total **100%**\nwhich provides defined benefits to certain of the Company’s union", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**We must serve well to prosper – We must prosper to serve well**\n\nShenTel Service Company • Shenandoah Long Distance Company • Shenandoah Mobile Company \nShenandoah Network Company • Shenandoah Telephone Company • Shenandoah Valley Leasing Company \nShenandoah Cable Television Company • ShenTel Communications Company \nShenandoah Personal Communications Company \n\nPO Box 459 \nEdinburg, VA 22824-0459 \nPhone 540-984-4141 • Fax 540-984-8192 \nwww.shentel.com", - "page_start": 59, - "page_end": 59, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "For over 100 years Shenandoah Telecommunications Company has been committed to providing outstanding \n\nservice to our customers. Our employees take that same dedication after hours to make a difference in their \ncommunity. \n\nWe take this opportunity to share with you, our shareholders, the stories of just a few of your dedicated \nemployees. \n\nVolunteerism is in Patty Pomeroy’s blood. Her grandfather was a dispatcher for the \n\nrescue squad in Middletown, VA for 25 years and her grandmother was in the ladies \nauxiliary. Her father was a charter member of the Middletown Rescue Squad. In 1997, \nPatty, a customer service representative at Shentel for four years, continued the family \ntradition by earning her Emergency Medical Technician certification and going to “work” \nfor the Strasburg Rescue Squad. Patty is the administrator of membership recruitment \nand retention for the squad and is the liaison coordinator for junior squad members under \n18. It is her job to make sure that new members are brought in to the squad and current \nmembers stay active. \n\n**“There is a great satisfaction that comes from knowing that what you can do will**\n**help people.”**\n***Patty Pomeroy***\n\nJeff Beard has been an installer repairman with Shentel for almost five years. Two \n\nyears ago, Jeff helped start Project Isaiah 58, a faith-based recovery ministry that reaches \nout to people who are struggling with addiction. Project Isaiah 58 has weekly group \nmeetings in Winchester, Woodstock and Warrenton, VA. Jeff, who lives in Winchester, \nparticipates in the group meetings and also makes time to meet one-on-one with people \nwho need personal attention. \n\n\n\n**“I feel the need to reach out to people who are suffering.”**\n\n***Jeff Beard***\n\nJohn Gardner has been with Shentel for two years as a PCS technician in Central \nPennsylvania, but for almost a year of that time he was on Naval Reserve duty in Sasebo, \nJapan. John joined the Reserves after serving 10 years of active duty. In October 2002, \nhe was activated under Noble Eagle-Enduring Freedom as part of the increase in security \nat bases around the world. John worked on Motorola radios and repeater systems while \nstationed in Japan. It was tough for the serviceman to be away from his wife and \nchildren, but John believes very strongly in serving his country. \n\n\n\n**“Being in the Reserves is a way for me to be a civilian and still serve my country.”**\n\n\n\n***John Gardner***\n\nAt Shentel, George Brinkley, the store manager in Front Royal, VA, is known for \n\nbeing one of the biggest fund-raisers for the Shenandoah County American Cancer \nSociety Relay for Life event. In his six years at the Company, George has raised nearly \n$20,000. In 2003, he raised $4,246 and was recognized as the top individual fund-raiser \nfor the entire event. \n\nIn 2002, George was chairman of the parade committee for the Woodstock, VA \n\n250th anniversary celebration. Under George’s leadership, the 26-member committee \nworked for a year preparing for the parade, which was the largest in the town’s history. \n\n**“I just have a knack for volunteering. I want to make my community better any way**\n**I can.”**\n\n***George Brinkley***\n3 ■ 2003 ANNUAL REPORT", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "The Company maintains a nonqualified deferred retirement plan for certain key \nemployees. The plan allows participants to defer, on a pre-tax basis, a portion of their \nsalary and bonus and accumulate tax deferred earnings, plus investment earnings on \nthe deferred balances, as a retirement fund. Participants receive a Company match of \nup to 4% of salary, net of any Company match received under the Company’s 401(k) \nplan. All employee deferrals vest immediately. The Company matching contributions \nvest ratably over a three-year period. The Company recorded charges for matching \ncontributions of $1 million in 2004, $2 million in 2003 and $1 million in 2002.", - "page_start": 72, - "page_end": 72, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "**SHENTEL SERVICE AREAS**", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "This annual report contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 \nand Section 21E of the Securities Exchange Act of 1934, including statements regarding our expectations, hopes, \nintentions, or strategies regarding the future. These statements are subject to certain risks and uncertainties that could \ncause actual results to differ materially from those anticipated in the forward-looking statements. Factors that might cause \nsuch a difference include, but are not limited to, changes in the interest rate environment, management’s business strategy, \nnational, regional and local market conditions, and legislative and regulatory conditions. The Company undertakes no \nobligation to publicly revise these forward-looking statements to reflect subsequent events or circumstances, except as \nrequired by law. \n\n**General**\n\nShenandoah Telecommunications Company is a diversified telecommunications company providing both regulated and \nunregulated telecommunications services through its nine wholly owned subsidiaries. These subsidiaries provide local \nexchange telephone services, wireless personal communications services (PCS), as well as cable television, paging, \nInternet access, long distance, fiber optics facilities, and leased tower facilities. The Company is the exclusive provider \nof wireless mobility communications network products and services under the Sprint brand from Harrisonburg, \nVirginia to Harrisburg, York and Altoona, Pennsylvania. The Company refers to the Hagerstown, Maryland; \nMartinsburg, West Virginia; and Harrisonburg and Winchester, Virginia markets as its Quad State markets. The \nCompany refers to the Altoona, Harrisburg, and York, Pennsylvania markets as its Central Penn markets. Competitive \nlocal exchange carrier (CLEC) services were established on a limited basis during 2002. In addition, the Company \nsells and leases equipment, mainly related to services it provides, and also participates in emerging services and \ntechnologies by direct investment in non-affiliated companies. \n\nThe Company reports revenues as wireless, wireline and other revenues. These revenue classifications are defined as \nfollows: Wireless revenues are made up of the Personal Communications Company (a PCS Affiliate of Sprint), and the \nMobile Company. Wireline revenues include the following subsidiary revenues in the financial results: Telephone \nCompany, Network Company, Cable Television Company, and the Long Distance Company. Other revenues are \ncomprised of the revenues of ShenTel Service Company, the Leasing Company, ShenTel Communications Company \nand the Holding Company. For additional information on the Company's business segments, see Note 14 to audited \nconsolidated financial statements appearing elsewhere in this report.", - "page_start": 40, - "page_end": 40, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "E M P L O Y E E R E T I R E M E N T A N D B E N E F I T P L A N S 11 \n\nA noncontributory defined benefit retirement plan is maintained for all regular employees of the Company except those of Quest Medical. This plan was \namended effective January 1, 1998 to become a cash balance pension plan. The Company’s funding policy is to make the annual contributions required by \napplicable regulations and recommended by its actuary. The Company uses a December 31 measurement date for the plan. \n\nThe changes in the plan’s projected benefit obligation (“PBO”) as of December 31, 2003 and 2002 are as follows (in thousands): \n\n2003 2002 \n\n**C H A N G E I N B E N E F I T O B L I G A T I O N :**\n\nBenefit obligation, January 1 $ 4,170 $ 4,599 \n\nService cost 214 320 \n\nInterest cost 298 307 \n\nAmendments —- (616) \n\nActuarial (gain)/loss 529 (93) \n\nBenefits paid (333) (347) \n\nIn December 2002, the plan was amended to reduce benefit accruals for future service by plan participants by approximately 50 percent. This amendment \ncaused a reduction in the PBO of approximately $616,000, and is reflected as a reduction in pension expense over the estimated employee service lives. \n\nThe changes in the fair value of plan assets, funded status of the plan and the status of the prepaid pension benefit recognized, which is included in the \nCompany’s balance sheets as of December 31, 2003 and 2002 are as follows (in thousands): \n\n\n \n \n \n \n [html]\n
20032002
CBAN GE 1N P1AN ASSET51
Fair value of plan zessets, January 1$4.383$4.550
Actual return on plan assets963( 750 )
Employer contributions400930
Benefits paid( 333 )( 347 )
Fair value of plan assets, December 31$5.413$4.385
Funded status of plan$535$213
Unrecognized actuarial loss1.9412.154
Unrecognized prior service cost( 502 )( 539 )
Unrecognized net transition obligation( 88 )( 132 )
Net amount recognized as other assets$1.886$1.696
", - "page_start": 21, - "page_end": 21, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_SHEN_2003.pdf", - "query": "At the end of 2003, how many available-for-sales investments did Shenandoah company count in its portfolio ?", - "target_page": 53, - "target_passage": "The Company’s available-for-sale portfolio at December 31, 2003 is made up of two investments", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED BALANCE SHEETS**\n\n\n\n\n \n \n \n \n [html]200320022001\n
ASSETS ( Note 5 )
Current Assets
Cash and cash equivalents$28.696S2.209$2.037
Accounts receivable, net ( Notes 1 and 8 )6.4887.5365.739Income taxes receivable
1.526121.205Materials and supplies2.062
1.7872.934Prepaid expenses and other1.6692.205
1.146Deferred income taxes ( Note 6 )5221.197575
Assets held for sale ( Note 2 )P5.5482.973Total current assets
$40.963S
20.494$16.609Securities and Investments ( Notes 3 and 8 )Available - for - sale securities$
199
$151$12.025Other investments7.268
7.2726.438Total securities and investments$7.467
$7.423$18.463Property, Plant and EquipmentPlant in service ( Note 4 )
$
97.431S4.069$54.345Plant under construction
2.2615.20914.960$99.692
$9.278$69.305Less accumulated depreciation
72.00657.12644.473Net property, plant and equipment$
. 27.686$2.152$24.832
Other Assets
Assets held for sale ( Note 2 )$-$-$
3.272Cost in excess of net assets of business acquired5.1055.1055.105
Deferred charges and other assets ( Notes 1 and 2 )5.9996671.452$
11.104$5.772$9.829
Less accumulated amortization1.8561.8372.361Net other assets
$9.248S3.935$7.468
Total assets$85.364S4.004
", - "page_start": 13, - "page_end": 13, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF CASH FLOWS**\n\n\n\n\n \n \n \n \n [html]\n
200320022001
Cash Flows from Operating Activities
Income ( loss ) from continuing operations$ 9.761$ ( 2.893 )$ 9.694
Adjustments to reconcile net income to net cash provided by operating activities :
Depreciation16.61214.47610.540
Amortization196723
Deferred income taxes5.6642898.666
Loss on disposal of assets348739506
Net ( gain ) loss on disposal of investments39.034( 14.162 )
Net ( gain ) loss from patronage and equityinvestments52393
789
Other
403443987Changes in assets and liabilities :
( Increase ) decrease in :Accounts receivable1.069( 1.797 )
( 864 )
Materials and supplies( 275 )1.147( 307 )
Increase ( decrease ) in :Accounts payable( 275 )1.067
( 3.968 )Other prepaids, deferrals and accruals( 2.778 )120
( 2.263 )
Net cash provided by operating activities
$ 30.599$ 23.024$ 10.341Cash Flows From Investing Activities
Purchase and construction of plant and equipment, net of retirements$ ( 12.476 )$ ( 22.612 )$ ( 27.972 )
Purchase of investment securities( 796 )( 1.775 )( 1.250 )
Proceeds from sale of equipment109
77482Proceeds from sale of radio spectrum licenseSpecificity
1.133Proceeds from investment activities ( Note 3 )7143.301
", - "page_start": 17, - "page_end": 17, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF SHAREHOLDERS’ EQUITY AND COMPREHENSIVE INCOME**\n\n\n\n\n \n \n \n \n [html]\n
SharesCommon StockRetained EarningsAccumulated Other Comprehensive Income ( loss )Total
Balance, January 1.2001 Comprehensive income :7.518$ 4.817$ 55.873$ 5.645$ 66.335
Net income--16.372-16.372
Net unrealized change in securities available - for - sale, net of tax of $ 3.482 Total comprehensive income vidends declared ($ 0.35 per share )---( 5.603 )__ ( 5.603 )
Statements decisions--( 2.635 )-$ 10.769 – 850 ( 2.635 )
Common stock issued through exercise of incentive stock options12133--133
Balance, December 31.20017.530$ 4.950$ 69.610$42
$ 74.602Comprehensive income : Net income--4.519-
4.519Net unrealized change in securities available - for - sale, net of tax of $ 29---( 46 )
( 46 )Total comprehensive incomeS_4.473Dividends declared ($ 0.37 per share ) Common stock issued through eye--
( 2.794 )-( 2.794 )Common stock issued through exercise of incentive stock options and stock grants22296
--296Balance, December 31.2002 Comprehensive income7.552$ 5.246
$ 71.335$( 4 )$ 76.577Net income.
.32.074.32.074Net unrealized change in securities available - for - sale, net of tax of S ( 18 ) Total comprehensive income.
..30___30Dividends declared ($ 0.39 per share )
--( 2.960 )$ 32.104Common stock issued through exercise of incentive stock optionsBalance, December 31.200341
487--4877.593$ 5.733
", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "507 )( 73 )7Total assets :2003$ 141.658$33$ 10.340$ 6.721$2002112.76559.55410.9616.2551872001114.28056.09011.4805.373", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF CASH FLOWS**\n\n\n\n\n \n \n \n \n [html]\n
200320022001
Cash Flows From Financing Activities
Proceeds from issuance of long - term debt$$-
$ 24.641Principal payments on long - term debt( 8.697 )( 4.393 )
( 23.692 )Net proceeds from ( payments of ) lines of credit( 3.503 )( 2.697 )
6.200Debt issuance costs--
( 175 )Dividends paid( 2.960 )( 2.794 )
( 2.635 )Proceeds from exercise of incentive stock options487296
133Net cash provided by ( used in ) financing activities$( 14.673 )$ ( 9.588 )
$ _4.472Net cash used in continuing operations$ 3.477$ ( 7.573 )
$ ( 6.952 )Net cash provided by discontinued operations23.0107.745
6.444Net increase ( decrease ) in cash and cash equivalents$ 26.487$ 172
$ ( 508 )
Cash and cash equivalents :Beginning2.2092.037
2.545Ending$ 28.696$ 2.209
$ 2.037
Supplemental Disclosures of Cash Flow Information Cash payments for : Interest, net of capitalized interest of S26 in 2003 ; S93 in 2002 ; and S134 in 2001$ 3.577$ 4.274$ 4.217
Income taxes$ 15.569$ 1.045$
\n\nDuring 2002, the Company issued 4,654 shares of Company stock to employees valued at $0.1 million \nin recognition of the Company’s 100th year anniversary. \n\nIn December 2001, the Company received 310,158 shares of VeriSign Inc. common stock in exchange \nfor 333,504 shares of Illuminet Holdings, Inc. stock as a result of the merger of the two entities. \n\nThe Company completed the sale of its GSM network equipment in January 2001, for approximately \n$6.5 million of which approximately $4.9 million was escrowed as part of a like-kind exchange \ntransaction. The escrowed funds were disbursed as new equipment was received during the first six \nmonths of 2001.", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED BALANCE SHEETS**\n\n\n\n\n \n \n \n \n [html]2003\n
LIABILITIES AND SHAREHOLDERS ’ EQUITY20022001
Current Liabilities
Current maturities of long - term debt ( Note 5 )$ 4.230$ 4.482$ 4.387Revolving line of credit ( Note 5 )
-3.5036.200Accounts payable ( Note 7 )
4.7295.0035.128Advanced billings and customer deposits3.326
3.5382.652Accrued compensation1.015
1.2681.084Other current liabilities2.496
1.5641.455Current liabilities held for sale ( Note 2 )-
542735Total current liabilities$ 15.796
$ 19.900$ 21.641Long - term debt, less current maturities ( Note 5 )$ 39.116
$ 47.561$ 52.049Other LiabilitiesDeferred income taxes ( Note 6 )
$ 20.819
$ 15.859$ 14.977Pension and other ( Note 9 )3.4252.441
2.265Total other liabilities$ 24.244$ 18.300
$ 17.242Minority Interests in discontinued operations ( Note 2 )$-
$ 1.666$ 1.838
\n\n$ \n\n5,246 \n71,335 \n(4) \n$ 76,577 $ 4,950 \n69,610 \n42 \n$ 74,602 **5,733**\n**100,449**\n**26**\n**$ 106,208**\n\n**$**\n\n$164,004 $167,32 \n$167,372 **$ 185,364**", - "page_start": 14, - "page_end": 14, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**SHAREHOLDER INFORMATION**\n\n\n\n**OUR BUSINESS**\n\nShenandoah Telecommunications Company is a diversified telecommunications holding company which provides \nvarious telecommunications services through its operating subsidiaries. These services include: wireline telephone \nservice, primarily in Shenandoah County and small service areas in Rockingham, Frederick, and Warren counties, all in \nVirginia; cable television service in Shenandoah County; unregulated telecommunications equipment sales and services; \nonline information and Internet access provided to the multi-state region surrounding the Northern Shenandoah Valley of \nVirginia; financing of purchases of telecommunications facilities and equipment; paging services in the Northern \nShenandoah Valley; resale of long distance services; operation and maintenance of an interstate fiber optic network; \nwireless personal communications services (PCS) and a tower network in the four-state region from Harrisonburg, \nVirginia to the Harrisburg, York and Altoona, Pennsylvania markets. \n\n**ANNUAL MEETING**\n\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The \nmeeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company’s offices at the Shentel \nCenter, 500 Mill Road, Edinburg, Virginia. \n\n**FORMS 10-K, 10-Q, and 8-K**\n\n**The Company files periodic reports with the Securities and Exchange Commission. The Company's Annual**\n**Report on Form 10-K, Quarterly Reports on Form 10-Q, and Current Reports on Form 8-K, along with any**\n**amendments to these reports, are available to shareholders through the Company’s website, www.shentel.com.**\n**This website also has recent news releases and other information potentially of interest to shareholders.**\n\n**A copy of the Company’s Annual Report on Form 10-K, without exhibits, may be obtained, without charge, by**\n**writing to Shenandoah Telecommunications Company, 124 South Main Street, P.O. Box 459, Edinburg, Virginia**\n**22824, Attention: Secretary.**\n\n**MARKET AND DIVIDEND INFORMATION**\n\nThe Company's stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the \nThe Company’s stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the high \nhigh and low sales prices per share of common stock as reported by the NASDAQ National Market for the last two years \nand low closing prices per share of common stock as reported by the NASDAQ National Market for the last two years is \nis set forth below: \nset forth below: \n\n\n \n \n \n \n [html]20032002\n
Qtr. 1Qtr. 2Qtr. 3Qtr. 4Qtr. 1Qtr. 2Qtr. 3Qtr. 4
High price$ 24.31$ 24.98$ 25.48$ 27.50$ 20.06$ 27.25$ 27.25$ 25.95
Low price$ 13.64S 14.33$ 19.25$ 19.74$ 16.50$ 19.69$ 22.75$ 21.61
\n\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\nCALL (540) 984-5200 \nCALL (540) 984-5200 \nTransfer Agent - Common Stock \nTransfer Agent - Common Stock \nShenandoah Telecommunications Company \nShenandoah Telecommunications Company \nP.O. Box 459 \nP.O. Box 459 \nEdinburg, VA 22824 \nEdi b \nVA 22824", - "page_start": 58, - "page_end": 58, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "In 2003, the Company issued $600 million of 6% Senior Notes due 2009. In \n2004, the Company issued $525 million of 5.875% senior notes due 2014. Of this \namount, $225 million of the senior notes were issued pursuant to the Company’s \nshelf registration statement, which completed the available securities issuances under \nthat registration statement and $300 million of the senior notes were issued through \na Rule 144A offering and subsequently exchanged for registered notes with identical", - "page_start": 65, - "page_end": 65, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**\n\n\nis the intent of the Company to evaluate whether to hold or sell parts or all of each investment on an individual basis. \nAt December 31, 2003, the Company had external investments totaling $7.5 million. \n\nIn 2004, the Company anticipates taking advantage of a conversion feature on its Rural Telephone Bank stock. The \nCompany will convert a portion of its holdings into a different class of stock that will pay cash dividends each year. \nThe bank declares a dividend rate that varies, each year. The range of the dividend has been between 4.2% and 5.65% \nover the last 5 years. The rate in the two most recent years was 4.2%. This transaction is estimated to provide the \nCompany with approximately $0.3 million in dividend income each year, based on the 2003 dividend rate of 4.2% and \nassuming we had converted the stock at the beginning of 2003. \n\n**Financial Condition, Liquidity and Capital Resources**\n\nThe Company has four principal sources of funds available to meet the financing needs of its operations, capital \nprojects, debt service, investments and potential dividends. These sources include cash flows from operations, cash \nand cash equivalents, the liquidation of investments and borrowings. Management routinely considers the alternatives \navailable to determine what mix of sources are best suited for the long-term benefit of the Company. \n\nDuring the 2003 year, with the closing of the sale of the Virginia 10 RSA Limited partnership interest, the Company \nevaluated its capital requirements, and as a result eliminated its $20.0 million revolving line of credit with CoBank in May \n2003. The Company had paid off the outstanding balance in early 2003, and did not borrow on it during the remaining time \nthe facility was in place. In light of the $27.9 million balance in cash equivalent investments, management determined \nadditional debt capacity is not necessary for the near-term. \n\nThe term debt loan agreements with CoBank have three financial covenants. These are measured on a trailing 12-month \nbasis and are calculated on continuing operations. The first of the covenants is the total leverage ratio, which is total debt to \noperating cash flow. This ratio must remain below 3.5, and as of December 31, 2003 it was 1.2. The second measure is \nequity to total assets, which must be 35% or higher. At December 31, 2003 the ratio was 57.3%. The third measure is the \ndebt service coverage ratio, which is operating cash flow to scheduled debt service, which must exceed 2.0. At December 31, \n2003 this measure was 4.3. Management believes the Company will meet these covenant measures for the coming year. The \nCompany has pledged all of its affiliates capital stock as collateral for the CoBank loans. \n\nThe Company’s covenants on the RUS/RTB debt require the pledge of all current and future assets of the Telephone \nsubsidiary until the debt is retired. \n\nAnother external source of funding is a $0.5 million unsecured, variable rate revolving line of credit with SunTrust \nBank. This facility is in place to allow the Company to better manage its daily cash balances. The facility expires \nMay 31, 2004. Management anticipates renewing this facility with SunTrust Bank under similar terms and conditions. \nAt December 31, 2003 there were no balances outstanding under this facility. \n\nDue to make-whole provisions in the Company’s debt agreements it is currently uneconomical for the Company to \nprepay any debt. \n\nThe Company is obligated to make future payments under various contracts it has entered into, including amounts \npursuant to its various long-term debt facilities, and non-cancelable operating lease agreements for retail space, tower \nspace and cell sites. Expected future minimum contractual cash obligations for the next five years and in the aggregate \nat December 30, 2003, are as follows:", - "page_start": 53, - "page_end": 53, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "[html]( Amounts in thousands )For the Years200320022001NET CASH FLOWS FROM ( TO ) OPERATING ACTIVITIES :Net income$ 98.105$ 91.360$ 74.407Noncash items included in net income :Depreciation and amortization72.77268.75581.385Other postretirement and postemployment benefits2.1662.2461.757Deferred income taxes( 3.314 )2.3216.962Loss on sales, retirements and impairments of property,plant and equipment5.4158.97616.200Stock issued to retirement plan4.6785.750—Other — net3912.613109Changes in working capital, excluding acquisition and disposition :Receivables1.006( 19.414 )47.897Inventories( 3.004 )2.34835.048Prepaid expenses and other current assets1.5082.431( 1.661 )Accounts payable and accrued expenses( 35.288 )37.857( 26.149 )Income taxes2.218( 2.370 )( 5.957 )Increase ( decrease ) in other liabilities( 5.379 )( 482 )( 2.198 )Net cash flows from ( to ) operating activities141.274202.391227.800NET CASH FLOWS FROM ( TO ) INVESTING ACTIVITIES :Capital expenditures( 34.842 )( 25.885 )( 36.851 )Proceeds from sale of property, plant and equipment1.808−—Capitalized software( 2.666 )( 65 )( 1.757 )Additional purchase consideration( 5.710 )−( 8.748 )Short - term investments — net( 49.326 )( 16.377 )—Purchase of long - term investments( 5.742 )( 22.493 )—Sales or maturities of long - term investments15.000−—Other — net2.924343Net cash flows from ( to ) investing activities( 81.478 )( 63.896 )( 47.013 )NET CASH FLOWS FROM ( TO ) FINANCING ACTIVITIES :Purchase of HON INDUSTRIES common stock( 21.512 )( 15.736 )( 35.059 )Proceeds from long - term debt76182536.218Payments of note and long - term debt( 20.992 )( 35.967 )( 87.365 )Proceeds from sale of HON INDUSTRIES common stock12.0632.0969.449Dividends paid( 30.299 )( 29.386 )( 28.373 )Net cash flows from ( to ) financing activities( 59.979 )( 78.168 )( 105.130 )Net increase ( decrease ) in cash and cash equivalents( 183 )60.32775.657Cash and cash equivalents at beginning of year139.16578.8383.181Cash and cash equivalents at end of year138.982139.16578.838SUPPLEMENTAL DISCLOSURRS OF CASH FLOW INFORMATION :Cash paid during the year for", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_SHEN_2003.pdf", - "query": "What was the main reason of the decrease of customer base of the Shenandoah and Virginia 10 RSA partnership ?", - "target_page": 51, - "target_passage": "he decline was the result of competition with digital technologies and increased competition from national carriers in the area", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "**Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the \nVirginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with \nVerizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated \nan analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, \nRappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus \nthe Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company \nwas required to do a working capital true up following the closing, from which the Company recorded a charge for $23 \nthousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to \nreflect the consolidated effective tax rate based on the final operating results for the year. \n\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the \nresults of operations for the two months of 2003 that the operation remained a part of the Company.", - "page_start": 41, - "page_end": 41, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**Note 1. Summary of Significant Accounting Policies (Continued)**\n\n***Reclassifications:***Certain amounts reported in the 2002 and 2001 financial statements have been reclassified to \nconform with the 2003 presentation, with no effect on net income or shareholders' equity. \n\n**Note 2. Discontinued Operations**\n\nIn November 2002, the Company entered into an agreement to sell its 66% General Partner interest in the Virginia 10 \nRSA Limited Partnership (cellular operation) to Verizon Wireless for $37.0 million. The closing of the sale took place \nat the close of business on February 28, 2003. The total proceeds received were $38.7 million, including $5.0 million \nheld in escrow, and a $1.7 million adjustment for estimated working capital at the time of closing. There was a post \nclosing adjustment based on the actual working capital balance as of the closing date, which resulted in a $39 thousand \ncharge for the Company. The $5.0 million escrow was established for any contingencies and indemnification issues \nthat may arise during the two-year post-closing period and is included in deferred charges and other assets in the 2003 \nconsolidated balance sheet. The Company’s gain on the transaction was approximately $35 million. Post closing, the \nCompany provided transition services to Verizon for a period of approximately three months, with compensation for \nthose services being approximately $40 thousand per month during the transition period. \n\nThe assets and liabilities attributable to the cellular operation have been classified as held for sale in the consolidated \nbalance sheets and consist of the following at December 31, 2002 and 2001: \n\n2001 \n2001 \n2002 \n\n2002 \n*(in thousands)*\n*(in thousands)*\n$ \n2,608 \n$ \n$ 2,759 \n309 \n214 \n2,631 \n3,272 \n5,548 \n$ 6,245 \n\n2002 \n*(in thousands)*\n\n2001 \n*(in thousands)*\n$ 2,759 \n$ \n214 \n3,272 \n$ 6,245 \n$ \n\nAssets \n$ \n\n2,608 \n309 \n2,631 \n5,548 \nAccounts receivable \nOther current assets \nProperty, plant and equipment, (net) \n\n$ \n\n2,608 \n309 \n2,631 \n5,548 \n$ $ \n$ Total assets $ \n\nLiabilities and minority interest \n$ \n\n381 \n$ \n161 \n1,666 \n2,208 \n\n$ \n$ \n\n381 \n499 \n161 \n236 \n1,666 \n1,838 \n2,208 \n$ 2,573 \n\nAccounts payable and accrued expenses \nDeferred revenue and deposits \nMinority interest \n\n381 \n161 \n1,666 \n2,208 $ \n$ Total liabilities and minority interest $ \n\n$ \n$ \n\n499 \n236 \n1,838 \n$ 2,573 \n$ \n$ \n\nThe operations of the cellular partnership including the minority interest have been reclassified as discontinued \noperations, net of taxes in the consolidated statements of income for all periods presented. Operating results and the \nsale of the discontinued operations are summarized as follows: \n\n\n \n \n \n \n [html]\n
( in thousands )$3.056
$ 20.895$ 20.012453
3.6184.674-
316$
2.603$ 17.280$ 15.354
( 773 )( 5.200 )( 4.526 )
34.973--
( 14.414 )( 4.668 )( 4.150 )
$22.389$ 7.412
$ 6.678
", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "The $5.0 million placed in escrow, as part of the sales agreement on the Virginia 10 RSA limited partnership, should be \nreleased after February 28, 2005. There are no known claims that have been filed against the amount in escrow. \n\nThe Company spent $12.5 million on capital projects in 2003, or about $7.0 million below what was budgeted for the \nyear. The variance was primarily due to postponing construction of an additional diverse fiber route and the delay of \nthe second phase of renovations on the Shentel Center in Edinburg, Virginia. \n\nThe Company has no other off-balance sheet arrangements and has not entered into any transactions involving \nunconsolidated, limited purpose entities or commodity contracts. \n\nCapital expenditures budgeted for 2004 total approximately $30 million, including approximately $20 million for \nadditional PCS base stations, additional towers, and switch upgrades to enhance the PCS network. Improvements and \nreplacements of approximately $5 million are planned for the telephone operation. The remaining $5 million covers \nbuilding renovations, vehicles, office equipment, and other miscellaneous capital needs. \n\nThe Company anticipates using funds from operations, to the extent they are available to fund the capital expenditures \nand the payment of debt and interest. Due to lower than expected tax expenses in 2003, the Company will apply the \ntax receivable to the 2004-year tax liability. It is anticipated by no later than second quarter of 2004, additional federal \ntax payments will be due based on anticipated profits expected to be generated in the operation. \n\nManagement anticipates its operations will generate similar operating cash flows in 2004, compared to those of \ncontinuing operations in 2003, although there are events outside the control of the Company that could have an adverse \nimpact on cash flows from operations. The events that could adversely impact operating cash flow results include, but \nare not limited to; changes in overall economic conditions, regulatory requirements, changes in technologies, \navailability of labor resources and capital, and other conditions. The PCS subsidiary's operations are dependent upon \nSprint’s ability to execute certain functions such as billing, customer care, and collections; their ability to develop and \nimplement successful marketing programs and new products and services; and their ability to effectively and \neconomically manage other operating activities under the Company's agreements with Sprint. Additionally, the \nCompany's ability to attract and maintain a sufficient customer base is critical to maintaining a positive cash flow from \noperations. These items individually and/or collectively could impact the Company’s results. \n\nThe Company expects to generate adequate cash to meet its short-term and long-term cash needs, including working \ncapital requirements, capital projects and debt payments, and to fund potential dividend payments from cash on hand, \noperating cash flow, and amounts expected to be available under the Company’s existing financing facilities and its \nanticipated financing facilities discussed above. The Company may, at its election, liquidate some of its investments to \ngenerate additional cash for its capital needs as market conditions allow. \n\n**Recently Issued Accounting Standards**", - "page_start": 54, - "page_end": 54, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "The wireless industry in the late 1990’s became increasingly competitive and the Company was not immune to these \nindustry issues. The Clear PaySM program, introduced by Sprint as a no-deposit offering in 2001, attracted high credit \nrisk customers in the Company’s markets. As the results began to materialize, the Company implemented deposits on \nthis program (mid-April 2002), and experienced high levels of customer turnover (churn) and uncollectable accounts. \nThe write-offs of uncollectable accounts peaked in the third quarter of 2002. During the fourth quarter of 2002 there \nwas some evidence that the strengthened credit policy was having a favorable impact. Nonetheless, the 2002 net loss \nin the PCS operation was $5.4 million, as compared to $5.5 million in 2001. Despite the disappointing financial results \nfor 2002, the PCS customer base grew by over 40%. While the PCS operation was adding customers, the cellular \noperation continued to lose its local customer base. \n\nThe growing belief that national branding was critical to our wireless operations, the expectation that roaming revenues \nfrom our analog cellular operation would not continue to grow, and the increase in the number of wireless competitors \nin our markets, prompted the Company to exit the cellular business in order to focus on our PCS operations. The \nCompany entered into an agreement on November 21, 2002, to sell its 66% ownership interest in the Virginia 10 RSA \ncellular operation which was classified as a discontinued operation. The closing occurred February 28, 2003. The \nCompany received $37.0 million in proceeds, including $5.0 million in escrow for two years and $1.7 million for \nworking capital. \n\nIn many respects, 2003 was a successful year. Churn and levels of uncollectable accounts in the PCS operation \nreturned to more acceptable levels. PCS revenues reached $67.0 million, and total revenues reached $105.9 million. \nThe PCS operation recognized a small profit for the year, including favorable adjustments associated with settlement of \ndisputed items with Sprint. Excluding the favorable adjustments, the PCS operation recognized a profit in the fourth \nquarter. With improved operating cash flow and reduced capital spending in 2003, the Company prepaid $4.6 million \nin debt, selecting those notes with nominal prepayment penalties. Additionally, after receiving the cash and paying \ntaxes on the gain of the sale of the Virginia 10 partnership interest, the Company invested the remaining proceeds in \nliquid financial instruments, available for future deployment. Additionally, the Company has been successful at \ndecreasing its dependency on wireline revenues. Wireline revenues, at $29.0 million in 2003 compared to $18.6 million \nin 1998, were 27.4% of total revenues in 2003 compared to 76.6% in 1998. \n\nEntering 2004, the Company is pleased with the milestone of a profitable quarter in the PCS operation, but recognizes \nthat much work remains to ultimately earn a reasonable return on this investment. The recently announced signing of \nan addendum to the management and services agreements with Sprint is expected to lead to cost savings and greater \ncertainty in fees paid to Sprint. However, the consolidation predicted for the wireless industry in recent years, \nincluding the recently announced Cingular/ATT deal and anticipated improvements in the overall economics of \nwireless services, has not yet materialized. Future Sprint marketing efforts, designed to meet the competition, could \npotentially have an unfavorable impact on the Company and lead to additional losses. The risks associated with the \nSprint PCS affiliation are described in further detail elsewhere in this document. The Company is now reviewing \nalternatives for other businesses to further diversify our revenue base, from either a services platform or a geographic \nconcentration. \n\n**Significant Transactions**", - "page_start": 41, - "page_end": 41, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Income from discontinued operations was $22.4 million after taxes, an increase of $15.0 million or 202%. The income \nfrom discontinued operations in 2003 includes the sale of the partnership interest in February 2003 and results from the \ntwo months of its operations in 2003. \n\nThe Company adopted FAS 143 “Accounting for Asset Retirement Obligations.” effective January 1, 2003, and as a \nresult recorded a charge to earnings for the cumulative effect of this change in accounting of $76 thousand after taxes. \n\nNet income was $32.1 million, an increase of $27.6 million or 610%. The increase is a result of improved operating \nresults in the PCS operations, the 2002 VeriSign stock loss and the sale of the cellular operations. \n\n**DISCONTINUED OPERATIONS**\nThe Company invested $2.0 million in the Virginia 10 RSA limited partnership in the early 1990’s. The partnership’s \nlocal customer base peaked in early 2000 with nearly 12,000 subscribers, then steadily declined to 6,700 by December \n31, 2002. The decline was the result of competition with digital technologies and increased competition from national \ncarriers in the area. As a result of the decline in the subscriber base, and the need for extensive capital expenditures to \ntransform the analog network into a digital cellular network, the Company elected to sell its 66% interest in the \npartnership to one of the minority partners. The agreement was signed in November 2002, and closing was February \n28, 2003. The Company’s portion of the net income from its operations for 2003, 2002 and 2001 was $1.2 million, \n$7.4 million and $6.7 million, respectively. \n\n**CONTINUING OPERATIONS**\n\n**2002 compared to 2001**\n\nTotal revenue was $93.0 million in 2002, an increase of $24.3 million or 35.3%. Total revenues included $57.9 million \nof wireless revenues, an increase of $21.7 million or 60.2%; wireline revenues of $28.7 million, an increase of $1.3 \nmillion or 4.6%; and other revenues of $6.4 million, an increase of $1.2 million or 24.5%. \n\nWithin wireless revenues, the PCS operation contributed $55.5 million, an increase of $21.4 million, or 63.0%. PCS \nservice revenues were $37.4 million, an increase of $18.3 million or 95.7%. The increase in the subscriber base, which \ntotaled 67,842 at December 31, 2002, was an increase of 20,524 or 43% from the prior year end. \n\nPCS travel revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party’s network, \nwas $16.5 million, an increase of $2.9 million or 21.3%. Travel revenue is impacted by the geographic size of the \nCompany’s network service area, the overall number of Sprint wireless customers, and the travel exchange rate. The \nrate received on travel was $0.10 per minute in 2002. The rates in 2001 were $0.20 per minute from January 1, 2001 \nthrough April 30, 2001; $0.15 per minute from May 1, 2001 through September 30, 2001; and $0.12 per minute from \nOctober 1, 2001 through December 31, 2001. \n\nPCS equipment sales were $1.6 million, an increase of $0.3 million or 19.6%. The equipment sales are net of $0.3 \nmillion of rebates and discounts given at the time of sale, which became more pronounced during the year to meet \nindustry competition for subscriber additions and subscriber retention. \n\nIn accordance with Sprint’s requirements, the Company launched third generation (3G 1X) service in August 2002. \nThe impact of 3G 1X-network enhancements on revenues was not significant in 2002. \n\nTower leases added $2.1 million to wireless revenues, an increase of $0.4 million or 24.5%. The increase was the \nresult of other wireless carriers executing additional leases to use space on the Company’s portfolio of towers. Of the \n82 towers and poles owned by the Company as of December 31, 2002, 46 have tower space leased to other carriers.", - "page_start": 50, - "page_end": 50, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "The Company participates in the telecommunications industry, which requires substantial investment in fixed assets or \nplant. This significant capital requirement may preclude profitability during the initial years of operation. The strategy \nof the Company is to grow and diversify the business by adding services and geographic areas that can leverage the \nexisting plant, but to do so within the opportunities and constraints presented by the industry. For many years the \nCompany focused on reducing reliance on the regulated telephone operation, which up until 1981 was the primary \nbusiness within the Company. This initial diversification was concentrated in other wireline businesses, such as the \ncable television and regional fiber facility businesses, but in 1990 the Company made its first significant investment in \nthe wireless sector through its former investment in the Virginia 10 RSA Limited partnership. By 1998, revenues of \nthe regulated telephone operation had decreased to 59.2% of total revenues. In that same year more than 76.6% of the \nCompany’s total revenue was generated by wireline operations, and initiatives were already underway to make wireless \na more significant contributor to total revenues. \n\nDuring the 1990’s significant investments were made in the cellular and PCS (wireless) businesses. The VA 10 RSA \ncellular operation, in which the Company held a 66% interest and was the general partner, experienced rapid revenue \ngrowth and excellent margins in the late 1990’s. The cellular operation covered only six counties, and became \nincreasingly dependent on roaming revenues. Management believed the roaming revenues and associated margins \nwould be unsustainable as other wireless providers increasingly offered nationally-branded services with significantly \nreduced usage charges. To position it to participate in the newer, more advanced, digital wireless services, in 1995 the \nCompany entered the PCS business through an affiliation with American Personal Communications (APC), initiating \nservice along the Interstate 81 corridor from Harrisonburg, Virginia to Chambersburg, Pennsylvania. This territory was \na very close match to the Company’s fiber network, thereby providing economic integration that might not be available \nto other wireless carriers. In 1999, the Company entered a new affiliation arrangement with Sprint, the successor to \nAPC (which introduced the Company to a nationally-branded wireless service) and expanded the PCS footprint further \ninto Central Pennsylvania. The Company’s combined capital investment in 2000 and 2001 in the PCS operation was \n$45.1 million.", - "page_start": 40, - "page_end": 40, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "For over 100 years Shenandoah Telecommunications Company has been committed to providing outstanding \n\nservice to our customers. Our employees take that same dedication after hours to make a difference in their \ncommunity. \n\nWe take this opportunity to share with you, our shareholders, the stories of just a few of your dedicated \nemployees. \n\nVolunteerism is in Patty Pomeroy’s blood. Her grandfather was a dispatcher for the \n\nrescue squad in Middletown, VA for 25 years and her grandmother was in the ladies \nauxiliary. Her father was a charter member of the Middletown Rescue Squad. In 1997, \nPatty, a customer service representative at Shentel for four years, continued the family \ntradition by earning her Emergency Medical Technician certification and going to “work” \nfor the Strasburg Rescue Squad. Patty is the administrator of membership recruitment \nand retention for the squad and is the liaison coordinator for junior squad members under \n18. It is her job to make sure that new members are brought in to the squad and current \nmembers stay active. \n\n**“There is a great satisfaction that comes from knowing that what you can do will**\n**help people.”**\n***Patty Pomeroy***\n\nJeff Beard has been an installer repairman with Shentel for almost five years. Two \n\nyears ago, Jeff helped start Project Isaiah 58, a faith-based recovery ministry that reaches \nout to people who are struggling with addiction. Project Isaiah 58 has weekly group \nmeetings in Winchester, Woodstock and Warrenton, VA. Jeff, who lives in Winchester, \nparticipates in the group meetings and also makes time to meet one-on-one with people \nwho need personal attention. \n\n\n\n**“I feel the need to reach out to people who are suffering.”**\n\n***Jeff Beard***\n\nJohn Gardner has been with Shentel for two years as a PCS technician in Central \nPennsylvania, but for almost a year of that time he was on Naval Reserve duty in Sasebo, \nJapan. John joined the Reserves after serving 10 years of active duty. In October 2002, \nhe was activated under Noble Eagle-Enduring Freedom as part of the increase in security \nat bases around the world. John worked on Motorola radios and repeater systems while \nstationed in Japan. It was tough for the serviceman to be away from his wife and \nchildren, but John believes very strongly in serving his country. \n\n\n\n**“Being in the Reserves is a way for me to be a civilian and still serve my country.”**\n\n\n\n***John Gardner***\n\nAt Shentel, George Brinkley, the store manager in Front Royal, VA, is known for \n\nbeing one of the biggest fund-raisers for the Shenandoah County American Cancer \nSociety Relay for Life event. In his six years at the Company, George has raised nearly \n$20,000. In 2003, he raised $4,246 and was recognized as the top individual fund-raiser \nfor the entire event. \n\nIn 2002, George was chairman of the parade committee for the Woodstock, VA \n\n250th anniversary celebration. Under George’s leadership, the 26-member committee \nworked for a year preparing for the parade, which was the largest in the town’s history. \n\n**“I just have a knack for volunteering. I want to make my community better any way**\n**I can.”**\n\n***George Brinkley***\n3 ■ 2003 ANNUAL REPORT", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**Note 14. Segment Reporting**\n\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on \nthe products and services each provides. Each segment is managed and evaluated separately because of differing \ntechnologies and marketing strategies. \n\nThe reporting segments and the nature of their activities are as follows: \n\nShenandoah Telecommunications Company (Holding) \nHolding company, which invests in both affiliated \nand non-affiliated companies. \n\nShenandoah Telephone Company (Telephone) \n\nProvides both regulated and unregulated telephone \nservices and leases fiber optic facilities primarily \nthroughout the Northern Shenandoah Valley. \n\nShenandoah Cable Television Company (CATV) \nProvides cable television service in Shenandoah \nCounty. \n\nShenTel Service Company (ShenTel) \n\nProvides Internet access to a multi-state region \nsurrounding the Northern Shenandoah Valley, hosts \nTravel 511 for Virginia, and sells and services \ntelecommunication equipment. \n\nShenandoah Long Distance Company (Long Distance) Provides long distance services. \n\nShenandoah Network Company (Network) Leases interstate fiber optic facilities. \n\nShenTel Communications Company (Shen Comm) Provides DSL services as a CLEC operation. \n\nShenandoah Personal Communications Company (PCS) \n\nAs a PCS Affiliate of Sprint, provides digital wireless \nservice to a portion of a four-state area covering the \nregion from Harrisburg, York and Altoona, \nPennsylvania, to Harrisonburg, Virginia. \n\nThe accounting policies of the segments are the same as those described in the summary of significant accounting \npolicies. Each segment accounts for inter-segment sales and transfers as if the sales or transfers were to outside parties. \n\nIncome (loss) recognized from equity method nonaffiliated investees by segment is as follows: \n\n\n \n \n \n \n [html]\n
YearHoldingTelephoneConsolidated Totals
( in thousands )
2003$( 441 )$ 65
$ _ ( 376 )2002$( 822 )
$ 45$ ( 777 )2001$
", - "page_start": 36, - "page_end": 36, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**SHAREHOLDER INFORMATION**\n\n\n\n**OUR BUSINESS**\n\nShenandoah Telecommunications Company is a diversified telecommunications holding company which provides \nvarious telecommunications services through its operating subsidiaries. These services include: wireline telephone \nservice, primarily in Shenandoah County and small service areas in Rockingham, Frederick, and Warren counties, all in \nVirginia; cable television service in Shenandoah County; unregulated telecommunications equipment sales and services; \nonline information and Internet access provided to the multi-state region surrounding the Northern Shenandoah Valley of \nVirginia; financing of purchases of telecommunications facilities and equipment; paging services in the Northern \nShenandoah Valley; resale of long distance services; operation and maintenance of an interstate fiber optic network; \nwireless personal communications services (PCS) and a tower network in the four-state region from Harrisonburg, \nVirginia to the Harrisburg, York and Altoona, Pennsylvania markets. \n\n**ANNUAL MEETING**\n\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The \nmeeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company’s offices at the Shentel \nCenter, 500 Mill Road, Edinburg, Virginia. \n\n**FORMS 10-K, 10-Q, and 8-K**\n\n**The Company files periodic reports with the Securities and Exchange Commission. The Company's Annual**\n**Report on Form 10-K, Quarterly Reports on Form 10-Q, and Current Reports on Form 8-K, along with any**\n**amendments to these reports, are available to shareholders through the Company’s website, www.shentel.com.**\n**This website also has recent news releases and other information potentially of interest to shareholders.**\n\n**A copy of the Company’s Annual Report on Form 10-K, without exhibits, may be obtained, without charge, by**\n**writing to Shenandoah Telecommunications Company, 124 South Main Street, P.O. Box 459, Edinburg, Virginia**\n**22824, Attention: Secretary.**\n\n**MARKET AND DIVIDEND INFORMATION**\n\nThe Company's stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the \nThe Company’s stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the high \nhigh and low sales prices per share of common stock as reported by the NASDAQ National Market for the last two years \nand low closing prices per share of common stock as reported by the NASDAQ National Market for the last two years is \nis set forth below: \nset forth below: \n\n\n \n \n \n \n [html]20032002\n
Qtr. 1Qtr. 2Qtr. 3Qtr. 4Qtr. 1Qtr. 2Qtr. 3Qtr. 4
High price$ 24.31$ 24.98$ 25.48$ 27.50$ 20.06$ 27.25$ 27.25$ 25.95
Low price$ 13.64S 14.33$ 19.25$ 19.74$ 16.50$ 19.69$ 22.75$ 21.61
\n\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\nCALL (540) 984-5200 \nCALL (540) 984-5200 \nTransfer Agent - Common Stock \nTransfer Agent - Common Stock \nShenandoah Telecommunications Company \nShenandoah Telecommunications Company \nP.O. Box 459 \nP.O. Box 459 \nEdinburg, VA 22824 \nEdi b \nVA 22824", - "page_start": 58, - "page_end": 58, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**A SIGNIFICANT MILESTONE FOR PCS**\n\n\n\n2003 was the 10th anniversary of Shentel’s decision to enter the PCS \n\nbusiness and the 8th year operating as a Sprint PCS Affiliate. This year was a \nsignificant milestone for Shentel’s PCS business, as we posted our first \nprofitable quarter and recorded net income for the year of $0.3 million versus a \nnet loss of $5.4 million in 2002. \n\nOur Sprint PCS wireless customer base continues to grow, with year-end \n\ncustomers at 85,139 spread from Harrisonburg, Virginia to Harrisburg, \nPennsylvania. Our customers are averaging approximately 700 minutes of \nusage per month and we have one of the lowest customer churn rates in the \nindustry. To keep up with this growth and improve our service, we continued \ninvesting in additional network facilities. We added capacity to 26 existing \ntower sites and installed 16 new tower locations bringing our total sites to \n253. Our plan is to add capacity and build additional sites in 2004 in order \nto meet expected growth. \n\nWe added a new type of customer in 2003. Through Sprint’s \nrelationship with its wholesale cutomers, more than 11,000 pre-paid \ncustomers were added to our network. These pre-paid accounts, usually \nfor customers with no established credit, are a low cost method to increase \ncustomers. They can purchase phones and some minutes at various \nconvenience, electronic or department stores in addition to one of our \ncompany locations. When needed, they can easily purchase additional \nminutes. \n\nCamera phones and e-mailing pictures were hot in 2003. We now \noffer phones that can take and send a 15 second video. Late in the year, \nwe launched Spirit PCS ReadyLinksm, the Sprint walkie-talkie style \nservice. It is hoped that these new services will be major sales drivers \nin 2004. \n\n\n\nIn 2003, we focused on improving our distribution channels. We \n\nexpanded and relocated our stores in Harrisonburg and Winchester, \nVirginia to handle our growing customer base. At our Edinburg, \nVirginia store, we expanded both our hours and office space. We \ncontinue to increase our direct sales force to expand our base of \nbusiness customers. To make it convenient for our potential \ncustomers, we also grew the number of local third-party sales \npartners. \n\nA much publicized development in our industry was the introduction of Wireless Local Number Portability \n(WLNP) on November 24th, 2003. Starting on that day, customers in the 100 largest population centers in the \nUnited States were able to change wireless carriers while keeping their existing phone number. WLNP will be \navailable in the entire country on May 24, 2004. To date, this change has had only a minor impact on Shentel’s \ncustomer base. \n\nWe continue to work to make PCS a growth vehicle of revenue and net income for Shenandoah \n\nTelecommunications Company.", - "page_start": 10, - "page_end": 10, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "maiis-user-manual.pdf", - "query": "As a product manager, how can I reject an inventory in NAIIS ?", - "target_page": 38, - "target_passage": "Log in as PM. Click on “View Inventories Progress” under sub menu “Submission Management”. The “View Inventories Progress” screen appears. Select the appropriate inventory by clicking the Inventory name under column “Name” Press the “Reject” button ", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "**10.5.2 Rejection of an inventory**\n\n1. Log in as NFP. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 66). \n5. Press the “Send for Rejection” button (figure 66, b). \n\nOnce the “Send for Rejection” button was pressed, the status of the selected inventory changes to \n“awaiting_rejection” (figure 67, a). \n\n***Note: A notification email will be sent to the PM that the inventory has been rejected. Therefore, the PM \nwill be able to reject the submission. Proceed to section 10.4.2. \n\n***Figure 66. Work on Inventories screen – Rejection of an inventory - Status = awaiting_approval***\n\n\n\n***Figure 67. Work on Inventories screen – Rejection of an inventory - Status = rejected_approval***", - "page_start": 40, - "page_end": 40, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**10.5 Approval or Rejection of an inventory (NFP)**\n\nThis section describes how the NFP approves or rejects an inventory after being sent for approval by the PM \n(See section 10.4). \n\n**10.5.1 Approval of an inventory**\n\n1. Log in as NFP. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 64). \n5. Press the “Approve” button (figure 64, b). \n\nOnce the “Approve” button was pressed, the status of the selected inventory changes to “approved” (figure \n65, b). \n\n***Note: A notification email will be sent to the PM that the inventory has been approved. Therefore, the PM \nmay proceed to selecting the tables for preparing the official submission (See section 10.6). \n\n***Figure 64. Work on Inventories screen – Approve an inventory - Status = awaiting_approval***", - "page_start": 39, - "page_end": 39, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**10.4.1 Send for approval of an Inventory**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 60, a). \n5. Press the “Send for Approval” button to send it to NFP for his/her review and approval of the inventory \n(figure 60, b). \n\n***Note: A notification email will be sent to the PM, once the “Send for Approval” has been pressed. And the \nstatus changed to “Awaiting_approval” (figure 61). \n\n***Figure 60. Work on Inventories screen – Send for Approval - Status = check***\n\n\n\n***Figure 61. Work on Inventories screen – Status = awaiting_approval***\n\n\n\n**10.4.2 Rejection of an Inventory**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 62, a). \n5. Press the “Reject” button (figure 62, b). \n\n***Note: A notification email will be sent to the PM, once the “Reject” button has been pressed. And the \nstatus changed to “Awaiting_rejection_check” (figure 63).", - "page_start": 37, - "page_end": 37, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "***Figure 62. Work on Inventories screen –Reject - Status = check***\n\n\n\n***Figure 63. Work on Inventories screen – Propose Rejection - Status = awaiting_rejection_check***", - "page_start": 38, - "page_end": 38, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "***Figure 54. View Inventories Progress screen***\n\n\n\n***Figure 55. Work on Inventories sub menu***\n\n\n\n5. Click the appropriate Inventory year on “Work on Inventories” under “Submission” (figure 56, a). \n6. Press the “Start Inventory” button to start the inventory (figure 56, b). Once pressed, the status changes to \n“started” (figure 57). \n\n***Once the “Start Inventory” button has been pressed by the NFP or PM, a notification email will be sent to all \nSE’s with the information that a new inventory was created. SE’s and PM’s can start entering their data into the \nNAIIS software. More details on how to do the data entry please see section 4.1 above. \n\n***Figure 56. Work on Inventories screen***\n\n\n\n***Figure 57. Work on Inventories screen – Status = Started***", - "page_start": 35, - "page_end": 35, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**Contents**\n1 Introduction .................................................................................................................................. 4 \n\n2 General information ..................................................................................................................... 4 \n\n2.1 System overview ............................................................................................................... 4 \n\n2.2 Pending NAIIS features .................................................................................................... 5 \n\n2.3 Contact .................................................................................................................................. 5 \n\n3 Getting started .............................................................................................................................. 6 \n\n3.1 User Access, Roles and Privileges ........................................................................................ 6 \n\n3.2 How to access/ log out / create a GHG inventory ................................................................. 6 \n\n3.2.1 How to access the NAIIS application ............................................................................ 6 \n\n3.2.2 Create, Start, Add new and View GHG inventory year ................................................. 8 \n\n3.2.3 Initial screen / menu tab of the NFP, PM and SE ........................................................ 13 \n\n3.2.4 How to log out .............................................................................................................. 13 \n\n3.3 User management ................................................................................................................ 14 \n\n3.3.1 Add User ...................................................................................................................... 14 \n\n3.3.2 Disable/Enable User ..................................................................................................... 15 \n\n3.3.3 View User ..................................................................................................................... 16 \n\n4 Using the system ........................................................................................................................ 17 \n\n4.1 Data Entry ........................................................................................................................... 17 \n\n4.2 Navigation tree .................................................................................................................... 17 \n\n4.3 Grids .................................................................................................................................... 17 \n\n4.4 Data input ............................................................................................................................ 18 \n\n4.5 Add/delete new nodes – user defined source categories ..................................................... 18 \n\n4.5.1 Add new nodes ............................................................................................................. 18 \n\n4.5.2 Delete nodes – user defined nodes ............................................................................... 20 \n\n4.6 Backup of data files ............................................................................................................. 20 \n\n5 Key Category Analysis ............................................................................................................... 21 \n\n5.1 Using the default list ........................................................................................................... 22 \n\n5.2 Customizing the list ............................................................................................................. 22 \n\n5.3 Delete subnodes ................................................................................................................... 23", - "page_start": 1, - "page_end": 1, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**10 Submission management**\n\n**10.1 Workflow**\n\nCreating and preparing an inventory, generating tables for checking by the NFP and approving and/or rejecting \nsubmission, follows a number of steps known collectively as a workflow. This chapter describes the workflow relating \nto the submission of the GHG inventory/(ies), which users should follow to create, prepare, and send GHG \ninventories for internal checking, and approval/rejection of the submission by the NFP, within the NAIIS web \napplication (figure 52). \n\n**10.2 Start of inventory/submission (NFP or PM)**\n\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year \nidentified will be made available in the new inventory/submission. \n\nThese are the steps to start a new inventory: \n\n1. Click on “View Inventories Progress” under sub menu “Submission Management” (figure 53). \n\n***Figure 53. View Inventories Progress sub menu***\n\n\n\n2. The “View Inventories Progress” screen appears (figure 54). \n3. Select the appropriate inventory by clicking the box under column “Working Inventory” (figure 54, a). \n\n***Note: The selected appropriate inventory should be in status “created” (figure 54, b)", - "page_start": 34, - "page_end": 34, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**3.2.2 Create, Start, Add new and View GHG inventory year**\n\nThese functions allow the NFP and PM to create or edit a GHG inventory within the NAIIS software. \n\n***3.2.2.1 Create a new GHG inventory or Start a GHG inventory year***\n\n3.2.2.1.1 Create a new GHG inventory \n\n\n \n \n \n \n [html]\n
Notw This stan ran CWJ Y ha unrisertaken hy the NFP nr PM 1
\n\nIn order to create one or several GHG inventories, the following steps can be done by the NFP or PM: \n\n Log in as NFP or PM \n Hover the cursor on “Submission Management” menu and click on the “View Inventories Progress” button. (see \nFigure 5). Left click on the “+” sign will create a new GHG inventory. (see Figure 6) \n\nThe new GHG Inventory name will be automatically generated by the NAIIS system, as follows: \n___Inventory \n\nFor example: Paraguay_2013_1_Inventory or Bhutan_2014_2_Inventory \n\n***Figure 5. Create new GHG inventory screen***", - "page_start": 7, - "page_end": 7, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "10.1 Workflow .......................................................................................................................... 35 \n\n10.2 Start of inventory/submission (NFP or PM) ..................................................................... 35 \n\n10.3 Send for checking (PM) .................................................................................................... 37 \n\n10.4 Send for approval/rejection of an Inventory (PM) ............................................................ 38 \n\n10.4.1 Send for approval of an Inventory .............................................................................. 38 \n\n10.4.2 Rejection of an Inventory ........................................................................................... 38 \n\n10.5 Approval or Rejection of an inventory (NFP) ................................................................... 40 \n\n10.5.1 Approval of an inventory ........................................................................................... 40 \n\n10.5.2 Rejection of an inventory ........................................................................................... 41 \n\n10.6 Submit inventory (PM) ...................................................................................................... 42 \n\n10.6.1 Submit select tables for preparing the general submission ........................................ 42 \n\nGlossary of terms and abbreviations ............................................................................................. 44 \n\nAnnex 1: Non-Annex I (NAI) Parties .......................................................................................... 45 \n\nAnnex 2: Fuel categories .............................................................................................................. 47 \n\nAnnex 3: Global Warming Potentials (GWPs) ............................................................................ 48 \n\nAnnex 4: Default values ............................................................................................................... 49", - "page_start": 2, - "page_end": 2, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**1 Introduction**\n\nThe Non-Annex I Inventory software (NAIIS) web application is a web-based tool developed for use by Parties not \nincluded in Annex I to the Convention (non-Annex I Parties) to estimate and report their national greenhouse gas \ninventories (GHG inventories). As per Article 4, paragraph 1 (a), and Article 12, paragraph 1 (a) of the Convention, \nnon-Annex I Parties are required to communicate to the Conference of the Parties a national inventory of \nanthropogenic emissions by sources and removals by sinks of all greenhouse gases (GHGs) not controlled by the \nMontreal Protocol, to the extent their capacities permit, following the guidelines contained in the annex to \ndecision17/CP.8. \n\nIn order to assist non-Annex I Parties in estimating and reporting their GHG inventories as part of their national \ncommunications, the secretariat developed an Excel-based software which incorporated all the elements of a national \nGHG inventory prescribed by decision 17/CP.8. The software was based on the IPCC inventory software version \n1.1, which used the Tier 1 methodologies for estimating GHG emissions and removals for all source categories \nincluded in the Revised 1996 IPCC Guidelines, and further complemented by the GPGs.1 \n\nSince its release in 2005, most non-Annex I Parties have been using that software for the development of their \nnational GHG inventories. In December 2011, Parties requested the secretariat to upgrade the software and make it \navailable to non-Annex I Parties by June 2013. Pursuant to that request, the secretariat converted the current Excel- \nbased version of the software (v.1.3.2)2 into a web-based application (NAIIS) which provides greater flexibility and \nsecurity for maintaining data. \n\n**2 General information**\n\nThe NAIIS is a web-based application designed to enable non-Annex I Parties estimate their national GHG \ninventories according to the UNFCCC guidelines and using the IPCC methodologies, and to report the results in their \nnational communications and biennial update reports. \n\n**2.1** **System overview**\n\nThe NAIIS web application has the following functionalities: \n\n1. User management (only for the user roles NFP and PM) \n2. Submission management \n3. Data entry \n4. Key category analysis \n5. Reporting tables \n6. Data Export/Import \n7. Completeness \n8. Consistency \n\nThe NAIIS web application allows input of data through three different channels: \n\n1. Manual input into the entry grids \n2. Partial or full import of data from Excel \n3. Bulk import of data from XML \n\nThe GHG emissions totals, by gas and by sector, are automatically calculated and saved based on the values \nentered for activity data (AD), emission factors and other relevant parameters. In addition, the software facilitates the \nreporting of other category specific information, for example, the choice of the method for activity data and emission \nfactors. \n\n1 Good Practice Guidance and Uncertainty Management in National Greenhouse Gas Inventories, 2000, and Good Practice Guidance for Land \nUse, Land‐Use Change and Forestry, 2003. \n2 http://unfccc.int/files/national_reports/non‐ \nannex_i_natcom/training_material/methodological_documents/application/zip/unfccc_nai_is_132.zip", - "page_start": 3, - "page_end": 3, - "source_file": "maiis-user-manual.pdf" - } - ] - }, - { - "references": { - "source_file": "maiis-user-manual.pdf", - "query": "What is the global warming potential of Perfluorohexane ?", - "target_page": 48, - "target_passage": "7,400", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
Greenhouse gasChemical formula1995 IPCC GWP
Carbon dioxideCO21
MethaneCH421
Nitrous oxideN2O310
HFC - 23CHF311.700
HFC - 32CH2F2650
HFC - 41CH3F150
HFC - 43 - 10meeC5H2F101.300
HFC - 125C2HF52.800
HFC - 134C2H2F41.000
HFC - 134aCH2FCF31.300
HFC - 152aC2H4F2140
HFC - 143C2H3F3300
HFC - 143aCF3CH33.800
HFC - 227eaC3HF72.900
HFC - 236faC3H2F66.300
HFC - 254caC3H3F5560
PerfluoromethaneCF46.500
PerfluroethaneC2F69.200
PerfluoropropapeC3F87.000
PerfluorobutaneC2F107.000
Perfluorocyclobutanec - c4F88.700
PerfluoropentaneC5F127.500
PerfluorohexaneC6F147.400
Sulphur hexafluorideSF623.900
", - "page_start": 47, - "page_end": 47, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Article \n**#Climatechange vs. #Globalwarming: Characterizing**\n**Two Competing Climate Discourses on Twitter with**\n**Semantic Network and Temporal Analyses**\n\n**Wen Shi 1, Haohuan Fu 1,2, Peinan Wang 3, Changfeng Chen 3 and Jie Xiong 4,***\n\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, \n\nTsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); \nhaohuan@tsinghua.edu.cn (H.F.) \n\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China \n3 \n\nSchool of Journalism and Communication, Tsinghua University, Beijing 100084, China; \nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.) \nStrategy and Innovation Department, Rennes School of Business, 35065 Rennes, France \n\n4 \n** ***Correspondence: jie.xiong@rennes-sb.com; Tel.:+ 33-(0)-2-99-54-46-79 \n\n**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. \n\n**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed10.pdf" - }, - { - "text": "\n \n \n \n \n [html]No.# Climatechange# Globalwarming\n
HashtagCentralityHashtagCentrality
23co20.174snow0.161
24weather0.169world0.157
25solar0.165gop *0.156
26economy0.164arctic0.150
27auspol0.163 *winter0.145
28education0.155p2 *0.144
29news0.152drought0.142
30drought0.150epa *0.141
31coal0.147global0.137
32sustainable0.147eco0.137
33cdnpoli0.144 *actonclimate0.136
34sdgs0.143 *health0.134
35china0.143un *0.133
36gop0.143 *solar0.132
37food0.141economy0.131
38un0.141 *hoax0.131
39cop24 *0.140california0.130
40agriculture0.138politics0.129
41environmental0.136india0.128
42fossilfuels0.134china0.127
43arctic0.134planet0.127
44epa *0.133parisagreement *0.126
45biodiversity0.132heatwave0.125
46future0.131summer0.121
47canada0.128nyc *0.118
48emissions0.128nasa0.118
49obama0.127future0.118
50politics0.125oil0.117
\n\nThe association networks of #climatechange and #globalwarming are shown in Figure 2. Nodes \nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of \nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and \nfive in the #globalwarming network, where clusters are differentiated by color (resolution is 0.75 for \nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each \ncluster are also summarized and represented in the network depicted in Figure 2. \n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer \nto general facts about global climate issues, sharing words about the causes or effects concerning \nsustainability. The difference is that the largest cluster of #globalwarming (46% of the network) includes \nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the \nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as \nagriculture, biodiversity, education, and politics.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "**Simulation of climate scenarios with global warming by 1.5 °C and 2.0 °C.**\nIn this study, climate \ndata of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models \ndriven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a \ntotal of 20 sets of data under four RCP scenarios of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL- \nCM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sun- \nshine hours (Fig. 1).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - }, - { - "text": "conducted to reveal the interactions between public discourse and natural, scientific, social, or political \nevents. In particular, factors promoting public consensus and factors resulting in discourse discrepancy \nshould be further identified to help climate communicators narrow the public cognitive divergence \nabout the global climate issue. \n\n**Supplementary Materials:**The following are available online at http://www.mdpi.com/1660-4601/17/3/1062/s1. \n\n**Author Contributions:**W.S. designed the study, collected the data, conducted the analysis, and wrote the article. \nH.F. offered suggestions to the part of temporal analysis. P.W. contributed to the hashtag co-occurrence part. C.C. \nhelped with the design of the study. J.X. contributed to the framing of the article and helped with the revision. \nAll authors have read and agreed to the published version of the manuscript. \n\n**Funding:**This work was supported in part by the National Key R&D Program of China (Grant No. \n2017YFA0604500), by the National Natural Science Foundation of China (Grant No. 51761135015, 71772142 and \nU1839206), by the National Social Science Foundation of China (Grant No.18ZDA307), by the Center for High \nPerformance Computing and System Simulation, and by the Pilot National Laboratory for Marine Science and \nTechnology (Qingdao). \n\n**Conflicts of Interest:**The authors declare no conflict of interest. \n\n**Appendix A**\n\n#agw, short for anthropogenic global warming, indicating global warming is caused by \n\nhuman activities. \n\n#cdnpoli, short for Canadian politics \n#cop21, the yearly session of COP (short for the Conference of the Parties) held in 2015. \n#cop24, the yearly session of COP (short for the Conference of the Parties) held in 2018. \n#epa, short for the United States Environmental Protection Agency founded in 1970, an agency \n\naiming at protecting environment. \n\n#gop, short for Grand Old Party, the Republican political party in the United States. \n#nyc, short for New York City \n#p2, short for Progressives 2.0, a hashtag used to show progressive political standpoints on Twitter. \n#parisagreement, Paris Agreement, the agreement signed on UNFCCC in 2016 to deal with global \n\nwarming by reducing greenhouse gas emissions. \n\n#sdgs, short for Sustainable Development Goals, containing 17 global goals put forward by the \n\nUnited Nations General Assembly in 2015 and expected to be achieved in 2030. \n\n#tcot, short for Top Conservatives On Twitter, a hashtag used to show conservative political \n\nstandpoints on Twitter. \n\n#un, short for the United Nations \n#us, short for the United States \n\n**References**\n\n1. Nisbet, M.C. Communicating climate change: Why frames matter for public engagement. Environ. Sci. \n\n2. \n\n3. \n\n4. \n\n5. \n\n6. \n\nPolicy Sustain. Dev.**2009**, 51, 12–23. [CrossRef] \nRoxburgh, N.; Guan, D.; Shin, K.J.; Rand, W.; Managi, S.; Lovelace, R.; Meng, J. Characterising climate change \ndiscourse on social media during extreme weather events. Glob. Environ. Chang.**2019**, 54, 50–60. [CrossRef] \nSchuldt, J.P.; Konrath, S.H.; Schwarz, N. “Global warming” or “climate change”? Whether the planet is \nwarming depends on question wording. Public Opin. Q.**2011**, 75, 115–124. [CrossRef] \nVillar, A.; Krosnick, J.A. Global warming vs. climate change, taxes vs. prices: Does word choice matter? \nClim. Chang.**2011**, 105, 1–12. [CrossRef] \nJang, S.M.; Hart, P.S. Polarized frames on “climate change” and “global warming” across countries and \nstates: Evidence from Twitter big data. Glob. Environ. Chang.**2015**, 32, 11–17. [CrossRef] \nUnited States Environmental Protection Agency. Climate Change: Basic Information. Available online: \nhttps://19january2017snapshot.epa.gov/climatechange/climate-change-basic-information_.html (accessed on \n10 October 2019).", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed10.pdf" - }, - { - "text": "issues and re-constructing them differently. By comparing the persistent words used related to the two \ndiscourses in the 10-year period in Table 2, we think that global warming showed a relative preference \ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change” \nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”. \n\nStudies have suggested that the public shows a preference for scientific publications with general \nkeywords compared with those with complicated scientific jargon [47], lacking a deep understanding of \nthe complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions \nseem to suit global warming more than climate change according to the current study, which is \nprobably because climate change receives more publicity and recognition than global warming in the \nscientific community. In the association network shown in Figure 2, global warming was found to be \nmore connected with temperature abnormalities. This finding is in accordance with studies reporting \nthat short-term temperature anomalies [87] can increase the public’s belief about global warming by \nincreasing the understanding of this abstract issue [88], although scientists mostly make judgments \nbased on long-term weather statistics [89]. However, none of the four words, “snow”, “summer”, \n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes \nlist of the climate change network. \n\nEven when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. \n\n5.1.3. Discourse Structure", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "**Figure 5.**The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to \n2018 (**a**); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to \n2018 (**b**). \n\nAs the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. \n\n**Figure 6.**Rank order correlation between hashtags in the climate change and global warming discourses \nfrom 2009 to 2018 (**a**); correlation between matrices of the climate change discourse and the global \nwarming discourse from 2009 to 2018 (**b**). \n\n**5. Discussion**\n\n5.1. Themes and Structure of the Two Discourses \n\n5.1.1. Phenomenon vs. Mechanism of Action \n\nClimate change and global warming have long been two competing frameworks shaping the \npublic’s perceptions, memory, and interpretations of climate issue by highlighting different aspects of", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed10.pdf" - }, - { - "text": "**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames \n\nExisting studies have noted that the subtle difference between climate change and global warming \nevokes different public cognitive responses, where global warming“indicates heat-related impacts, \nhuman causes, increased UV light penetration, ozone depletion, and the greenhouse effect, whereas \nclimate change is more associated with a wide range of influences on climate, including drought and \nagriculture [9]. An N-gram analysis suggested that global warming showed a closer connection with \nice, snow, and sea, whereas climate change was always connected with scientific investigations, such as", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "Caitlyn Kennedy, R.L. What’s the Difference between Global Warming and Climate Change? 2015. Available \nonline: https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and- \nclimate-change (accessed on 10 October 2019). \nPachauri, R.K.; Allen, M.R.; Barros, V.R.; Broome, J.; Cramer, W.; Christ, R.; Church, J.A.; Clarke, L.; Dahe, Q.; \nDasgupta, P.; et al. Climate Change 2014: Synthesis Report. Contribution of Working Groups I, II and III to the Fifth \nAssessment Report of the Intergovernmental Panel on Climate Change; IPCC: Geneva, Switzerland, 2014. \n9. Whitmarsh, L. What’s in a name? Commonalities and differences in public understanding of “climate \n\n7. \n\n8. \n\nchange” and “global warming”. Public Underst. Sci.**2009**, 18, 401–420. [CrossRef] \nShehata, A.; Hopmann, D.N. Framing climate change: A study of US and Swedish press coverage of global \nwarming. Journal. Stud.**2012**, 13, 175–192. [CrossRef] \nSchuldt, J.P.; Roh, S. Of accessibility and applicability: How heat-related cues affect belief in “global warming” \nversus “climate change”. Soc. Cogn.**2014**, 32, 217–238. [CrossRef] \n\n12. McCright, A.M.; Dunlap, R.E. Challenging global warming as a social problem: An analysis of the conservative \n\nmovement’s counter-claims. Soc. Probl.**2000**, 47, 499–522. [CrossRef] \n\n13. Lineman, M.; Do, Y.; Kim, J.Y.; Joo, G.J. Talking about climate change and global warming. PLoS ONE**2015**, \n\n10, e0138996. [CrossRef] \n\n14. Anderson, J.R. The Architecture of Cognition; Psychology Press: London, UK, 2013. \n15. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of traffic anomalies based on human mobility \nand social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in \nGeographic Information Systems, Orlando, FL, USA, 5–8 November 2013; pp. 344–353. \n\n16. Rogstadius, J.; Vukovic, M.; Teixeira, C.A.; Kostakos, V.; Karapanos, E.; Laredo, J.A. CrisisTracker: \nCrowdsourced social media curation for disaster awareness. IBM J. Res. Dev.**2013**, 57, 4:1–4:13. [CrossRef] \n17. Leetaru, K.; Wang, S.; Cao, G.; Padmanabhan, A.; Shook, E. Mapping the global Twitter heartbeat: The \n\ngeography of Twitter. First Monday**2013**, 18. [CrossRef] \n\n18. Kirilenko, A.P.; Molodtsova, T.; Stepchenkova, S.O. People as sensors: Mass media and local temperature \n\ninfluence climate change discussion on Twitter. Glob. Environ. Chang.**2015**, 30, 92–100. [CrossRef] \n\n19. Gamson, W.A.; Modigliani, A. Media discourse and public opinion on nuclear power: A constructionist \n\napproach. Am. J. Sociol.**1989**, 95, 1–37. [CrossRef] \n\n20. Entman, R.M. Framing: Toward clarification of a fractured paradigm. J. Commun.**1993**, 43, 51–58. [CrossRef] \n21. McCombs, M.; Llamas, J.P.; Lopez-Escobar, E.; Rey, F. Candidate images in Spanish elections: Second-level \n\nagenda-setting effects. Journal. Mass Commun. Q.**1997**, 74, 703–717. [CrossRef] \n\n22. Druckman, J.N. On the limits of framing effects: Who can frame? J. Politics**2001**, 63, 1041–1066. [CrossRef] \n23. Druckman, J.N. The implications of framing effects for citizen competence. Political Behav.**2001**, 23, 225–256. \n\n[CrossRef] \n\n24. Teigen, K.H.; Karevold, K.I. Looking back versus looking ahead: Framing of time and work at different \n\nstages of a project. J. Behav. Decis. Mak.**2005**, 18, 229–246. [CrossRef] \n\n25. McKenzie, C.R.; Nelson, J.D. What a speaker’s choice of frame reveals: Reference points, frame selection, \n\nand framing effects. Psychon. Bull. Rev.**2003**, 10, 596–602. [CrossRef] \n\n26. Du, Y.R. Same events, different stories: Internet censorship in the Arab Spring seen from China. Journal. \n\n27. \n\n28.", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - }, - { - "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. \n\nLarge amounts of user-generated data on social media, which have been valued in computer science, \ncommunication, and environmental studies [5,9,15–18], have enabled the acquistion of the social media \nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence \npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009 \nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify \nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to \nobserve the evolution of the two discourses and to measure whether the discrepancy between the two \nhas widened or narrowed within the 10-year period. \n\nTo be specific, we formulated three research questions (RQs) to be explored in this study: \n\nRQ1: What is the difference in how the two the discourses are associated with important climate \nconcepts in people’s minds? \nRQ2: How did the two competing climate discourses evolve from 2009 to 2018? \nRQ3: Did the two competing discourses converge or diverge in this decade? \n\n**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "maiis-user-manual.pdf", - "query": "How can I request access to NAIIS ?", - "target_page": 5, - "target_passage": "Requests for access to, inquiries on the use of the software, and comments on the design and functionalities of the application should be sent to the dedicated e-mail address naiisapp@unfccc.int.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**2.3 Contact**\n\nRequests for access to, inquiries on the use of the software, and comments on the design and functionalities of the \napplication should be sent to the dedicated e-mail address**naiisapp@unfccc.int**.", - "page_start": 4, - "page_end": 4, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Press the ‘Enter key’ and the non-Annex I Greenhouse Gas Inventories web page appears. \n\nTo access the NAIIS application, click on the image NAIIS Web Application, the right hand side of the screen. (figure \n3, number 1) and the log-in page will be displayed. (figure 4) \n\n***Figure 3. UNFCCC non-Annex I Greenhouse Gas Inventories web page***\n\n\n\n***Figure 4. Log-in page of the NAIIS Web Application***", - "page_start": 6, - "page_end": 6, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**3 Getting started**\n\n**3.1 User Access, Roles and Privileges**\n\nThe users of the application are the members of the national team(s) of non-Annex I Parties involved in the \npreparation of their national GHG inventories, and each user is assigned a role. \n\nThe table below explains the different levels of the access rights and corresponding explanation for each role. It is \nimportant to note that the roles are not necessarily identical to a person’s title (e.g. National Focal Point) and that a \nperson can take on several roles (which may be necessary for some countries). \n\nThere are three types of access rights (roles) to the NAIIS application: \n\n\n \n \n \n \n [html]\n
Type of access rights for specific rolesProcess to gain access rights
National Focal Point ( NFP ): Will be responsible for identifying the members of the team and is the only one who has the right to approve the submission of any GHG inventory.Parties that have not already requested and received access rights can obtain them by having their National Focal Point contact : galigagaga ( Quet ) squipt
NFPs will have the option to create, edit, update or delete all of their country ’ s GHG data entries, and grant access rights to the ‘ Project Manager ’ and ‘ Sectoral Experts ’ for their country if they choose.( Note : Some Parties may have more than one individual acting as the NFP ; however the system can accommodate only one account per Party ).
Project Manager ( PM ): Will have the right to enter / edit data in all sectors, as well as to generate an official submission to the UNPCC, and grant access rights to the “ Sectoral Experts ” for their country.Entities will be provided these rights by their NFP. If a Party decides to grant access to a PM, their NFP will be able to create such user account on the NAIIS application.
Sectoral Experts ( SE ): Will have the right to enter / edit data in respective sector ( s ).Experts will be provided these rights by their NFP and PM. If a Party decides to grant access to Sectoral Experts, the NFP will be able to create such user accounts and assign them in respective sector ( s ).
\n\n**3.2 How to access/ log out / create a GHG inventory**\n\n**3.2.1 How to access the NAIIS application**\n\nOpen any internet browser (i.e. Internet Explorer, Firefox, etc.) and type in the following URL http://unfccc.int/7627 on \nthe browser’s address bar. (figure 1 and figure 2) \n\n***Figure 1. Using Internet Explorer browser***\n\n\n\n***Figure 2. Using Firefox browser***", - "page_start": 5, - "page_end": 5, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**Contents**\n1 Introduction .................................................................................................................................. 4 \n\n2 General information ..................................................................................................................... 4 \n\n2.1 System overview ............................................................................................................... 4 \n\n2.2 Pending NAIIS features .................................................................................................... 5 \n\n2.3 Contact .................................................................................................................................. 5 \n\n3 Getting started .............................................................................................................................. 6 \n\n3.1 User Access, Roles and Privileges ........................................................................................ 6 \n\n3.2 How to access/ log out / create a GHG inventory ................................................................. 6 \n\n3.2.1 How to access the NAIIS application ............................................................................ 6 \n\n3.2.2 Create, Start, Add new and View GHG inventory year ................................................. 8 \n\n3.2.3 Initial screen / menu tab of the NFP, PM and SE ........................................................ 13 \n\n3.2.4 How to log out .............................................................................................................. 13 \n\n3.3 User management ................................................................................................................ 14 \n\n3.3.1 Add User ...................................................................................................................... 14 \n\n3.3.2 Disable/Enable User ..................................................................................................... 15 \n\n3.3.3 View User ..................................................................................................................... 16 \n\n4 Using the system ........................................................................................................................ 17 \n\n4.1 Data Entry ........................................................................................................................... 17 \n\n4.2 Navigation tree .................................................................................................................... 17 \n\n4.3 Grids .................................................................................................................................... 17 \n\n4.4 Data input ............................................................................................................................ 18 \n\n4.5 Add/delete new nodes – user defined source categories ..................................................... 18 \n\n4.5.1 Add new nodes ............................................................................................................. 18 \n\n4.5.2 Delete nodes – user defined nodes ............................................................................... 20 \n\n4.6 Backup of data files ............................................................................................................. 20 \n\n5 Key Category Analysis ............................................................................................................... 21 \n\n5.1 Using the default list ........................................................................................................... 22 \n\n5.2 Customizing the list ............................................................................................................. 22 \n\n5.3 Delete subnodes ................................................................................................................... 23", - "page_start": 1, - "page_end": 1, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**3.3.3 View User**\n\nThis function enables NFP and PM to view all users of their country. \n\n Log in as NFP or PM \n Hover the cursor on the “Users Management” tab and click on the “Users Administration” button. (see figure 21); \nthis opens the Users Administration screen (figure 22). \n\n***Figure 21. Users Administration***\n\n Click on the row of the respective user to be viewed (figure 22a). All information of the selected user will be \ndisplayed on the**General Properties**,**Sector**and**Role**boxes (figure 22b). \n\n***Figure 22. Users Administration***\n\n*NAIIS-User-Manual.Docx* Page 16 10/02/2013", - "page_start": 15, - "page_end": 15, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Complete the following steps to access the SAT: \n\nIf you are accessing SAT by using*cluster IP address*/service, the configuration node \ncanister SAT GUI login window opens. Enter the Superuser Password, as shown in \nFigure 13-76. \n\n1.", - "page_start": 757, - "page_end": 757, - "source_file": "sg247938.pdf" - }, - { - "text": "Once the “Generate Official Submission” button has been pressed the “Submit Inventory” initial screen for selecting \nthe tables appears (figure 70). \n\n8. Select or deselect by clicking the appropriate year(s) under “Inventory Years” box (figure 70, c) or the sector \ngrids under the “Table” box (figure 70, d) to generate the official submission. \n9. Press the “Submit” button (figure 70, e). An official submission will be generated in the NAIIS system. \n\n***Figure 70. Submit – select tables and grids for the general submission***\n\n\n \n \n \n \n [html]\n
TableTableTableTableTable
TableTableTableNAIIS - User - Manual. DocxPage 43
10 / 02 / 2013
", - "page_start": 42, - "page_end": 42, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**3.3.1 Add User**\n\n**Note**: This function is**ONLY**available for NFP’s and PM’s! \n\n Log in as NFP or PM \n Hover the cursor on the “Users Management” tab and click on the “Users Administration” button. (see figure 18); \nthis opens the Users Administration screen (figure 19). \n\n***Figure 18. Users Administration***\n\n***Figure 19. Initial screen of Users Administration***\n\n Click the “+” sign (figure 19a) creates a new user (figure 20 new User). \n Double click on the cell of the newly created user name and enter a new user name (must be unique and contain at \n\nleast 3 characters). \nOnce done, press the enter key and the new user name will be saved in the respective table of the NAIIS database. \n\nNote: New user name(s) will be generated by the system as default [Non-Annex I Party name] + “newUser” \n(e.g. UgandanewUser, PhilippinesnewUser, ArgentinanewUser)", - "page_start": 13, - "page_end": 13, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence.", - "page_start": 33, - "page_end": 33, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**1 Introduction**\n\nThe Non-Annex I Inventory software (NAIIS) web application is a web-based tool developed for use by Parties not \nincluded in Annex I to the Convention (non-Annex I Parties) to estimate and report their national greenhouse gas \ninventories (GHG inventories). As per Article 4, paragraph 1 (a), and Article 12, paragraph 1 (a) of the Convention, \nnon-Annex I Parties are required to communicate to the Conference of the Parties a national inventory of \nanthropogenic emissions by sources and removals by sinks of all greenhouse gases (GHGs) not controlled by the \nMontreal Protocol, to the extent their capacities permit, following the guidelines contained in the annex to \ndecision17/CP.8. \n\nIn order to assist non-Annex I Parties in estimating and reporting their GHG inventories as part of their national \ncommunications, the secretariat developed an Excel-based software which incorporated all the elements of a national \nGHG inventory prescribed by decision 17/CP.8. The software was based on the IPCC inventory software version \n1.1, which used the Tier 1 methodologies for estimating GHG emissions and removals for all source categories \nincluded in the Revised 1996 IPCC Guidelines, and further complemented by the GPGs.1 \n\nSince its release in 2005, most non-Annex I Parties have been using that software for the development of their \nnational GHG inventories. In December 2011, Parties requested the secretariat to upgrade the software and make it \navailable to non-Annex I Parties by June 2013. Pursuant to that request, the secretariat converted the current Excel- \nbased version of the software (v.1.3.2)2 into a web-based application (NAIIS) which provides greater flexibility and \nsecurity for maintaining data. \n\n**2 General information**\n\nThe NAIIS is a web-based application designed to enable non-Annex I Parties estimate their national GHG \ninventories according to the UNFCCC guidelines and using the IPCC methodologies, and to report the results in their \nnational communications and biennial update reports. \n\n**2.1** **System overview**\n\nThe NAIIS web application has the following functionalities: \n\n1. User management (only for the user roles NFP and PM) \n2. Submission management \n3. Data entry \n4. Key category analysis \n5. Reporting tables \n6. Data Export/Import \n7. Completeness \n8. Consistency \n\nThe NAIIS web application allows input of data through three different channels: \n\n1. Manual input into the entry grids \n2. Partial or full import of data from Excel \n3. Bulk import of data from XML \n\nThe GHG emissions totals, by gas and by sector, are automatically calculated and saved based on the values \nentered for activity data (AD), emission factors and other relevant parameters. In addition, the software facilitates the \nreporting of other category specific information, for example, the choice of the method for activity data and emission \nfactors. \n\n1 Good Practice Guidance and Uncertainty Management in National Greenhouse Gas Inventories, 2000, and Good Practice Guidance for Land \nUse, Land‐Use Change and Forestry, 2003. \n2 http://unfccc.int/files/national_reports/non‐ \nannex_i_natcom/training_material/methodological_documents/application/zip/unfccc_nai_is_132.zip", - "page_start": 3, - "page_end": 3, - "source_file": "maiis-user-manual.pdf" - } - ] - }, - { - "references": { - "source_file": "creative_common_ai.pdf", - "query": "What is the problem regarding the use of the Book3 dataset ?", - "target_page": 2, - "target_passage": "The Books3 dataset contains text from over 170,000 books,2 which are a mix of in-copyright and out-of-copyright works. It is believed to have been originally sourced from a website that was not authorized to distribute all of the works", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "***1. Introduction***1 \n\nWhile the field of artificial intelligence research and technology has a long history, broad \npublic attention grew over the last year in light of the wide availability of new generative AI \nsystems, including large language models (LLMs) like GPT-4, Claude, and LLaMA-2. These \ntools are developed using machine learning and other techniques that analyze large datasets \nof written text, and they are capable of generating text in response to a user’s prompts. \n\nWhile many large language models rely on website text for training, books have also played \nan important role in developing and improving AI systems. Despite the widespread use of e- \nbooks and growth of sales in that market, books remain difficult for researchers and \nentrepreneurs to access at scale in digital form for the purposes of training AI. \n\nIn 2023, multiple news publications reported on the availability and use of a dataset of books \n The Books3 dataset contains text from over 170,000 books, \ncalled “Books3” to train LLMs. \nwhich are a mix of in-copyright and out-of-copyright works. It is believed to have been \noriginally sourced from a website that was not authorized to distribute all of the works \ncontained in the dataset. In lawsuits brought against OpenAI, Microsoft, Meta, and \nBloomberg related to their LLMs, the use of Books3 as training data was specifically cited. 3 \n\n2 \n\nThe Books3 controversy highlights a critical question at the heart of generative AI: what role \ndo books play in training AI models, and how might digitized books be made widely \naccessible for the purposes of training AI? What dataset of books could be constructed and \nunder what circumstances? \n\nIn February 2024, Creative Commons, Open Future and Proteus Strategies convened a series \nof workshops to investigate the concept of a responsibly designed, broadly accessible \ndataset of digitized books to be used in training AI models. Conducted under the Chatham \nHouse Rule, we set out to ask if there is a possible future in which a “books data commons \nfor AI training” might exist, and what such a commons might look like. The workshops \nbrought together practitioners on the front lines of building next-generation AI models, as \nwell as legal and policy scholars with expertise in the copyright and licensing challenges \nsurrounding digitized books. Our goal was also to bridge the perspective of stewards of \n\n Authored by Alek Tarkowski and Paul Keller (Open Future), Derek Slater and Betsy Masiello (Proteus \n1 \nStrategies) in collaboration with Creative Commons. We are grateful to participants in the workshops, \nincluding Luis Villa, Tidelift and openml.fyi; Jonathan Band; Peter Brantley, UC Davis; Aaron Gokaslan, \nCornell; Lila Bailey, Internet Archive; Jennifer Vinopal, HathiTrust Digital Library; Jennie Rose Halperin, \nLibrary Futures/NYU Engelberg Center, Nicholas P. Garcia, Public Knowledge; Sayeed Choudhury; Erik \nStallman, UC Berkeley School of Law. The paper represents the views of the authors, however, and \nshould not be attributed to the workshop as a whole. All mistakes or errors are the authors’. \n\n See e.g. Knibbs, Kate. “The Battle over Books3 Could Change AI Forever.”*Wired*, 4 Sept. 2023, \n2 \nwww.wired.com/story/battle-over-books3/. \n\n For key documents in these cases, see the helpful compendium at “Master List of Lawsuits v. AI, \n3 \nChatGPT, OpenAI, Microsoft, Meta, Midjourney & Other AI Cos.”*Chat GPT Is Eating the World*, 27 Dec. \n2023, chatgptiseatingtheworld.com/2023/12/27/master-list-of-lawsuits-v-ai-chatgpt-openai-microsoft- \nmeta-midjourney-other-ai-cos. See also “Fair Use Week 2024: Day Two with Guest Expert Brandon \nButler.”*Fair Use Week*, sites.harvard.edu/fair-use-week/2024/02/26/fair-use-week-2024-day-two-with- \nguest-expert-brandon-butler/. Accessed 20 Mar. 2024 (arguing that use of this dataset is not \nconsequential for the fair use analysis).", - "page_start": 1, - "page_end": 1, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "***5. Examining approaches to building a books data***\n***commons***\n\nThere are many possible permutations for building a books data commons. To structure our \nexploration, we focused on two particular tracks, discussed below. We chose these tracks \nmindful of the above legal issues, and because there are already existence proofs that help \nto illuminate tradeoffs, challenges and potential paths forward for each. \n\n*5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2**\n27 \n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large, \ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own \ntraining of LLMs, but also to lower the barriers for others. 28 \n\nAlong with data drawn from the web at large, The Pile included books from three datasets. \nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second \nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books \nby otherwise unpublished authors; and a 28,752 books in the public domain and published \nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project \nGutenberg. \n\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright \nnotices to have the dataset taken down from various websites. \n\nDespite the takedown requests, the importance of books to EleutherAI and the broader \ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced \n 29 \nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. \nAmong other things, v2 would “have many more books than the original Pile had, for \nexample, and more diverse representation of non-academic non-fiction domains.” At the \nsame time, it would only seek to include public domain books and permissively licensed \ncontent. As before, this corpus focuses on English language books. \n\n This is an illustrative example, and there are also other projects of this ilk. For instance, see the \n\n27 \nCommon Corpus project, which includes an array of public domain books from a number of countries, \nat https://huggingface.co./blog/Pclanglais/common-corpus; see also https://huggingface.co./datasets/ \nstorytracer/internet_archive_books_en (“This dataset contains more than 650,000 English public domain \nbooks (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the \nOpen Library project.”) \n\n See Gao et al, supra note 8. \n28 \n\n Goldman, Sharon. “One of the World’s Largest AI Training Datasets Is About to Get Bigger and \n29 \n“Substantially Better.”*VentureBeat*, 11 Jan. 2024, venturebeat.com/ai/one-of-the-worlds-largest-ai- \ntraining-datasets-is-about-to-get-bigger-and-substantially-better/. Accessed 20 Mar. 2024.", - "page_start": 12, - "page_end": 12, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "*What dataset management practices are necessary?*\n\nNo matter how a books data commons gets built, it will be important to consider broader \naspects of data governance. For example: \n\n•**Dataset documentation and transparency:**Transparent documentation is important \nfor any dataset used for AI training. A datasheet is a standardized form of \ndocumentation that includes information about provenance and composition of data, \nand includes information on management practices, recommended uses or collection \nprocess. \n\n•**Quality assurance:**Above, we note the many features that make books useful for AI \ntraining, as compared with web data, for example. That said, the institution managing \na books commons dataset may still want to collect and curate the collection to meet \nthe particular purposes of its users. For instance, it may want to take steps to \nmitigate biases inherent in the dataset, by ensuring books are representative of a \nvariety of languages and geographies. \n\n•**Understanding uses:**The institution managing a books commons dataset could \nmeasure and study how the dataset is used, to inform future improvements. Such \nmonitoring may also enable accountability measures with respect to uses of the \ndataset. Introducing community norms for disclosing datasets used in AI training and \nother forms of AI research would facilitate such monitoring. \n\n•**Governance mechanisms:**In determining matters like acceptable and ethical use, the \nfundamental question is “who decides.” While this might be settled simply by whoever \nsets up and operates the dataset and related \ninfrastructure, participatory \nmechanisms — such as advisory bodies bringing together a broad range of users and \nstakeholders of a collection — could also be incorporated. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 19, - "page_end": 19, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "***7. Conclusion***\n\nThis paper is a snapshot of an idea that is as underexplored as it is rooted in decades of \nexisting work. The concept of mass digitization of books, including to support text and data \nmining, of which AI is a subset, is not new. But AI training is newly of the zeitgeist, and its \ntransformative use makes questions about how we digitize, preserve, and make accessible \nknowledge and cultural heritage salient in a distinct way. \n\nAs such, efforts to build a books data commons need not start from scratch; there is much \nto glean from studying and engaging existing and previous efforts. Those learnings might \ninform substantive decisions about how to build a books data commons for AI training. For \ninstance, looking at the design decisions of HathiTrust may inform how the technical \ninfrastructure and data management practices for AI training might be designed, as well as \nhow to address challenges to building a comprehensive, diverse, and useful corpus. In \naddition, learnings might inform the process by which we get to a books data commons — \nfor example, illustrating ways to attend to the interests of those likely to be impacted by the \ndataset’s development. 41 \n\nWhile this paper does not prescribe a particular path forward, we do think finding a path (or \npaths) to extend access to books for AI training is critical. In the status quo, large swaths of \nknowledge contained in books are effectively locked up and inaccessible to most everyone. \nGoogle is an exception — it can reap the benefits of their 40 million books dataset for \nresearch, development, and deployment of AI models. Large, well-resourced entities could \ntheoretically try to replicate Google’s digitization efforts, although it would be incredibly \nexpensive, impractical, and largely duplicative for each entity to individually pursue their own \nefforts. Even then, it isn’t clear how everyone else — independent researchers, entrepreneurs, \nand smaller entities — will have access. The controversy around the Books3 dataset \ndiscussed at the outset should not, then, be an argument in favor of preserving the status \nquo. Instead, it should highlight the urgency of building a books data commons to support an \nAI ecosystem that provides broad benefits beyond the privileged few. \n\n For other existing and past examples, one might look to the work of Europeana, https:// \n\n41 \nwww.europeana.eu/en, as well as the mountain of commentary on the failed class action settlement \nbetween Google, the Authors Guild, and the Association of American Publishers — see e.g. the excellent \ncollection of court filings created by James Grimmelmann and colleagues (now archived at the Internet \nArchive) — https://web.archive.org/web/20140425012526/http://thepublicindex.org/. The Settlement \nexpressly would have set up a “Research Corpus” for non-consumptive research. HathiTrust created a \nResearch Center, with the intention of becoming one of the hosts for the “Research Corpus.” The \nSettlement was criticized and was ultimately rejected by the district court for both substantive reasons \n(that is, what the settlement would specifically do) and procedural (in the sense of violating class-action \nlaw, but also in a broader sense of representing a “backroom deal” without sufficient participation from \nimpacted interests). The Research Corpus was not a core locus of critique, though it did receive concern \nin terms of providing too much control to Google, for example. Our purpose in mentioning this is not to \nrelitigate the issue, but rather to call out that design decisions of this sort have been considered in the \npast.", - "page_start": 20, - "page_end": 20, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or \ndataset built on their basis, we want to understand the implications of relying on public \ndomain works and expressly licensed works in building a books commons. \n\nThe benefits are relatively straightforward. Both categories, by definition come with express \npermission to use the books in AI training. The cost of acquiring the books for this use may \nbe effectively zero or close to it, when considering public domain and “openly” licensed \nbooks that allow redistribution and that have already been digitized. \n\nBut this approach comes with some clear limitations. First, as noted above, for many books \nin the public domain, their status as such is not always clear. And with respect to \npermissively licensed books, it is not always clear whether and how to comply with the \nlicense obligations in this context. \n\nSetting aside those challenges, the simple fact is that relying on public domain and existing \npermissively licensed books would limit the quantity and diversity of data available for \ntraining, impacting performance along different dimensions. Only a small fraction of books \never published fall into this category, and the corpus of books in this category is likely to be \nskewed heavily towards older public domain books. This skew would, in turn, impact the \n For instance, relying on books from before 1929 would not \ncontent available for AI training. \nonly incorporate outdated language patterns, but also a range of biases and misconceptions \nabout race and gender, among other things. Efforts could be made to get people to \npermissively license more material — a book drive for permissive licensing, so to speak; this \napproach would still not encompass most books, at least when it comes to past works. \n\n30 \n\n 31 \n\n*5b. Limitations & Exceptions*\n\n**Existing Project Example: HathiTrust Research Center (HTRC)**\n\nThe HathiTrust Research Center provides researchers with the ability to perform \ncomputational analysis across millions of books. While it is not suited specifically for AI \ntraining, it is an existence proof for what such a resource might look like. \n\n For instance, AI researchers note that the recently released Common Corpus dataset is an “invaluable \n30 \nresource” but “comes with limitations. A lot of public domain data is antiquated—in the US, for example, \ncopyright protection usually lasts over seventy years from the death of the author—so this type of \ndataset won’t be able to ground an AI model in current affairs or, say, how to spin up a blog post using \ncurrent slang” and the “dataset is tiny.” Thus, while it is possible to train an AI model on the data, those \nmodels will have more limited utility on some dimensions than current frontier models trained on a \nbroader array of data. See Knibbs, Kate,*Here’s Proof You Can Train an AI Model Without Slurping*\n*Copyrighted Content | WIRED*. (2024, March 20), at https://www.wired.com/story/proof-you-can-train-ai- \nwithout-slurping-copyrighted-content/. \n\n Our workshop discussion did note that some widely available datasets for AI training have also \n31 \npursued more direct licensing agreements. For instance, the SILO LLM was created by working with \nscientific journal publishers to make works available for both download and AI training. While this might \nbe viable in the context of particular, narrow classes of works, the barriers to efficient licensing \nmentioned above would remain a problem for any broader efforts. See Min, Sewon, et al. “SILO \nLanguage Models: Isolating Legal Risk in a Nonparametric Datastore.”*ArXiv (Cornell University)*, 8 Aug. \n2023, https://doi.org/10.48550/arxiv.2308.04430. Accessed 14 Dec. 2023.", - "page_start": 13, - "page_end": 13, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "•**Breadth, Diversity, and Mitigating Bias:**Books can serve a critical role in ensuring AI \nmodels are inclusive of a broad range of topics and categories that may be under- \nrepresented in other content. For all that the Internet has generated an explosion in \nhuman creativity and information sharing, it generally represents only a few decades \nof information and a small portion of the world’s creative population. A books \ndataset, by comparison, is capable of representing centuries of human knowledge. As \na result such a dataset can help ensure AI systems behavior is based on centuries of \nhistorical information from modern books. It can help ensure broad geographic and \nlinguistic diversity. What’s more, the greater breadth and diversity of high-quality \ncontent help mitigate challenges around bias and misinformation. Using a more \ndiverse pool of training data can help support the production of a model and outputs \nof the model that are more representative of that diversity. Books can be useful in \nevaluation datasets to test existing models for memorization capabilities, which can \nhelp prevent unintended reproduction of existing works. Of course, this is all \ncontingent on actual composition of the corpus; in order to have the benefits \ndescribed, the books would need to be curated and included with characteristics like \ntime, geographic and linguistic diversity. \n\n•**Other Modalities:**Finally, books do not just contain text, they often contain images \nand captions of those images. As such, they can be an important training source for \nmulti-modal LLMs, which can receive and generate data in media other than text. \n\n**Lowering Barriers to Entry & Facilitating Competition**\n\nBroad access to books for AI training is critical to ensure powerful AI models are not \nconcentrated in the hands of only a few companies. Access to training data, in general, has \nbeen cited as a potential competitive concern \n11 \n in the AI field because of the performance \nbenefits to be gained by training on larger and larger datasets. But this competitive wedge is \neven more acute when we look specifically at access to book datasets. \n\nThe largest technology companies building commercial AI models have the resources and \ncapacity to mass digitize books for AI training. Google has scanned 40 million books, many \nof which came from digitization partnerships they formed with libraries. They may already \nuse some or all of these books to train their AI systems. \n It’s unclear to what extent other \ncompanies already have acquired books for AI training (for instance, whether Amazon’s \nlicenses with publishers or self-published authors may permit such uses); \nexisting \n\n12 \n\n See e.g. Trendacosta, Katherine and Doctorow, Cory. “AI Art Generators and the Online Image Market.” \n\n11 \n*Electronic Frontier Foundation*, 3 Apr. 2023, www.eff.org/deeplinks/2023/04/ai-art-generators-and- \nonline-image-market; Narechania, Tejas N., and Sitaraman, Ganesh. “An Antimonopoly Approach to \nGoverning Artificial Intelligence.”*SSRN Electronic Journal*, 2023, cdn.vanderbilt.edu/vu-URL/wp-content/ \nuploads/sites/412/2023/10/09151452/Policy-Brief-2023.10.08-.pdf, https://doi.org/10.2139/ \nssrn.4597080. Accessed 25 Feb. 2024. \n\n See white paper for Google’s Gemini models https://arxiv.org/pdf/2312.11805.pdf — “Gemini models \n12 \nare trained on a dataset that is both multimodal and multilingual. Our pretraining dataset uses data from \nweb documents, books, and code, and includes image, audio, and video data.”", - "page_start": 6, - "page_end": 6, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "engagement. And, at least in the U.S., it could generate billions of dollars in damages if the \nspecific design choices and technical constraints are not adequate to justify a finding of fair \nuse. \n\nThis sort of books dataset could be built by expanding use of in-copyright books that have \nalready been digitized from existing libraries and other sources. Specifically, workshop \nparticipants mentioned that the Internet Archive, HathiTrust, and Google as entities that have \ndigitized books and could repurpose their use to build a books commons, although \nchallenges with using these datasets were noted. The Internet Archive is in the midst of \nlitigation brought by book publishers for its program for lending digital books; while not \ndirectly relevant to the issue of AI training using their corpus of books, this sort of litigation \ncreates a chilling effect on organizations seeking to make new uses of these digitized books. \nMeanwhile, Google encumbered HathiTrust’s digital copies with certain contractual \nrestrictions, which would need to be addressed to develop a books dataset for AI training, \nand Google itself is unlikely to share its own copies while it provides them a competitive \nadvantage. \n\nPerhaps as a matter of public policy, these existing copies could be made more freely \navailable. For instance, to ensure robust competition around AI and advance other public \ninterests, policymakers could remove legal obstacles to the sharing of digitized book files for \nuse in AI training. Alternatively, policymakers could go further and affirmatively compel \nsharing access to these digital book files for AI training. \n\nIt's possible that there could be a new mass digitization initiative, turning physical books into \nnew digital scans. At least in theory, one could try to replicate the existing corpora of \nHathiTrust, for example, without Google’s contractual limitations. At the same time, such an \neffort would take many years, and it seems unlikely that many libraries would want to go to \nthe trouble to have their collections digitized a second time. Moreover, while new scans may \nprovide some incremental benefit over use of existing ones (e.g., by using the most modern \ndigitization and OCR tools and thus improving accuracy), there is no inherent social value to \nmaking every entity that wants to do or allow AI training invest in their own redundant \nscanning. \n\nA new digitization effort could target works that have not been yet digitized. This may be \nparticularly useful given that previous book digitization efforts, and the Google Books project \nin particular, have focused heavily (though not exclusively) on libraries in English-speaking \ncountries. Additional digitization efforts might make more sense for books in those \nlanguages that have not yet been digitized at a meaningful scale. Any new digitization effort \nmight therefore start with a mapping of the extent to which a books corpus in a given \nlanguage has been digitized. \n\n\n \n \n \n \n [html]\n
TableTableTable
TableTowards a Books Data Commons for AI Training16
", - "page_start": 16, - "page_end": 16, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "German is the next-largest language represented at 9%, and is followed by a long-tail of \nlanguages by representation. \n\nIn order to enable these uses, HathiTrust has invested in technical solutions to prevent \npossible misuse. To some extent, they manage this by limiting who gets access to the \nCenter, and limiting access to specific features to researchers at member institutions. \nHathiTrust has also put in place various security controls on both the physical storage of the \ndigitized books and the network access to those files. The primary uses of the data through \nthe Research Center includes access to an extracted features set and access to the \ncomplete corpus “data capsule,” which is a virtual machine running on the Center’s servers. \nThe data capsule allows users to conduct non-consumptive research with the data, but it \nlimits the types of outputs allowed in order to prevent users from obtaining full content of in- \ncopyright works. The measures taken include physical security controls on the data centers \nhousing the information, as well as restrictions via network access and encryption of backup \ntapes. In the finding that HathiTrust use was a fair use and thus rejecting a lawsuit brought \nby the Authors Guild, the Court noted the importance of these controls. 35 \n\nToday, the Center’s tools are not suitable for AI training, in that they don’t allow the specific \ntypes of technical manipulation of underlying text necessary to train an AI. Nevertheless, the \nCenter demonstrates that building a books data commons for computational analysis is \npossible, and in turn points to the possibility of creating such a resource for AI training. 36 \n\n**Implications of Overall Approach**\n\nBy relying on existing limitations and exceptions in copyright law, the number of books one \ncould include in the corpus of a books data commons is far greater and more diverse. Of \ncourse, a bigger dataset doesn’t necessarily mean a higher quality dataset for all uses of AI \nmodels; as HathiTrust shows, even a multimillion book corpus can skew in various \ndirections. Still, dataset size generally remains significant to an LLM’s performance – the \nmore text one can train on, or rather the more tokens for training the model, the better, at \n 37 \nleast along a number of performance metrics. \n\nWhile holding the potential for a broader and more diverse dataset, a key limitation in \npursuing this approach is that it is only feasible where relevant copyright limitations and \nexceptions exist. Even then, legal uncertainty means that going down this path is likely to \nlitigation and regulatory \ngenerate, at a minimum, expensive and time-consuming \n\n This is explained explicitly in the appeals court’s decision:*Authors Guild v. HathiTrust,*755 F.3d 87 (2d \n35 \nCir. 2014). \n\n HathiTrust has also made available some data derived from books, such as the Extracted Features \n\n36 \nset: “HTRC releases research datasets to facilitate text analysis using the HathiTrust Digital Library. \nWhile copyright-protected texts are not available for download from HathiTrust, fruitful research can still \nbe performed on the basis of non-consumptive analysis of transformative datasets, such as in HTRC's \nflagship Extracted Features Dataset, which includes features extracted from full-text volumes. These \nfeatures include volume-level metadata, page-level metadata, part-of-speech-tagged tokens, and token \ncounts:” https://analytics.hathitrust.org/datasets#top. \n\n See Testimony of Chris Callison-Burch, July 2023, https://docs.house.gov/meetings/JU/ \n\n37 \nJU03/20230517/115951/HHRG-118-JU03-Wstate-Callison-BurchC-20230517.pdf (“As the amount of \ntraining data increases, AI systems’ capabilities for language understanding and their other skills \nimprove.”); Brown, Tom, et al.*Language Models Are Few-Shot Learners*. 22 July 2020, at https://arxiv.org/ \npdf/2005.14165.pdf (“we find that performance scales very smoothly with model size”).", - "page_start": 15, - "page_end": 15, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs \nto be both responsibly managed, and useful for developers of AI models. \n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible, \nand thus obviates the need for each individual actor to acquire, digitize, and format their own \ncorpus of books for AI training. This resource could be collectively and intentionally \nmanaged, though we do not mean to select a particular form of governance in this paper. 4 \n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a \nbooks data commons as defined above and key questions relevant to developers, \nrepositories, and other stakeholders, building on our workshop discussions. We first explain \nwhy books matter for AI training and how broader access could be beneficial. We then \nsummarize two tracks that might be considered for developing such a resource, highlighting \nexisting projects that help foreground both the potential and challenges. Finally, we present \nseveral key design choices, and next steps that could advance further development of this \napproach. 5 \n\n In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis.", - "page_start": 2, - "page_end": 2, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "INTRODUCTION \n\n∗Joint first authors \n\n\n\nJust as environmental impact scales with model size, so does \nthe difficulty of understanding what is in the training data. In §4, \nwe discuss how large datasets based on texts from the Internet \noverrepresent hegemonic viewpoints and encode biases potentially \ndamaging to marginalized populations. In collecting ever larger \ndatasets we risk incurring documentation debt. We recommend \nmitigating these risks by budgeting for curation and documentation \nat the start of a project and only creating datasets as large as can \nbe sufficiently documented. \n\nAs argued by Bender and Koller [14], it is important to under- \nstand the limitations of LMs and put their success in context. This \nnot only helps reduce hype which can mislead the public and re- \nsearchers themselves regarding the capabilities of these LMs, but \nmight encourage new research directions that do not necessarily \ndepend on having larger LMs. As we discuss in §5, LMs are not \nperforming natural language understanding (NLU), and only have \nsuccess in tasks that can be approached by manipulating linguis- \ntic form [14]. Focusing on state-of-the-art results on leaderboards \nwithout encouraging deeper understanding of the mechanism by \nwhich they are achieved can cause misleading results as shown \n\nThis work is licensed under a Creative Commons Attribution International 4.0 License. \nFAccT ’21, March 3–10, 2021, Virtual Event, Canada \nACM ISBN 978-1-4503-8309-7/21/03. \nhttps://doi.org/10.1145/3442188.3445922", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv5_ccby4license.pdf" - } - ] - }, - { - "references": { - "source_file": "creative_common_ai.pdf", - "query": "In the United States, before which date is book out of copyright for sure ?", - "target_page": 9, - "target_passage": "In the United States, all books published or released before 1929 are in the public domain. While use of these books provides maximal certainty for the AI developer to train on", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 \n\n See e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary \n16 \nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper \nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. \nAccessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, \nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?”*The Atlantic*, 18 Mar. \n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century- \navailable-as-ebooks/284486/. See also “Google Book Search Settlement and Access to Out of Print \nBooks.”*Google Public Policy Blog*, publicpolicy.googleblog.com/2009/06/google-book-search- \nsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class- \naction settlement between Google, the Authors Guild, and the Association of American Publishers). \nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying \nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at https:// \nweb.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ \ngoogle_final_approval_support.pdf. The Authors Guild and Association of American Publishers also \njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding \ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly \n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether \nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out- \nof-print works anyway — see this brief at https://web.archive.org/web/20130112060213/http:// \nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_of_law.pdf. \n\n In the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce \n\n17 \nworks and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These \nprovisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-of- \ncommerce works or other subject matter permanently in their collections\". The limitation to non- \ncommercial purposes means that works made available under these provisions would be of limited use \nin building a books data commons.", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "***4. Copyright, Licensing, & Access to Books for***\n***Training***\n\nEven if books can be acquired, digitized, and made technically useful for AI training, the \ndevelopment of a books data commons would necessarily need to navigate and comply with \ncopyright law. \n\n**Out-of-Copyright Books:**A minority of books are old enough to be in the public domain and \nout of copyright, and an AI developer could use them in training without securing any \ncopyright permission. In the United States, all books published or released before 1929 are in \nthe public domain. While use of these books provides maximal certainty for the AI developer \nto train on, it is worth noting that the status of whether a book is in the public domain can be \ndifficult to determine. \n For instance, books released between 1929 and 1963 in the U.S. are \nout of copyright if they were not subject to a copyright renewal; however, data on copyright \nrenewals is not easily accessible. \n\n14 \n\nWhat’s more, copyright definitions and term lengths vary among countries. Even if a work is \nin the public domain in the US, it may not be in other countries. \n Countries generally use the \nlife of the last living author + “x” years to determine the term of copyright protection. For \nmost countries, “x” is either 50 years (the minimum required by the Berne Convention) or 70 \nyears (this is the case for all member states of the European Union and for all works \npublished in the U.S. after 1978). This approach makes it difficult to determine copyright \nterms with certainty because it requires information about the date of death of each author, \nwhich is often not readily available. \n\n15 \n\n**In-Copyright Books:**The vast majority of books are in copyright, and, insofar as the training \nprocess requires making a copy of the book, the use in AI training may implicate copyright \nlaw. Our workshop covered three possible paths for incorporating such works. \n\n**Direct licensing**\n\nOne could directly license books from rightsholders. There may be some publishers who are \nwilling to license their works for this purpose, but it is hard to determine the scale of such \naccess, and, in any event, there are significant limits on this approach. Along with the \nchallenge (and expense) of reaching agreements with relevant rightsholders, there is also the \npractical difficulty of simply identifying and finding the rightsholder that one must negotiate \n\n For a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler.*Finding the Public Domain:*\n\n14 \n*Copyright Review Management System Toolkit*. 2016, quod.lib.umich.edu/c/crmstoolkit/ \n14616082.0001.001. Accessed 20 Mar. 2024.; Kopel, Matthew. “LibGuides: Copyright at Cornell Libraries: \nCopyright Term and the Public Domain.” guides.library.cornell.edu/copyright/publicdomain; \nMannapperuma, Menesha, et al.*Is It in the Public Domain? A HANDBOOK for EVALUATING the*\n*COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES*. 1923. \n\n See e.g. Moody, Glyn. “Project Gutenberg Blocks Access in Germany to All Its Public Domain Books \n\n15 \nbecause of Local Copyright Claim on 18 of Them.”*Techdirt*, 7 Mar. 2018, www.techdirt.com/ \n2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-local- \ncopyright-claim-18-them/. Accessed 20 Mar. 2024.", - "page_start": 8, - "page_end": 8, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "It is also important to note two other issues that can affect the application of limitations and \nexceptions, in particular, their application to e-books. \n\nThe first important limitation is that almost every digital book published today comes with a \nset of contractual terms that restrict what users can do with it. In many cases, those terms \nwill explicitly restrict text data mining or AI uses of the content, meaning that even where \ncopyright law allows for reuse (for example, under fair use), publishers by contract can \nimpose restrictions anyway. In the United States, those contract terms are generally thought \nto override the applicability of fair use or other limitations and exceptions. \n Other \njurisdictions, such as those in the EU, provide that certain limitations and exceptions cannot \nbe contractually overridden, though experience to date varies with how those anti-contractual \noverride protections work in practice. \n\n23 \n\n 24 \n\nThe second limitation is the widespread adoption of “anti-circumvention” rules in copyright \nlaws and the interplay of these with a choice to rely on copyright limitations and exceptions. \nDigital books sold by major publishers are generally encumbered with “digital rights \nmanagement” (DRM) that limits how someone can use the digital file. For instance, DRM can \nlimit the ability to make a copy of the book, or even screenshot or excerpt from it, among \nother things. Anti-circumvention laws restrict someone's ability to evade these technical \nrestrictions, even if it is for an ultimately lawful use. \n\nWhat this means for our purposes is that even if one acquires a digital book from, for \nexample, Amazon, and it is lawful under copyright law to use that book in AI training, it can \nstill generally be unlawful to circumvent the DRM to do so, outside narrow exceptions. \n 25 \nThus, the ability to use in-copyright books encumbered by DRM — that is, most all books sold \nby major publishers — is generally limited. 26 \n\nPractically, using in-copyright books to build a books commons for AI training — while relying \non copyright’s limitations and exceptions — requires turning a physical book into digital form, \nor otherwise engaging in the laborious process of manually re-creating a book’s text (i.e., re- \ntyping the full text of the book) without circumventing the technical restrictions themselves. \n\n See Hansen, Dave. “Fair Use Week 2023: How to Evade Fair Use in Two Easy Steps.”*Authors Alliance*, \n23 \n23 Feb. 2023, www.authorsalliance.org/2023/02/23/fair-use-week-2023-how-to-evade-fair-use-in-two- \neasy-steps/. Accessed 20 Mar. 2024. \n\n See Band, Jonathan. “Protecting User Rights against Contract Override.”*Joint PIJIP/TLS Research*\n24 \n*Paper Series*, 1 May 2023, digitalcommons.wcl.american.edu/research/97/. Accessed 20 Mar. 2024. \n\n In the U.S. the Copyright Office has recognized the importance of allowing particular exceptions for \n\n25 \nresearchers engaged in text and data mining. See their rulemaking in 2021 https:// \nwww.federalregister.gov/documents/2021/10/28/2021-23311/exemption-to-prohibition-on- \ncircumvention-of-copyright-protection-systems-for-access-control. These rules are reviewed triennially \nand are currently under review, with submissions suggesting both contraction and expansion; see the \nAuthors’ Alliance comments in January 2024 https://www.authorsalliance.org/2024/01/29/authors- \nalliance-submits-long-form-comment-to-copyright-office-in-support-of-petition-to-expand-existing-text- \nand-data-mining-exemption/. It is possible that one could argue for these exceptions to be expanded, \nand then work to renew that exception every three years. The EU’s text and data mining exception may \nalso limit use of DRM to impede data mining, but only for particular covered research and heritage \ninstitutions; commercial and other users are not covered, however.", - "page_start": 11, - "page_end": 11, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "**Reliance on Copyright Limitations and Exceptions**\n\nEven if a book is in copyright, it’s possible that copying books for AI training may be covered \nby existing limitations and exceptions to copyright law in particular jurisdictions. For \nexample: \n\n• In the United States, many argue using existing works to train generative AI is “fair \nuse,” consistent with existing law and legal precedents. \n This is the subject of a \nnumber of currently active court cases, and different actors and tools may yield \ndifferent results, as fair use is applied case-by-case using a flexible balancing test. \n\n19 \n\n• In the European Union, there are explicit exceptions in the law for “text and data \nmining” uses of in-copyright works, both for non-commercial research and for \ncommercial purposes. However, for commercial uses and for users outside of \nresearch and heritage institutions, they must respect the rights of rightsholders who \nchoose to “reserve their rights” (i.e., opt-out of allowing text and data mining) via \n The exception also requires that users have “lawful \nmachine readable mechanisms. \naccess” to the works. \n\n20 \n\n• Finally, Japan provides a specific text and data mining exception, without any \ncomparable opt-out requirement for commercial uses as is embedded in EU law. 21 \n\nWhile exceptions that allow AI training exist in several other countries, such as Singapore and \nIsrael, most countries do not provide exceptions that appear to permit AI training. Even where \npotentially available, as in the United States, legal uncertainty and risk create a hurdle for \nanyone building a books commons. 22 \n\n See e.g. Comments from Sprigman, Samuelson, Sag to Copyright Office, October 2023, at https:// \n19 \nwww.regulations.gov/comment/COLC-2023-0006-10299 as well as many other submissions to the US \ncopyright office; see also Advocacy, Katherine Klosek, Director of Information Policy and Federal \nRelations, Association of Research Libraries (ARL), and Marjory S. Blumenthal, Senior Policy Fellow, \nAmerican Library Association (ALA) Office of Public Policy and. “Training Generative AI Models on \nCopyrighted Works Is Fair Use.”*Association of Research Libraries*, 23 Jan. 2024, www.arl.org/blog/ \ntraining-generative-ai-models-on-copyrighted-works-is-fair-use/. \n\n See Articles 3 and 4 of the EU’s Directive on Copyright and Related Rights in the Digital Single Market \n20 \n— https://eur-lex.europa.eu/eli/dir/2019/790/oj. \n\n Japan clarified its laws in 2018 to make clear that this type of use is permitted — see discussion in \n\n21 \nTestimony of Matthew Sag, July 2023, https://www.judiciary.senate.gov/imo/media/doc/ \n2023-07-12_pm_-_testimony_-_sag.pdf, see also Fiil-Flynn, S.*et al.*(2022)*Legal reform to enhance global*\n*text and Data Mining Research*,*Science*. Available at: https://www.science.org/doi/10.1126/ \nscience.add6124 (Accessed: 28 Sept. 2023). \n\n See supra note 22*.*See also Jonathan Band,*Copyright Implications of the Relationship between*\n\n22 \n*Generative Artificial Intelligence and Text and Data Mining | Infojustice*. infojustice.org/archives/45509. In \naddition, for an in-depth look at the cross-border legal challenges involved see:*Wrapping up Our NEH-*\n*Funded Project to Help Text and Data Mining Researchers Navigate Cross-Border Legal and Ethical*\n*Issues*. 2 Oct. 2023, buildinglltdm.org/2023/10/02/wrapping-up-our-neh-funded-project-to-help-text-and- \ndata-mining-researchers-navigate-cross-border-legal-and-ethical-issues/. Accessed 20 Mar. 2024.", - "page_start": 10, - "page_end": 10, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "***6. Cross-cutting design questions***\n\nThe workshops briefly touched on several cross-cutting design questions. While most \nrelevant for approaches that depend on limitations and exceptions, considerations of these \nquestions may be relevant across both tracks. \n\n*Would authors, publishers, and other relevant rightsholders*\n*and creators have any ability to exclude their works?*\n\nOne of the greatest sources of controversy in this area is the extent to which rightsholders of \ncopyrighted works, as well as the original creators of such works (e.g., book authors in this \ncontext), should be able to prevent use of their works for AI training. \n\nWhile a system that required affirmative “opt-in” consent would limit utility significantly (as \ndiscussed above in the context of directly licensing works), a system that allowed some \nforms of “opt-out” could still be quite useful to some types of AI development. In the context \nof use cases like development of LLMs, the performance impact may not be so significant. \nSince most in-copyright books are not actively managed, the majority of books would remain \nin the corpus by default. The performance of LLMs can still be improved across various \ndimensions without including, for example, the most famous writers or those who continue \nto commercially exploit their works and may choose to exercise an opt-out. Perhaps the \npotential for licensing relationships (and revenue) may induce some rightsholders to come \nforward and begin actively managing their works. In such a case, uses that do require a \nlicense may once again become more feasible once the rightsholder can be reached. \n\nWorkshop participants discussed different types of opt-outs that could be built. For example, \nopt-outs could be thought of not in blanket terms, but only as applied to certain uses, for \nexample to commercial uses of the corpus, but not research uses. This could build on or \nmirror the approach that the EU has taken in its text and data mining exceptions to \ncopyright. \n Opt-outs might be more granular, by focusing on allowing or forbidding particular \nuses or other categories of users, given that rights holders have many different sets of \npreferences. \n\n38 \n\nAnother question is about*who*can opt-out particular works from the dataset. This could \nsolely be an option for copyright holders, although authors might be allowed to exercise an \nopt-out for their books even if they don’t hold the copyrights. This might create challenges if \nthe author and rightsholder disagree about whether to opt a particular book out of the \ncorpus. Another related issue is that individual books, such as anthologies, may comprise \nworks created (and rights held) by many different entities. The images in a book may have \ncome from third-party sources, for instance, or a compendium of poetry might involve many \n\n In fact, as noted above, to the extent an AI model developer intends for their model to abide by the \n38 \nEU’s legal regime, they will have to abide by such opt-outs, at least if they are engaged in text and data \nmining for commercial uses and/or are users outside of the covered set of research and heritage \ninstitutions. A books data commons may incorporate opt-outs in particular to serve such EU-focused AI \ndevelopers.", - "page_start": 17, - "page_end": 17, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "It is also an example predicated on copyright’s limitations and exceptions — in this case, on \nU.S. fair use. While the Authors Guild filed a copyright infringement suit against HathiTrust, \nfederal courts in 2012 and 2014 ruled that HathiTrust’s use of books was fair use. 32 \n\nA nonprofit founded in 2008, HathiTrust grew out of a partnership among major US university \nlibraries and today is “an international community of research libraries committed to the \nlong-term curation and availability of the cultural record.” \n It started in what it calls the “early \ndays of mass digitization” — that is, at a time when it started to become economical to take \nexisting physical artifacts in libraries and turn them into digital files at a large scale. \n\n33 \n\nThe founding members of HathiTrust were among the initial partners for Google’s Book \nSearch product, which allows people to search across and view small snippets of text from \nin-copyright books and read full copies of public domain books scanned from libraries’ \ncollections. The libraries provided Google with books from their collections, Google would \nthen scan the books for use in Book Search, and return to the libraries a digital copy for their \nown uses. These uses included setting up HathiTrust not only to ensure long-term \npreservation of the digital books and their metadata, but also to facilitate other uses, \nincluding full text search of books and accessibility for people with print disabilities. In \nseparate court cases, both Google and HathiTrust’s uses of the books were deemed \nconsistent with copyright law. \n\n34 \n\nThe uses most relevant to this paper are those enabled by what HathiTrust refers to today as \nthe Research Center. The Center grew in part out of a research discipline called “digital \nhumanities,” which, among other things, seeks to use computational resources or other \ndigital technologies to analyze information and contribute to the study of literature, media, \nhistory, and other areas. For instance, imagine you want to understand how a given term \n(e.g., “war on drugs”) became used; one might seek to analyze when the term was first used \nand how often it was used over time by analyzing a vast quantity of sources, searching out \nthe term’s use. The insight here is that there is much to be learned not just from reading or \notherwise consuming specific material, but also from “non-consumptive research,” or \n\"research in which computational analysis is performed on one or more volumes (textual or \nimage objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use. \n\nToday, the Center “[s]upports large-scale computational analysis of the works in the \nHathiTrust Digital Library to facilitate non-profit and educational research.” It includes over 18 \nmillion books in over 400 languages from the HathiTrust Digital Library collection. Roughly \n58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has \nlimitations in terms of its representation across subject matter, language, geography, and \nother dimensions. In terms of subject matter, the corpus is skewed towards humanities \n(64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English, \n\n*Authors Guild v. HathiTrust,*902 F.Supp.2d 445 (SDNY October 10, 2012) and*Authors Guild v.*\n32 \n*HathiTrust*, 755 F.3d 87 (2d Cir. 2014). \n\n\n \n \n \n \n [html]\n
Table
Patients without
Age, years
Table
\n\nTowards a Books Data Commons for AI Training 14", - "page_start": 14, - "page_end": 14, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "***1. Introduction***1 \n\nWhile the field of artificial intelligence research and technology has a long history, broad \npublic attention grew over the last year in light of the wide availability of new generative AI \nsystems, including large language models (LLMs) like GPT-4, Claude, and LLaMA-2. These \ntools are developed using machine learning and other techniques that analyze large datasets \nof written text, and they are capable of generating text in response to a user’s prompts. \n\nWhile many large language models rely on website text for training, books have also played \nan important role in developing and improving AI systems. Despite the widespread use of e- \nbooks and growth of sales in that market, books remain difficult for researchers and \nentrepreneurs to access at scale in digital form for the purposes of training AI. \n\nIn 2023, multiple news publications reported on the availability and use of a dataset of books \n The Books3 dataset contains text from over 170,000 books, \ncalled “Books3” to train LLMs. \nwhich are a mix of in-copyright and out-of-copyright works. It is believed to have been \noriginally sourced from a website that was not authorized to distribute all of the works \ncontained in the dataset. In lawsuits brought against OpenAI, Microsoft, Meta, and \nBloomberg related to their LLMs, the use of Books3 as training data was specifically cited. 3 \n\n2 \n\nThe Books3 controversy highlights a critical question at the heart of generative AI: what role \ndo books play in training AI models, and how might digitized books be made widely \naccessible for the purposes of training AI? What dataset of books could be constructed and \nunder what circumstances? \n\nIn February 2024, Creative Commons, Open Future and Proteus Strategies convened a series \nof workshops to investigate the concept of a responsibly designed, broadly accessible \ndataset of digitized books to be used in training AI models. Conducted under the Chatham \nHouse Rule, we set out to ask if there is a possible future in which a “books data commons \nfor AI training” might exist, and what such a commons might look like. The workshops \nbrought together practitioners on the front lines of building next-generation AI models, as \nwell as legal and policy scholars with expertise in the copyright and licensing challenges \nsurrounding digitized books. Our goal was also to bridge the perspective of stewards of \n\n Authored by Alek Tarkowski and Paul Keller (Open Future), Derek Slater and Betsy Masiello (Proteus \n1 \nStrategies) in collaboration with Creative Commons. We are grateful to participants in the workshops, \nincluding Luis Villa, Tidelift and openml.fyi; Jonathan Band; Peter Brantley, UC Davis; Aaron Gokaslan, \nCornell; Lila Bailey, Internet Archive; Jennifer Vinopal, HathiTrust Digital Library; Jennie Rose Halperin, \nLibrary Futures/NYU Engelberg Center, Nicholas P. Garcia, Public Knowledge; Sayeed Choudhury; Erik \nStallman, UC Berkeley School of Law. The paper represents the views of the authors, however, and \nshould not be attributed to the workshop as a whole. All mistakes or errors are the authors’. \n\n See e.g. Knibbs, Kate. “The Battle over Books3 Could Change AI Forever.”*Wired*, 4 Sept. 2023, \n2 \nwww.wired.com/story/battle-over-books3/. \n\n For key documents in these cases, see the helpful compendium at “Master List of Lawsuits v. AI, \n3 \nChatGPT, OpenAI, Microsoft, Meta, Midjourney & Other AI Cos.”*Chat GPT Is Eating the World*, 27 Dec. \n2023, chatgptiseatingtheworld.com/2023/12/27/master-list-of-lawsuits-v-ai-chatgpt-openai-microsoft- \nmeta-midjourney-other-ai-cos. See also “Fair Use Week 2024: Day Two with Guest Expert Brandon \nButler.”*Fair Use Week*, sites.harvard.edu/fair-use-week/2024/02/26/fair-use-week-2024-day-two-with- \nguest-expert-brandon-butler/. Accessed 20 Mar. 2024 (arguing that use of this dataset is not \nconsequential for the fair use analysis).", - "page_start": 1, - "page_end": 1, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "creative_common_ai.pdf", - "query": "What of the main imporvement of the Pile v2 dataset in comparison to its first version ?", - "target_page": 13, - "target_passage": "Among other things, v2 would “have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.” At the same time, it would only seek to include public domain books and permissively licensed content", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "***5. Examining approaches to building a books data***\n***commons***\n\nThere are many possible permutations for building a books data commons. To structure our \nexploration, we focused on two particular tracks, discussed below. We chose these tracks \nmindful of the above legal issues, and because there are already existence proofs that help \nto illuminate tradeoffs, challenges and potential paths forward for each. \n\n*5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2**\n27 \n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large, \ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own \ntraining of LLMs, but also to lower the barriers for others. 28 \n\nAlong with data drawn from the web at large, The Pile included books from three datasets. \nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second \nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books \nby otherwise unpublished authors; and a 28,752 books in the public domain and published \nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project \nGutenberg. \n\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright \nnotices to have the dataset taken down from various websites. \n\nDespite the takedown requests, the importance of books to EleutherAI and the broader \ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced \n 29 \nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. \nAmong other things, v2 would “have many more books than the original Pile had, for \nexample, and more diverse representation of non-academic non-fiction domains.” At the \nsame time, it would only seek to include public domain books and permissively licensed \ncontent. As before, this corpus focuses on English language books. \n\n This is an illustrative example, and there are also other projects of this ilk. For instance, see the \n\n27 \nCommon Corpus project, which includes an array of public domain books from a number of countries, \nat https://huggingface.co./blog/Pclanglais/common-corpus; see also https://huggingface.co./datasets/ \nstorytracer/internet_archive_books_en (“This dataset contains more than 650,000 English public domain \nbooks (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the \nOpen Library project.”) \n\n See Gao et al, supra note 8. \n28 \n\n Goldman, Sharon. “One of the World’s Largest AI Training Datasets Is About to Get Bigger and \n29 \n“Substantially Better.”*VentureBeat*, 11 Jan. 2024, venturebeat.com/ai/one-of-the-worlds-largest-ai- \ntraining-datasets-is-about-to-get-bigger-and-substantially-better/. Accessed 20 Mar. 2024.", - "page_start": 12, - "page_end": 12, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "Figure 4 SSv2 fine-tuning performance vs. Samples Seen. We \nreport SSv2 fine-tuning for V-JEPA and pixel-reconstruction \nbaselines using a ViT-L/16 or Hiera-L architecture. V-JEPA \noutperforms all pixel-reconstruction methods using a ViT- \nL/16 and matches the Hiera-L performance while seeing \nsignificantly less samples during pretraining. \n\nFigure 5 SSv2 frozen-evaluation performance vs. Pretraining \nTime. Wallclock times for all methods are measured on a \nsingle GPU with a batch size of 10 clips, using the official \ncodebases for VideoMAE and VideoMAEv2, and linearly \nextrapolated assuming a global batch size of 2400 samples. \nHowever, note that the SSv2 accuracies of video pixel pre- \ndiction methods are actually obtained with small batch sizes \nand significantly longer training schedules. V-JEPA out- \nperforms pixel-reconstruction methods while training signifi- \ncantly faster. ageNet; hence, V-JEPA achieves comparable ImageNet \nperformance despite only pretraining on video. \n\nUnder the fine-tuning protocol, V-JEPA also achieves the \nbest performance of any model trained with a ViT-L/16, \nand matches the performance of the Hiera-L on SSv2, \nwhich benefits from a hierachical prior (Ryali et al., 2023). \nThe V-JEPA models achieve this result while processing \nsignificantly fewer samples during pretraining (Figure 4), \ndemonstrating the efficiency of feature prediction as a \nlearning principle. \n\nand image task with notable margin (see Table 6). Our \nH/16 model outperforms the largest publicly available \nVideoMAE, VideoMAEv2, OmniMAE, MVD, and Hiera \nmodels by at least +5 points in motion understanding \n(Something-Something-v2), +2 points in action recogni- \ntion (Kinetics-400), +5 points on action detection (AVA), \n+1 point on object recognition (ImageNet-1K), +2 points \nin scene recognition (Places205), and +0.2 points on fine- \ngrained recognition (iNaturalist). Moreover, when com- \nparing pretraining wallclock time in Figure 5, we see that \nV-JEPA achieves this performance with a roughly 2 \n× \nspeedup compared to the large pixel prediction models. \n\n5.2 Comparison with State-of-the-Art \n\nNext, in Table 6, we inspect how the V-JEPA models \npretrained on video stack up next to the largest state- \nof-the-art self-supervised image and video models when \nfreezing the backbone encoder and training an attentive \nprobe on top. Our image pretrained baselines include \nOpenCLIP (Cherti et al., 2023), DINOv2 (Oquab et al., \n2023), and I-JEPA (Assran et al., 2023). The Open- \nCLIP model is trained with a contrastive image-text \nalignment objective, DINOv2 and I-JEPA are trained \nwith self-supervision. These models are known to excel \nin their frozen-evaluation performance (Oquab et al., \n2023); i.e., their ability to produce visual features that \ncan be applied to many downstream tasks simultane- \nously, without end-to-end fine-tuning, and thus pro- \nvide highly competitive baselines. Our video pretrained \nbaselines include VideoMAE (Tong et al., 2022), Omni- \nMAE (Girdhar et al., 2023), Hiera (Ryali et al., 2023), \nVideoMAEv2 (Wang et al., 2023a), and MVD (Wang \net al., 2023b). The OpenCLIP, DINOv2 and Video- \nMAEv2 models are parameterized as Giant/Gigantic \nvision transformer architectures containing over 1B pa- \nrameters trained on large-scale image or video datasets. \n\nComparison with image models. On tasks that re- \nquire a fine-grained understanding of motion (Something- \nSomething-v2), the V-JEPA models provide a major im- \nprovement (over +21 points) compared to large-scale \nimage baselines, such as DINOv2, OpenCLIP, and I- \nJEPA. Self-supervised pretraining from videos allows to \nmodel dynamic concepts that are not easily learned from \nstatic image datasets. Similarly, we observe that the \nV-JEPA models outperform image-based pretraining on \naction localization.", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv3.pdf" - }, - { - "text": "**3.2 Datasets (Data Platform)**\n\nThe**datasets section is the main access point for browsing, filtering and searching the datasets**. It \noffers a faceted search, a full text search and a geographical search. The dataset view provides access \nand information to the distributions of the dataset. \n\nThe home page of this section appears like this:", - "page_start": 25, - "page_end": 25, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "Table 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), Video- \nMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using \na ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, \niNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. \nAll models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from \nseveral spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream \ntasks, except ImageNet, where the model achieves 74.8% compared to 75.1% of an OmniMAE model trained directly on \nImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on \nSSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining. \n\n\n \n \n \n \n [html]MethodArch.# Samples SeenIter.K400 ( 16 × 8 × 3 )SSv2 ( 16 × 2 × 3 )ViT - L / 16\n
AVAIN1KPlaces205iNat21K400 - ft ( 16 × 5 × 3 )SSv2 - ft ( 36 × 2 × 3 )Methods pretroined using pivel prolictionOmniMAE
2400M1170K65.660.614.475.159.866.184.074.2VideoMAEViT - L / 16
410M400K77.865.521.671.159.364.685.474.3HieraHiera - L
770M1500K75.564.215.868.958.556.987.375.1V - JEPAViT - L / 16
270M90K80.869.525.674.860.367.885.675.1
\n\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation \nwith an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models \nare evaluated at resolution 224, except I-JEPA512 and V-JEPA384 which are evaluated respectively at resolution 512 and \n384. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views \nfrom the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. \nCompared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on \ntasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks \nrequiring static appearance-based features.", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "2.6 Data collection \n\nThe interview guide (Table 4) was developed based on literature \nreviews, clinical experience and discussions within the research \ngroup and with user representatives. Two test interviews were", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "5.1 Comparison with Pixel Prediction \n\nTo investigate the effectiveness of feature prediction pre- \ntraining, we first compare V-JEPA to video masked mod- \neling models relying on a pixel prediction loss. We control \n\n7", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or \ndataset built on their basis, we want to understand the implications of relying on public \ndomain works and expressly licensed works in building a books commons. \n\nThe benefits are relatively straightforward. Both categories, by definition come with express \npermission to use the books in AI training. The cost of acquiring the books for this use may \nbe effectively zero or close to it, when considering public domain and “openly” licensed \nbooks that allow redistribution and that have already been digitized. \n\nBut this approach comes with some clear limitations. First, as noted above, for many books \nin the public domain, their status as such is not always clear. And with respect to \npermissively licensed books, it is not always clear whether and how to comply with the \nlicense obligations in this context. \n\nSetting aside those challenges, the simple fact is that relying on public domain and existing \npermissively licensed books would limit the quantity and diversity of data available for \ntraining, impacting performance along different dimensions. Only a small fraction of books \never published fall into this category, and the corpus of books in this category is likely to be \nskewed heavily towards older public domain books. This skew would, in turn, impact the \n For instance, relying on books from before 1929 would not \ncontent available for AI training. \nonly incorporate outdated language patterns, but also a range of biases and misconceptions \nabout race and gender, among other things. Efforts could be made to get people to \npermissively license more material — a book drive for permissive licensing, so to speak; this \napproach would still not encompass most books, at least when it comes to past works. \n\n30 \n\n 31 \n\n*5b. Limitations & Exceptions*\n\n**Existing Project Example: HathiTrust Research Center (HTRC)**\n\nThe HathiTrust Research Center provides researchers with the ability to perform \ncomputational analysis across millions of books. While it is not suited specifically for AI \ntraining, it is an existence proof for what such a resource might look like. \n\n For instance, AI researchers note that the recently released Common Corpus dataset is an “invaluable \n30 \nresource” but “comes with limitations. A lot of public domain data is antiquated—in the US, for example, \ncopyright protection usually lasts over seventy years from the death of the author—so this type of \ndataset won’t be able to ground an AI model in current affairs or, say, how to spin up a blog post using \ncurrent slang” and the “dataset is tiny.” Thus, while it is possible to train an AI model on the data, those \nmodels will have more limited utility on some dimensions than current frontier models trained on a \nbroader array of data. See Knibbs, Kate,*Here’s Proof You Can Train an AI Model Without Slurping*\n*Copyrighted Content | WIRED*. (2024, March 20), at https://www.wired.com/story/proof-you-can-train-ai- \nwithout-slurping-copyrighted-content/. \n\n Our workshop discussion did note that some widely available datasets for AI training have also \n31 \npursued more direct licensing agreements. For instance, the SILO LLM was created by working with \nscientific journal publishers to make works available for both download and AI training. While this might \nbe viable in the context of particular, narrow classes of works, the barriers to efficient licensing \nmentioned above would remain a problem for any broader efforts. See Min, Sewon, et al. “SILO \nLanguage Models: Isolating Legal Risk in a Nonparametric Datastore.”*ArXiv (Cornell University)*, 8 Aug. \n2023, https://doi.org/10.48550/arxiv.2308.04430. Accessed 14 Dec. 2023.", - "page_start": 13, - "page_end": 13, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "mitigate the class imbalance while preserving the \nmajority of those classes, they have been randomly \nsubsampled to 6701 and 4803 samples. Further- \nmore, baseline models have been trained and tested \nto assess the usability of this dataset in other tasks, \nsuch as classification and topic modeling. Table 5 \nshows the results obtained. \n\nA.1 All datasets \n\nTable 3 displays the size of each dataset along with \nthe average number of tokens per sample and their \nreferences. The dataset’s content was tokenized \nusing cl100k_base encoding. For Retrieval, the \ntwo numbers refer to the queries and the docu- \nments. For Reranking, the three numbers refer to \nthe queries, the pairs of queries with relevant docu- \nments and the pairs of queries with irrelevant ones, \nrespectively. The pairs of queries and documents \nare obtained from the 90 documents extracted. For \nSummEvalFr, the three numbers refer to the texts, \nhuman and machine summaries, respectively. \nSummEvalFr Extracts of humans and machine \nsummaries translated in French from SummEvalFr \nand the original ones in English from SummEval \n(Fabbri et al., 2021) are shown in Figure 9. As ex- \nplained in section 3.1.3, we use a LLM to evaluate \nthe quality of translations for human summaries, \nwe provide the prompt used with GPT-4 for this \nevaluation in Figure 8. \n\nFigure 3 represents the semantic similarity be- \ntween each dataset. The methodology was as fol- \nlows: 90 random samples per dataset are embedded \nusing the multilingual-e5-large model. The embed- \ndings of each dataset’s samples are averaged. The \nsimilarity between each dataset is then calculated \nusing cosine similarity as in (Muennighoff et al., \n2022). \n\nTable 6 shows the distribution of ratings given \nby the LLM. With the scale being 10, we man- \nually verify random samples rated above 9. We \nverify all samples with ratings under 9 and those \nwith no provided rating (N/A) due to the triggering \nof the OpenAI content management policy. The \nLLM suggests that 60 samples are not correctly \ntranslated. These were verified manually, and after \nchecking, less than 10 samples only needed to be \ncorrected. \nWe complement this analysis by observing the \ndataset’s clouds of embedding in a 2D plane using \nPCA in Figure 4. \n\nB Supplementary materials for \nA.2 Created datasets \ncorrelation analysis \n\nSyntec Figure 5 shows an extract from the Syntec \ndataset with a document and a query relative to this \ndocument. \nThis section presents various correlations computed \nbased on the model results on the proposed bench- \nmark. \n\nFigure 10 represents cross-correlations between \nmodels’ performances and their studied character- \nistics as a heatmap. \n\nFigure 11 represents the Spearman correlations \n\nin terms of performance across models. \n\nFigure 12 represents the Spearman correlations \n\nin terms of performance across datasets. \n\nHAL Figure 6 is an extract from the HAL \ndataset. Table 4 lists the distribution of classes \n(domain field) for the HAL dataset on raw \nsubset and mteb_eval subset, which is used \nfor MTEB evaluation. \nLabels descriptions \ncan be found at this URL: https://api.archives- \nouvertes.fr/ref/domain/?q=*:*&rows=393 or in Ta- \nble 4. After pre-processing, mteb_eval covers titles \nfrom 10 domains as classes with less than 500 sam- \nples were removed. In the MTEB evaluation subset \nof the dataset, titles composed of 2 words or less \nhave been removed (371 samples), resulting in an \naverage word count of 13.4. Figure 7 shows the \nword count distribution per title. Furthermore, the \ndataset has been cleaned up by manually remov- \ning all non-French titles. Additionally, it can be \nobserved in Table 4 that in the original raw dataset, \nthe shs and sdv classes represent by far the majority \nof the dataset samples with respectively 58706 sam- \nples (73%) and 11049 samples (13%). In order to \n\nC Supplementary materials for models", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "Figure 4: 2D projection of tasks’ data. 90 random samples per task’s data are embedded using multlingual-e5-small \nmodel (Wang et al., 2022). The embeddings are reduced to 2 dimensions using PCA. The centroid of each task’s \ndata is represented, along with the ellipse showing the standard deviation along each axis. \n\n\n \n \n \n \n [html]\n
Task typeModelScore
Classification ( F1 - score )TF - IDF + LR0.60 (± 0.002 )
TF - IDF + SVC0.61 (± 0.001 )
CarnemBERT ( finc - tuned )*0.6 (± 0.008 )
GPT - 4 ( ICL )**0.30
Topic ModelingTF - IDF + LDA0.49 ( Coherence )
\n\nTable 5: Baselines results for HAL on a classification \ntask and topic modeling. \n*CamemBERT was finetuned for 5 epochs with learn- \ning rate of 1e−4 (+ lr scheduler) and a batch size of 64. \n**Due to limited budget, we evaluate GPT-4 ICL ca- \npabilities on a limited subset of our dataset (600 first \nsamples from the test set that is generated using the \nsame seed as for other experiments). \n\nLabel \nshs # raw # mteb_eval Description \n58706 \n\nHuman and social sciences (Sci- \nences humaines et sociales) \nLife science [Biology] (Sciences du \nvivant [Biologie]) \nEngineering science (Sciences de \nl’ingénieur [Physics]) \nComputer Science (Informatique) \nEnvironment science (Sciences de \nl’environnement) \nPhysics (Physique) \nPlanet and Universe [Physics] \n(Planète et Univers [Physique]) \nMathematics (Mathématiques) \nChemistry (Chimie) \nCognitive sciences (Sciences cogni- \ntives) \nEconomy and quantitative finance \n(Économie et finance quantitative \nStatistics (Statistiques) \nOther (Autre) \nN/A \nNon-linear Science [Physics] (Sci- \nence non linéaire [Physique]) \nElectro-magnetism \nmagnétisme) \nInstrumentation [Physics] (Instru- \nmentation [Physique]) \nImage \n\n6701 \n\nsdv 11049 4803 \n\nspi 3601 3451 \n\ninfo \nsde 3446 \n2830 3263 \n2754 \n\nphys \nsdu 2003 \n1177 1926 \n1158 \n\nmath \nchim \nscco 862 \n764 \n652 824 \n734 \n619 \n\nqfin 183 N/A \n\nstat \nother \nstic \nnlin 52 \n18 \n14 \n12 N/A \nN/A \nN/A \nN/A \n\n(Electro- electromag 3 N/A \n\ninstrum 2 N/A \n\nimage 1 N/A \n\nTable 4: Distribution of classes in HAL the raw and \nmteb_eval subsets of the dataset. \n\n• Bitext Mining: F1 score \n\n• Classification: Accuracy \n\n• Clustering: V measure \n\n• Pair Classification: Average Precision (AP) \n\n• Reranking: Mean Average Precision (MAP) \n\n• Retrieval: Normalized Discounted Cumula- \n\ntive Gain at k (NDCG@k) \n\n• STS: Spearman correlation based on cosine \n\nsimilarity", - "page_start": 13, - "page_end": 13, - "source_file": "arxiv4.pdf" - }, - { - "text": "Table 1 Pixels vs. Featurized Targets. We ablate the effect of computing the prediction loss in feature space vs pixel space. All \nmodels are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We \nexamine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single \ncenter view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide \na consistent improvement over pixel space prediction. \n\n\n \n \n \n \n [html]TargetArch.Frozen Evaluation\n
Fine - Tuning
K400 ( 16 × 1 × 1 )SSv2 ( 36 × 1 × 1 )IN1KK400 - ft ( 16 × 5 × 3 )
PixelsViT - L / 1668.666.073.385.4
FeaturesViT - L / 1673.766.274.885.6
\n\nTable 2 Pretraining Data Distribution. We pretrain all models for 90K iterations using a batch size of 3072, and evaluate \ndownstream performance of the frozen backbones with an attentive probe using a single center view. Average performance \nacross tasks increases with the pretraining dataset size. \n\n\n \n \n \n \n [html]Frozen EvaluationArch.Data# SamplesK400 ( 96 × 1 × 1 )ViT - L / 16ViT - H / 16\n
SSv2 ( 15 × 1 × 1 )IN1KAvg.
K710700K75.863.273.770.9
K710 + SSv2900K72.967.472.871.0
K710 + HT1900K74.564.274.871.1
VideoMix2M2000K73.766.274.871.5
K710 + SSv2900K75.766.873.772.0
VideoMix2M2000K74.068.575.972.8
\n\nversus pixel prediction objective, b) the construction of \nthe pretraining data distribution, c) the feature pooling \nstrategy for leveraging the model’s representations in \ndownstream tasks, and d) the masking strategy, towards \nidentifying: what to predict from what?", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "news1.pdf", - "query": "Where will the 2024 AI + Energy summit take place ?", - "target_page": 1, - "target_passage": "The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. \n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… \n\n\n\n\n\nMar 06, 2024 Mar 06, 2024 \n\nCelebrate St. Patrick's Day with Say Hello to Your Big Break at the \n\nNo Booze, Just Pure Irish Fun and Stapleton Library Job Fair in \n\nEntertainment Vocation, Trade, or Civil Service", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "Franzen) sued AI companies for using their work to train generative AI.[195][196] Another discussed \napproach is to envision a separate*sui generis*system of protection for creations generated by AI to ensure \nfair attribution and compensation for human authors.[197] \n\n**Dominance by tech giants**\n\nThe commercial AI scene is dominated by Big Tech companies such as Alphabet Inc., Amazon, Apple \nInc., Meta Platforms, and Microsoft.[198][199][200] Some of these players already own the vast majority of \nexisting cloud infrastructure and computing power from data centers, allowing them to entrench further in \nthe marketplace.[201][202] \n\n**Power needs and environmental impacts**\n\nIn January 2024, the International Energy Agency (IEA) released*Electricity 2024, Analysis and Forecast*\n*to 2026*, forecasting electric power use.[203] This is the first IEA report to make projections for data \ncenters and power consumption for artificial intelligence and cryptocurrency. The report states that power \ndemand for these uses might double by 2026, with additional electric power usage equal to electricity \nused by the whole Japanese nation.[204] \n\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay \nclosings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of \ndata centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon) \ninto voracious consumers of electric power. Projected electric consumption is so immense that there is \nconcern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the \nelectrical energy as a Google search. The large firms are in haste to find power sources – from nuclear \nenergy to geothermal to fusion. The tech firms argue that – in the long view – AI will be eventually \nkinder to the environment, but they need the energy now. AI makes the power grid more efficient and \n\"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to \ntechnology firms.[205] \n\nA 2024 Goldman Sachs Research Paper,*AI Data Centers and the Coming US Power Demand Surge*, \nfound \"US power demand (is) likely to experience growth not seen in a generation....\" and forecasts that, \nby 2030, US data centers will consume 8% of US power, as opposed to 3% in 2022, presaging growth for \nthe electrical power generation industry by a variety of means.[206] Data centers' need for more and more \nelectrical power is such that they might max out the electrical grid. The Big Tech companies counter that \nAI can be used to maximize the utilization of the grid by all.[207] \n\nIn 2024, the*Wall Street Journal*reported that big AI companies have begun negotiations with the US \nnuclear power providers to provide electricity to the data centers. In March 2024 Amazon purchased a \nPennsylvania nuclear-powered data center for $650 Million (US).[208] Nvidia CEO Jen-Hsun Huang said \nnuclear power is a good option for the data centers.[209] \n\nIn September 2024, Microsoft announced an agreement with Constellation Energy to re-open the Three \nMile Island nuclear power plant to provide Microsoft with 100% of all electric power produced by the \nplant for 20 years. Reopening the plant, which suffered a partial nuclear meltdown of its Unit 2 reactor in \n1979, will require Constellation to get through strict regulatory processes which will include extensive \nsafety scrutiny from the US Nuclear Regulatory Commission. If approved (this will be the first ever US \nre-commissioning of a nuclear plant), over 835 megawatts of power – enough for 800,000 homes – of", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Promotion of the wellbeing of the people and communities that these technologies affect requires \nconsideration of the social and ethical implications at all stages of AI system design, development and \nimplementation, and collaboration between job roles such as data scientists, product managers, data \nengineers, domain experts, and delivery managers.[300] \n\nThe UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations \navailable under a MIT open-source licence which is freely available on GitHub and can be improved with \nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge, \nability to reason, and autonomous capabilities.[301] \n\n\n\n**Regulation**\n\nThe regulation of artificial intelligence is the development \nof public sector policies and laws for promoting and \nregulating AI; it is therefore related to the broader regulation \nof algorithms.[302] The regulatory and policy landscape for \nAI is an emerging issue in jurisdictions globally.[303] \nAccording to AI Index at Stanford, the annual number of \nAI-related laws passed in the 127 survey countries jumped \nfrom one passed \nin 2022 \nalone.[304][305] Between 2016 and 2020, more than 30 \ncountries adopted dedicated strategies for AI.[306] Most EU \nmember states had released national AI strategies, as had \nCanada, China, India, Japan, Mauritius, \nthe Russian \nFederation, Saudi Arabia, United Arab Emirates, U.S., and \nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia \nand Tunisia.[306] The Global Partnership on Artificial Intelligence was launched in June 2020, stating a \nneed for AI to be developed in accordance with human rights and democratic values, to ensure public \nconfidence and trust in the technology.[306] Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher \npublished a joint statement in November 2021 calling for a government commission to regulate AI.[307] \nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they \nbelieve may happen in less than 10 years.[308] In 2023, the United Nations also launched an advisory \nbody to provide recommendations on AI governance; the body comprises technology company \nexecutives, governments officials and academics.[309] In 2024, the Council of Europe created the first \ninternational legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence \nand Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United \nStates, the United Kingdom, and other signatories.[310] \n\nin 2016 to 37 passed \n\nIn a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only \n35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\".[304] \nA 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to \nhumanity.[311] In a 2023 Fox News poll, 35% of Americans thought it \"very important\", and an additional \n41% thought it \"somewhat important\", for the federal government to regulate AI, versus 13% responding \n\"not very important\" and 8% responding \"not at all important\".[312][313]", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - }, - { - "text": "energy will be produced. The cost for re-opening and upgrading is estimated at $1.6 billion (US) and is \ndependent on tax breaks for nuclear power contained in the 2022 US Inflation Reduction Act.[210] The \nUS government and the state of Michigan are investing almost $2 billion (US) to reopen the Palisades \nNuclear reactor on Lake Michigan. Closed since 2022, the plant is planned to be reopened in October \n2025. The Three Mile Island facility will be renamed the Crane Clean Energy Center after Chris Crane, a \nnuclear proponent and former CEO of Exelon who was responsible for Exelon spinoff of \nConstellation.[211] \n\nAfter the last approval in September 2023, Taiwan suspended the approval of data centers north of \nTaoyuan with a capacity of more than 5 MW in 2024, due to power supply shortages.[212] Taiwan aims to \nphase out nuclear power by 2025.[212] On the other hand, Singapore imposed a ban on the opening of \ndata centers in 2019 due to electric power, but in 2022, lifted this ban.[212] \n\nAlthough most nuclear plants in Japan have been shut down after the 2011 Fukushima nuclear accident, \naccording to an October 2024*Bloomberg*article in Japanese, cloud gaming services company Ubitus, in \nwhich Nvidia has a stake, is looking for land in Japan near nuclear power plant for a new data center for \ngenerative AI.[213] Ubitus CEO Wesley Kuo said nuclear power plants are the most efficient, cheap and \nstable power for AI.[213] \n\nOn 1 November 2024, the Federal Energy Regulatory Commission (FERC) rejected an application \nsubmitted by Talen Energy for approval to supply some electricity from the nuclear power station \nSusquehanna to Amazon's data center.[214] According to the Commission Chairman Willie L. Phillips, it \nis a burden on the electricity grid as well as a significant cost shifting concern to households and other \nbusiness sectors.[214] \n\n**Misinformation**\n\nYouTube, Facebook and others use recommender systems to guide users to more content. These AI \nprograms were given the goal of maximizing user engagement (that is, the only goal was to keep people \nwatching). The AI learned that users tended to choose misinformation, conspiracy theories, and extreme \npartisan content, and, to keep them watching, the AI recommended more of it. Users also tended to watch \nmore content on the same subject, so the AI led people into filter bubbles where they received multiple \nversions of the same misinformation.[215] This convinced many users that the misinformation was true, \nand ultimately undermined trust in institutions, the media and the government.[216] The AI program had \ncorrectly learned to maximize its goal, but the result was harmful to society. After the U.S. election in \n2016, major technology companies took steps to mitigate the problem . \n\nIn 2022, generative AI began to create images, audio, video and text that are indistinguishable from real \nphotographs, recordings, films, or human writing. It is possible for bad actors to use this technology to \ncreate massive amounts of misinformation or propaganda.[217] AI pioneer Geoffrey Hinton expressed \nconcern about AI enabling \"authoritarian leaders to manipulate their electorates\" on a large scale, among \nother risks.[218] \n\n**Algorithmic bias and fairness**\nMachine learning applications will be biased[k] if they learn from biased data.[220] The developers may \nnot be aware that the bias exists.[221] Bias can be introduced by the way training data is selected and by \nthe way a model is deployed.[222][220] If a biased algorithm is used to make decisions that can seriously", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**The top AI-powered tech trends in 2025**\n\n\n\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. \n\nFinancial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "Harari, Yuval Noah (2023). \"AI and the future of humanity\" (https://www.youtube.com/watch?v= \nLWiM-LuRe6w).*YouTube*. Archived (https://web.archive.org/web/20240930110823/https://w \nww.youtube.com/watch?v=LWiM-LuRe6w) from the original on 30 September 2024. \nRetrieved 5 October 2024. \n\nHaugeland, John (1985).*Artificial Intelligence: The Very Idea*. Cambridge, Mass.: MIT Press. \n\nISBN 978-0-2620-8153-5.", - "page_start": 56, - "page_end": 56, - "source_file": "wikipedia3.pdf" - }, - { - "text": "In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the \nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks.[314] \n28 countries including the United States, China, and the European Union issued a declaration at the start \nof the summit, calling for international co-operation to manage the challenges and risks of artificial \nintelligence.[315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety \ncommitments on the development of AI.[317][318] \n\n**History**\n\nThe study of mechanical or \"formal\" reasoning began with philosophers and mathematicians in antiquity. \nThe study of logic led directly to Alan Turing's theory of computation, which suggested that a machine, \nby shuffling symbols as simple as \"0\" and \"1\", could simulate any conceivable form of mathematical \nreasoning.[319][320] This, along with concurrent discoveries in cybernetics, information theory and \nneurobiology, led researchers to consider the possibility of building an \"electronic brain\".[r] They \ndeveloped several areas of research that would become part of AI,[322] such as McCullouch and Pitts \ndesign for \"artificial neurons\" in 1943,[115] and Turing's influential 1950 paper 'Computing Machinery \nand Intelligence', which introduced the Turing test and showed that \"machine intelligence\" was \nplausible.[323][320] \n\nThe field of AI research was founded at a workshop at Dartmouth College in 1956.[s][6] The attendees \nbecame the leaders of AI research in the 1960s.[t] They and their students produced programs that the \npress described as \"astonishing\":[u] computers were learning checkers strategies, solving word problems \nin algebra, proving logical theorems and speaking English.[v][7] Artificial intelligence laboratories were \nset up at a number of British and U.S. universities in the latter 1950s and early 1960s.[320] \n\nResearchers in the 1960s and the 1970s were convinced that their methods would eventually succeed in \ncreating a machine with general intelligence and considered this the goal of their field.[327] In 1965 \nHerbert Simon predicted, \"machines will be capable, within twenty years, of doing any work a man can \ndo\".[328] In 1967 Marvin Minsky agreed, writing that \"within a generation ... the problem of creating \n'artificial intelligence' will substantially be solved\".[329] They had, however, underestimated the difficulty \nof the problem.[w] In 1974, both the U.S. and British governments cut off exploratory research in \nresponse to the criticism of Sir James Lighthill[331] and ongoing pressure from the U.S. Congress to fund \nmore productive projects.[332] Minsky's and Papert's book*Perceptrons*was understood as proving that \nartificial neural networks would never be useful for solving real-world tasks, thus discrediting the \napproach altogether.[333] The \"AI winter\", a period when obtaining funding for AI projects was difficult, \nfollowed.[9] \n\nIn the early 1980s, AI research was revived by the commercial success of expert systems,[334] a form of \nAI program that simulated the knowledge and analytical skills of human experts. By 1985, the market for \nAI had reached over a billion dollars. At the same time, Japan's fifth generation computer project inspired \nthe U.S. and British governments to restore funding for academic research.[8] However, beginning with \nthe collapse of the Lisp Machine market in 1987, AI once again fell into disrepute, and a second, longer- \nlasting winter began.[10]", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia3.pdf" - }, - { - "text": ". \n0 \n. \n4 \nY \nB \nC \nC \n\nr \ne \nd \nn \nu \nd \ne \ns \nn \ne \nc \ni \nl \ne \nr \na \ns \no \nt \no \nh \np \n\nC \nC \n\n\n\n**cc global summit**\n\nOver 300 attendees from 45 countries joined us this past October in \nMexico City for the first in-person**CC Global Summit**since 2019. The \ntheme was AI & the Commons with over 60 sessions and 180 speakers. \n**Learn more here.**\n\n**Thank you to our sponsors:**John D. and Catherine T. MacArthur \nFoundation, Microsoft Corporation, Filecoin Foundation for the \nDecentralized Web, Akin, Anthropic, Mozilla Foundation, The Michelson \n20MM Foundation, MHz Curationist, Frontiers Media, Arnold & Porter, \nand Crowell & Moring.", - "page_start": 5, - "page_end": 5, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] \n\nArtificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Strubell et al. also examine the cost of these models vs. their \naccuracy gains. For the task of machine translation where large \nLMs have resulted in performance gains, they estimate that an \nincrease in 0.1 BLEU score using neural architecture search for \nEnglish to German translation results in an increase of $150,000 \ncompute cost in addition to the carbon emissions. To encourage \nmore equitable access to NLP research and reduce carbon footprint, \nthe authors give recommendations to report training time and \nsensitivity to hyperparameters when the released model is meant \nto be re-trained for downstream use. They also urge governments to \ninvest in compute clouds to provide equitable access to researchers. \nInitiatives such as the SustainNLP workshop5 have since taken \nup the goal of prioritizing computationally efficient hardware and \nalgorithms. Schwartz et al. [115] also call for the development of \ngreen AI, similar to other environmentally friendly scientific de- \nvelopments such as green chemistry or sustainable computing. As \nshown in [5], the amount of compute used to train the largest deep \nlearning models (for NLP and other applications) has increased \n300,000x in 6 years, increasing at a far higher pace than Moore’s \nLaw. To promote green AI, Schwartz et al. argue for promoting \nefficiency as an evaluation metric and show that most sampled \npapers from ACL 2018, NeurIPS 2018, and CVPR 2019 claim accu- \nracy improvements alone as primary contributions to the field, and \nnone focused on measures of efficiency as primary contributions. \nSince then, works such as [57, 75] have released online tools to \nhelp researchers benchmark their energy usage. Among their rec- \nommendations are to run experiments in carbon friendly regions, \nconsistently report energy and carbon metrics, and consider energy- \nperformance trade-offs before deploying energy hungry models. \nIn addition to these calls for documentation and technical fixes, \nBietti and Vatanparast underscore the need for social and political \nengagement in shaping a future where data driven systems have \nminimal negative impact on the environment [16]. \n\n3 ENVIRONMENTAL AND FINANCIAL COST \nStrubell et al. recently benchmarked model training and develop- \nment costs in terms of dollars and estimated 𝐶𝑂2 emissions [129]. \nWhile the average human is responsible for an estimated 5t 𝐶𝑂2𝑒 \nper year,2 the authors trained a Transformer (big) model [136] with \nneural architecture search and estimated that the training procedure \nemitted 284t of 𝐶𝑂2. Training a single BERT base model (without \nhyperparameter tuning) on GPUs was estimated to require as much \nenergy as a trans-American flight. \n\nWhile some of this energy comes from renewable sources, or \ncloud compute companies’ use of carbon credit-offset sources, the \nauthors note that the majority of cloud compute providers’ energy is \nnot sourced from renewable sources and many energy sources in the \nworld are not carbon neutral. In addition, renewable energy sources \nare still costly to the environment,3 and data centers with increasing \ncomputation requirements take away from other potential uses of", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv5_ccby4license.pdf" - } - ] - }, - { - "references": { - "source_file": "news1.pdf", - "query": "What is the United States SCSP ?", - "target_page": 1, - "target_passage": "he Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**SHENTEL SERVICE AREAS**", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**\n\n**(d) Share Based Payment Compensation**", - "page_start": 80, - "page_end": 80, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "As of January 31, 2015 and February 1, 2014, we were in compliance with this covenant. We will continue to monitor this covenant and \nbelieve that we will remain in compliance with this covenant during 2015.", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**22. Investments in Controlled Entities**", - "page_start": 71, - "page_end": 71, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "news1.pdf", - "query": "What are some example of uses AI by the US departement of energy ?", - "target_page": 1, - "target_passage": "The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Artificial intelligent (AI) agents are software entities designed to \nperceive their environment, make decisions, and take actions \nautonomously to achieve specific goals. These agents can interact \nwith users, their environment, or other agents. AI agents are used \nin various applications, including virtual assistants, chatbots, \nindustrial \nautonomous vehicles, game-playing systems, and \nrobotics. AI agents operate within the constraints of their \nprogramming, available computational resources, and hardware \nlimitations. This means they are restricted to performing tasks \nwithin their defined scope and have finite memory and processing \ncapabilities. In real-world applications, AI agents often face time \nconstraints for decision-making and action execution. Many AI \nagents incorporate learning algorithms, enabling them to improve \ntheir performance over time through experience or training. Using \nmachine learning, AI agents can adapt to new situations and \noptimise their behaviour for their designated tasks.[175][176][177] \n\n**Other industry-specific tasks**\n\nThere are also thousands of successful AI applications used to solve specific problems for specific \nindustries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in \nsome offerings or processes.[178] A few examples are energy storage, medical diagnosis, military \nlogistics, applications that predict the result of judicial decisions, foreign policy, or supply chain \nmanagement. \n\nAI applications for evacuation and disaster management are growing. AI has been used to investigate if \nand how people evacuated in large scale and small scale evacuations using historical data from GPS, \nvideos or social media. Further, AI can provide real time information on the real time evacuation \nconditions.[179][180][181] \n\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments \nor increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict \nthe ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct \npredictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests, \nand save water. \n\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and \napplications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the \ndevelopment of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting \nsolar activity, and distinguishing between signals and instrumental effects in gravitational wave \nastronomy. Additionally, it could be used for activities in space, such as space exploration, including the \nanalysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance, \nand more autonomous operation.", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Franzen) sued AI companies for using their work to train generative AI.[195][196] Another discussed \napproach is to envision a separate*sui generis*system of protection for creations generated by AI to ensure \nfair attribution and compensation for human authors.[197] \n\n**Dominance by tech giants**\n\nThe commercial AI scene is dominated by Big Tech companies such as Alphabet Inc., Amazon, Apple \nInc., Meta Platforms, and Microsoft.[198][199][200] Some of these players already own the vast majority of \nexisting cloud infrastructure and computing power from data centers, allowing them to entrench further in \nthe marketplace.[201][202] \n\n**Power needs and environmental impacts**\n\nIn January 2024, the International Energy Agency (IEA) released*Electricity 2024, Analysis and Forecast*\n*to 2026*, forecasting electric power use.[203] This is the first IEA report to make projections for data \ncenters and power consumption for artificial intelligence and cryptocurrency. The report states that power \ndemand for these uses might double by 2026, with additional electric power usage equal to electricity \nused by the whole Japanese nation.[204] \n\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay \nclosings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of \ndata centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon) \ninto voracious consumers of electric power. Projected electric consumption is so immense that there is \nconcern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the \nelectrical energy as a Google search. The large firms are in haste to find power sources – from nuclear \nenergy to geothermal to fusion. The tech firms argue that – in the long view – AI will be eventually \nkinder to the environment, but they need the energy now. AI makes the power grid more efficient and \n\"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to \ntechnology firms.[205] \n\nA 2024 Goldman Sachs Research Paper,*AI Data Centers and the Coming US Power Demand Surge*, \nfound \"US power demand (is) likely to experience growth not seen in a generation....\" and forecasts that, \nby 2030, US data centers will consume 8% of US power, as opposed to 3% in 2022, presaging growth for \nthe electrical power generation industry by a variety of means.[206] Data centers' need for more and more \nelectrical power is such that they might max out the electrical grid. The Big Tech companies counter that \nAI can be used to maximize the utilization of the grid by all.[207] \n\nIn 2024, the*Wall Street Journal*reported that big AI companies have begun negotiations with the US \nnuclear power providers to provide electricity to the data centers. In March 2024 Amazon purchased a \nPennsylvania nuclear-powered data center for $650 Million (US).[208] Nvidia CEO Jen-Hsun Huang said \nnuclear power is a good option for the data centers.[209] \n\nIn September 2024, Microsoft announced an agreement with Constellation Energy to re-open the Three \nMile Island nuclear power plant to provide Microsoft with 100% of all electric power produced by the \nplant for 20 years. Reopening the plant, which suffered a partial nuclear meltdown of its Unit 2 reactor in \n1979, will require Constellation to get through strict regulatory processes which will include extensive \nsafety scrutiny from the US Nuclear Regulatory Commission. If approved (this will be the first ever US \nre-commissioning of a nuclear plant), over 835 megawatts of power – enough for 800,000 homes – of", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Alternatively, dedicated models for mathematical problem solving with higher precision for the outcome \nincluding proof of theorems have been developed such as*Alpha Tensor*,*Alpha Geometry*and*Alpha*\n*Proof*all from Google DeepMind,[157]*Llemma*from eleuther[158] or*Julius*.[159] \n\nWhen natural language is used to describe mathematical problems, converters transform such prompts \ninto a formal language such as Lean to define mathematical tasks. \n\nSome models have been developed to solve challenging problems and reach good results in benchmark \ntests, others to serve as educational tools in mathematics.[160] \n\n**Finance**\n\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail \nonline banking to investment advice and insurance, where automated \"robot advisers\" have been in use \nfor some years.[161] \n\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly \ninnovative AI-informed financial products and services: \"the deployment of AI tools will simply further \nautomatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice \nin the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension \ninnovation.\"[162] \n\n**Military**\nVarious countries are deploying AI military applications.[163] The main applications enhance command \nand control, communications, sensors, integration and interoperability.[164] Research is targeting \nintelligence collection and analysis, \ninformation operations, and \nsemiautonomous and autonomous vehicles.[163] AI technologies enable coordination of sensors and \neffectors, threat detection and identification, marking of enemy positions, target acquisition, coordination \nand deconfliction of distributed Joint Fires between networked combat vehicles involving manned and \nunmanned teams.[164] \n\nlogistics, cyber operations, \n\nAI has been used in military operations in Iraq, Syria, Israel and Ukraine.[163][165][166][167] \n\n**Generative AI**\n\nIn the early 2020s, generative AI gained widespread prominence. GenAI is AI capable of generating text, \nimages, videos, or other data using generative models,[168][169] often in response to prompts.[170][171] \n\nIn March 2023, 58% of U.S. adults had heard about ChatGPT and 14% had tried it.[172] The increasing \nrealism and ease-of-use of AI-based text-to-image generators such as Midjourney, DALL-E, and Stable \nDiffusion sparked a trend of viral AI-generated photos. Widespread attention was gained by a fake photo \nof Pope Francis wearing a white puffer coat, the fictional arrest of Donald Trump, and a hoax of an attack \non the Pentagon, as well as the usage in professional creative arts.[173][174] \n\n\n \n \n \n \n [html]\n
Agents
", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia3.pdf" - }, - { - "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. \n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… \n\n\n\n\n\nMar 06, 2024 Mar 06, 2024 \n\nCelebrate St. Patrick's Day with Say Hello to Your Big Break at the \n\nNo Booze, Just Pure Irish Fun and Stapleton Library Job Fair in \n\nEntertainment Vocation, Trade, or Civil Service", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "181. Zhao, Xilei; Lovreglio, Ruggiero; Nilsson, Daniel (1 May 2020). \"Modelling and interpreting \n\npre-evacuation decision-making using machine learning\" (https://www.sciencedirect.com/sci \nence/article/pii/S0926580519313184).*Automation in Construction*.**113**: 103140. \ndoi:10.1016/j.autcon.2020.103140 (https://doi.org/10.1016%2Fj.autcon.2020.103140). \nhdl:10179/17315 (https://hdl.handle.net/10179%2F17315). ISSN 0926-5805 (https://search. \nworldcat.org/issn/0926-5805). Archived (https://web.archive.org/web/20240519121548/http \ns://www.sciencedirect.com/science/article/abs/pii/S0926580519313184) from the original on \n19 May 2024. Retrieved 5 October 2024. \n\n182. \"India's latest election embraced AI technology. Here are some ways it was used \n\nconstructively\" (https://www.pbs.org/newshour/world/indias-latest-election-embraced-ai-tech \nnology-here-are-some-ways-it-was-used-constructively).*PBS News*. 12 June 2024. \nRetrieved 28 October 2024. \n\n183. Müller, Vincent C. (30 April 2020). \"Ethics of Artificial Intelligence and Robotics\" (https://plat \n\no.stanford.edu/archives/fall2023/entries/ethics-ai/).*Stanford Encyclopedia of Philosophy*\n*Archive*. Archived (https://web.archive.org/web/20241005165650/https://plato.stanford.edu/a \nrchives/fall2023/entries/ethics-ai/) from the original on 5 October 2024. Retrieved 5 October \n2024. \n\n184. Simonite (2016). \n185. Russell & Norvig (2021), p. 987. \n186. Laskowski (2023). \n187. GAO (2022). \n188. Valinsky (2019). \n189. Russell & Norvig (2021), p. 991. \n190. Russell & Norvig (2021), pp. 991–992. \n191. Christian (2020), p. 63. \n192. Vincent (2022). \n193. Kopel, Matthew. \"Copyright Services: Fair Use\" (https://guides.library.cornell.edu/copyright/f \nair-use).*Cornell University Library*. Archived (https://web.archive.org/web/20240926194057/ \nhttps://guides.library.cornell.edu/copyright/fair-use) from the original on 26 September 2024. \nRetrieved 26 April 2024. \n\n194. Burgess, Matt. \"How to Stop Your Data From Being Used to Train AI\" (https://www.wired.co \nm/story/how-to-stop-your-data-from-being-used-to-train-ai).*Wired*. ISSN 1059-1028 (https:// \nsearch.worldcat.org/issn/1059-1028). Archived (https://web.archive.org/web/202410031801 \n00/https://www.wired.com/story/how-to-stop-your-data-from-being-used-to-train-ai/) from the \noriginal on 3 October 2024. Retrieved 26 April 2024. \n\n195. Reisner (2023). \n196. Alter & Harris (2023). \n197. \"Getting the Innovation Ecosystem Ready for AI. An IP policy toolkit\" (https://www.wipo.int/e \ndocs/pubdocs/en/wipo-pub-2003-en-getting-the-innovation-ecosystem-ready-for-ai.pdf) \n(PDF).*WIPO*. \n\n198. Hammond, George (27 December 2023). \"Big Tech is spending more than VC firms on AI \n\nstartups\" (https://arstechnica.com/ai/2023/12/big-tech-is-spending-more-than-vc-firms-on-ai- \nstartups).*Ars Technica*. Archived (https://web.archive.org/web/20240110195706/https://arst \nechnica.com/ai/2023/12/big-tech-is-spending-more-than-vc-firms-on-ai-startups) from the \noriginal on 10 January 2024. \n\n199. Wong, Matteo (24 October 2023). \"The Future of AI Is GOMA\" (https://www.theatlantic.com/t \n\nechnology/archive/2023/10/big-ai-silicon-valley-dominance/675752).*The Atlantic*. Archived \n(https://web.archive.org/web/20240105020744/https://www.theatlantic.com/technology/archi \nve/2023/10/big-ai-silicon-valley-dominance/675752) from the original on 5 January 2024.", - "page_start": 40, - "page_end": 40, - "source_file": "wikipedia3.pdf" - }, - { - "text": "models are prone to generating falsehoods called \"hallucinations\", although this can be reduced with \nRLHF and quality data. They are used in chatbots, which allow people to ask a question or request a task \nin simple text.[122][123] \n\nCurrent models and services include Gemini (formerly Bard), ChatGPT, Grok, Claude, Copilot, and \nLLaMA.[124] Multimodal GPT models can process different types of data (modalities) such as images, \nvideos, sound, and text.[125] \n\n**Hardware and software**\n\nIn the late 2010s, graphics processing units (GPUs) that were increasingly designed with AI-specific \nenhancements and used with specialized TensorFlow software had replaced previously used central \nprocessing unit (CPUs) as the dominant means for large-scale (commercial and academic) machine \nlearning models' training.[126] Specialized programming languages such as Prolog were used in early AI \nresearch,[127] but general-purpose programming languages like Python have become predominant.[128] \n\nThe transistor density in integrated circuits has been observed to roughly double every 18 months—a \ntrend known as Moore's law, named after the Intel co-founder Gordon Moore, who first identified it. \nImprovements in GPUs have been even faster.[129] \n\n**Applications**\n\nAI and machine learning technology is used in most of the essential applications of the 2020s, including: \nsearch engines (such as Google Search), targeting online advertisements, recommendation systems \n(offered by Netflix, YouTube or Amazon), driving internet traffic, targeted advertising (AdSense, \nFacebook), virtual assistants (such as Siri or Alexa), autonomous vehicles (including drones, ADAS and \nself-driving cars), automatic language translation (Microsoft Translator, Google Translate), facial \nrecognition (Apple's Face ID or Microsoft's DeepFace and Google's FaceNet) and image labeling (used \nby Facebook, Apple's iPhoto and TikTok). The deployment of AI may be overseen by a Chief automation \nofficer (CAO). \n\n**Health and medicine**\n\nThe application of AI in medicine and medical research has the potential to increase patient care and \nquality of life.[130] Through the lens of the Hippocratic Oath, medical professionals are ethically \ncompelled to use AI, if applications can more accurately diagnose and treat patients.[131][132] \n\nFor medical research, AI is an important tool for processing and integrating big data. This is particularly \nimportant for organoid and tissue engineering development which use microscopy imaging as a key \ntechnique in fabrication.[133] It has been suggested that AI can overcome discrepancies in funding \nallocated to different fields of research.[133] New AI tools can deepen the understanding of biomedically \nrelevant pathways. For example, AlphaFold 2 (2021) demonstrated the ability to approximate, in hours \nrather than months, the 3D structure of a protein.[134] In 2023, it was reported that AI-guided drug \ndiscovery helped find a class of antibiotics capable of killing two different types of drug-resistant \nbacteria.[135] In 2024, researchers used machine learning to accelerate the search for Parkinson's disease", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia3.pdf" - }, - { - "text": "energy will be produced. The cost for re-opening and upgrading is estimated at $1.6 billion (US) and is \ndependent on tax breaks for nuclear power contained in the 2022 US Inflation Reduction Act.[210] The \nUS government and the state of Michigan are investing almost $2 billion (US) to reopen the Palisades \nNuclear reactor on Lake Michigan. Closed since 2022, the plant is planned to be reopened in October \n2025. The Three Mile Island facility will be renamed the Crane Clean Energy Center after Chris Crane, a \nnuclear proponent and former CEO of Exelon who was responsible for Exelon spinoff of \nConstellation.[211] \n\nAfter the last approval in September 2023, Taiwan suspended the approval of data centers north of \nTaoyuan with a capacity of more than 5 MW in 2024, due to power supply shortages.[212] Taiwan aims to \nphase out nuclear power by 2025.[212] On the other hand, Singapore imposed a ban on the opening of \ndata centers in 2019 due to electric power, but in 2022, lifted this ban.[212] \n\nAlthough most nuclear plants in Japan have been shut down after the 2011 Fukushima nuclear accident, \naccording to an October 2024*Bloomberg*article in Japanese, cloud gaming services company Ubitus, in \nwhich Nvidia has a stake, is looking for land in Japan near nuclear power plant for a new data center for \ngenerative AI.[213] Ubitus CEO Wesley Kuo said nuclear power plants are the most efficient, cheap and \nstable power for AI.[213] \n\nOn 1 November 2024, the Federal Energy Regulatory Commission (FERC) rejected an application \nsubmitted by Talen Energy for approval to supply some electricity from the nuclear power station \nSusquehanna to Amazon's data center.[214] According to the Commission Chairman Willie L. Phillips, it \nis a burden on the electricity grid as well as a significant cost shifting concern to households and other \nbusiness sectors.[214] \n\n**Misinformation**\n\nYouTube, Facebook and others use recommender systems to guide users to more content. These AI \nprograms were given the goal of maximizing user engagement (that is, the only goal was to keep people \nwatching). The AI learned that users tended to choose misinformation, conspiracy theories, and extreme \npartisan content, and, to keep them watching, the AI recommended more of it. Users also tended to watch \nmore content on the same subject, so the AI led people into filter bubbles where they received multiple \nversions of the same misinformation.[215] This convinced many users that the misinformation was true, \nand ultimately undermined trust in institutions, the media and the government.[216] The AI program had \ncorrectly learned to maximize its goal, but the result was harmful to society. After the U.S. election in \n2016, major technology companies took steps to mitigate the problem . \n\nIn 2022, generative AI began to create images, audio, video and text that are indistinguishable from real \nphotographs, recordings, films, or human writing. It is possible for bad actors to use this technology to \ncreate massive amounts of misinformation or propaganda.[217] AI pioneer Geoffrey Hinton expressed \nconcern about AI enabling \"authoritarian leaders to manipulate their electorates\" on a large scale, among \nother risks.[218] \n\n**Algorithmic bias and fairness**\nMachine learning applications will be biased[k] if they learn from biased data.[220] The developers may \nnot be aware that the bias exists.[221] Bias can be introduced by the way training data is selected and by \nthe way a model is deployed.[222][220] If a biased algorithm is used to make decisions that can seriously", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia3.pdf" - }, - { - "text": "drug treatments. Their aim was to identify compounds that block the clumping, or aggregation, of alpha- \nsynuclein (the protein that characterises Parkinson's disease). They were able to speed up the initial \nscreening process ten-fold and reduce the cost by a thousand-fold.[136][137] \n\n**Sexuality**\n\nApplications of AI in this domain include AI-enabled menstruation and fertility trackers that analyze user \ndata to offer prediction,[138] AI-integrated sex toys (e.g., teledildonics),[139] AI-generated sexual \neducation content,[140] and AI agents that simulate sexual and romantic partners (e.g., Replika).[141] AI is \nalso used for the production of non-consensual deepfake pornography, raising significant ethical and legal \nconcerns.[142] \n\nAI technologies have also been used to attempt to identify online gender-based violence and online \nsexual grooming of minors.[143][144] \n\n**Games**\n\nGame playing programs have been used since the 1950s to demonstrate and test AI's most advanced \ntechniques.[145] Deep Blue became the first computer chess-playing system to beat a reigning world chess \nchampion, Garry Kasparov, on 11 May 1997.[146] In 2011, in a*Jeopardy!*quiz show exhibition match, \nIBM's question answering system, Watson, defeated the two greatest*Jeopardy!*champions, Brad Rutter \nand Ken Jennings, by a significant margin.[147] In March 2016, AlphaGo won 4 out of 5 games of Go in a \nmatch with Go champion Lee Sedol, becoming the first computer Go-playing system to beat a \nprofessional Go player without handicaps. Then, in 2017, it defeated Ke Jie, who was the best Go player \nin the world.[148] Other programs handle imperfect-information games, such as the poker-playing \nprogram Pluribus.[149] DeepMind developed increasingly generalistic reinforcement learning models, \nsuch as with MuZero, which could be trained to play chess, Go, or Atari games.[150] In 2019, DeepMind's \nAlphaStar achieved grandmaster level in StarCraft II, a particularly challenging real-time strategy game \nthat involves incomplete knowledge of what happens on the map.[151] In 2021, an AI agent competed in a \nPlayStation Gran Turismo competition, winning against four of the world's best Gran Turismo drivers \nusing deep reinforcement learning.[152] In 2024, Google DeepMind introduced SIMA, a type of AI \ncapable of autonomously playing nine previously unseen open-world video games by observing screen \noutput, as well as executing short, specific tasks in response to natural language instructions.[153] \n\n**Mathematics**\nIn mathematics, special forms of formal step-by-step reasoning are used.[154] In contrast, LLMs such as \n*GPT-4 Turbo*,*Gemini Ultra*,*Claude Opus*,*LLaMa-2*or*Mistral Large*are working with probabilistic \nmodels, which can produce wrong answers in the form of hallucinations. Therefore, they need not only a \nlarge database of mathematical problems to learn from but also methods such as supervised fine-tuning or \ntrained classifiers with human-annotated data to improve answers for new problems and learn from \ncorrections.[155] A 2024 study showed that the performance of some language models for reasoning \ncapabilities in solving math problems not included in their training data was low, even for problems with \nonly minor deviations from trained data.[156]", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] \n\nArtificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Promotion of the wellbeing of the people and communities that these technologies affect requires \nconsideration of the social and ethical implications at all stages of AI system design, development and \nimplementation, and collaboration between job roles such as data scientists, product managers, data \nengineers, domain experts, and delivery managers.[300] \n\nThe UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations \navailable under a MIT open-source licence which is freely available on GitHub and can be improved with \nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge, \nability to reason, and autonomous capabilities.[301] \n\n\n\n**Regulation**\n\nThe regulation of artificial intelligence is the development \nof public sector policies and laws for promoting and \nregulating AI; it is therefore related to the broader regulation \nof algorithms.[302] The regulatory and policy landscape for \nAI is an emerging issue in jurisdictions globally.[303] \nAccording to AI Index at Stanford, the annual number of \nAI-related laws passed in the 127 survey countries jumped \nfrom one passed \nin 2022 \nalone.[304][305] Between 2016 and 2020, more than 30 \ncountries adopted dedicated strategies for AI.[306] Most EU \nmember states had released national AI strategies, as had \nCanada, China, India, Japan, Mauritius, \nthe Russian \nFederation, Saudi Arabia, United Arab Emirates, U.S., and \nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia \nand Tunisia.[306] The Global Partnership on Artificial Intelligence was launched in June 2020, stating a \nneed for AI to be developed in accordance with human rights and democratic values, to ensure public \nconfidence and trust in the technology.[306] Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher \npublished a joint statement in November 2021 calling for a government commission to regulate AI.[307] \nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they \nbelieve may happen in less than 10 years.[308] In 2023, the United Nations also launched an advisory \nbody to provide recommendations on AI governance; the body comprises technology company \nexecutives, governments officials and academics.[309] In 2024, the Council of Europe created the first \ninternational legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence \nand Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United \nStates, the United Kingdom, and other signatories.[310] \n\nin 2016 to 37 passed \n\nIn a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only \n35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\".[304] \nA 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to \nhumanity.[311] In a 2023 Fox News poll, 35% of Americans thought it \"very important\", and an additional \n41% thought it \"somewhat important\", for the federal government to regulate AI, versus 13% responding \n\"not very important\" and 8% responding \"not at all important\".[312][313]", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HNI_2003.pdf", - "query": "How can I contact Investor Relations of HON industries through email ?", - "target_page": 63, - "target_passage": "E-mail: investorrelations@honi.com", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**FOR FURTHER INFORMATION,**\n**PLEASE CONTACT**\n\n**Investor Relations**\n**Nissan Motor Co., Ltd.**\nGlobal Communications, CSR and IR Division \n17-1, Ginza 6-chome, Chuo-ku \nTokyo 104-8023, Japan \nphone: +81(0)3-5565-2334 \nfax: +81(0)3-3546-2669 \ne-mail: nissan-ir@mail.nissan.co.jp", - "page_start": 111, - "page_end": 111, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
SCHEDULE OF QUARTERLY RESULTSINVESTOR RELATIONSCOMMON STOCK
Send inquiries to :HON INDUSTRIES common stock tradesThe Company operates on a fiscal year ending
Investor Relationson the New York Stock Exchange under theon the Saturday nearest December 31. Quar -
HON INDUSTRIES Inc.symbol : HNI. Stock price quotations can beterly results are typically announced within 25
414 East Third Streetfound in major daily newspapers and Thedays after the end of each quarter, and audited
Muscatine, IA 52761Wall Street Journal.results are typically announced within 40 days
Telephone : 56 ( 3.264.7400after year - end.Fax : 563.264.7655
TRANSFER AGENTFISCAL zoo4E - mail : investorrelations @ honi. com
Shareholders may report a change of address or make inquiries by writing or calling :QUARTER - END DATESCORPORATE HEADQUARTERS
1st Quarter : Saturday, April 3HON INDUSTRIES Inc.Computershare Investor Services, LLC
2nd Quarter : Saturday, July 3414 East Third Street2 North LaSalle Street
3rd Quarter : Saturday, October 2P. O. Box 1109Chicago, IL 60602
4th Quarter : Saturday, January 1Muscatine, IA 52761 - 0071Telephone : 312.588.4991
AN NUAL MEETINGTelephone : 56 ( 3.264.7400The Company ’ s annual shareholders ’ meeting
Fax : 563.264.7217will be held at 10 : 30 a. m. on May 4.2004, atWebsite : www. honi. com
the Holiday Inn, Highways 61 & 38 North,Muscatine, Iowa. Shareholders and otherINDEPENDENT PUBLIC
interested investors are encouraged to attendPricewaterhouseCoopers LLPthe meeting.
One North Wacker DriveChicago, IL 60606
\n\n**F O R W A R D - L O O K I N G S T A T E M E N T S**\n\nStatements in this report that are not strictly historical, including statements as to **•**changes in demand and order patterns from the Company’s customers, par- \n\nplans, objectives, and future financial performance, are “forward-looking” state- ticularly its top ten customers, which represented approximately 36% of net sales \n\nments that are made pursuant to the safe harbor provisions of the Private Securities in 2003; \n\nLitigation Reform Act of 1995. Forward-looking statements involve known and **•** issues associated with acquisitions and integration of acquisitions; \n\nunknown risks, which may cause the Company’s actual results in the future to dif- **•**the ability of the Company to realize cost savings and productivity improve- \n\nfer materially from expected results. These risks include, among others: ments from its cost containment and business simplification initiatives; \n\n**•**competition within the office furniture and fireplace industries, including **•**the ability of the Company to realize financial benefits from investments in new \n\ncompetition from imported products and competitive pricing; products; \n\n**•** increases in the cost of raw materials, including steel, which is the Company’s **•**the ability of the Company’s distributors and dealers to successfully market \n\nK \nR \nO \nY \n\nW \nE \nN \n,", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is \n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement \n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that \n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day. \n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining \n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to \n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors. \n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s \n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and \n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years. \n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the \n\nNew York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that \n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules. \n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man- \n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance. \n\n\nStan A. Askren \n\n\nAbbie J. Smith \n\n\nDennis J. Martin \n\n\nGary M. Christensen \n\n Richard H. Stanley \n\n\nJack D. Michaels \n\n\nCheryl A. Francis \n\n\nBrian E. Stern \n\n\nJoseph Scalzo \n\n\n\n\n\nRobert L. Katz", - "page_start": 60, - "page_end": 60, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "We, the members of HON INDUSTRIES, are dedicated to creating long-term value for all of our stakeholders, to \n\nexceeding our customers’ expectations, and to making our company a great place to work. We will always treat each \n\nother, as well as customers, suppliers, shareholders, and our communities, with fairness and respect. \n\nOur success depends upon business simplification, rapid continuous improvement, and innovation in every- \n\nthing we do, individual and collective integrity, and the relentless pursuit of the following long-standing beliefs: \n\n**W E W I L L B E P R O F I T A B L E .**\n\nWe pursue mutually profitable relationships with customers and suppliers. Only when our company achieves an ade- \n\nquate profit can the other elements of this Vision be realized. \n\n**W E W I L L C R E A T E L O N G - T E R M V A L U E F O R S H A R E H O L D E R S .**\n\nWe create long-term value for shareholders by earning financial returns significantly greater than our cost of capital and \n\npursuing profitable growth opportunities. We will safeguard our shareholders’ equity by maintaining a strong balance \n\nsheet to allow flexibility in responding to a continuously changing market and business environment. \n\n**W E W I L L P U R S U E P R O F I T A B L E G R O W T H .**\n\nWe pursue profitable growth on a global basis in order to provide continued job opportunities for members and finan- \n\ncial success for all stakeholders. \n\n**W E W I L L B E A S U P P L I E R O F Q U A L I T Y P R O D U C T S A N D S E R V I C E S .**\n\nWe provide reliable products and services of high quality and brand value to our end-users. Our products and services \n\nexceed our customers’ expectations and enable our distributors and our company to make a fair profit. \n\n**W E W I L L B E A G R E A T P L A C E T O W O R K .**\n\nWe pursue a participative environment and support a culture that encourages and recognizes excellence, active \n\ninvolvement, ongoing learning, and contributions of each member; that seeks out and values diversity; and that \n\nattracts and retains the most capable people who work safely, are motivated, and are devoted to making our company \n\nand our members successful. \n\n**W E W I L L B E A R E S P O N S I B L E C O R P O R A T E C I T I Z E N .**\n\nWe conduct our business in a way that sustains the well-being of society, our environment, and the economy in which \n\nwe live and work. We follow ethical and legal business practices. Our company supports our volunteer efforts and \n\nprovides charitable contributions so that we can actively participate in the civic, cultural, educational, environmental, \n\nand governmental affairs of our society. \n\n**T O O U R S T A K E H O L D E R S :**\n\nWhen our company is appreciated by its*members,*favored by its*customers,*supported by its*suppliers,*respected by \n\n*the public,*and admired by its*shareholders,*this Vision is fulfilled. \n\n**H O N I N D U S T R I E S I n c . ( H N I )**\n\n**414 East Third Street, P.O. Box 1109, Muscatine, IA 52761-0071**\n\n**www.honi.com**", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**Nature of Operations** date. Equity securities are classified as available-for-sale and are stated \n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a at current market value with unrealized gains and losses included as a \n\nprovider of office furniture and hearth products. Both industries are separate component of equity, net of any related tax effect. Debt securi- \n\nreportable segments; however, the Company’s office furniture business ties are classified as held-to-maturity and are stated at amortized cost. \n\nis its principal line of business. Refer to the Operating Segment The specific identification method is used to determine realized gains \n\nInformation note for further information. Office furniture products are and losses on the trade date. Short-term investments include municipal \n\nsold through a national system of dealers, wholesalers, mass merchan- bonds, money market preferred stock, and U.S. treasury notes. Long- \n\ndisers, warehouse clubs, retail superstores, end-user customers, and to term investments include U.S. government securities, municipal bonds, \n\nfederal and state governments. Dealer, wholesaler, and retail super- certificates of deposit, and asset- and mortgage-backed securities. \n\nstores are the major channels based on sales. Hearth products include \n\nAt January 3, 2004, and December 28, 2002, cash, cash \n\nelectric, wood-, pellet-, and gas-burning factory-built fireplaces, fire- equivalents and investments consisted of the following (cost approxi- \n\nplace inserts, stoves, and gas logs. These products are sold through a mates market value): \n\nnational system of dealers, wholesalers, large regional contractors, and \n\nCash and \ncash \nequivalents Short- \nterm \ninvestments Long- \nterm \ninvestments \nCompany-owned retail outlets. The Company’s products are marketed \n*(In thousands)*\npredominantly in the United States and Canada. The Company exports \n\nY E A R - E N D 2 0 0 3 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nselect products to a limited number of markets outside North America, \n\n**$ 31,000**\n**–**\n**–**\n\n**$**\n\n**–**\n**–**\n**–** **$ 2,396**\n**–**\n**400**\nprincipally Latin America and the Caribbean, through its export subsid- \n\niary; however, based on sales, these activities are not significant. \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities \n\n**Summary of Significant Accounting Policies**\n\n**–**\n**–**\n**–** **4,259**\n**–**\n**60,949** **–**\n**–**\n**12,835**\n\n**107,982** **–** **–**\n\n**$ 138,982** **$ 65,208** **$ 15,631**\n\n***PRINCIPLES OF CONSOLIDATION AND FISCAL YEAR-END***\n*Cash and money market accounts*\nThe consolidated financial statements include the accounts and trans- \n Total \nactions of the Company and its subsidiaries. Intercompany accounts \n\nY E A R - E N D 2 0 0 2 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nand transactions have been eliminated in consolidation. \n\n$ 82,300 \n– \n– \n\nThe Company follows a 52/53-week fiscal year which ends \n\non the Saturday nearest December 31. Fiscal year 2003 ended on \n\nJanuary 3, 2004; 2002 ended on December 28, 2002; and 2001 ended \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities – \n– \n– 3,478 \n 11,000 \n– \n\non December 29, 2001. The financial statements for fiscal year 2003 \n\nare based on a 53-week period; fiscal years 2002 and 2001 are on a \n*Cash and money market accounts* 56,865 **–**\n52-week basis. \n$ 16,378 \n\n$ \n\n1,900 \n– \n– $ 5,396 \n11,995 \n400 \n\n– \n– \n7,098 \n\n**–**\n Total $ 24,889", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Management is responsible for the preparation and integrity of the consolidated financial statements and other financial information presented \n\nin this report. That responsibility is accomplished using internal controls designed to provide reasonable assurance as to the integrity and accuracy \n\nof the Company’s financial records and to adequately safeguard, verify, and maintain accountability of assets. Such controls are based on estab- \n\nlished written policies and procedures, are implemented by trained personnel with an appropriate segregation of duties, and are monitored \n\nthrough a comprehensive internal audit program. These policies and procedures prescribe that the Company and all its members are to maintain \n\nthe highest ethical and business standards. \n\nPricewaterhouseCoopers, LLP, independent accountants, is retained to audit HON INDUSTRIES’ financial statements. Their accompa- \n\nnying report is based on audits conducted in accordance with auditing standards, generally accepted in the United States. \n\nThe Board of Directors exercises its responsibility for these financial statements through its Audit Committee, which consists entirely of \n\nindependent board members. The Audit Committee meets periodically with the independent accountants and with the Company’s internal audi- \n\ntors, both privately and with management present, to review accounting, auditing, internal controls, and financial reporting matters. \n\n\n\n\nJack D. Michaels \n\nC H A I R M A N A N D \n\nC H I E F E X E C U T I V E O F F I C E R", - "page_start": 59, - "page_end": 59, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
ARD OF DIRECTORSBrian E. SternMelinda C. Ellsworth
A. Askren dent, HON INDUSTRIES Inc.President, Xerox SupVice President, Treasurer and Investor Relations
Xerox CorporationJeffrey D. FickM. Christensened President and Executive Officer,
Ronald V. Waters, III Chief Operating Officer,Vice President, Member and Community RelationsWm. Wrigley Jr. Company
Malcolm C. FieldsFrancisor / ConsultantCOMMITTEES OF THE BOARD
Vice President and Chief Information OfficerExecutive Vice President and Financial Officer,AUDIT
Vice President, General Counsel and Secretary Timothy R. SummersCheryl A. Francis, ChairpersonTimothy R. Summers
Dennis J. MartinVice President, Lean Enterpriseert L. Katz
dent, rt L. Katz and AssociatesHUMAN RESOURCES AND COMPENSATIONSUBSIDIARIES
Gary M. Christensen, ChairpersonDavid C. BurdakinRobert L. Katz
Executive Vice President, HON INDUSTRIES, IncPresident andAbbie J. Smith
President, The HON CompanyExecutive Officer,PUBLIC POLICY AND CORPORATE GOVERNANCE
Brad D. DetermanAccuracy (%)Richard H. Stanley, Chairperson
President,Joseph ScalzoHearth and Home Technologies Inc.
Brian E. SternThomas D. HeadVice President,
General Manager, Holga Inc.President and President, nal Care Products,HON INDUSTRIES INC. OFFICERS
Eric K. JungbluthGillette CompanyJack D. Michaels
President, Allsteel Inc.Chairman and Chief Executive OfficerDonald T. Mead
ie J. SmithStan A. AskrenPresident, The Gunlocke Company L. LC.
University of Chicago usate School of BusinessPresidentMarco V. Molinari
Peter R. AthertonPresident, International and Businessnard H. Stanley
Vice President and Chief Technology OfficerDevelopmentChairman, HON INDUSTRIES Inc. man, SC Companies, Inc.
Jerald K. DittmerJean M. ReynoldsVice President and Chief Financial Officer
President, Maxon Furniture Inc.Thermal standardized status, Inc.Robert J. Driessnack
Thomas A. ToloneVice President, ControllerPresident, Paoli Inc.
", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**2.3 Contact**\n\nRequests for access to, inquiries on the use of the software, and comments on the design and functionalities of the \napplication should be sent to the dedicated e-mail address**naiisapp@unfccc.int**.", - "page_start": 4, - "page_end": 4, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Outperform \n\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HNI_2003.pdf", - "query": "What explains the decrease in net sales of HON industries in 2002 ?", - "target_page": 34, - "target_passage": "The decrease in 2002 was due to the decline in the office furniture market due to unstable economic conditions and the deletion of less profitable product lines in the hearth products segment", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "[html]( Amounts in thousands )For the Years200320022001NET CASH FLOWS FROM ( TO ) OPERATING ACTIVITIES :Net income$ 98.105$ 91.360$ 74.407Noncash items included in net income :Depreciation and amortization72.77268.75581.385Other postretirement and postemployment benefits2.1662.2461.757Deferred income taxes( 3.314 )2.3216.962Loss on sales, retirements and impairments of property,plant and equipment5.4158.97616.200Stock issued to retirement plan4.6785.750—Other — net3912.613109Changes in working capital, excluding acquisition and disposition :Receivables1.006( 19.414 )47.897Inventories( 3.004 )2.34835.048Prepaid expenses and other current assets1.5082.431( 1.661 )Accounts payable and accrued expenses( 35.288 )37.857( 26.149 )Income taxes2.218( 2.370 )( 5.957 )Increase ( decrease ) in other liabilities( 5.379 )( 482 )( 2.198 )Net cash flows from ( to ) operating activities141.274202.391227.800NET CASH FLOWS FROM ( TO ) INVESTING ACTIVITIES :Capital expenditures( 34.842 )( 25.885 )( 36.851 )Proceeds from sale of property, plant and equipment1.808−—Capitalized software( 2.666 )( 65 )( 1.757 )Additional purchase consideration( 5.710 )−( 8.748 )Short - term investments — net( 49.326 )( 16.377 )—Purchase of long - term investments( 5.742 )( 22.493 )—Sales or maturities of long - term investments15.000−—Other — net2.924343Net cash flows from ( to ) investing activities( 81.478 )( 63.896 )( 47.013 )NET CASH FLOWS FROM ( TO ) FINANCING ACTIVITIES :Purchase of HON INDUSTRIES common stock( 21.512 )( 15.736 )( 35.059 )Proceeds from long - term debt76182536.218Payments of note and long - term debt( 20.992 )( 35.967 )( 87.365 )Proceeds from sale of HON INDUSTRIES common stock12.0632.0969.449Dividends paid( 30.299 )( 29.386 )( 28.373 )Net cash flows from ( to ) financing activities( 59.979 )( 78.168 )( 105.130 )Net increase ( decrease ) in cash and cash equivalents( 183 )60.32775.657Cash and cash equivalents at beginning of year139.16578.8383.181Cash and cash equivalents at end of year138.982139.16578.838SUPPLEMENTAL DISCLOSURRS OF CASH FLOW INFORMATION :Cash paid during the year for", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**Nature of Operations** date. Equity securities are classified as available-for-sale and are stated \n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a at current market value with unrealized gains and losses included as a \n\nprovider of office furniture and hearth products. Both industries are separate component of equity, net of any related tax effect. Debt securi- \n\nreportable segments; however, the Company’s office furniture business ties are classified as held-to-maturity and are stated at amortized cost. \n\nis its principal line of business. Refer to the Operating Segment The specific identification method is used to determine realized gains \n\nInformation note for further information. Office furniture products are and losses on the trade date. Short-term investments include municipal \n\nsold through a national system of dealers, wholesalers, mass merchan- bonds, money market preferred stock, and U.S. treasury notes. Long- \n\ndisers, warehouse clubs, retail superstores, end-user customers, and to term investments include U.S. government securities, municipal bonds, \n\nfederal and state governments. Dealer, wholesaler, and retail super- certificates of deposit, and asset- and mortgage-backed securities. \n\nstores are the major channels based on sales. Hearth products include \n\nAt January 3, 2004, and December 28, 2002, cash, cash \n\nelectric, wood-, pellet-, and gas-burning factory-built fireplaces, fire- equivalents and investments consisted of the following (cost approxi- \n\nplace inserts, stoves, and gas logs. These products are sold through a mates market value): \n\nnational system of dealers, wholesalers, large regional contractors, and \n\nCash and \ncash \nequivalents Short- \nterm \ninvestments Long- \nterm \ninvestments \nCompany-owned retail outlets. The Company’s products are marketed \n*(In thousands)*\npredominantly in the United States and Canada. The Company exports \n\nY E A R - E N D 2 0 0 3 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nselect products to a limited number of markets outside North America, \n\n**$ 31,000**\n**–**\n**–**\n\n**$**\n\n**–**\n**–**\n**–** **$ 2,396**\n**–**\n**400**\nprincipally Latin America and the Caribbean, through its export subsid- \n\niary; however, based on sales, these activities are not significant. \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities \n\n**Summary of Significant Accounting Policies**\n\n**–**\n**–**\n**–** **4,259**\n**–**\n**60,949** **–**\n**–**\n**12,835**\n\n**107,982** **–** **–**\n\n**$ 138,982** **$ 65,208** **$ 15,631**\n\n***PRINCIPLES OF CONSOLIDATION AND FISCAL YEAR-END***\n*Cash and money market accounts*\nThe consolidated financial statements include the accounts and trans- \n Total \nactions of the Company and its subsidiaries. Intercompany accounts \n\nY E A R - E N D 2 0 0 2 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nand transactions have been eliminated in consolidation. \n\n$ 82,300 \n– \n– \n\nThe Company follows a 52/53-week fiscal year which ends \n\non the Saturday nearest December 31. Fiscal year 2003 ended on \n\nJanuary 3, 2004; 2002 ended on December 28, 2002; and 2001 ended \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities – \n– \n– 3,478 \n 11,000 \n– \n\non December 29, 2001. The financial statements for fiscal year 2003 \n\nare based on a 53-week period; fiscal years 2002 and 2001 are on a \n*Cash and money market accounts* 56,865 **–**\n52-week basis. \n$ 16,378 \n\n$ \n\n1,900 \n– \n– $ 5,396 \n11,995 \n400 \n\n– \n– \n7,098 \n\n**–**\n Total $ 24,889", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "8.048.224II. Assets, depreciation and capital expendituresTotal assets$ 62.117.701$ 42.95$ 10I73.982$( 131.710 )$ 92.042.272Depreciation and amortization ——————————––––––––––––––––$ 3.263.206$ 1.65, 990$4.915.196$—$ 4.915.196Capital expenditures4.385.823$ 5.444.626$9.829.449$—$ 9.829.449Fiscal year 2003 ( For the year ended Mar. 31.2004 )SalesTotalEliminations ConsolidatedMillions of yenI. Sales and operating incomeSales to third parties--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------¥ 356.237¥ 7.429.219¥–¥ 7.429.219Inter - segment sales and transfers ---------------------------------------------------------22.9169.75232.668( 32.668 )–Total sales7.095.898365.9897.461.887( 32.668 )7.429.219Operating expenses — exonomics ----------------------------------------------------------------6.340.631301.1796.641.810( 37.446 )6.604.364Operating income¥ 755.267¥ 64.810¥ 820.077¥4.778¥ 824.855II. Assets, depreciation and capital expendituresTotal assets¥ 5.847.139¥ 3.479.171¥ 9.326.310¥( 1.466.454 )¥ 7.859.856Depreciation and amortization ----------------------------------------------------------------------------¥ 313.289147** 461.037¥−¥ 461.037Capital expenditures¥ 441.384", - "page_start": 93, - "page_end": 93, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]JapanConsolidated\n
North AmericaEuropeOther foreign countriesTotalEliminationsMillions of yen
Sales to third parties ——————–––––––––––¥ 2.554.374¥ 2.879.500¥ 963.440¥ 431.274¥ 6.828.588Y¥ 6.828.588
Inter - area sales and transfers ————————––––––––––––––––––1.766.10232.76326.7654.1741.829.804( 1.829.804 )Total sales --------------------------------------------------------------------------
4.320.4762.912.263990.205435.4488.658.392( 1.829.804 )6.828.588Operating expenses →—————————––––––––––3.929.920
2.607.699968.253418.6827.924.554( 1.833.196 )6.091.358Operating income ------------------------------------------¥ 390.556¥ 304.564
¥ 21.952¥ 16.766¥ 733.838Y3.392¥ 737.230Total assets -------------------------------------------------------------------------¥ 4.881.842¥ 3.463.261
\n\nOverseas sales \n\nOverseas sales, which include export sales of the Company and its domestic consolidated subsidiaries and sales (other than exports to Japan) of \nthe foreign consolidated subsidiaries, for the years ended March 31, 2005, 2004 and 2003 are summarized as follows: \n\n\n \n \n \n \n [html]1 Multiplexed presence of compared by the formation ( brith : 211, all / kV )Millions of yenThousends of U. S. dollarsOvertems talets -----------------------------------------------------------------------------------------------------------------------------------------------------------------------\n
North AmericaEuropeOther foreign countriesTotal
Overtemplets stalltyconomics - sensense - sense - sense - sense - sense - sense - sense - sense - sense -¥ 3.662.436¥ 1.269.204¥ 1.401.592¥ 6.333.232
Consolidated net salet ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------8.576.277
$ 34.228.374$ 11.861.720$ 13.098.991$ 59.189.085
Consolidated net sales ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------80.152.122
Overseas sales as a percentage of consolidated net sales42.7 %14.8 %16.3 %73.8 %
\n\nFiscal year 2003*(For the year ended Mar. 31, 2004)*\n\nOther foreign \ncountries North America Europe Total \n*Millions of yen*", - "page_start": 103, - "page_end": 103, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Fiscal year 2002 ( For the year ended Mar. 31.2003 )Automobile and EliminationsSales FinancingConsolidated total
Net salest ------------------------------------------------------------------------------------------------------------------------------------¥ 6.432.720¥ 395.868¥ 6.828.588
Cost of sales -------------------------------------------------------------------------4.617.368254.9564.872.324
Gross profit -----------------------------------------------------1.815.352140.9121.956.264
Operating income ----------------------------------------------------------------------------------------------677.34859.882737.230
Operating income as a percentage of net sales -----10.5 %15.1 %10.8 %
Net financial cost ---------------------------------------------------------------------( 16.543 )3( 16.540 )
Income before income taxes and minority interests -------------------------------------------------------------------------------------------------------------------------------------------------------------634.81859.806694.624
Net income ---------------------------------------------------------¥ 458.6¥36.554
¥495.165Total net financial cost -----------------------------------------------------------------------------------------κ_ ( 16.5 )
Ψ3Y( 16.540 )
Intersegment elimination -----------------------------------------------------------------------------------------( 5.677 )( 5.677 )
Net financial cost for segment →—~~~~–~––––––––––––––( 10.866 )3( 10.863 )
", - "page_start": 98, - "page_end": 98, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Nissan Motor Co, Ltd. and Consolidated Subsidiaries Fiscal years 2004.2003 and 2002
Millions of yen2004.31.202003Me. 31.20042002Met 31.2008
Net sales¥ 8.576.277¥ 7.429.219¥ 6.828.588
Cost of sales ( N = 166 #< 11 )6.351.2695.310.1724.872.324
Gross profit2.225.0082.119.0471.956.264
Selling, general and administrative expenses ( Notes 6ond 11 )1.363.8481.294.1921.219.034
Operating income861.160824.855737.230
Other income ( expenses ):Interest income14.93410.321
7.566Interest expense( 26.656 )( 27.290 )
( 25.060 )Equity in earnings of unconsolidatedsubsidiaries and affiliates36.790
11.62311.395Other, net ( Note 12 )( 92.995 )
( 83.012 )( 36.507 )( 67.927 )( 88.358 )
( 42.606 )Income before income taxes andminority interests793.233
736.497694.624Income taxes ( Nete 15 ):Current
179.226137.745113.185Deferred
78.83781.29585.513258.063
219.040198.698Minority interests( 22.889 )
( 13.790 )( 761 )Net income ( Note 18 )¥ 512.281
¥ 503.667¥495.165
", - "page_start": 75, - "page_end": 75, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
SCHEDULE OF QUARTERLY RESULTSINVESTOR RELATIONSCOMMON STOCK
Send inquiries to :HON INDUSTRIES common stock tradesThe Company operates on a fiscal year ending
Investor Relationson the New York Stock Exchange under theon the Saturday nearest December 31. Quar -
HON INDUSTRIES Inc.symbol : HNI. Stock price quotations can beterly results are typically announced within 25
414 East Third Streetfound in major daily newspapers and Thedays after the end of each quarter, and audited
Muscatine, IA 52761Wall Street Journal.results are typically announced within 40 days
Telephone : 56 ( 3.264.7400after year - end.Fax : 563.264.7655
TRANSFER AGENTFISCAL zoo4E - mail : investorrelations @ honi. com
Shareholders may report a change of address or make inquiries by writing or calling :QUARTER - END DATESCORPORATE HEADQUARTERS
1st Quarter : Saturday, April 3HON INDUSTRIES Inc.Computershare Investor Services, LLC
2nd Quarter : Saturday, July 3414 East Third Street2 North LaSalle Street
3rd Quarter : Saturday, October 2P. O. Box 1109Chicago, IL 60602
4th Quarter : Saturday, January 1Muscatine, IA 52761 - 0071Telephone : 312.588.4991
AN NUAL MEETINGTelephone : 56 ( 3.264.7400The Company ’ s annual shareholders ’ meeting
Fax : 563.264.7217will be held at 10 : 30 a. m. on May 4.2004, atWebsite : www. honi. com
the Holiday Inn, Highways 61 & 38 North,Muscatine, Iowa. Shareholders and otherINDEPENDENT PUBLIC
interested investors are encouraged to attendPricewaterhouseCoopers LLPthe meeting.
One North Wacker DriveChicago, IL 60606
\n\n**F O R W A R D - L O O K I N G S T A T E M E N T S**\n\nStatements in this report that are not strictly historical, including statements as to **•**changes in demand and order patterns from the Company’s customers, par- \n\nplans, objectives, and future financial performance, are “forward-looking” state- ticularly its top ten customers, which represented approximately 36% of net sales \n\nments that are made pursuant to the safe harbor provisions of the Private Securities in 2003; \n\nLitigation Reform Act of 1995. Forward-looking statements involve known and **•** issues associated with acquisitions and integration of acquisitions; \n\nunknown risks, which may cause the Company’s actual results in the future to dif- **•**the ability of the Company to realize cost savings and productivity improve- \n\nfer materially from expected results. These risks include, among others: ments from its cost containment and business simplification initiatives; \n\n**•**competition within the office furniture and fireplace industries, including **•**the ability of the Company to realize financial benefits from investments in new \n\ncompetition from imported products and competitive pricing; products; \n\n**•** increases in the cost of raw materials, including steel, which is the Company’s **•**the ability of the Company’s distributors and dealers to successfully market \n\nK \nR \nO \nY \n\nW \nE \nN \n,", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Fiscal year 2003*(For the year ended Mar. 31, 2004)*\n\nOther foreign \ncountries North America Europe Total \n*Millions of yen*\n\nOverseas sales.................................................................................................................................................... ¥3,222,497 \nConsolidated net sales................................................................................................................................. \nOverseas sales as a percentage of consolidated net sales .......................................... \n\n¥1,201,035 ¥773,248 \n\n¥5,196,780 \n7,429,219 \n70.0% 43.4% 16.2% 10.4% \n\nFiscal year 2002*(For the year ended Mar. 31, 2003)*\n\nOther foreign \ncountries Total \n*Millions of yen*\n\nOverseas sales.................................................................................................................................................... ¥2,785,334 \nConsolidated net sales................................................................................................................................. \nOverseas sales as a percentage of consolidated net sales .......................................... \n\n¥974,872 ¥763,368 \n\n¥4,523,574 \n6,828,588 \n66.2% 40.8% 14.3% 11.1%", - "page_start": 103, - "page_end": 103, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]( SANS ) ANT and attended attended and results of births of births ( interventions )For the years ended\n
2004Met 31.2006
2003Mv. 31.20042002Mw. 31.20092001Mw. 81.20022000Me. 31.20012004Mo : 37.290Net sales
¥ 8.576.277¥ 7.429.219¥ 6.828.588¥ 6.196.241¥ 6.089.620$ 80.15 :Operating income
861.160824.855737.230489.215290.3148.04Net income
512.281503.667495.165372.262331.0754.78Net income per share (% ex - 2 )
125.16122.02117.7592.6183.531.1Cash dividends paid ( h, w, s )
94.23674.59450.80027.841088Shareholder ' s equity
¥ 2.465.750¥ 2.023.994¥ 1.808.304¥ 1.620.822¥957.939$ 23.04
Total assets9.848.5237.859.8567.349.1837.215.0056.451.24392.04 :
Net consolidated automotive debt (%**)( 205.791 )13.603107.952431.714952.657( 1.92 :
Number of employees183.607123.748127.625125.099133.833
\n\nNotes: 1. Unless indicated otherwise, all dollar figures herein refer to U.S. currency. Yen amounts have been translated into U.S. dollars, for convenience \nonly, at ¥107 = $1, the approximate exchange rate on March 31, 2005. \n2. Net income per share amounts are based on the weighted average number of shares of common stock outstanding during each year. \n\nFigures for net income per share are in exact yen and U.S. dollars. \nNumber of shares outstanding as of March 31, 2005: 4,520,715,112. \n\n3. Cash dividends during the full year by subsidiary companies to non-Nissan minority shareholders are not included. \n4. Net consolidated automotive debt was ¥8,602 million cash positive in fiscal year 2002, ¥215,861 million cash positive in fiscal year 2003, and \n¥453,470 million cash positive in fiscal year 2004, using the same accounting principles as fiscal year 2001. \n\n**861** **8,576** **512**\n\n**’00 ’01 ’02 ’03 ’04** **’00 ’01 ’02 ’03 ’04** **’00 ’01 ’02 ’03 ’04**\n\n504 7,429 825 \n737 495 6,829 \n6,196 489 372 \n6,090 290 331", - "page_start": 2, - "page_end": 2, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "[html]The Company and its concollabod subsidiseases are primarily engaged in the manufacture and sales of products in the automobile segment and in providing visualises fromcise sences to uses of the Company ’ s products in the sales froncingeBusiness segmentsThe business segment information for the Company and its consolidated subsidaries for the years ended March 31.2005.2004 and 20003 is as follows :Fiscal year 2004 ( For the year ended Mar. 31.2005 )AutomobileFinancingTotalEliminationsConsolidatedMillions of yenI. Sales and operating incomeSales to third parties¥ 8.177.841¥398.436¥ 8.576.277Ψ−¥ 8.576.277Inter - segment sales and transfers ------------------------------------------------------------------------------------------------------------23.74213.50937.251( 37.251 )–Total sales ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------8.201.583411.9458.613.528( 37.251 )8.576.277Operating expenses7.429.760338.3887.768.148( 53.031 )7.715.117Operating income¥ 771.823γ73.557¥ 845.380¥15.780¥ 861.160II. Assets, depreciation and capital expendituresTotal assets¥ 6.646.594¥596.322¥ 11.242.916¥94.393 )¥ 9.848.523Depreciation and amortization -------------------------------------------------------------------------------------------------------------Ψ 349.163Y176.763V 525.926Ψ−¥ 525.926Capital expendituresV_469.283¥582.468< underline > V_1.051 , 751¥−¥ 1.051.751Fiscal year 2004 ( For the year ended Mar. 31.2005 )SalesAutomobileFinancingTotalEliminationsConsolidatedThousands of U. S. dollarsI. Sales and operating incomeSales to third parties$ 76.428.421$3.723.700$ 852.121$—$ 80.152.121Inter - segment sales and transfers -----------------------------------------------------------------------------------------------------------------------------------------------------------------------221.889126.253348.142( 348.142 )–Total sales76.650.3103.849.95380.500.263( 348.142 )80.152.121Operating expenses --------------------------------------------------------------------69.437.0103.162.50472.599.514( 495.617 )22.103.897Operating income -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------$ 7.213.300$687.449$7.900.749$147.475$ 8.048.224II. Assets, depreciation and capital expendituresTotal assets$ 62.117.701$ 42.95$ 10I73.982$(", - "page_start": 93, - "page_end": 93, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_ATRI_2003.pdf", - "query": "What operations were discontinued in 1997 by Atrion Corp ?", - "target_page": 17, - "target_passage": "During 1997, the Company sold all of its natural gas operations. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 \nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit. \nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors \nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan \nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting \nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits \nprovide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation \nand Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then \nended in conformity with accounting principles generally accepted in the United States of America. \n\nAs discussed above, the financial statements of Atrion Corporation and Subsidiaries as of December 31, 2001, and for the year then ended were audited by \nother auditors who have ceased operations. As described in Note 2, these financial statements have been revised to include the transitional disclosures required \nby Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of January 1, 2002. Our \naudit procedures with respect to the disclosures in Note 2 with respect to 2001 included agreeing the previously reported net income to the previously issued \nfinancial statements and the adjustments to reported net income representing amortization expense (including any related tax effects) recognized in those \nperiods related to goodwill to the Company’s underlying records obtained from management. We also tested the mathematical accuracy of the reconciliation \nof adjusted net income to reported net income, and the related income-per-share amounts. In our opinion, the disclosures for 2001 in Note 2 are appropriate. \nHowever, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements of the Company other than with respect to such \ndisclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 financial statements taken as a whole. \n\nGrant Thornton LLP \nDallas, Texas \nFebruary 13, 2004 \n\n*This is a copy of the audit report previously issued by Arthur Andersen LLP in connection with Atrion Corporation and Subsidiaries Annual Report*\n*for the year ended December 31, 2001. This audit report has not been reissued by Arthur Andersen LLP in connection with this Annual Report. The*\n*consolidated balance sheets as of December 31, 2001 and 2000 and the consolidated statements of income and cash flows for the years ended*\n*December 31, 2000 and 1999 referred to in this report have not been included in the accompanying financial statements.*\n\nTo the Stockholders and the Board of Directors of Atrion Corporation:", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and subsidiaries as of December 31, 2001 \nand 2000 and the related consolidated statements of income and cash flows for each of the three years in the period ended December 31, 2001. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that we plan and perform the audit \nto obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence \nsupporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made \nby management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position of Atrion Corporation and subsidiaries \nas of December 31, 2001 and 2000 and the results of their operations and their cash flows for each of the three years in the period ended December 31, \n2001 in conformity with accounting principles generally accepted in the United States.", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "**Discontinued Operations**\nA discontinued operation is a component of our business that has \noperations and cash flows that are clearly distinguished from the rest of \nRogers and: \n(cid:129) represents a separate major line of business \n(cid:129) is part of a single coordinated plan to dispose of a separate major \nline of business, or \n(cid:129) is a subsidiary we have acquired with the intention to re-sell. \n\nWhen we classify a component as a discontinued operation, we restate \nour comparative income and comprehensive income as though the \noperation had been discontinued from the start of the comparative \nyear. \n\nSee note 6 for information about discontinued operations. \n\n**New Accounting Pronouncements Effective in 2013**\nWe adopted the following accounting changes \nconsolidated financial statements on January 1, 2013. \n(cid:129) IFRS 10, Consolidated Financial Statements \n(cid:129) IFRS 11, Joint Arrangements \n(cid:129) IFRS 12, Disclosure of Interest in Other Entities \n(cid:129) IFRS 13, Fair Value Measurement \n(cid:129) IAS 19, Employee Benefits (2011) \n(cid:129) IAS 28, Investments in Associates and Joint Ventures \n(cid:129) IAS 36, Impairment of Assets \n\nfor our 2013", - "page_start": 104, - "page_end": 104, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "As of January 31, 2015 and February 1, 2014, we were in compliance with this covenant. We will continue to monitor this covenant and \nbelieve that we will remain in compliance with this covenant during 2015.", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Over the years, we have learned that there are certain clear prerequisites to growth. Our path to growth is grounded on \n\nthese basic fundamentals: Managing our assets wisely. Making products that meet specific market needs. And maintaining \n\nour keen focus on productivity and profitability. It is our steady and consistent focus on the fundamentals that has \n\nenabled us to build strength and create an environment for growth, through favorable or unfavorable conditions in the \n\nmarket and the economy. \n\n**We manage our assets and resources carefully.**\n\nOur financial strategy centers on building the strength and stability that will position our company for \n\nongoing growth. We approach the management of our resources with discipline and diligence, striking the \n\nbalance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a \n\nEBITDA Per Diluted Share From \nContinuing Operations(a) strong financial foundation, and investing in the resources, technology and assets that will ensure operating \n\nefficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial \n\nresults for 2003. \n\nFor the fifth consecutive year, Atrion’s earnings per diluted share from continuing operations increased \n$7 \n\nby more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of \n6 \nthe economic pressures which have challenged virtually every business in recent years, we view five \n5 \nconsecutive years of EPS growth—ranging from 16 percent to over 50 percent—as a sign of solid financial \n\n4 strength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09 \n\nper share, net income totaled $2.75 per diluted share for 2003. \n3 \n$2.70 \nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return \n2 \n\n1 \n\non equity(a), which provides a good indication of how well we are utilizing investors’ dollars, has steadily \n\nincreased in recent years, from five percent in 1999 to 12 percent in 2003. This compares favorably to the \n\naverage return on equity for our industry, reported at 10.7 percent by statistical research sources. \n\nThe company’s ability to generate strong cash flow continued to flourish in 2003. This is a key strength \n\nfor our company, as it enables us to pursue a number of value-creating initiatives. \n\n• We initiated the payment of quarterly dividends on the company’s common stock in \n\nSeptember 2003. Recent changes in tax laws make this an efficient avenue for \n\nproviding a return to our shareholders and, with continuing growth in earnings and \n\ncash flow, we plan to increase the dividend periodically. \n\n• We repurchased 193,814 shares of our common stock in 2003. Over the last five \n\nyears, we have repurchased nearly two million shares of our stock, a strategy we \n\nregard as a wise investment for our company and our stockholders. \n\n• We reduced debt by $6 million, from $10.3 million at the end of 2002 to $4.3 million", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "1,868 \n998 \n477 \nNOTE 6: DISCONTINUED OPERATIONS \n\nOperating revenue \nOperating costs \nRestructuring, acquisition and other expenses \n3,343 \n15 \n\n3,358 \n\nLoss before income taxes \nIncome tax recovery \n162 \n183 \nLoss from discontinued operations for the year \n\n345 \n6 \n\nWe discontinued our Video segment in the second quarter of 2012 and \nreported the Video results of operations as discontinued operations at \nthat time. \n351 \n\n784 \n264 \n276 \n296 \n\nThe Video segment did not have any results from discontinued \noperations \nliabilities as at \nDecember 31, 2013 and 2012. Cash flows from operating activities for \nthe segment for 2013 were nil (2012 – $2 million). The Video segment \ndid not have any cash flows from investing or financing activities for the \nyears ended December 31, 2013 and 2012. \n\n1,620 \nin 2013 or any significant assets or \n**(117)** (123) \n\n**$ 12,706** $ 12,486 \n\n**2013** 2012 \n\n**$ 1,541**\n**190**\n**4,126** $ 1,605 \n173 \n4,138", - "page_start": 106, - "page_end": 106, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. \n\n\n \n \n \n \n [html]\n
We make products that meet the specific needs of niche markets.One of the principal strengths of our company lies in the diversity of our product lines. Atrion makes
medical devices and components for end - essers and mandacturers throughout the health care industry,ranging from ophthalmology and cardiovascular products to fluid delivery devices. Our repostation for quality,
precision : and reliability has belped a number of our products gain the leading market positions in the UnitedStates in their respective niches.
In the ophthalinic sector, Atrion is a leading IU. S. manufacturer of sofi contact lenes disinfection cases. Inaddition, our LacriCATIVIb, balloon catheter positions us as a market leader with a patented product for the
treatment of tear duct blockages.We serve the cardiac surgery market as a leading U. S. provider of vaccuum relief valves, minimally invasive
surgical tapes and chock valves. Serving the same market, our MPS ® Myocardial Protection System continuesto make headway, as hospitals and surgeons increasingly recognize the value of this proprietary technology.
The MPS delivers essential fluids and medications to the heart during open - heart surgery, and it is the onlysystem that provides integrated control over temperature, pressure, flow rate and the precise delivery of
medications to the heart during surgery, hittisto adso is the leading I '. 5. provider of clamps for IV sets, whichare used in many surgical and medical settings.
One expertise and leadership in valve design and manufacturing extend beyond the health care industry.We are the leading donestic mandfacturer of valves and inflation devices used in marine and zotation safety products.
We support this stable of solidly performing products with two essential programs. One is a highlyeffective sales and marketing effort that keeps our products moving into the marketplace. Our sales team is
comprised of professionals who possess clinical knowledge and specific product experience, and alsoconcentrate on building, strong relationships with customers and within the industry.
Our other essential program is research and development. We believe it is vital to keep a pipeline ofproducts in various stages of development so that we can take advantage of neur - and long - term opportunities
in our markets. Understandably, proposed new products for the health care industry must undergo stringenttesting and rigorous approval procedures. Often, this means that the process of bringing a new product from
the design stage to the marketplace is a long and ardisous one. A strong, proactive research and developmentprogram ensures that we are couniting the resources and time required to successfully stay the course.
", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Note 15. Quarterly Results (unaudited)**", - "page_start": 39, - "page_end": 39, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_ATRI_2003.pdf", - "query": "How much share of Atrion's revenues did its major customer representin in 2003 ? ", - "target_page": 21, - "target_passage": "The Company had one major customer which represented approximately $9.1 million (14.4 percent", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Note 11. Major Customers**\n\nThe Company has one major customer and relationship that is a significant source of revenue. In 2003, as during the \npast number of years, the Company's relationship with Sprint continued to increase, due to growth in the PCS business \nsegment. Approximately 61.2% of total revenues in 2003 were generated by or through Sprint and its customers using \nthe Company's portion of Sprint’s nationwide PCS network. This was compared to 57.6% in 2002, and 47.1% of total \nrevenue in 2001. No other customer relationship on a stand-alone basis generates more than 2.5% of the Company’s \ntotal revenue for 2003, 2002 and 2001.", - "page_start": 34, - "page_end": 34, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Over the years, we have learned that there are certain clear prerequisites to growth. Our path to growth is grounded on \n\nthese basic fundamentals: Managing our assets wisely. Making products that meet specific market needs. And maintaining \n\nour keen focus on productivity and profitability. It is our steady and consistent focus on the fundamentals that has \n\nenabled us to build strength and create an environment for growth, through favorable or unfavorable conditions in the \n\nmarket and the economy. \n\n**We manage our assets and resources carefully.**\n\nOur financial strategy centers on building the strength and stability that will position our company for \n\nongoing growth. We approach the management of our resources with discipline and diligence, striking the \n\nbalance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a \n\nEBITDA Per Diluted Share From \nContinuing Operations(a) strong financial foundation, and investing in the resources, technology and assets that will ensure operating \n\nefficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial \n\nresults for 2003. \n\nFor the fifth consecutive year, Atrion’s earnings per diluted share from continuing operations increased \n$7 \n\nby more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of \n6 \nthe economic pressures which have challenged virtually every business in recent years, we view five \n5 \nconsecutive years of EPS growth—ranging from 16 percent to over 50 percent—as a sign of solid financial \n\n4 strength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09 \n\nper share, net income totaled $2.75 per diluted share for 2003. \n3 \n$2.70 \nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return \n2 \n\n1 \n\non equity(a), which provides a good indication of how well we are utilizing investors’ dollars, has steadily \n\nincreased in recent years, from five percent in 1999 to 12 percent in 2003. This compares favorably to the \n\naverage return on equity for our industry, reported at 10.7 percent by statistical research sources. \n\nThe company’s ability to generate strong cash flow continued to flourish in 2003. This is a key strength \n\nfor our company, as it enables us to pursue a number of value-creating initiatives. \n\n• We initiated the payment of quarterly dividends on the company’s common stock in \n\nSeptember 2003. Recent changes in tax laws make this an efficient avenue for \n\nproviding a return to our shareholders and, with continuing growth in earnings and \n\ncash flow, we plan to increase the dividend periodically. \n\n• We repurchased 193,814 shares of our common stock in 2003. Over the last five \n\nyears, we have repurchased nearly two million shares of our stock, a strategy we \n\nregard as a wise investment for our company and our stockholders. \n\n• We reduced debt by $6 million, from $10.3 million at the end of 2002 to $4.3 million", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "In recent years, the economic climate has presented significant \nchallenges to growth—and, in some cases, survival—for American \nbusinesses. The companies that have fared well are those with solid \nfinancial foundations and sound growth strategies that provide a \nmeasure of protection against the changing winds of the economy. \nAtrion is one of those companies. For the past five years, we have \nproduced earnings per share growth of more than 15 percent each \nyear. Despite fluctuations in our markets and product demand, we \nhave continued to return value to our stockholders through strong \nearnings growth, year after year. As a leading provider of medical \ndevices and components to niche markets in the health care \nindustry, we are committed to doing everything we can to continue \nthat level of performance. \n\n\n \n \n \n \n [html]F 1 N A X C I A LH IG H L L L L T S H T S1\n
L E T T E RT 0S TO CKH O LD ER S
2F 1 N A N C I A LIN IV O R M ATI O N
7C 0 R P O R A T EIN IV O R M ATI O N
2.8
", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and subsidiaries as of December 31, 2001 \nand 2000 and the related consolidated statements of income and cash flows for each of the three years in the period ended December 31, 2001. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that we plan and perform the audit \nto obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence \nsupporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made \nby management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position of Atrion Corporation and subsidiaries \nas of December 31, 2001 and 2000 and the results of their operations and their cash flows for each of the three years in the period ended December 31, \n2001 in conformity with accounting principles generally accepted in the United States.", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "507 )( 73 )7Total assets :2003$ 141.658$33$ 10.340$ 6.721$2002112.76559.55410.9616.2551872001114.28056.09011.4805.373", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Concentration of Credit Risk \n\nThe Company has a broad customer base representing many diverse industries primarily across North America. As such, the \nCompany does not believe that a significant concentration of credit risk exists in its accounts receivable.", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. \n\n\n \n \n \n \n [html]\n
We make products that meet the specific needs of niche markets.One of the principal strengths of our company lies in the diversity of our product lines. Atrion makes
medical devices and components for end - essers and mandacturers throughout the health care industry,ranging from ophthalmology and cardiovascular products to fluid delivery devices. Our repostation for quality,
precision : and reliability has belped a number of our products gain the leading market positions in the UnitedStates in their respective niches.
In the ophthalinic sector, Atrion is a leading IU. S. manufacturer of sofi contact lenes disinfection cases. Inaddition, our LacriCATIVIb, balloon catheter positions us as a market leader with a patented product for the
treatment of tear duct blockages.We serve the cardiac surgery market as a leading U. S. provider of vaccuum relief valves, minimally invasive
surgical tapes and chock valves. Serving the same market, our MPS ® Myocardial Protection System continuesto make headway, as hospitals and surgeons increasingly recognize the value of this proprietary technology.
The MPS delivers essential fluids and medications to the heart during open - heart surgery, and it is the onlysystem that provides integrated control over temperature, pressure, flow rate and the precise delivery of
medications to the heart during surgery, hittisto adso is the leading I '. 5. provider of clamps for IV sets, whichare used in many surgical and medical settings.
One expertise and leadership in valve design and manufacturing extend beyond the health care industry.We are the leading donestic mandfacturer of valves and inflation devices used in marine and zotation safety products.
We support this stable of solidly performing products with two essential programs. One is a highlyeffective sales and marketing effort that keeps our products moving into the marketplace. Our sales team is
comprised of professionals who possess clinical knowledge and specific product experience, and alsoconcentrate on building, strong relationships with customers and within the industry.
Our other essential program is research and development. We believe it is vital to keep a pipeline ofproducts in various stages of development so that we can take advantage of neur - and long - term opportunities
in our markets. Understandably, proposed new products for the health care industry must undergo stringenttesting and rigorous approval procedures. Often, this means that the process of bringing a new product from
the design stage to the marketplace is a long and ardisous one. A strong, proactive research and developmentprogram ensures that we are couniting the resources and time required to successfully stay the course.
", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "**C o r p o r a t e O f f i c e :**\nAtrion Corporation \nOne Allentown Parkway \nAllen, Texas 75002 \n(972) 390-9800 \nwww.atrioncorp.com \n\n**R e g i s t r a r a n d T r a n s f e r A g e n t**\nAmerican Stock Transfer and Trust Company \n59 Maiden Lane \nNew York, New York 10007 \n\n**F o r m 1 0 - K**\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange \nCommission, may be obtained by any stockholder without charge by written request to: \n\n*Corporate Secretary*\n*Atrion Corporation*\n*One Allentown Parkway*\n*Allen, Texas 75002*\n\n**S t o c k I n f o r m a t i o n**\nThe Company’s common stock is traded on The Nasdaq Stock Market (Symbol: ATRI). As of March 8, 2004, there were \napproximately 1,200 stockholders, including beneficial owners holding shares in nominee or “street” name. The table below \nsets forth the high and low closing prices on The Nasdaq Stock Market and the quarterly dividends per share declared by the \nCompany for each quarter of 2002 and 2003. \n\n2003 Quarter Ended \nMarch 31 \nJune 30 \nSeptember 30 \nDecember 31 \n\n$ \n\nThe Company paid no cash dividends on its common stock during 2002. In the third quarter of 2003 the Company began paying \nquarterly cash dividends and presently plans to pay quarterly cash dividends in the future.", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "Within wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS \nservice revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the \nincrease in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 \nsubscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the \nchurn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the \nafter sales support. Competition in the wireless industry continues to have a significant impact on the results of the \nCompany’s PCS operation. \n\nPCS travel revenue, including reseller revenue, which is compensation between Sprint and its PCS Affiliates for use of \nthe other party’s network, was $16.8 million, an increase of $0.3 million or 1.8%. Travel revenue is impacted by the \ngeographic size of the Company’s network service area, the overall number of Sprint wireless customers, their travel \npatterns and the travel exchange rate. The rate received on travel was $0.058 per minute in 2003, compared to $0.10 \nper minute in 2002. As a part of the amended management agreement signed on January 30, 2004, Sprint and the \nCompany agreed to maintain the travel rate at $0.058 per minute through December 31, 2006. \n\n45 ■ 2003 ANNUAL REPORT", - "page_start": 46, - "page_end": 46, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 \nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit. \nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors \nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan \nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting \nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits \nprovide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation \nand Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then \nended in conformity with accounting principles generally accepted in the United States of America. \n\nAs discussed above, the financial statements of Atrion Corporation and Subsidiaries as of December 31, 2001, and for the year then ended were audited by \nother auditors who have ceased operations. As described in Note 2, these financial statements have been revised to include the transitional disclosures required \nby Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of January 1, 2002. Our \naudit procedures with respect to the disclosures in Note 2 with respect to 2001 included agreeing the previously reported net income to the previously issued \nfinancial statements and the adjustments to reported net income representing amortization expense (including any related tax effects) recognized in those \nperiods related to goodwill to the Company’s underlying records obtained from management. We also tested the mathematical accuracy of the reconciliation \nof adjusted net income to reported net income, and the related income-per-share amounts. In our opinion, the disclosures for 2001 in Note 2 are appropriate. \nHowever, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements of the Company other than with respect to such \ndisclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 financial statements taken as a whole. \n\nGrant Thornton LLP \nDallas, Texas \nFebruary 13, 2004 \n\n*This is a copy of the audit report previously issued by Arthur Andersen LLP in connection with Atrion Corporation and Subsidiaries Annual Report*\n*for the year ended December 31, 2001. This audit report has not been reissued by Arthur Andersen LLP in connection with this Annual Report. The*\n*consolidated balance sheets as of December 31, 2001 and 2000 and the consolidated statements of income and cash flows for the years ended*\n*December 31, 2000 and 1999 referred to in this report have not been included in the accompanying financial statements.*\n\nTo the Stockholders and the Board of Directors of Atrion Corporation:", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_ATRI_2003.pdf", - "query": "What was Atrion's gross profit in 2003 (in thousands) ? ", - "target_page": 10, - "target_passage": "Gross Profit 22,239", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Over the years, we have learned that there are certain clear prerequisites to growth. Our path to growth is grounded on \n\nthese basic fundamentals: Managing our assets wisely. Making products that meet specific market needs. And maintaining \n\nour keen focus on productivity and profitability. It is our steady and consistent focus on the fundamentals that has \n\nenabled us to build strength and create an environment for growth, through favorable or unfavorable conditions in the \n\nmarket and the economy. \n\n**We manage our assets and resources carefully.**\n\nOur financial strategy centers on building the strength and stability that will position our company for \n\nongoing growth. We approach the management of our resources with discipline and diligence, striking the \n\nbalance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a \n\nEBITDA Per Diluted Share From \nContinuing Operations(a) strong financial foundation, and investing in the resources, technology and assets that will ensure operating \n\nefficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial \n\nresults for 2003. \n\nFor the fifth consecutive year, Atrion’s earnings per diluted share from continuing operations increased \n$7 \n\nby more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of \n6 \nthe economic pressures which have challenged virtually every business in recent years, we view five \n5 \nconsecutive years of EPS growth—ranging from 16 percent to over 50 percent—as a sign of solid financial \n\n4 strength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09 \n\nper share, net income totaled $2.75 per diluted share for 2003. \n3 \n$2.70 \nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return \n2 \n\n1 \n\non equity(a), which provides a good indication of how well we are utilizing investors’ dollars, has steadily \n\nincreased in recent years, from five percent in 1999 to 12 percent in 2003. This compares favorably to the \n\naverage return on equity for our industry, reported at 10.7 percent by statistical research sources. \n\nThe company’s ability to generate strong cash flow continued to flourish in 2003. This is a key strength \n\nfor our company, as it enables us to pursue a number of value-creating initiatives. \n\n• We initiated the payment of quarterly dividends on the company’s common stock in \n\nSeptember 2003. Recent changes in tax laws make this an efficient avenue for \n\nproviding a return to our shareholders and, with continuing growth in earnings and \n\ncash flow, we plan to increase the dividend periodically. \n\n• We repurchased 193,814 shares of our common stock in 2003. Over the last five \n\nyears, we have repurchased nearly two million shares of our stock, a strategy we \n\nregard as a wise investment for our company and our stockholders. \n\n• We reduced debt by $6 million, from $10.3 million at the end of 2002 to $4.3 million", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "507 )( 73 )7Total assets :2003$ 141.658$33$ 10.340$ 6.721$2002112.76559.55410.9616.2551872001114.28056.09011.4805.373", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "In recent years, the economic climate has presented significant \nchallenges to growth—and, in some cases, survival—for American \nbusinesses. The companies that have fared well are those with solid \nfinancial foundations and sound growth strategies that provide a \nmeasure of protection against the changing winds of the economy. \nAtrion is one of those companies. For the past five years, we have \nproduced earnings per share growth of more than 15 percent each \nyear. Despite fluctuations in our markets and product demand, we \nhave continued to return value to our stockholders through strong \nearnings growth, year after year. As a leading provider of medical \ndevices and components to niche markets in the health care \nindustry, we are committed to doing everything we can to continue \nthat level of performance. \n\n\n \n \n \n \n [html]F 1 N A X C I A LH IG H L L L L T S H T S1\n
L E T T E RT 0S TO CKH O LD ER S
2F 1 N A N C I A LIN IV O R M ATI O N
7C 0 R P O R A T EIN IV O R M ATI O N
2.8
", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and subsidiaries as of December 31, 2001 \nand 2000 and the related consolidated statements of income and cash flows for each of the three years in the period ended December 31, 2001. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that we plan and perform the audit \nto obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence \nsupporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made \nby management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position of Atrion Corporation and subsidiaries \nas of December 31, 2001 and 2000 and the results of their operations and their cash flows for each of the three years in the period ended December 31, \n2001 in conformity with accounting principles generally accepted in the United States.", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 \nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit. \nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors \nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan \nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting \nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits \nprovide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation \nand Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then \nended in conformity with accounting principles generally accepted in the United States of America. \n\nAs discussed above, the financial statements of Atrion Corporation and Subsidiaries as of December 31, 2001, and for the year then ended were audited by \nother auditors who have ceased operations. As described in Note 2, these financial statements have been revised to include the transitional disclosures required \nby Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of January 1, 2002. Our \naudit procedures with respect to the disclosures in Note 2 with respect to 2001 included agreeing the previously reported net income to the previously issued \nfinancial statements and the adjustments to reported net income representing amortization expense (including any related tax effects) recognized in those \nperiods related to goodwill to the Company’s underlying records obtained from management. We also tested the mathematical accuracy of the reconciliation \nof adjusted net income to reported net income, and the related income-per-share amounts. In our opinion, the disclosures for 2001 in Note 2 are appropriate. \nHowever, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements of the Company other than with respect to such \ndisclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 financial statements taken as a whole. \n\nGrant Thornton LLP \nDallas, Texas \nFebruary 13, 2004 \n\n*This is a copy of the audit report previously issued by Arthur Andersen LLP in connection with Atrion Corporation and Subsidiaries Annual Report*\n*for the year ended December 31, 2001. This audit report has not been reissued by Arthur Andersen LLP in connection with this Annual Report. The*\n*consolidated balance sheets as of December 31, 2001 and 2000 and the consolidated statements of income and cash flows for the years ended*\n*December 31, 2000 and 1999 referred to in this report have not been included in the accompanying financial statements.*\n\nTo the Stockholders and the Board of Directors of Atrion Corporation:", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**C o r p o r a t e O f f i c e :**\nAtrion Corporation \nOne Allentown Parkway \nAllen, Texas 75002 \n(972) 390-9800 \nwww.atrioncorp.com \n\n**R e g i s t r a r a n d T r a n s f e r A g e n t**\nAmerican Stock Transfer and Trust Company \n59 Maiden Lane \nNew York, New York 10007 \n\n**F o r m 1 0 - K**\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange \nCommission, may be obtained by any stockholder without charge by written request to: \n\n*Corporate Secretary*\n*Atrion Corporation*\n*One Allentown Parkway*\n*Allen, Texas 75002*\n\n**S t o c k I n f o r m a t i o n**\nThe Company’s common stock is traded on The Nasdaq Stock Market (Symbol: ATRI). As of March 8, 2004, there were \napproximately 1,200 stockholders, including beneficial owners holding shares in nominee or “street” name. The table below \nsets forth the high and low closing prices on The Nasdaq Stock Market and the quarterly dividends per share declared by the \nCompany for each quarter of 2002 and 2003. \n\n2003 Quarter Ended \nMarch 31 \nJune 30 \nSeptember 30 \nDecember 31 \n\n$ \n\nThe Company paid no cash dividends on its common stock during 2002. In the third quarter of 2003 the Company began paying \nquarterly cash dividends and presently plans to pay quarterly cash dividends in the future.", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "**R E S U L T S O F O P E R A T I O N S**\nThe Company’s income from continuing operations was $4.9 million, or $2.86 per basic and $2.66 per diluted share, in 2003, compared to income from \ncontinuing operations of $4.1 million, or $2.37 per basic and $2.18 per diluted share, in 2002 and $4.3 million, or $2.10 per basic and $1.88 per diluted \nshare, in 2001. Net income, including discontinued operations and cumulative effect of accounting change, totaled $5.1 million, or $2.96 per basic and \n$2.75 per diluted share, in 2003, compared with $2.6 million, or $1.51 per basic and $1.39 per diluted share, in 2002 and $9.8 million, or $4.80 per \nbasic and $4.30 per diluted share, in 2001. The Company adopted Statement of Financial Accounting Standards (“SFAS”) No. 142 effective January 1, 2002. \nThe required adoption of SFAS No. 142 as discussed in Note 2 to the Company’s Consolidated Financial Statements included herein is considered a change \nin accounting principle and the cumulative effect of adopting this standard resulted in a $1.6 million, or $ .96 per basic and $ .88 per diluted share, non- \ncash, after-tax charge in 2002. \n\nOperating revenues were $62.8 million in 2003, compared with $59.5 million in 2002 and $57.6 million in 2001. These revenue increases are generally \nattributable to higher sales volumes. The 5 percent revenue increase in 2003 over the prior year is primarily attributable to an 8 percent increase in the \nrevenues of the Company’s ophthalmic products, an 8 percent increase in the revenues of the Company’s cardiovascular products, a 3 percent increase in \nthe Company’s fluid delivery products and a 2 percent increase in the Company’s other medical and non-medical products and services. The 3 percent \nrevenue increase in 2002 over the prior year is primarily attributable to an 8 percent increase in the revenues of the Company’s cardiovascular products, \na 4 percent increase in the Company’s fluid delivery products and a 4 percent increase in the Company’s other medical and non-medical products and \nservices. \n\nThe Company’s cost of goods sold was $40.6 million in 2003, compared with $39.2 million in 2002 and $35.8 million in 2001. The increase in cost of \ngoods sold for 2003 over 2002 was primarily related to the increase in revenues discussed above and increased insurance costs partially offset by an \nimprovement in manufacturing variances resulting from increased production volumes. The increase in cost of goods sold for 2002 over 2001 was \nprimarily related to a shift in product mix, which resulted in lower gross margins, and the increase in revenues discussed above. \n\nGross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company’s gross profit in 2003 was 35 \npercent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$12.7 billion \n\nWIRELESS**57%** **5.0**\n\n$12.7 \nCABLE**27%**\n**4.8**\nBILLION \n\nMEDIA**13%**\nBUSINESS \nSOLUTIONS**3%**\n**4.7**\n\n\n\n\n\n**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$7.3 billion \n\n**3. 2**\nPOSTPAID VOICE**46%**\n\n$7.3 \nDATA**44%**\n**3.1**\nBILLION \n\nEQUIPMENT**7%**\nPREPAID VOICE**3%**\n**3.0**", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. \n\n\n \n \n \n \n [html]\n
We make products that meet the specific needs of niche markets.One of the principal strengths of our company lies in the diversity of our product lines. Atrion makes
medical devices and components for end - essers and mandacturers throughout the health care industry,ranging from ophthalmology and cardiovascular products to fluid delivery devices. Our repostation for quality,
precision : and reliability has belped a number of our products gain the leading market positions in the UnitedStates in their respective niches.
In the ophthalinic sector, Atrion is a leading IU. S. manufacturer of sofi contact lenes disinfection cases. Inaddition, our LacriCATIVIb, balloon catheter positions us as a market leader with a patented product for the
treatment of tear duct blockages.We serve the cardiac surgery market as a leading U. S. provider of vaccuum relief valves, minimally invasive
surgical tapes and chock valves. Serving the same market, our MPS ® Myocardial Protection System continuesto make headway, as hospitals and surgeons increasingly recognize the value of this proprietary technology.
The MPS delivers essential fluids and medications to the heart during open - heart surgery, and it is the onlysystem that provides integrated control over temperature, pressure, flow rate and the precise delivery of
medications to the heart during surgery, hittisto adso is the leading I '. 5. provider of clamps for IV sets, whichare used in many surgical and medical settings.
One expertise and leadership in valve design and manufacturing extend beyond the health care industry.We are the leading donestic mandfacturer of valves and inflation devices used in marine and zotation safety products.
We support this stable of solidly performing products with two essential programs. One is a highlyeffective sales and marketing effort that keeps our products moving into the marketplace. Our sales team is
comprised of professionals who possess clinical knowledge and specific product experience, and alsoconcentrate on building, strong relationships with customers and within the industry.
Our other essential program is research and development. We believe it is vital to keep a pipeline ofproducts in various stages of development so that we can take advantage of neur - and long - term opportunities
in our markets. Understandably, proposed new products for the health care industry must undergo stringenttesting and rigorous approval procedures. Often, this means that the process of bringing a new product from
the design stage to the marketplace is a long and ardisous one. A strong, proactive research and developmentprogram ensures that we are couniting the resources and time required to successfully stay the course.
", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EEFT_2000.pdf", - "query": "What the name of the first bridge buildt over Danube ?", - "target_page": 16, - "target_passage": "he Chain Bridge was the first bridge over the Danube", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "**B R O O K LYN BRIDGE, New Yo r k**\n\nThe Brooklyn Bridge, proudly standing over the East River and \n\nconnecting the boroughs of Brooklyn and Manhattan, endures as \n\none of the most famous bridges in America. When completed in \n\nMay 1883, the 5989-foot-long Brooklyn Bridge was the largest \n\nsuspension bridge in the world.", - "page_start": 28, - "page_end": 28, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**RIVER TYNE BRIDGES, Newcastle**\n\nSix bridges dominate the Tyne between Newcastle \n\nand Gateshead, enabling innovative railway and \n\nroadway advances over the past two centuries. At \n\nthe time of its completion in 1929, the Tyne Bridge \n\nwas the world’s longest single span bridge.", - "page_start": 27, - "page_end": 27, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "\n \n \n \n \n [html]Consolidated Balance Sheet Data :As of December 3120001999199819971996( in thrassunds, e. wrpt Summary Network Data )693ATM transactions during the period5\n
Cash and cash equivalents$7.151815.037Table55.614$7.516
$2.541Restricted cash2.10310.92912.972
847152Investment securities.7503.149
31.94419 +Trade accounts receivable, net9.4857.8885.681
647172Other current assets5.3465.180+, 61 +
1.857433Total current assets24.08539.78482.030
+ 2.8113.492Net property, plant and equipment31.65736.69333.182
24.0887.284Intangible assets, net2.60416.25912.46 +
Other long - term assets2.5444.1035.762
3.1341.158Total assets$60.890896.844$ 133.438$
70.033$1.934Current liabilities$20.466826.938Table
18.739$9.315$2.861Obligations under capital leases,
excluding current installments8.0346.3976.80911.3303.834
Notes payable77.19172.80083.720
Other long - term liabilities202169103
Total liabilities105.691106.337109.26820.8146.798
Total stockholders ’ ( deficit )/ equity(++, 801 )( 9.493 )24.17049.2195.136
$60.890896.844$ 133.438$
70.033$1.934Summary Network Data :Number of operational ATMs at end of period2.634
2.2831.271166
\n\n**CHAIN BRIDGE, Budapest**\n\nThe Chain Bridge, built from 1839 to 1849, was the \n\nfirst bridge over the Danube, linking the cities \n\nBuda and Pest. Measuring 380 meters long and \n\n15.7 meters wide, it is supported by pillars \n\nshaped like antique triumphal arches.", - "page_start": 15, - "page_end": 15, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**17th and 18th centuries**\n\nCity Hall on the Place des Terreaux, built by architects Jules Hardouin-Mansart and Robert de Cotte \nMusée des beaux-arts de Lyon, fine arts museum housed in a former convent of the 17th century, including \nthe Baroque*chapelle Saint-Pierre*\nHôtel-Dieu de Lyon (17th and 18th century), historical hospital with a baroque chapel \nTemple du Change (17th and 18th century), former stock exchange of Lyon, Protestant temple since the 18th \ncentury \nPlace Bellecour, one of the largest town squares in Europe \nChapelle de la Trinité (1622), the first Baroque chapel built in Lyon, and part of the former École de la Trinité, \nnow Collège-lycée Ampère \nÉglise Saint-Polycarpe (1665–1670), Classical church \nÉglise Saint-Just (16th to 18th century), Classical church \nSaint-Bruno des Chartreux (17th and 18th century), church, masterpiece of Baroque architecture \nÉglise Notre Dame Saint-Vincent (18th century), Neo-classical church", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia4.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
nd• Metro density
500 / km2 ( 1.300 / sq mi )Time zone • Summer ( DS )
UTC + 01 : 00 ( CET ) UTC + 02 : 00 ( CESTINSEE / Postal code
69123 ( https :// www. insee. fr / fr / statistiques / 14055997geo = COM - 69123 )/ 69001 - 69009
2012Elevation
\n\n**1**French Land Register data, which excludes \nlakes, ponds, glaciers > 1 km2 (0.386 sq mi or \n247 acres) and river estuaries. \n\n\n\n**Modern Lyon**\n\n**Timeline of Lyon**\n**Historical affiliations**\n\n Roman Empire (Gallia Lugdunensis), 43 \n\nBC-286 \n\nFernand Braudel \nremarked, \n\"Historians of Lyon are not \nthe bi- \nsufficiently aware of \npolarity between Paris and Lyon, \nwhich is a constant structure in \nFrench development...from \nthe \nlate Middle Ages to the Industrial \nRevolution\".[31] In the late 15th century, the fairs introduced by Italian \nmerchants made Lyon the economic counting house of France. Even the \n*Bourse*(treasury), built in 1749, resembled a public bazaar where \naccounts were settled in the open air. When international banking moved \nto Genoa, then Amsterdam, Lyon remained the banking centre of \nFrance. \n\n Western Roman Empire (Gallia \n\nLugdunensis), 286-411 \n\n Kingdom of the Burgundians, 411–534 \n Francia, 534–843 \n Middle Francia, 843–855 \n Lotharingia, 855–879 \n Lower Burgundy, 879-933 \n Kingdom of Arles, 933–1312 \n Kingdom of France (Lyonnais), 1312– \n\nThe Roman-era Theatre on the \nFourvière Hill \n\n1792 \n\nDuring the Renaissance, the city's development was driven by the silk \ntrade, which strengthened its ties to Italy. Italian influence on Lyon's \narchitecture is still visible among historic buildings.[32] In the late 1400s \nand 1500s Lyon was also a key centre of literary activity and book \npublishing, both of French writers (such as Maurice Scève, Antoine \nHeroet, and Louise Labé) and of Italians in exile (such as Luigi \nAlamanni and Gian Giorgio Trissino). \n\n\n\n French First Republic, 1792–1793 \n Counter-revolutionary, 1793 \n French First Republic, 1793–1804 \n First French Empire, 1804–1814 \n Kingdom of France, 1814–1815 \n First French Empire, 1815 \n Kingdom of France, 1815–1830 \n Kingdom of France, 1830–1848 \n French Second Republic, 1848–1852 \n Second French Empire, 1852–1870 \n French Third Republic, 1870–1940 \n Vichy France, 1940–1944 \n French Fourth Republic, 1944–1958 \n France, 1958–present \n\nIn 1572, Lyon was a scene of mass violence by Catholics against \nProtestant Huguenots in the St. Bartholomew's Day Massacre. Two \ncenturies later, Lyon was again convulsed by violence during the French \nRevolution, when the citizenry rose up against the National Convention \nand supported the Girondins. The city was besieged by Revolutionary armies for over \ntwo months before it surrendered in October 1793. Many buildings were destroyed, \nespecially around the Place Bellecour, and Jean-Marie Collot d'Herbois and Joseph \nFouché administered the execution of more than 2,000 people. The Convention \nordered that its name be changed to \"Liberated City\", and a plaque was erected that \nproclaimed \"Lyons made war on Liberty; Lyons no longer exists\". A decade later, \nNapoleon ordered the reconstruction of all the buildings demolished during that \nperiod. \nLyon under siege in 1793", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia4.pdf" - }, - { - "text": "II \nWielbark, Poland \nI \n\nBritain \nEastern Europe \n1 \n0 \n\nn \no \ns \nn \ne \nm \nD \n\nCentral Europe \ni \nHungary and Slovakia \n\nPortugal \n\n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n–0.002 –0.001 0 \n0.001 \nDimension 2 \n0.002 0.003 0.004 \n\nb \n\n3.3 \n2 \n\nIron Age, Denmark \n(first to third century CE) \n\n3 \nFriesland, the Netherlands \n(fifth to sixth century CE) \n\nII I III \n13 \n\n6 \nMedieval Poland (tenth \nto eleventh century CE) \nWielbark, Poland \n(first to third century CE) \n3 \n\nLa Tène, Slovakia \n(first century BCE \nto first century CE) \n\n2 \nBaiuvarii \n(fifth century CE) \n1 \n9 \nZohor, Slovakia \n(first to second \ncentury CE) \nLongobard \n(sixth century CE) \nI II 7 \n\nEarly medieval \nSlovakia \n(third to fifth century CE) \n\n4.7 \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \nSlovakia_Zohor_Germanic_Roman \nSlovakia_earlyMED \nSlovenia.lronRoman \nSlovenia.Roman.oNorthEurope \n\nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian Peninsula EIA \nRegular f3-statistics 0.002 \n\nEngland Diffield Terrace \nDenmark IA \nBritain \n\n0 1 \n\nn \no \ns \nn \ne \nm \nD \n\ni \n\nCentral \nEurope \n\nEarly medieval, \nincluding Wielbark, \nBaiuvarii, \nLongobards, \nEngland earlyMED, \nSlovakia earlyMED \n\nPortugal \n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n0.002 0.003 –0.002 –0.001 0 0.001 0.004 \nDimension 2 \n\nAnatolia_EBA \nAustria_Klosterneuburg_Roman \nBaiuvari_earlyMED \nBritain.lronRoman \nCentraIEurope.IronRoman(l) \nCentraIEurope.IronRoman(Il) \nCentraIEurope.IronRoman(IIl) \nCordedWare_EBA \nCroatia.IronRoman_oNorthEurope \nDenmark_BA Denmark_EVA \nDenmark_IA \nEngland_earlyMED_highCNE \nEngland_earlyMED_lowCNE \nEngland_earlyMED_midCNE \nEngland.Driffield.Terrace.Scandinavia \nHungary_earlyMED(I) \nHungary_earlyMED(II) \nHungarySlovakia.lronRoman \nIrelandOrkney_BA \n\nItaly.lmperial(l) \nltaly.lmperial(ll) \nltaly.lronRepublic \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_earlyMED(I) \nLongobard_earlyMED(II) \nMontenegro_earlyMED \nNetherlands_Friesland_earlyMED \nPoland_BA \n\n**Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**\n**a**, Source groups used for qpAdm modelling of early medieval Europe. MDS is \ncomputed jointly with individuals from later periods using pairwise outgroup \n*f*3 statistics (outgroup: Han Chinese people). These are calculated using \nTwigstats on Relate genealogies with a cut-off of 1,000 generations. The \ngeographical map shows sampling locations of these individuals.**b**, The \ngenetic structure of ancient groups predominantly from early medieval \ncontexts shown on the same MDS as in**a**. The magnified inset shows an MDS \ncomputed without Twigstats on the same samples as the Twigstats MDS and \nfocusing on early medieval or later individuals.**c**, Ancestry models of early \nmedieval (EM) groups across Europe computed using qpAdm. Sample sizes are shown in black boxes. Sources are highlighted in**a**and marked as bold in the \nkey, and were used in a rotational qpAdm scheme. For each target group, we \nremove models with infeasible admixture proportions (falling outside [0, 1]) \nand use a Twigstats cut-off of 1,000 generations. All models satisfy*P*> 0.01, \nunless a −log10[*P*value] is shown next to the model. If models satisfy*P*> 0.05, \nwe show all such models; otherwise, we show only the model with the largest \n*P*value.**d**, The ancestry proportion derived from EIA Scandinavia in groups \nwith a non-zero component of this ancestry. We show groups modelled in**c**\nthat have a feasible model (*P*> 0.01). In**c**,**d**, we show one s.e. BA, Bronze Age; \nCNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking \nAge; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "**19th century and modern city**\n\nOpéra Nouvel (1831), renovated in 1993 by Jean Nouvel \nThéâtre des Célestins (1877), designed by Gaspard André \nBasilica of Notre-Dame de Fourvière, large 19th-century basilica on the top of Fourvière Hill \nTour métallique de Fourvière (1894) \nVacherie du Parc (1904-1905), designed by Tony Garnier. \n*La Mouche*Cattle Market and Abattoir (1914, 1928), also by Garnier", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Osaka, Japan, since 1984 \nOuagadougou, Burkina Faso \nPorto-Novo, Benin \nRabat, Morocco \nSt. Louis, United States[85] \nSaint Petersburg, Russia \nSétif, Algeria \nTinca, Romania \nTurin, Italy \nYerevan, Armenia, since 1992 \nYokohama, Japan, since 1959 \n\nFrankfurt, Germany, since 1960 \nGothenburg, Sweden \nGuangzhou, China, since 1988 \nHaute Matsiatra, Madagascar \nHo Chi Minh City, Vietnam, since 1997 \nJericho, Palestine \nLeipzig, Germany, since 1981 \nŁódź, Poland, since 1991 \nMelbourne, Australia \nMilan, Italy, since 1966 \nMontreal, Canada, since 1979 \nOran, Algeria \n\n**Notable people**\n\n***Geography portal***\n\n***Europe portal***\n\n***European Union***\n***portal***\n\n***France portal***\n\nList of films set in Lyon \nList of streets and squares in Lyon \nMères of France \nMontchat \nOccupation of Saint-Nizier church by Lyon prostitutes \n\n**Notes**\n\na. A war cry from 1269, spelt in modern Franco-Provençal as*Avant, Avant, Liyon lo mèlyor*. \nb. Quote from a letter of Cicero to Lucius Munatius Plancus, founder of the city.[1] \nc. Pronunciation: UK: /ˈliːɒ̃/,[8][9] US: /liˈoʊn/*lee-OHN*;[10][11] French: [ljɔ̃] ⓘ; formerly spelled in English as \n\n*Lyons*(/ˈlaɪənz/*LY-*ə*nz*).[11][12] Arpitan:*Liyon*[ʎjɔ̃]; Occitan:*Lion*, hist.*Lionés*.[13] \n\nd. Constant PPP US dollars, base year 2015. \n\n**References**\n\n\n \n \n \n \n [html]\n
1. \" CX0897 [ 100 ]: TWWKISNBINIDNIDNIDENVODENTIDENTIDLSTIIIIIIIFQ1. EpISIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
2. \" Ripentore national des disc less mairers \" ( https :// www. data. goxs lt / htlatasetol / 257 / sLAR - dSIc - 4012 / 55Ae - 2.9eelThDHSSSSTI ) ( n Frinth ), data. gox. h. Platelorme ouverte des domeles publiques hascases. 12 September
and. 2. Comparity of physion - Jonk unbanies [ 20 ] do Lys ( 35787 ) [ 99 ]: Pittps :// www. minee h1f / histotistiques / 26597gges / rUU35252545765 ]. HCEE, Photomol 3 Juni 201244. “ Comparatour de territion - Jontation - Job, territories - Jobr
5. Topulations de reference 2027 ( https :// www. insee. thf / statistiques / EDED27ger =− COM. 932.23 ) ( in Frinch ). The National Institute of Statistics and Economic Studies. 25 December 2024.
", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia4.pdf" - }, - { - "text": "POSITIVE STATIC \nSTABILITY \n\n\n\n\n\n\nCREASED POSIT,VE \nTIC STABILITY \n\n\n\n\n\n\n\n\n\nNEUTRAL STATIC STABILITY \n\n\n\n\n\n\nNEGATIVE \nSTATIC STABILITY", - "page_start": 265, - "page_end": 265, - "source_file": "00-80T-80.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Causes and build - up to the warBy the time of the Presee of Ryswick, the Spatiels had been a source of concerns in Earspean beaders for well or years. King Che / ey... If noled a vast empire comprising Spain, Naples, Sic33y, Milan, the Spanids Netherlands, and nSpanish col
\n\nThe principal claimants to the throne of Spain belonged to the ruling families of France and Austria. The French claim derived \nfrom Louis XIV's mother Anne of Austria (the older sister of Philip IV of Spain) and his wife Maria Theresa (Philip IV's eldest \ndaughter). Based on the laws of primogeniture, France had the better claim as it originated from the eldest daughters in two \ngenerations. However, their renunciation of succession rights complicated matters. In the case of Maria Theresa, nonetheless, the \nrenunciation was considered null and void owing to Spain's breach of her marriage contract with Louis. In contrast, no \nrenunciations tainted the claims of Emperor Leopold I's son Charles, Archduke of Austria, who was a grandson of Philip III's \nyoungest daughter Maria Anna. The English and Dutch feared that a French or Austrian-born Spanish king would threaten the \nbalance of power and thus preferred the Bavarian Prince Joseph Ferdinand, a grandson of Leopold I through his first wife \nMargaret Theresa of Spain (the younger daughter of Philip IV). \n\nIn an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided \nSpain's Italian territories between Louis's son*le Grand Dauphin*and Archduke Charles, with the rest of the empire awarded to \nJoseph Ferdinand. William III consented to permitting the Dauphin's new territories to become part of France when the latter", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EEFT_2000.pdf", - "query": "What was the total amount of operating expenses of 2000 by Network Wordwide in 2000 ?", - "target_page": 17, - "target_passage": "Total operating expenses increased to $88.1 million for the year ended December 31, 2000", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Comparison of Results of Operations for the Years Ended December 31, 2000, 1999 and 1998**\n\n**Annual Consolidated Revenues**\n27% increase for full year \n2000 over 1999 \n**5 2 . 7**\n\n**4 1 . 5**\n\n**Revenues**The Company’s total revenues increased to $52.7 million for the year ended December \n31, 2000 from $41.5 million for the year ended December 31, 1999 and $11.9 million for the year \nended December 31, 1998. The increase in revenues from 1999 to 2000 is primarily due to two \nfactors: (1) a $10.4 million increase in Network Services Segment revenues resulting from the \ni n c rease in transaction volumes in the Company owned ATMs and an increase in the number of AT M s \noperated by the Company during this period; and (2) an increase of $800,000 in Software Solutions \nSegment revenues. The increase in revenues from 1998 to 1999 is primarily due to two factors: (1) a \n$15.0 million increase in Network Services Segment revenues resulting from the increase in \ntransaction volume attributable to an increase in the number of ATMs operated by the Company \nduring this period; and (2) the addition of $14.6 million of Software Solutions Segment re v e n u e s . \nRevenues for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment \nResults of Operations sections below. \n\n**1 1 . 9**\n\n**5 . 3**\n\n**1 . 3**\n**0 . 1**\n\n**Operating Expenses**Total operating expenses increased to $88.1 million for the year ended \nDecember 31, 2000 from $68.3 million for the year ended December 31, 1999 and from $34.5 \nmillion for the year ended December 31, 1998. The increase from 1999 to 2000 can be broken down \nby segment as follows: (1) a $3.5 million increase in Network Services Segment operating costs due to growth in the size of the network \noperations; (2) a $15.2 million increase in Software Services Segment due to write down of intangibles of $11.2 million and investment in \npersonnel and re s o u rces; and (3) a $1.1 million increase in Corporate Services Segment operating costs due to the expended operations. The \ni n c rease from 1998 to 1999 can be broken down by segment as follows: (1) a $13.0 million increase in Network Services Segment operating costs, \n(2) the addition of $19.6 million of Software Solutions Segment operating costs, and (3) a $1.2 million increase in Corporate Services Segment \noperating costs. Operating expenses for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment Results of \nOperations sections below. \n\n**1995 1996 1997 1998 1999 2000**\n\n**Operating Loss**The Company generated an operating loss of $35.4 million for the year ended December 31, 2000 compared to $26.8 million \nfor the year ended December 31, 1999 and $22.6 million for the year ended December 31, 1998. The increased operating loss from 1999 to 2000 \nis due to the net effect of three factors: (1) a $6.8 million decrease in the operating loss from the Company’s Network Services Segment; (2) a \n$14.3 million increase in the operating loss from the Company’s Software Solutions Segment; and (3) a $1.1 million increase in the operating loss \nf rom the Company’s Corporate Services Segment. The increased operating loss from 1998 to 1999 is due to the net effect of three factors: (1) a \n$1.9 million decrease in operating losses from the Company’s Network Services Segment; (2) the addition of $4.8 million in operating losses fro m \nthe Company’s Software Solutions Segment; and (3) a $1.3 million increase in operating losses from the Company’s Corporate Services Segment.", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "Network operating costs were $33.6 million, an increase of $1.1 million or 3.4%. The largest item in network \noperating costs is travel expense. These costs made up 31.8% and 32.9% of the total network and other costs in 2003 \nand 2002, respectively. Travel expense is the cost of minutes used by the Company’s PCS subscribers on Sprint or \nother Sprint Affiliates’ networks. Travel expense in 2003 was $10.8 million, an increase of $0.1 million due to a \nsignificant increase in travel minutes in 2003 which was offset by the impact of the rate decline. The travel rate \ndeclined from $0.10 per minute in 2002 to $0.058 per minute in 2003. Our PCS customers increased their average \nmonthly travel minutes by 22% compared to 2002. In 2002, the average customer’s travel usage was 130 minutes per \nmonth and in 2003 that average travel usage increased to 159 minutes per month. \n\nNetwork infrastructure maintenance costs were $4.9 million or 14.6% of total network operating costs, a decrease of \n$0.2 million from 2002. Rent for towers, tower sites, and buildings increased $0.9 million or 27.3% to $4.2 million. \nLease escalators plus the increase in the number of sites leased contributed to the increase. Line costs in 2003 were \n$9.8 million or 29.1% of the network operating costs, an increase of $0.1 million. \n\nDepreciation and amortization expense was $16.6 million, an increase of $2.1 million or 14.8%. The PCS operation had \ndepreciation expense of $10.2 million, an increase of $1.6 million or 18.9%. The 16 additional PCS base stations placed \nin service during 2003 resulted in higher depreciation expense for the year. In the telephone operation, depreciation", - "page_start": 48, - "page_end": 48, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "\n \n \n \n \n [html]( in thousunds )Years ending December 31,20001999\n
ATM connunication$+, 183S3.982
ATM cash filling and interest on network cash7.4265.900
ATM maintenance3.9872.967
ATM site rental2.2582.421
ATM installation675783
Transaction processing and XTM monitoring5.242+, 205
Other6001.663
Total direct operating expensesS24.371S21.921
\n\nAs a percentage of network revenue, direct operating costs fell from 83% for the year ended December 31, 1999 to 66% for the year ended \nDecember 31, 2000. On a per ATM basis the direct operating costs fell from $12,782 per ATM for the year ended December 31, 1999 to $9,807 \nper ATM for the year ended December 31, 2000, an improvement of 23%. On a per transaction basis the direct operating costs fell from $0.66 \nper transaction for the year ended December 31, 1999 to $0.46 per transaction for the year ended December 31, 2000, an improvement of 30%. \n\nSegment salaries and benefits increased to $7.4 million for the year ended December 31, 2000 from $7.2 million for the year ended December \n31, 1999, an increase of 3%. The increase in the year-on-year expenses reflect the continued expansion of the operations to We s t e rn Euro p e a n \nmarkets with significantly higher labor costs than Central Europe as well as some increases in staff levels at the processing center re q u i red to \nmaintain quality service in line with the rising transaction volumes. As a percentage of Network Services Segment revenue, salaries and benefits \nfell from 27% for the year ended December 31, 1999 to 20% for the year ended December 31, 2000. \n\nSelling, general and administrative costs allocated to the Network Services Segment decreased to $2.4 million for the year ended December 31, \n2000 from $2.9 million for the year ended December 31, 1999. The $500,000 cost decrease for the year ended December 31, 2000 results fro m \nthe net effect of (1) a $600,000 increase in the allocation of costs from the selling, general and administrative line of the Budapest pro c e s s i n g \ncenter to the operating cost line, as discussed above, from $2.9 million for the year ended December 31, 1999 to $3.5 for the year ended \nDecember 31, 2000 and (2) a $100,000 increase in costs associated with the expansion of the Company’s network operations. \n\nD e p reciation and amortization increased to $8.0 million for the year ended December 31, 2000 from $7.4 million for the year ended December \n31, 1999. The increases are due primarily to the increase in the number of owned ATMs as discussed pre v i o u s l y. The Company also re c o rded an \n$800,000 write-down of certain ATM hard w a re assets for the year ended December 31, 2000, as previously discussed.", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**Operating Loss**The total Network Services Segment operating loss decreased to $6.1 million for the year ended December 31, 2000 from $12.9 \nmillion for the year ended December 31, 1999, an improvement of 53%, as a result of the factors discussed above. The Central European Sub- \nsegment re c o rded an operating loss of $3.1 million for the year ended December 31, 2000 compared to a loss of $8.0 million for the year ended \nDecember 30, 1999, an improvement of 61%, as a result of the factors discussed above. The We s t e rn European Sub-segment operating loss \nd e c reased to $2.3 million for year ended December 31, 2000 compared to a loss of $3.8 million for the year ended December 31, 1999, an \ni m p rovement of 39%, as a result of the factors discussed above. The Other ATM Operations Sub-segment incurred an operating loss of $700,000 \nfor the year ended December 31, 2000 compared to a loss of $1.0 million for the year ended December 31, 1999, an improvement of 30%, as a \nresult of the factors discussed above. \n\nSoftware Solutions Segment \n\n**Software Solutions Revenue**Revenues from the Software Solutions Segment totaled $16.0 million before inter-segment eliminations for the \nyear ended December 31, 2000 as compared to revenue of $15.1 for the year ended December 31, 1999. Software revenues are grouped into four \nb road categories: software license fees, professional service fees, maintenance fees and hard w a re sales. Software license fees are the initial fees \nc h a rged by the Company for the licensing of its pro p r i e t a ry application software to customers. Professional service fees are charged for \ncustomization, installation and consulting services provided to customers. Software maintenance fees are the ongoing fees charged to customers \nfor the maintenance of the software products. Hard w a re sales revenues are derived from the sale of computer products and are re p o rted net of \ncost of sales. The components of software solutions revenue for the years ended December 31, 2000 and 1999 were: \n\n\n \n \n \n \n [html]( in thousonols )Years ending December 31,20001999\n
Software license fees$+, 11782.430
Professional service fees6.8678.298
Maintenance fees4.487+. 051
Hardware sales535370
Total direct operating expenses$16.006815.149
\n\nThe increases in software license fees from 1999 to 2000 can be attributed to an increased number of software sales contracts signed in 2000 as \nc o m p a red to 1999, primarily in the first half of the year 2000. Sales of the Company’s core software products have dropped off substantially in \nthe third and fourth quarter of 2000 and are expected to be soft again during 2001. The Company believes that revenues of the Software \nSolutions Segment will increasingly be derived from the Company’s new set of software solutions, including its wireless banking solutions. \nThe decreases in professional service fees from 1999 to 2000 can be attributed to increased efficiency in the installation of software.", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "\n \n \n \n \n [html]RevenuesOperating Loss200019992000\n
( In thousands )
Year ended December 31,
1999
Network ServicesCentral Europe$18.599812.664$
( 3.070 )8( 8.019 )Western Europe
16.61512.637( 2.286 )( 3.840 )
Other1.7001.202( 709 )
( 1.048 )Total Network Services36.91 +26.503
( 6.065 )( 12.907 )Software Solutions16.006
15.149( 21.469 )( 7.141 )Corporate Services
( 7.862 )( 6.750 )
\n\n**Revenues**Total segment revenues increased by $10.4 million or 39% to $36.9 million for the year ended December 31, 2000 from $26.5 million \nfor the year ended December 31, 1999. The increase in revenues is due primarily to the significant increase in transaction volume and an incre a s e \nin the number of ATMs operated by the Company during these periods. The Company had 2,283 ATMs installed as of December 31, 1999 and \np rocessed 32.9 million transactions for the year ended December 31, 1999. As of December 31, 2000, the Company’s owned and operated AT M \nnetwork increased by 351 ATMs, or 15%, to a total of 2,634 ATMs, of which 72% are owned by the Company and 28% are owned by banks or \nother financial institutions but operated by the Company through management agreements. The Company processed 52.7 million transactions for \nthe year ended December 31, 2000, an increase of 19.8 million transactions, or 60%, over the year \nended December 31, 1999. \n\n**Network Services: Revenue**\n39% increase for full year 2000 over 1999 \n\nRevenues for the Central European Sub-segment totaled $18.6 million for the year ended December \n31, 2000 as compared to $12.7 million for the year ended December 31, 1999, an increase of 47%. \nThe increase in revenues is largely the result of an increase in the number of ATMs operated by the \nCompany from 1,203 at December 31, 1999 to 1,391 at December 31, 2000, and incre a s e d \ntransaction volumes. \n\n**3 6 . 9**\n\n**2 6 . 5**\n\nRevenues for the We s t e rn European Sub-segment totaled $16.6 million for the year ended December \n31, 2000 as compared to $12.6 million for the year ended December 31, 1999, an increase of 31%. \nThe increase in revenues is largely the result of an increase in the number of ATMs operated by the \nCompany from 621 at December 31, 1999 to 787 at December 31, 2000, and increased transaction \nvolumes. \n\n**1 1 . 5**\n\n**5 . 3**\n\n**1 . 3**\n**0 . 1**\n\n**1995 1996 1997 1998 1999 2000**\n\nRevenues for the Other ATM Operations Sub-segment were $1.7 million for the year ended \nDecember 31, 2000 as compared to $1.2 million for the year ended December 31, 1999, an incre a s e \nof 41%. The revenues from this segment are the result of the acquisition of the Dash network located in the United States in August 1999.", - "page_start": 17, - "page_end": 17, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "The Company re c o rded an $800,000 write-down of certain ATM hard w a re assets associated with the \np u rchase of the Budapest Bank ATM network in May 2000 and the Service Bank ATM network in \nM a rch 1999 (see Note 10 to the Consolidated Financial Statements – Asset Write Down). In addition, \nthe Company re c o rded a one-time gain in its Central European Sub-segment of $1.2 million. The \ngain is related to a change in Hungarian law that eliminates a major portion of the Company’s \nliability for import taxes on ATM hard w a re to the Hungarian government. The gain is included as an \nelement of direct operating costs. \n\n**Network Services: EBITDA**\n**1 . 3**\n\n**0 . 7**\n**0 . 4**\n\n**- 0 . 7**\n\nThe operating expenses for the Central European Sub-segment totaled $21.7 million for the year \nended December 31, 2000 as compared to $20.7 million for the year ended December 31, 1999, an \ni n c rease of 5%. The increase in operating expenses is largely the result of an increase in the number \nof ATMs operated by the Company from 1,203 at December 31, 1999 to 1,391 at December 31, \n2000, and increased transaction volumes. \n\n**Q1 Q2 Q3 Q4**\n\nThe operating expenses for the We s t e rn European Sub-segment totaled $18.9 million for the year \nended December 31, 2000 as compared to $16.5 million for the year ended December 31, 1999, an increase of 15%. The increase in operating \nexpenses is largely the result of an increase in the number of ATMs operated by the Company from 621 at December 31, 1999 to 787 at \nDecember 31, 2000, and increased transaction volumes. \n\nThe operating expenses for the Other ATM Operations Sub-segment were $2.4 million for the year ended December 31, 2000 as compared to \n$2.2 million for the year ended December 31, 1999, an increase of 9%. The operating expenses from this segment are the result of the acquisition \nof the Dash network located in the United States in August 1999 and the unallocated costs associated with the Company's processing facilities. \n\nD i rect operating costs in the Network Services Segment consist primarily of: ATM installation costs; ATM site rentals; and costs associated with \nmaintaining ATMs, ATM telecommunications, interest on network cash and cash delivery and security services to ATMs. Such costs increased to \n$24.4 million for the year ended December 31, 2000 from $21.9 million for the year ended December 31, 1999. The increase in direct operating \ncosts is primarily attributable to costs associated with operating the increased number of ATMs in the network during the periods. Also, \ni n t e rcompany allocations were made to charge the ATM operations with transaction switching and bank connection fees associated with the \noperations central processing center in Budapest. These allocations totalled $3.5 million and $2.9 million for the years ended December 31, 2000 \nand 1999, re s p e c t i v e l y. Direct operating costs for 2000 include a one-time gain of $1.2 million due to a change in Hungarian law that eliminates a \nmajor portion of the Company’s liability for import taxes on ATM hard w a re. Direct operating costs also include a $657,000 gain realized in 1999 \nf rom the sale of the Croatian network assets. The components of direct operating costs for the years ended December 31, 2000 and 1999 were:", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**2024** **2023**\n\nNet assets without donor restrictions: \n\nSupport and revenue: \n\nContributions of cash and other financial assets \nContributions of nonfinancial assets and services \nForeign currency losses \nOther income, net \nInvestment income, net \nRelease of net assets with donor restrictions \n\n$ \n\n168,212,977 \n263,476 \n(300,907) \n5,629,773 \n5,096,842 \n6,481,350 164,121,185 \n1,040,453 \n(94,868) \n3,824,240 \n3,002,929 \n4,732,654 \n\nTotal support and revenue 185,383,511 176,626,593 \n\nOperating expenses: \n\nSalaries and benefits \nAwards and grants \nInternet hosting \nIn-kind service expenses \nDonation processing expenses \nProfessional service expenses \nOther operating expenses \nTravel and conferences \nDepreciation and amortization 106,793,960 \n26,820,080 \n3,116,445 \n263,476 \n7,547,718 \n13,090,040 \n10,798,140 \n5,824,979 \n4,216,271 101,305,706 \n24,433,682 \n3,120,819 \n1,040,453 \n6,855,680 \n15,464,635 \n7,393,982 \n4,878,359 \n4,602,064 \n\nTotal operating expenses \n\nChange in net assets without donor restrictions \n\nfrom operating activities \n\nNonoperating activities: \n\nUnrealized gains on investments, net \n\nChange in net assets without donor restrictions \n\nNet assets with donor restrictions: \n\nContributions with donor restrictions \nNet assets released from restrictions \n\nIncrease (decrease) in net assets with donor \n\nrestrictions \n\nIncrease in net assets \n\nNet assets at beginning of year \n\nNet assets at end of year", - "page_start": 5, - "page_end": 5, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Total consolidated operating expenses $ 8 8 , 1 36. $ 6 8 , 2 70 . $ 3 4 , 4 9 2. \n\n\n \n \n \n \n [html]Total RevenuesLong - lived AssetsYear ended December 31,December 31,20001999199820001999( in thousands )\n
United States817.442816.1728356S98 +81.155
Germany9.98411.1602.394+, 25006.635
Hungary6.5245.6065.9365.8789.11 +
Poland9.1 + 75.7982.7879.82410.991
Other9.6 ± 32.736+ 0310.1718.798
TotalS52.740S+ 1.4728 11.881S31.657S36.693
\n\nTotal revenues are attributed to countries based on location of customer for the ATM and related service segment. For revenues generated by \nthe Euronet USA software solutions segment, all revenues are attributed to the United States. Long lived assets consist of pro p e rt y, plant, \nand equipment, net of accumulated depreciation.", - "page_start": 43, - "page_end": 43, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "“Key Performance Indicators*”*. \n\n**WIRELESS POSTPAID AND PREPAID SUBSCRIBERS**\n(IN THOUSANDS) \n\n**2013**\n\n2012 \n\n2011 \n\nPrepaid Postpaid \n\n\n \n \n \n \n [html]( In millions of dollars, except percentages )Years ended December 31Operating revenueOperating expensesAdjusted operating profit margin αs\n
20132012% Chg
Network revenue$ 6.748$ 6.719
Equipment sales522561( 7 )
Operating revenue – Wireless7.2707.280
Cost of equipment 1( 1.535 )( 1.585 )( 3 )
Other operating expenses( 2.578 )( 2.632 )( 2 )
( 4.113 )( 4.217 )( 2 )
Adjusted operating profit – Wireless$ 3.157$ 3.0633
% of network revenue46.8 %45.6 %
Additions to property, plant and equipment$865$ 1.123
( 23 )Oata revenue included in network revenue$ 3.175$ 2.722
17Data revenue as % of network revenue47 %
\n\n**Operating Revenue**\nOur operating revenue depends on the size of our subscriber base, the \naverage revenue per user and revenue from equipment sales. \n\n*Higher Network Revenue*\nNetwork revenue includes revenue derived from voice and data services \nfrom postpaid monthly fees, airtime, data usage, long distance charges, \noptional service charges, inbound and outbound roaming charges and \ncertain fees, as well as prepaid usage for airtime, data and other \nancillary charges such as long distance.", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**$ 462,122**\n\n**1,021,826**\n\n**245,816**\n\n**1.88**\n\n**$** **4,126**\n\n**0.6%**\n\n**$ 709,889**\n\n**678,391**\n\n**216,306**\n\n*(In thousands, except for per share data)*\n\nI N C O M E S T A T E M E N T D A T A \n\nNet sales \n\nGross profit \n\nGross profit as a % of: \n\n Net sales \n\n Selling and administrative expenses \n\nRestructuring related charges \n\nOperating income \n\nNet income \n\nNet income as a % of: \n\n Net sales \n\n Average shareholders’ equity \n\nPer common share: \n\n Net income – basic \n\n Net income – diluted \n\n Book value – basic \n\n Cash dividends \n\nB A L A N C E S H E E T D A T A \n\nCurrent assets \n\nTotal assets \n\nCurrent liabilities \n\nCurrent ratio \n\nLong-term debt and capital lease obligations \n\nDebt/capitalization ratio \n\nShareholders’ equity \n\nAverage shareholders’ equity \n\nWorking capital \n\nO T H E R D A T A \n\nCapital expenditures \n\nCash flow from operations \n\nWeighted-average shares outstanding during year – basic \n\nPrice/earnings ratio at year-end \n\nNumber of shareholders at year-end \n\nMembers (employees) at year-end", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EEFT_2000.pdf", - "query": "What was the share of revenues of Netwrok Wordwide made in Poland and Hungary in 2000 ?", - "target_page": 24, - "target_passage": "In 2000, 30% of the Company’s revenues were generated in Poland and Hungary", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]RevenuesOperating Loss200019992000\n
( In thousands )
Year ended December 31,
1999
Network ServicesCentral Europe$18.599812.664$
( 3.070 )8( 8.019 )Western Europe
16.61512.637( 2.286 )( 3.840 )
Other1.7001.202( 709 )
( 1.048 )Total Network Services36.91 +26.503
( 6.065 )( 12.907 )Software Solutions16.006
15.149( 21.469 )( 7.141 )Corporate Services
( 7.862 )( 6.750 )
\n\n**Revenues**Total segment revenues increased by $10.4 million or 39% to $36.9 million for the year ended December 31, 2000 from $26.5 million \nfor the year ended December 31, 1999. The increase in revenues is due primarily to the significant increase in transaction volume and an incre a s e \nin the number of ATMs operated by the Company during these periods. The Company had 2,283 ATMs installed as of December 31, 1999 and \np rocessed 32.9 million transactions for the year ended December 31, 1999. As of December 31, 2000, the Company’s owned and operated AT M \nnetwork increased by 351 ATMs, or 15%, to a total of 2,634 ATMs, of which 72% are owned by the Company and 28% are owned by banks or \nother financial institutions but operated by the Company through management agreements. The Company processed 52.7 million transactions for \nthe year ended December 31, 2000, an increase of 19.8 million transactions, or 60%, over the year \nended December 31, 1999. \n\n**Network Services: Revenue**\n39% increase for full year 2000 over 1999 \n\nRevenues for the Central European Sub-segment totaled $18.6 million for the year ended December \n31, 2000 as compared to $12.7 million for the year ended December 31, 1999, an increase of 47%. \nThe increase in revenues is largely the result of an increase in the number of ATMs operated by the \nCompany from 1,203 at December 31, 1999 to 1,391 at December 31, 2000, and incre a s e d \ntransaction volumes. \n\n**3 6 . 9**\n\n**2 6 . 5**\n\nRevenues for the We s t e rn European Sub-segment totaled $16.6 million for the year ended December \n31, 2000 as compared to $12.6 million for the year ended December 31, 1999, an increase of 31%. \nThe increase in revenues is largely the result of an increase in the number of ATMs operated by the \nCompany from 621 at December 31, 1999 to 787 at December 31, 2000, and increased transaction \nvolumes. \n\n**1 1 . 5**\n\n**5 . 3**\n\n**1 . 3**\n**0 . 1**\n\n**1995 1996 1997 1998 1999 2000**\n\nRevenues for the Other ATM Operations Sub-segment were $1.7 million for the year ended \nDecember 31, 2000 as compared to $1.2 million for the year ended December 31, 1999, an incre a s e \nof 41%. The revenues from this segment are the result of the acquisition of the Dash network located in the United States in August 1999.", - "page_start": 17, - "page_end": 17, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "The Company re c o rded an $800,000 write-down of certain ATM hard w a re assets associated with the \np u rchase of the Budapest Bank ATM network in May 2000 and the Service Bank ATM network in \nM a rch 1999 (see Note 10 to the Consolidated Financial Statements – Asset Write Down). In addition, \nthe Company re c o rded a one-time gain in its Central European Sub-segment of $1.2 million. The \ngain is related to a change in Hungarian law that eliminates a major portion of the Company’s \nliability for import taxes on ATM hard w a re to the Hungarian government. The gain is included as an \nelement of direct operating costs. \n\n**Network Services: EBITDA**\n**1 . 3**\n\n**0 . 7**\n**0 . 4**\n\n**- 0 . 7**\n\nThe operating expenses for the Central European Sub-segment totaled $21.7 million for the year \nended December 31, 2000 as compared to $20.7 million for the year ended December 31, 1999, an \ni n c rease of 5%. The increase in operating expenses is largely the result of an increase in the number \nof ATMs operated by the Company from 1,203 at December 31, 1999 to 1,391 at December 31, \n2000, and increased transaction volumes. \n\n**Q1 Q2 Q3 Q4**\n\nThe operating expenses for the We s t e rn European Sub-segment totaled $18.9 million for the year \nended December 31, 2000 as compared to $16.5 million for the year ended December 31, 1999, an increase of 15%. The increase in operating \nexpenses is largely the result of an increase in the number of ATMs operated by the Company from 621 at December 31, 1999 to 787 at \nDecember 31, 2000, and increased transaction volumes. \n\nThe operating expenses for the Other ATM Operations Sub-segment were $2.4 million for the year ended December 31, 2000 as compared to \n$2.2 million for the year ended December 31, 1999, an increase of 9%. The operating expenses from this segment are the result of the acquisition \nof the Dash network located in the United States in August 1999 and the unallocated costs associated with the Company's processing facilities. \n\nD i rect operating costs in the Network Services Segment consist primarily of: ATM installation costs; ATM site rentals; and costs associated with \nmaintaining ATMs, ATM telecommunications, interest on network cash and cash delivery and security services to ATMs. Such costs increased to \n$24.4 million for the year ended December 31, 2000 from $21.9 million for the year ended December 31, 1999. The increase in direct operating \ncosts is primarily attributable to costs associated with operating the increased number of ATMs in the network during the periods. Also, \ni n t e rcompany allocations were made to charge the ATM operations with transaction switching and bank connection fees associated with the \noperations central processing center in Budapest. These allocations totalled $3.5 million and $2.9 million for the years ended December 31, 2000 \nand 1999, re s p e c t i v e l y. Direct operating costs for 2000 include a one-time gain of $1.2 million due to a change in Hungarian law that eliminates a \nmajor portion of the Company’s liability for import taxes on ATM hard w a re. Direct operating costs also include a $657,000 gain realized in 1999 \nf rom the sale of the Croatian network assets. The components of direct operating costs for the years ended December 31, 2000 and 1999 were:", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**(19) Business Segment Information**\n\nE u ronet and its subsidiaries operate in two business segments: (1) a segment that provides an independent shared ATM network and other \ne l e c t ronic payment network services to banks, retail and financial institutions (the “Network Services Segment”); and (2) a segment that \np roduces application software and solutions for payment and transaction delivery systems (the “Software Solutions Segment”). These \nbusiness segments are supported by a corporate service segment which provides corporate and other administrative services which are not \nd i rectly identifiable with the two business segments, (the “Corporate Services Segment”). The accounting policies of each segment are the \nsame as those described in the summary of significant accounting policies. The Company evaluates perf o rmance based on profit or loss fro m \noperations before income taxes not including nonre c u rring gains and net loss. Prior period segment information has been restated to conform \nto the current period’s presentation. \n\nAs the Network Services Segment continued to grow throughout 1999, the Company’s management began to divide the internal org a n i z a t i o n \nof the segment into Sub-segments. Accord i n g l y, beginning in January 2000, the Company divided the Network Services Segment into thre e \nSub-segments: “Central European Sub-segment” (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), “We s t e rn \nE u ropean Sub-segment” (including Germ a n y, France, and the United Kingdom) and “Other Operations Sub-segment” (including the United \nStates and unallocated processing center costs). Where practical, certain amounts have been reclassified to reflect the change in intern a l \nre p o rting. The Company is unable to present Network Services Segment assets by Sub-segment as of December 31, 1999. Prior to January 1, \n2000, certain assets that were used to provide support services to the Company as a whole were included in the assets in the balance sheet of \nthe Company’s wholly owned Hungarian subsidiary, Bank Tech. In order to segregate corporate assets from those of the Hungarian \noperations, these assets were transferred as of December 31, 1999, from Bank Tech to an existing Hungarian shell company, Administrative \nS e rvices. Those assets are now shown under the Other Operations Sub-segment. \n\nN e t w o r k \nS e rvices \nTo t a l \n*(in thousands)*\nO t h e r \n\n$ 1 6 , 6 1 5. \n( 1 8 , 9 0 1 ) \n$ \n1 , 7 0 0. \n( 2 , 4 0 9 ) $ 3 6 , 9 1 4. \n( 4 2 , 9 7 9 ) —. \n( 7 , 8 6 2 ) $ 5 2 , 9 2 0. \n( 8 8 , 3 1 6 ) ( 3 7 , 4 7 5 ) \n\n( 3 , 0 7 0 ) \n2 8 9. \n( 1 , 0 1 6 ) \n( 6 1 6 ) ( 2 , 2 8 6 ) \n6 5. \n( 1 6 8 ) \n( 4 9 4 ) ( 7 0 9 ) \n1 9 0. \n( 1 5 0 ) \n( 1 5 5 ) \n\nThe following tables present the segment results of the Company’s operations for the years ended December 31, 2000, 1999 and 1998. \n\nYear Ended December 31, 2000 \nNetwork Serv i c e s \n\nCentral \nE u rope We s t e rn \nE u rope S o f t w a re \nSolutions C o r p o r a t e \nS e rvices To t a l \n\nTotal Revenues \nTotal operating expenses $ 1 8 , 5 9 9. \n( 2 1 , 6 6 9 ) \n$ 1 6 , 0 0 6. $ \n\nOperating loss. \nI n t e rest income \nI n t e rest expense \nF o reign exchange (loss)/gain, net \n\nNet loss before income taxes $ ( 4 , 4 1 3 ) $ ( 2 , 8 8 3 ) $ ( 8 2 4 ) \n\nSegment assets \nFixed assets \nD e p reciation and amort i z a t i o n \nAsset write down $ 2 5 , 6 9 7. \n1 7 , 1 4 5. \n3 , 9 7 7. \n6 6 8. $ 1 6 , 7 5 5 \n1 1 , 7 0 7. \n2 , 8 8 4. \n1 1 0. \n\n$ \n\n( 6 , 0 6 5 ) \n5 4 4. \n( 1 , 3 3 4 ) \n( 1 , 2 6 5 ) ( 2 1 , 4 6 9 ) \n1 0 3. \n—. \n1. . ( 7 , 8 6 2 ) \n4 4 2. \n( 9 , 4 9 5 ) \n( 1 , 9 6 3 ) ( 3 5 , 3 9 6 ) \n1 , 0 8 9. \n( 1 0 , 8 2 9 ) \n( 3 , 2 2 7 ) \n\n$ ( 8 , 1 2 0 ) $ ( 2 1 , 3 6 5 ) $( 1 8 , 8 7 8 ) $ ( 4 8 , 3 6 3 ) \n\n3 , 6 5 2. \n1 , 6 8 2. \n1 , 1 0 0. \n— $ 4 6 , 1 0 4. \n3 0 , 5 3 4. \n7 , 9 6 1. \n7 7 8.", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "\n \n \n \n \n [html]( in thousunds )Years ending December 31,20001999\n
ATM connunication$+, 183S3.982
ATM cash filling and interest on network cash7.4265.900
ATM maintenance3.9872.967
ATM site rental2.2582.421
ATM installation675783
Transaction processing and XTM monitoring5.242+, 205
Other6001.663
Total direct operating expensesS24.371S21.921
\n\nAs a percentage of network revenue, direct operating costs fell from 83% for the year ended December 31, 1999 to 66% for the year ended \nDecember 31, 2000. On a per ATM basis the direct operating costs fell from $12,782 per ATM for the year ended December 31, 1999 to $9,807 \nper ATM for the year ended December 31, 2000, an improvement of 23%. On a per transaction basis the direct operating costs fell from $0.66 \nper transaction for the year ended December 31, 1999 to $0.46 per transaction for the year ended December 31, 2000, an improvement of 30%. \n\nSegment salaries and benefits increased to $7.4 million for the year ended December 31, 2000 from $7.2 million for the year ended December \n31, 1999, an increase of 3%. The increase in the year-on-year expenses reflect the continued expansion of the operations to We s t e rn Euro p e a n \nmarkets with significantly higher labor costs than Central Europe as well as some increases in staff levels at the processing center re q u i red to \nmaintain quality service in line with the rising transaction volumes. As a percentage of Network Services Segment revenue, salaries and benefits \nfell from 27% for the year ended December 31, 1999 to 20% for the year ended December 31, 2000. \n\nSelling, general and administrative costs allocated to the Network Services Segment decreased to $2.4 million for the year ended December 31, \n2000 from $2.9 million for the year ended December 31, 1999. The $500,000 cost decrease for the year ended December 31, 2000 results fro m \nthe net effect of (1) a $600,000 increase in the allocation of costs from the selling, general and administrative line of the Budapest pro c e s s i n g \ncenter to the operating cost line, as discussed above, from $2.9 million for the year ended December 31, 1999 to $3.5 for the year ended \nDecember 31, 2000 and (2) a $100,000 increase in costs associated with the expansion of the Company’s network operations. \n\nD e p reciation and amortization increased to $8.0 million for the year ended December 31, 2000 from $7.4 million for the year ended December \n31, 1999. The increases are due primarily to the increase in the number of owned ATMs as discussed pre v i o u s l y. The Company also re c o rded an \n$800,000 write-down of certain ATM hard w a re assets for the year ended December 31, 2000, as previously discussed.", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "Total consolidated operating expenses $ 8 8 , 1 36. $ 6 8 , 2 70 . $ 3 4 , 4 9 2. \n\n\n \n \n \n \n [html]Total RevenuesLong - lived AssetsYear ended December 31,December 31,20001999199820001999( in thousands )\n
United States817.442816.1728356S98 +81.155
Germany9.98411.1602.394+, 25006.635
Hungary6.5245.6065.9365.8789.11 +
Poland9.1 + 75.7982.7879.82410.991
Other9.6 ± 32.736+ 0310.1718.798
TotalS52.740S+ 1.4728 11.881S31.657S36.693
\n\nTotal revenues are attributed to countries based on location of customer for the ATM and related service segment. For revenues generated by \nthe Euronet USA software solutions segment, all revenues are attributed to the United States. Long lived assets consist of pro p e rt y, plant, \nand equipment, net of accumulated depreciation.", - "page_start": 43, - "page_end": 43, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$12.7 billion \n\nWIRELESS**57%** **5.0**\n\n$12.7 \nCABLE**27%**\n**4.8**\nBILLION \n\nMEDIA**13%**\nBUSINESS \nSOLUTIONS**3%**\n**4.7**\n\n\n\n\n\n**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$7.3 billion \n\n**3. 2**\nPOSTPAID VOICE**46%**\n\n$7.3 \nDATA**44%**\n**3.1**\nBILLION \n\nEQUIPMENT**7%**\nPREPAID VOICE**3%**\n**3.0**", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "guarantees for financial instruments and as deposits with customs officials. The decrease resulted primarily from the settlement of the forw a rd \nf o reign exchange contracts using restricted cash and a release of restricted cash resulting from the posting of a surety bond with the Hungarian \nbanking institution that supplies cash to the Company’s ATM network in Hungary. \n\n**Trade Accounts**Trade accounts receivable increased to $9.5 million at December 31, 2000 from $7.9 million at December 31, 1999 due \nprimarily to sales from the Software Solutions Segment and increased Network Services Segment revenues. \n\n**P r o p e r t y, Plant and Equipment**Net pro p e rt y, plant and equipment decreased to $31.7 million at December 31, 2000 from $36.7 million at \nDecember 31, 1999. This decrease is due primarily to a reduction in the rate of installation of ATMs and fixed asset additions. Fixed asset \nd e p reciation was in excess of fixed asset additions, and the write-off of $800,000 in ATM hard w a re further reduced the net fixed asset position. \n\n**Intangible Assets**The decrease in net intangible assets to $2.6 million at December 31, 2000 from $16.3 million at December 31, 1999 is due \nprimarily to the $11.2 million write-down of goodwill and other identifiable intangible assets associated with the Software Solutions Segment (see \nNote 9 to the Consolidated Financial Statements – Intangibles). In addition, the decrease is the result of amortization of purchased intangibles \na c q u i red in the Euronet USA acquisition in 1998, and the SBK and Dash acquisitions in 1999. \n\n**Current Liabilities**C u rrent liabilities decreased to $20.5 million at December 31, 2000 from $26.9 million at December 31, 1999. This decre a s e \nis due primarily to decreases in accrued expenses, billings in excess of costs and estimated earnings on software installation costs and settlement of \nthe forw a rd foreign exchange contracts. \n\n**Capital Lease**Total capital lease obligations including current installments increased to $11.5 million at December 31, 2000 from $10.6 million \nat December 31, 1999. This increase is due primarily to additional capital leases resulting from the Company's purchase of Budapest Bank’s AT M \nnetwork, consisting of 147 ATMs on May 1, 2000. \n\n**Notes Payable**Notes payable increased to $77.2 million at December 31, 2000 from $72.8 million at December 31, 1999. This is the result of \nseveral transactions as follows: \n\n*(in millions)*\n7 2 . 8. \n(4.4) \n8 . 8. Balance at December 31, 1999 \nU n realized foreign exchange gain (DEM vs. US$) \nA c c retion of bond intere s t \n\n$ \n\nBalance at December 31, 2000 $ 7 7 . 2. \n\n**S t o c k h o l d e r’s Deficit**Stockholders’ deficit increased to $44.8 million at December 31, 2000 from $9.5 million at December 31, 1999. This is \ndue to the net loss for the year ended December 31, 2000 of $49.6 million which was offset by an increase in additional paid in capital of $14.4 \nmillion due to the sale of 1,882,723 shares of common stock for proceeds of $13.0 million, the issue of $400,000 of warrants and the exercise of \n390,231 stock options for proceeds of $900,000. \n\n**Year 2000 Compliance**\n\nThe Company’s European and U.S. Year 2000 compliance teams re p o rted no material Year 2000 problems during the advent of the year 2000, \neither with Euro n e t ’s own systems or the systems of its customers. The Company is unaware of any material Year 2000 complications to date. \n\n**Impact of New Accounting Pronouncements Not Yet Adopted**\n\n**S FAS 133**The Company is re q u i red to adopt Statement of Financial Accounting Standard (SFAS) No. 133 “Accounting for Derivative \nI n s t ruments and Hedging Activities” as amended by SFAS No. 138 for US GAAP re p o rting as of 1 January 2001. SFAS 133 and 138 establish \naccounting and re p o rting standards for derivative instruments, including certain derivative instruments embedded in other contracts (collectively \nre f e rred to as derivatives).", - "page_start": 22, - "page_end": 22, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**Operating Loss**The total Network Services Segment operating loss decreased to $6.1 million for the year ended December 31, 2000 from $12.9 \nmillion for the year ended December 31, 1999, an improvement of 53%, as a result of the factors discussed above. The Central European Sub- \nsegment re c o rded an operating loss of $3.1 million for the year ended December 31, 2000 compared to a loss of $8.0 million for the year ended \nDecember 30, 1999, an improvement of 61%, as a result of the factors discussed above. The We s t e rn European Sub-segment operating loss \nd e c reased to $2.3 million for year ended December 31, 2000 compared to a loss of $3.8 million for the year ended December 31, 1999, an \ni m p rovement of 39%, as a result of the factors discussed above. The Other ATM Operations Sub-segment incurred an operating loss of $700,000 \nfor the year ended December 31, 2000 compared to a loss of $1.0 million for the year ended December 31, 1999, an improvement of 30%, as a \nresult of the factors discussed above. \n\nSoftware Solutions Segment \n\n**Software Solutions Revenue**Revenues from the Software Solutions Segment totaled $16.0 million before inter-segment eliminations for the \nyear ended December 31, 2000 as compared to revenue of $15.1 for the year ended December 31, 1999. Software revenues are grouped into four \nb road categories: software license fees, professional service fees, maintenance fees and hard w a re sales. Software license fees are the initial fees \nc h a rged by the Company for the licensing of its pro p r i e t a ry application software to customers. Professional service fees are charged for \ncustomization, installation and consulting services provided to customers. Software maintenance fees are the ongoing fees charged to customers \nfor the maintenance of the software products. Hard w a re sales revenues are derived from the sale of computer products and are re p o rted net of \ncost of sales. The components of software solutions revenue for the years ended December 31, 2000 and 1999 were: \n\n\n \n \n \n \n [html]( in thousonols )Years ending December 31,20001999\n
Software license fees$+, 11782.430
Professional service fees6.8678.298
Maintenance fees4.487+. 051
Hardware sales535370
Total direct operating expenses$16.006815.149
\n\nThe increases in software license fees from 1999 to 2000 can be attributed to an increased number of software sales contracts signed in 2000 as \nc o m p a red to 1999, primarily in the first half of the year 2000. Sales of the Company’s core software products have dropped off substantially in \nthe third and fourth quarter of 2000 and are expected to be soft again during 2001. The Company believes that revenues of the Software \nSolutions Segment will increasingly be derived from the Company’s new set of software solutions, including its wireless banking solutions. \nThe decreases in professional service fees from 1999 to 2000 can be attributed to increased efficiency in the installation of software.", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**Note 11. Major Customers**\n\nThe Company has one major customer and relationship that is a significant source of revenue. In 2003, as during the \npast number of years, the Company's relationship with Sprint continued to increase, due to growth in the PCS business \nsegment. Approximately 61.2% of total revenues in 2003 were generated by or through Sprint and its customers using \nthe Company's portion of Sprint’s nationwide PCS network. This was compared to 57.6% in 2002, and 47.1% of total \nrevenue in 2001. No other customer relationship on a stand-alone basis generates more than 2.5% of the Company’s \ntotal revenue for 2003, 2002 and 2001.", - "page_start": 34, - "page_end": 34, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "could differ from the recorded amount. \n\n**Significant Customer**\n\nOne office furniture customer accounted for approximately 13% of con- \n\nsolidated net sales in 2003 and 14% in 2002 and 2001. \n\n\n \n \n \n \n [html]20032002Net sales : Office furniture Hearth product8 1.304.054451.674$ 1.279.05.413.5638 1.755.728$ 1.692.622$ 1.792.438Operating profit : Office furniture ( a ) Hearth products ( a )8130.08054 - 433130.0144.852$112.40539.282184.513174.866 ( 34.312 )151.687 ( 35.426 )8150.931$$116.261Depreciation and amortization expense : Office furniture Hearth products General corporate /*54.12.13.59.5. 052$48.54613.9936.21658.66820.3892.338872.77268.755$81.385817.61.18.57.7, 312$$29.7857.149 ( 83 )#$25.885$Identifiable assets : Office furniture Hearth products General corporate ( 9 )8458.350303.811265.665494.559305.326220.667$526.712320.199114.980$ 1.020.552$961.891\n
( tn thousonds )
2001
$ 1.366.31.426.126
$
Total operating profit Unallocated corporate expenses
Income before income taxes
140.554
8
$
$
Capital expenditures : Office furniture Hearth products General corporate
6.1322.570
37.508
36.851
$
8 1.021.826
\n\n**Operating Segment Information**\n\nIn accordance with SFAS No. 131, “Disclosures about Segments of an \n\nEnterprise and Related Information,” management views the Company \n\nas being in two operating segments: office furniture and hearth prod- \n\nucts, with the former being the principal segment. The office furniture \n\nsegment manufactures and markets a broad line of metal and wood \n\ncommercial and home office furniture, which includes storage prod- \n\nucts, desks, credenzas, chairs, tables, bookcases, freestanding office \n\npartitions and panel systems, and other related products. The hearth \n\nproducts segment manufactures and markets a broad line of manufac- \n\ntured gas-, pellet-, and wood-burning fireplaces and stoves, fireplace \n\ninserts, gas logs, and chimney systems, principally for the home. \n\nThe Company’s hearth products segment is somewhat sea- \n\nsonal, with the third (July-September) and fourth (October-December) \n\nfiscal quarters historically having higher sales than the prior quarters. \n*$8.5 million, $3.0 million, and $22.5 million for closing of facilities and impairment*\n*charges in 2003, 2002, and 2001, respectively. Included in operating profit for the*", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_AIT_2012.pdf", - "query": "Under which name was the Applied company initially fouded ?", - "target_page": 6, - "target_passage": "The Company was founded in 1923 by Joseph M. Bruening as The Ohio Ball Bearing Company", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "We have also audited, in accordance with the standards of the Public Company Accounting Oversight Board (United States), the \nconsolidated financial statements as of and for the year ended January 31, 2015 of the Company and our report dated March 16, 2015 \nexpressed an unqualified opinion on those financial statements.", - "page_start": 78, - "page_end": 78, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**SHAREHOLDER INFORMATION**\n\nApplied Industrial Technologies, Inc. common stock is listed on the New York Stock Exchange under the symbol AIT. The Company is identified in most \nfinancial listings as “AppliedIndlTch.” \n\n**RESEARCH ON APPLIED INDUSTRIAL TECHNOLOGIES IS AVAILABLE THROUGH:**\n\n**BB&T CAPITAL MARKETS** **KEYBANC CAPITAL MARKETS** **STEPHENS INC.**\nHolden Lewis, 703/471-3894 Jeffrey D. Hammond, 216/689-0236 Matt Duncan, 501/377-3723 \n\n**CJS SECURITIES** **SIDOTI & CO.** **WELLS FARGO SECURITIES, LLC**\nJonathan Tanwanteng, 914/287-7600 Joseph Mondillo, 212/894-3339 Allison Poliniak-Cusic, 212/214-5062 \n\n**CLEVELAND RESEARCH COMPANY** **GREAT LAKES REVIEW – Division of** **WUNDERLICH SECURITIES**\nAdam Uhlman, 216/649-7241 **Wellington Shields & Co.** Brent D. Rakers, 901/251-2236 \nElliott Schlang, 216/767-1340 \n\n**SHAREHOLDER INQUIRIES**\n\nRequests to transfer Applied Industrial \nTechnologies, Inc. shares and all \ncorrespondence regarding address change \ninformation, duplicate mailings, missing \ncertificates, failure to receive dividend \nchecks in a timely manner or to participate \nin the Company’s direct stock purchase \nprogram should be directed to the \nCompany’s transfer agent and registrar: \n\n**COMPUTERSHARE TRUST COMPANY, N.A.**\n250 Royall Street \nCanton, MA 02021 \n800/988-5291 \n\n**INVESTOR RELATIONS INQUIRIES SHOULD** **ANNUAL REPORT ON FORM 10-K**\n\n**BE DIRECTED TO:** **The Applied Industrial Technologies, Inc.**\n**Annual Report on Form 10-K for the fiscal**\n**MARK O. EISELE**\n**year ended June 30, 2012, including the**\nVice President – Chief Financial Officer \n**financial statements and schedules thereto,**\n & Treasurer \n**is available at our website at**\nApplied Industrial Technologies \n**www.Applied.com. It is also available**\n1 Applied Plaza \n**without charge upon written request to the**\nCleveland, OH 44115-5014 \n**Vice President – Chief Financial Officer &**\nTelephone: 216/426-4000, Fax: 216/426-4845 \n**Treasurer at the address shown.**\n\n**ANNUAL MEETING**\nThe Annual Meeting of Shareholders will be held \nat 10:00 a.m., Tuesday, October 23, 2012, at the \nCorporate Headquarters of Applied Industrial \nTechnologies, 1 Applied Plaza, East 36th and \nEuclid Avenue, Cleveland, Ohio 44115. \n\n**COMPARISON OF FIVE-YEAR CUMULATIVE TOTAL RETURN**\n\nApplied Industrial Technologies, Inc., Standard & Poor’s 500, and Peer Group \n\n(Performance Results from 7/1/2007 through 6/30/2012) \n\nAssumes $100 invested at the close of trading 6/30/07 in \nApplied Industrial Technologies, Inc. common stock, Standard \n& Poor’s 500, and Peer Group. \n\nCumulative total return assumes reinvestment of dividends. \n\nThe returns of the companies in the Peer Group are weighted \nbased on the companies’ relative stock market capitalization. \n\nPeer Group companies selected on a line-of-business basis \ninclude: DXP Enterprises, Inc.; Fastenal Company; Genuine \nParts Company; W. W. Grainger, Inc.; Kaman Corporation; \nLawson Products, Inc.; MSC Industrial Direct Co., Inc.; and \nWESCO International, Inc.", - "page_start": 46, - "page_end": 46, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "OVERVIEW Industrial production increased 0.4% in June after having declined \n\n0.2% in May. In the manufacturing sector, outputs advanced \nWith more than 4,600 associates across North America, Applied \n0.7% in June, reversing a decline of 0.7% in May and increased at \nIndustrial Technologies (“Applied,” the “Company,” “We,” “Us” \nan annual rate of 1.4% in the second quarter. In June, capacity \nor “Our”) is a leading industrial distributor serving MRO and OEM \n\n**Celebrating**\n**90 Years**\n**of Strength in**\n**Distribution**\n\nutilization for manufacturing moved up 0.4% to 77.7%, a rate \ncustomers in virtually every industry. In addition, Applied \n13.9 percentage points above its trough in June of 2009 and was \nprovides engineering, design and systems integration for \nstill 1.1 percentage points below its long-run average. The ISM PMI \nindustrial and fluid power applications, as well as customized \nregistered 49.7 in June, the first time this indicator dropped below \nmechanical, fabricated rubber and fluid power shop services. \n50 (its expansionary threshold) since July 2009. We remain \nApplied also offers maintenance training and inventory \noptimistic about the U.S. industrial economy for our fiscal 2013. \n\nmanagement solutions that provide added value to its customers. \n\nWe have a long tradition of growth dating back to 1923, the year \nYEAR ENDED JUNE 30, 2012 vs. 2011 \nour business was founded in Cleveland, Ohio. At June 30, 2012, \nThe following table is included to aid in review of Applied’s \nbusiness was conducted in the United States, Canada, Mexico \nstatements of consolidated income. \nand Puerto Rico from 476 facilities. \n\nWhen reviewing the discussion and analysis set forth below, \nChange in \nplease note that the majority of SKUs we sell in any given year Year Ended June 30, $'s Versus \nAs a % of Net Sales Prior Period \nwere not sold in the prior year, resulting in the inability to \n\n**2012** 2011 % Increase quantify certain commonly used comparative metrics analyzing \n\nsales, such as changes in product mix and volume. Net Sales **100.0 %**100.0 % 7.3 % \n\nGross Profit **27.6 %** 27.7 % 6.7 % Our fiscal 2012 sales were $2.4 billion, an increase of $162.6 \n\nLong-Range Strategy:*Translating Potential Into Results (continued)*\n\nAs a leadership team, we have developed a long-range strategic plan \n\nto accelerate profitable growth. Our plan includes numerous growth \n\nopportunities across our business, and implementation is underway, including: \n\n• Leveraging sales capabilities and existing CRM (Customer Relationship \n\nManagement) processes to expand our value-add and reach new customers \n\n• Strengthening our position in attractive vertical markets while growing in \n\nour core segments \n\n• Expanding our products and solutions; growing our core bearings and \npower transmission business at a rate greater than the market, along \nwith focused product expansion via logical extensions and enhanced local \ncapabilities \n\n• Building on our fluid power market leadership via strengthened product \n\nofferings and value-added services for OEM and MRO customers \n\n• Enhancing our operational excellence by capturing the full benefits of our \n\nERP system and driving continuous improvement with customers, suppliers \nand throughout our operations \n\n• Accelerating strategic acquisitions by leveraging our cash generation and \n\nstrong financial position to extend into new markets \n\nToday, nearly 90 years since our founding, we are well-positioned and \n\ncommitted to realizing our potential – a potential that builds upon a proud \n\npast and the dedication of our associates around the globe. \n\nmillion or 7.3% compared to the prior year. Net sales from \nSelling, Distribution & Administrative **20.5 %** 20.9 %", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "past and the dedication of our associates around the globe. \n\nmillion or 7.3% compared to the prior year. Net sales from \nSelling, Distribution & Administrative **20.5 %** 20.9 % \n\nacquired businesses added $16.6 million or 0.7% to the current \nOperating Income **7.1 %** 6.8 % \nyear. Gross margin of 27.6% compares to 27.7% in the prior \nNet Income **4.6 %** 4.4 % \nyear. Our operating margin increased to 7.1% compared to the \n\nprior year’s 6.8%. Our earnings per share was $2.54 versus $2.24 \nNet sales in fiscal 2012 were $2.4 billion, which was $162.6 million \nin fiscal year 2011, an increase of 13.4%. \nor 7.3% above the prior year, driven by improvements in the \nOur consolidated balance sheet remains strong. Shareholders’ \nindustrial economy as well as a continued focus on profitable sales \nequity is $672.1 million, up from $633.6 million at June 30, 2011. \ngrowth. Incremental net sales from companies acquired since the \nWorking capital increased $31.4 million from June 30, 2011 to \nprior year period contributed approximately $16.6 million or 0.7%. \n$435.6 million at June 30, 2012. Our current ratio remains strong \n\nAs we look ahead, we see a bright future with excellent opportunities for \n\ngrowth and increased profitability – organically, via acquisition, and through \n\nour technology investments.*We are in exciting times, and we firmly believe*\n\n*our best days are ahead.*\n\nThank you for your ongoing investment and support of Applied. \n\nIn January 2013, Applied \n\nIndustrial Technologies \n\nwill celebrate its 90th \n\nanniversary. The Company \n\nwas founded in 1923 by \n\nJoseph M. Bruening as \n\nThe Ohio Ball Bearing \n\nCompany, a distributor \n\nof bearings to customers \n\nin Cleveland, Ohio. Over \n\nthe years, the Company \n\ngrew to become a regional \n\ndistributor of bearings, \n\nthen an international \n\ndistributor of a wide range \n\nof industrial technologies \n\nand components. Today, \n\nnearly 90 years since our \n\nbeginning, customers \n\nserved by Applied \n\nbenefit from our years of \n\naccumulated experience, \n\nexpertise and exceptional \n\nability to improve our \n\ncustomers’ operations. \n\n\n\nBenjamin J. Mondics \nPresident & Chief Operating Officer \n\n\n\nNeil A. Schrimsher \nChief Executive Officer \n\nAugust 15, 2012 \n\nat 2.9 to 1, consistent with the June 30, 2011 level. \n\nApplied monitors several economic indices that have been key \n\nindicators for industrial economic activity in the United States. \n\nThese include the Industrial Production and Manufacturing \n\nCapacity Utilization (MCU) indices published by the Federal \n\nReserve Board and the Purchasing Managers Index (PMI) \n\npublished by the Institute for Supply Management (ISM). \n\nHistorically, our performance correlates well with the MCU \n\nwhich measures productivity and calculates a ratio of actual \n\nmanufacturing output versus potential full capacity output. \n\nWhen manufacturing plants are running at a high rate of \n\ncapacity, they tend to wear out machinery and require \n\nreplacement parts. Our sales tend to lag the MCU by up \n\nto six months. \n\nCurrency translation decreased fiscal year sales by approximately \n\n$1.8 million or 0.1%. In local currency, net sales from our \n\nCanadian operations were up 12.2% from fiscal 2011, including \n\n2.8% from acquisitions. In local currency, net sales from our \n\nMexican operations were up 25.9%. The number of selling days in \n\nfiscal 2012 was the same as in fiscal 2011. \n\nNet sales of our Service Center Based Distribution segment increased \n\n$133.8 million, or 7.6%, compared to fiscal year 2011 led by \n\nimprovements in the industrial economy as well as a continued focus on \n\nprofitable sales growth, with acquisitions adding $16.6 million or 0.9%. \n\nNet sales of our Fluid Power Businesses segment increased $28.8 million \n\nor 6.5%, also driven by improvements in the industrial economy as well \n\nas a continued focus on profitable sales growth. \n\nThe sales product mix for fiscal 2012 was 70.8% industrial products", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS \nOF FINANCIAL CONDITION AND RESULTS OF OPERATIONS \n\nOVERVIEW Industrial production increased 0.4% in June after having declined \n\n0.2% in May. In the manufacturing sector, outputs advanced \nWith more than 4,600 associates across North America, Applied \n0.7% in June, reversing a decline of 0.7% in May and increased at \nIndustrial Technologies (“Applied,” the “Company,” “We,” “Us” \nan annual rate of 1.4% in the second quarter. In June, capacity \nor “Our”) is a leading industrial distributor serving MRO and OEM \nutilization for manufacturing moved up 0.4% to 77.7%, a rate \ncustomers in virtually every industry. In addition, Applied \n13.9 percentage points above its trough in June of 2009 and was \nprovides engineering, design and systems integration for \nstill 1.1 percentage points below its long-run average. The ISM PMI \nindustrial and fluid power applications, as well as customized \nregistered 49.7 in June, the first time this indicator dropped below \nmechanical, fabricated rubber and fluid power shop services. \n50 (its expansionary threshold) since July 2009. We remain \nApplied also offers maintenance training and inventory \noptimistic about the U.S. industrial economy for our fiscal 2013. \n\n\n \n \n \n \n [html]Year Ended June 30, As a % of Net Sales\n
Change in $' s Versus Prior Period
20122011% Increase
Net Sales100.0 %100.0 %7.3 %
Gross Profit27.6 %27.7 %6.7 %
Selling, Distribution & Administrative20.5 %20.9 %5.1 %
Operating Income7.1 %6.8 %11.7 %
Net Income4.6 %4.4 %12.4 %
\n\nmanagement solutions that provide added value to its customers. \n\nWe have a long tradition of growth dating back to 1923, the year \n\nYEAR ENDED JUNE 30, 2012 vs. 2011 \nThe following table is included to aid in review of Applied’s \nour business was founded in Cleveland, Ohio. At June 30, 2012, \n\nbusiness was conducted in the United States, Canada, Mexico \nstatements of consolidated income. \nand Puerto Rico from 476 facilities. \n\nWhen reviewing the discussion and analysis set forth below, \n\nplease note that the majority of SKUs we sell in any given year \n\nwere not sold in the prior year, resulting in the inability to \n\nquantify certain commonly used comparative metrics analyzing \n\nsales, such as changes in product mix and volume. \n\nOur fiscal 2012 sales were $2.4 billion, an increase of $162.6 \n\nmillion or 7.3% compared to the prior year. Net sales from \n\nacquired businesses added $16.6 million or 0.7% to the current \n\nyear. Gross margin of 27.6% compares to 27.7% in the prior \n\nyear. Our operating margin increased to 7.1% compared to the", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "\n \n \n \n \n [html]( In thousands, except per share amounts and statistical data ) ( UNAUDITED )\n
Consolidated Operations - Year Ended June 30Net sales$ 2.375.445$ 2.212.849
$ 1.893.208
Depreciation and amortization of property11.23611.23411.465
Amortization :Intangible assets11.46511.382
10.151
SARs and stock options ( b )2.0582.4733.020
Operating income168.395150.763110.050
Net income108.77996.75965.903
Per share data :Net income :Basic2.58
2.28
1.56
Diluted2.542.241.54
Cash dividend0.800.700.60
Year - End Position - June 30Working capital$ 435.593$ 404.226
$
347.528Long - term debt ( including long - term debt classified as current )75.000Total assets
962.183914.931
891.520Shareholders ' equity672.131633.563
555.039Year - End Statistics - June 30Current ratio2.9
2.9
2.3Operating facilities476474
455Shareholders of record6.2256.208
5.884Return on assets ( c )11.8 %11.1 %
7.9 %Return on equity ( d )16.7 %16.3 %
12.4 %Capital expendituresS_26.021$ 20.431
$7.216
\n\n(a) The goodwill impairment charge in fiscal 2009 reduced operating income by $36,605, net income by $23,000 and net income per share by $0.54. \n(b) Prior to 2004, the Company did not record SAR or stock option expense as it was not required by Generally Accepted Accounting Principles. \n(c) Return on assets is calculated as net income divided by monthly average assets, exclusive of the goodwill impairment. \n(d) Return on equity is calculated as net income divided by the average shareholders' equity (beginning of the year and end of the year divided by 2). \n\n$120 \n\n5 \n. \n5 \n9 \n $ \n0 \n. \n6 \n8 \n$ \n\n$100 \n\n3 \n. \n2 \n7 \n$ \n9 \n. \n5 \n6 \n$ \n\n3 \n. \n5 \n5 \n$ \n\n3 \n. \n2 \n4 \n$ \n\n5 \n. \n1 \n3 \n$ \n\n8 \n. \n9 \n1 \n$ \n$20 \n\n$0 \n03 04 05 06 07 08 09 10 11 12 \n\n*The goodwill impairment charge in fiscal 2009 *The goodwill impairment charge in fiscal 2009 \nreduced net income by $23.0 million. reduced net income per share by $0.54. \n\n42 Applied Industrial Technologies, Inc. and Subsidiaries", - "page_start": 43, - "page_end": 43, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "2013 \nacquisition & \nDevelopment \nFacts \n$121M \n\nAcquisitions \nCompleted \n\n5.8% \n\nAverage Acquisition \nCapitalization Rate \n\n743 \n\nApartment Units \nAcquired", - "page_start": 14, - "page_end": 14, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_AIT_2012.pdf", - "query": "By how much does Applied company plan to contribute to its pension benefits between 2018 and 2022 ?", - "target_page": 36, - "target_passage": "2018 through 2022 15,200", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The Company has established an investment policy and regularly monitors the performance of the assets of the trust maintained in \nconjunction with the Qualified Defined Benefit Retirement Plan. The strategy implemented by the trustee of the Qualified Defined \nBenefit Retirement Plan is to achieve long-term objectives and invest the pension assets in accordance with ERISA and fiduciary \nstandards. The long-term primary objectives are to provide for a reasonable amount of long-term capital, without undue exposure \nto risk; to protect the Qualified Defined Benefit Retirement Plan assets from erosion of purchasing power; and to provide investment \nresults that meet or exceed the actuarially assumed long-term rate of return. The expected long-term rate of return on assets \nassumption was developed by considering the historical returns and the future expectations for returns of each asset class as well as \nthe target asset allocation of the pension portfolio. \n\nCash Flows \n\nEmployer Contributions \n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in \n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets. \n\nEstimated Future Benefit Payments \n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next \nfive years and in the aggregate for the subsequent five years: \n\n**Year Ended June 30, 2012**\n\nNet sales \n\nOperating income for reportable segments \n\nAssets used in the business \n\nDepreciation and amortization of property \n\nCapital expenditures \n\nYear Ended June 30, 2011 \n\nNet sales \n\nOperating income for reportable segments \n\nAssets used in the business \n\nDepreciation and amortization of property \n\nCapital expenditures \n\nYear Ended June 30, 2010 \n\nNet sales \n\nOperating income for reportable segments \n\nAssets used in the business \n\nDepreciation and amortization of property \n\nCapital expenditures \n\n\n \n \n \n \n [html]Pension BenefitsRetiree Health Care Benefits\n
During Fiscal Years
2013$6.200$240
20145.900240
20155.700240
20164.500240
20171.700260
2018 through 202215.2001.420
\n\n**$ 2,375,445**\n\n**178,476**\n\n**962,183**\n\n**11,236**\n\n**26,021**\n\n$ 2,212,849 \n\n157,591 \n\n914,931 \n\n11,234 \n\n20,431 \n\n$ 1,893,208 \n\n103,823 \n\n891,520 \n\n11,465 \n\n7,216 \n\nService Center \nBased Distribution \n\n**$ 1,904,564**\n\n**135,240**\n\n**731,915**\n\n**9,403**\n\n**24,339**\n\n$ 1,770,798 \n\n115,798 \n\n700,486 \n\n9,152 \n\n19,392 \n\n$ 1,536,543 \n\n77,029 \n\n690,970 \n\n9,336 \n\n6,389 \n\nFluid Power \nBusinesses \n\n**$ 470,881**\n\n**43,236**\n\n**230,268**\n\n**1,833**\n\n**1,682**\n\n$ 442,051 \n\n41,793 \n\n214,445 \n\n2,082 \n\n1,039 \n\n$ 356,665 \n\n26,794 \n\n200,550 \n\n2,129 \n\n827", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Net amount recognized at \nyear-end **$** **(493)** $ (9,784) $ (8,882) \n\n*Amounts recognized in the*\n**Retirement Benefits**\n\n*statement of financial position*\n*consist of:*\nThe Company has defined contribution profit-sharing plans cover- \n Accrued benefit liability **$** **(493)** $ (9,784) $ (8,882) \ning substantially all employees who are not participants in certain \n Net amount recognized at \nyear-end, included in \ndefined benefit plans. The Company’s annual contribution to the de- \n Other Liabilities **$** **(493)** $ (9,784) $ (8,882) \nfined contribution plans is based on employee eligible earnings and \nEstimated Future Benefit Payments (In thousands) \nresults of operations and amounted to $26,489,000, $23,524,000, \n$ \nand $24,826,000 in 2003, 2002, and 2001, respectively. \n\nThe Company sponsors defined benefit plans which include \n\na limited number of salaried and hourly employees at certain subsidiar- \n\n Fiscal 2004 \n Fiscal 2005 \n Fiscal 2006 \n Fiscal 2007 \n Fiscal 2008 \n Fiscal 2009 – 2013 1,133 \n1,189 \n1,195 \n1,217 \n 1,265 \n 6,874 \nies. The Company’s funding policy is generally to contribute annually \n\n*Expected Contributions During Fiscal 2004*\n Total $ 12,873 \nthe minimum actuarially computed amount. Net pension costs relating \n\nto these plans were $176,000; $0; and $0 for 2003, 2002, and 2001, \nPlan Assets – Percentage of Fair Value by Category \n**2003**\nrespectively. The actuarial present value of obligations, less related plan \n\n Equity \n Debit \n Other **0%**\n**0%**\n**100%**\n\nassets at fair value, is not significant. \n\nThe Company also participates in a multiemployer plan, \n Total **100%**\nwhich provides defined benefits to certain of the Company’s union", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**Note 9. Retirement Plans (Continued)**\n\n2002 \n$ (2,880) \n1,505 \n283 \n(38) \n$ (1,130) **2003**\n**$ (3,797)**\n**2,229**\n**252**\n**(9)**\n**$ (1,325)** Funded status \nUnrecognized net (gain) loss \nUnrecognized prior service cost \nUnrecognized net transition asset \nAccrued benefit cost \n\nComponents of net periodic benefit costs: \n\nService cost \nInterest cost \nExpected return on plan assets \nAmortization of prior service costs \nAmortization of net gain \nAmortization of net transition asset \n\n**$**\n\n**486**\n**615**\n**(494)**\n**31**\n**32**\n**(29)**\n**641** Net periodic benefit cost **$**\n\nThe accumulated benefit obligation for the qualified retirement plan was $7,872, $6,551 and $5,399 at December 31, \n2003, 2002 and 2001, respectively. \n\nWeighted average assumptions used by the Company in the determination of benefit obligations at December 31, 2003, \n2002 and 2001 were as follows: \n\n\n \n \n \n \n [html]\n
4.50 %4.50 %5.00 %
Number of experience
\n\n\n \n \n \n \n [html]\n
200320022001
6.50 %7.00 %7.50 %
4.50 %5.00 %5.00 %
7.50 %8.00 %8.00 %
\n\nDiscount Rate \nRate of increase in compensation level \nExpected long-term rate of return on plan assets \n\nThe Company’s pension plan asset allocations based on market value at December 31, 2003 and 2002, by asset \ncategory were as follows: \n\nAsset Category \nEquity securities \nDebt securities \nCash and cash equivalents \n\n\n \n \n \n \n [html]\n
69.8 %62.9 %
3.6 %4.9 %
100.0 %100.0 %
\n\n**Investment Policy**\n\nThe investment policy of the Company’s Pension Plan is for assets to be invested in a manner consistent with the \nfiduciary standards of ERISA. More specifically, the investment focus is to preserve capital which includes \ninflationary protection as well as protection of the principal amounts contributed to the Plan. Of lesser importance is \nthe consistency of growth, which will tend to minimize the annual fluctuations in the normal cost. It is anticipated that \ngrowth of the fund will result from both capital appreciation and the re-investment of current income. \n\n**Contributions**\n\nThe Company expects to contribute $0.5 million to the noncontributory defined benefit plan in 2004, and contributed \n$0.4 million in 2003, and $0.3 million in 2002. \n\n31 ■ 2003 ANNUAL REPORT", - "page_start": 32, - "page_end": 32, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "The following table provides information for pension plans with projected benefit obligations and accumulated benefit obligations in \nexcess of plan assets: \n\n\n \n \n \n \n [html]\n
Pension Benefits
June 30,20122011Projected benefit obligations
$47.151$53.490
Accumulated benefit obligations47.15143.528
Fair value of plan assets6.4396.056
\n\n\n \n \n \n \n [html]Year Ended June 30,I11\n
2010201220112010Service cost$289
$460$574$30$39$52Interest cost2.0472.232
2.911237235259Expected return on plan assets( 396 )( 385 )
( 351 )Recognized net actuarial loss ( gain )6441.449
924( 72 )( 83 )( 87 )Amortization of prior service cost412710
797139139148Recognition of prior service cost upon plan curtailment3.117
Net periodic cost$6.113
$4.466$4.855$334$330$372
\n\nSalary Continuation Benefits \n\nThe Company has agreements with certain retirees of acquired companies to pay monthly retirement benefits through fiscal 2020. \n\nRetiree Health Care Benefits \n\nThe Company provides health care benefits to eligible retired associates who pay the Company a specified monthly premium. \nPremium payments are based upon current insurance rates for the type of coverage provided and are adjusted annually. \nCertain monthly health care premium payments are partially subsidized by the Company. Additionally, in conjunction with a \nfiscal 1998 acquisition, the Company assumed the obligation for a postretirement medical benefit plan which provides health \ncare benefits to eligible retired associates at no cost to the individual. \n\nThe Company uses a June 30 measurement date for all plans. \n\nThe following table sets forth the changes in benefit obligations and plan assets during the year and the funded status for the \npostemployment plans at June 30: \n\nPension Benefits Retiree Health Care Benefits \n\n**2012** 2011 **2012** 2011. \n\n**$** **53,490**\n $ 51,114**$**\n\n**289**\n460 \n\n**2,047**\n2,232 \n\n— \n— \n\n**(4,144 )** (1,856 ) \n\n**150**\n151 \n\n**4,179**\n1,389 \n\n— \n**(8,860 )**\n\n**$** **47,151**\n $ 53,490**$**", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "The accumulated benefit obligation for the pension plan was $4,801,000 and $4,170,000 at December 31, 2003 and 2002, respectively. The components \nof net periodic pension cost for 2003, 2002 and 2001 were as follows (in thousands): \n\nYEAR ENDED DECEMBER 31, \n2003 2002 2001 \n\n**C O M P O N E N T S O F N E T P E R I O D I C P E N S I O N C O S T :**\n\nService cost $ 214 $ 320 $ 369 \n\nInterest cost 298 307 296 \n\nExpected return on assets (349) (405) (477) \n\nPrior service cost amortization (37) 7 6 \n\nActuarial loss 128 28 — \n\nTransition amount amortization (44) (44) (44) \n\nNet periodic pension cost $ 210 $ 213 $ 150 \n\nThe Company’s expected long-term rate of return assumption is based upon the plan’s actual long-term investment results as well as the long-term outlook \nfor investment returns in the marketplace at the time the assumption is made. The reduction in the Company’s assumption for this expected return rate in \nthe beginning of 2003 to 8 percent from 9 percent reflected the major downturn in returns on debt and equity investments that occurred in the investment \nmarkets in 2001 and 2002. \n\nThe Company’s pension plan assets at December 31, 2003 and 2002 were invested in the following asset categories: \n\n2003 2002 \n\n**A S S E T C A T E G O R Y :**\n\nEquity securities 73% 64% \n\nDebt securities 25% 28% \n\nOther 2% 8% \n\nTotal 100% 100%", - "page_start": 22, - "page_end": 22, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS (Continued) \n(In thousands, except per share amounts) \n\nSalary Continuation Benefits \n\nThe Company has agreements with certain retirees of acquired companies to pay monthly retirement benefits through fiscal 2020. \n\nRetiree Health Care Benefits \n\nThe Company provides health care benefits to eligible retired associates who pay the Company a specified monthly premium. \nPremium payments are based upon current insurance rates for the type of coverage provided and are adjusted annually. \nCertain monthly health care premium payments are partially subsidized by the Company. Additionally, in conjunction with a \nfiscal 1998 acquisition, the Company assumed the obligation for a postretirement medical benefit plan which provides health \ncare benefits to eligible retired associates at no cost to the individual. \n\nThe Company uses a June 30 measurement date for all plans. \n\nThe following table sets forth the changes in benefit obligations and plan assets during the year and the funded status for the \npostemployment plans at June 30: \n\nThe following table provides information for pension plans with projected benefit obligations and accumulated benefit obligations in \nexcess of plan assets: \n\nPension Benefits \n\n**2012** 2011 \n\n**$**\n**47,151**$ 53,490 \n\n**47,151** 43,528 \n\n**6,439** 6,056 \n\nThe net periodic costs are as follows: \n\nPension Benefits Retiree Health Care Benefits \n\nYear Ended June 30, **2012--** 2011-- 2010-- **2012--** 2011-- 2010-- \n\nService cost **$**\n**289**$ 460 $ 574**$** **30**$ 39 $ 52 \n\nInterest cost \n**2,047** 2,232 2,911 **237** 235 259 \n\n— — — \nExpected return on plan assets **(396 )** (385 ) (351 ) \n\nRecognized net actuarial loss (gain) \n**644** 1,449 924 \n**(72 )** (83 ) (87 ) \n\nAmortization of prior service cost \n**412** 710 797 **139** 139 148 \n\n— — —— — — \nRecognition of prior service cost upon plan curtailment \n**3,117**\n\nNet periodic cost **$**\n**6,113**$ 4,466 $ 4,855**$** **334**$ 330 $ 372", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Cash Flows \n\nEmployer Contributions \n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in \n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets. \n\nEstimated Future Benefit Payments \n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next \n\n\n \n \n \n \n [html]Year Ended June 30.201224.3392.082\n
Service Center Based DistributionFluid Power BusinessesTotal
Net sales$1.904.564$
470.881$2.375.445Operating income for reportable segments
135.24043.236178.476Assets used in the business
731.915230.268962.183Depreciation and amortization of property
9.4031.83311.236Capital expenditures
1.68226.021Year Ended June 30.2011Net sales
$1.770.798$442.051
$2.212.849Operating income for reportable segments115.798
41.793157.591Assets used in the business700.486
214.445914.931Depreciation and amortization of property9.152
11.234Capital expenditures19.3921.039
20.431Year Ended June 30.2010Net sales$
1.536.543$356.665$
1.893.208Operating income for reportable segments77.02926.794
103.823Assets used in the business690.970200.550
", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "**Note 9. Retirement Plans (Continued)**\n\nThe Company's matching contributions to the defined contribution plan were approximately $228 thousand, $210 \nthousand and $182 thousand for the years ended December 31, 2003, 2002 and 2001, respectively. \n\nIn May 2003, the Company adopted an unfunded nonqualified supplemental executive retirement plan for named \nexecutives. The plan was established to provide retirement benefits in addition to those provided under the Retirement \nPlan that covers all employees. The following table presents the actuarial information for the plan. \n\n\n \n \n \n \n [html]\n
2003
Change in benefit obligation :( in thousand.
Benefit obligation, beginning$
-Service cost
22Interest cost
23Actuarial loss
278Plan adoption
546Benefit obligation, ending
$ 869Funded status
$( 869 )Unrecognized net loss
278Additional minimum liability
( 380 )n
380Unrecognized prior service cost
521Accrued benefit cost
$ ( 70 )
Components of net periodic benefit costs :Service cost
22Interest cost
23Amortization of prior service costs
25
\n\n**Note 10. Stock Incentive Plan**\n\nThe Company has a shareholder approved Company Stock Incentive Plan (the “Plan”), providing for the grant of \nincentive compensation to essentially all employees in the form of stock options. The Plan authorizes grants of options \nto purchase up to 480,000 shares of common stock over a ten-year period beginning in 1996. The option price for all \ngrants has been at the current market price at the time of the grant. The grants have generally provided that one-half of \nthe options exercisable on each of the first and second anniversaries of the date of grant, with the options expiring five \nyears after they are granted. In 2003, the Company issued grants where the options are vested over a five-year period \nbeginning on the third anniversary date of the grant of the options. The participant may exercise 20% of the total grant \nafter each anniversary date through the eighth year, with the options expiring after ten years. \n\nThe fair value of each grant is estimated at the grant date using the Black-Scholes option-pricing model with the \nfollowing weighted average assumptions:", - "page_start": 33, - "page_end": 33, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Percentage of plan assets \n\nTarget asset \nallocation \npercentage **December 31,**\n**2013** December 31, \n2012 \n\n**20.1%**\n**40.7%**\n**38.9%**\n**0.3%** 19.3% 10% to 29% \n38.3% 29% to 48% \n41.8% 38% to 47% \n0% to 2% 0.6% \n\n**100.0%** 100.0% \n\n\n \n \n \n \n [html]Plan cost :20132012Service costInterest income on plan assetsS( 40 )Table2012Return on plan assets ( excluding interest income )$25\n
$71$46Net interest cost
125Net pension expense8351
Administrative expense22Total pension cost recognized in net income$
85$53Net interest cost, a component of the plan finance costs and is outlined as follows.is intervention
MaximumTable32012Net interest cost :
( 40 )Interest cost on plan obligation5245Net interest cost recognized in finance costs
$12Table5The remeasurement recognized in other determined as follows.
ProblemsiveAgevrnis2013
65$37Change in financial assumptions140
( 220 )Change in demographic assumptions( 43 )-Effect of experience adjustments
( 16 )( 49 )Change in asset ceiling( 9 )-
Remeasurement recognized in other comprehensive income ( loss ) and equity$137$( 232 )
We also provide supplemental unfunded pe executives. The table below includes our acc pension expense included in employee salaries cost and other comprehensive income.n benefitAboutCtTable
ts, nentTerest20132012
Accrued benefit obligation$ 49$ 45Pension expense included in employee salaries and benefits expense2
Net interest cost recognized in finance costs22Remeasurement recognized in other comprehensive income3
\n\nWe make contributions to the plans to secure the benefits of plan \nmembers and invest in permitted investments using the target ranges \nestablished by our Pension Committee, which reviews actuarial \nassumptions on an annual basis. \n\n**Assumptions**\nThere are significant assumptions that are used in the calculations \nprovided by our actuaries, and it is the responsibility of management to \ndetermine which assumptions could result in a significant impact when \ndetermining the accrued benefit obligations and pension expense.", - "page_start": 122, - "page_end": 122, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "NOTE 22: PENSIONS \n\nWe have contributory and non-contributory defined benefit pension \nplans that are made available to most of our employees. The plans \nprovide pensions based on years of service, years of contributions and \nearnings. We do not provide any non-pension post-retirement benefits. \nWe also provide unfunded supplemental pension benefits to certain \nexecutives. \n\nThe assets of the defined benefit pension plans are held in segregated \naccounts isolated from our assets. We administer the defined benefit \npension plans pursuant to applicable regulations, the Statement of \nInvestment Policies and Procedures and to the mandate of the Pension \nCommittee of the Board of Directors. The Pension Committee of the \nBoard of Directors oversees our administration of the defined benefits \npension plans, which includes the following principal areas: \n(cid:129) overseeing the funding, administration, communication and \ninvestment management of the plans \n(cid:129) selecting and monitoring the performance of all \n\nthird parties \nperforming duties in respect of the plans, including audit, actuarial \nand investment management services \n(cid:129) proposing, considering and approving amendments to the defined \nbenefit pension plans \n(cid:129) proposing, considering and approving amendments of the Statement \nof Investment Policies and Procedures \n(cid:129) reviewing management and actuarial reports prepared in respect of \nthe administration of the defined benefit pension plans \n(cid:129) reviewing and approving the audited financial statements of the \ndefined benefit pension plan funds.", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_AIT_2012.pdf", - "query": "What does Applied has to say regarding the potential creadit risk it could be exposed to ?", - "target_page": 21, - "target_passage": "The Company has a broad customer base representing many diverse industries primarily across North America. As such, the Company does not believe that a significant concentration of credit risk exists in its accounts receivable", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Concentration of Credit Risk \n\nThe Company has a broad customer base representing many diverse industries primarily across North America. As such, the \nCompany does not believe that a significant concentration of credit risk exists in its accounts receivable.", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "\n \n \n \n \n [html]The Ciroup ' s exposure to interest rate risk for classes of financial asserts and financial liabilities, at 30 ( uve 2013 and 30 ) une 2012 are set out as follows :Financial assetsCash and cash equivalentsPayablesFinancial assetsCash and cash equivalentsPayables\n
Floating interest rate ($ 100 )Tood interest maturing in year or less $ CCONon - interest bearing 5 ′ 000Totals ’ DDD2013
32.9691832.987Receivables
9.4319.431Restricted cash
5.4745.474Available - for - sale financial assets
767767Other financial assets
7.2715377.808Total financial assets
45.71410.75356.467Financial liabilities
( 47.106 )( 47.106 )Borrowings
( 191.995 )( 10.570 )( 202.565 )Derivatives held for trading
( 1.271 )( 1.271 )Total financial liabilities
( 191.995 )( 10.570 )( 48.377 )( 250.942 )Net financial ( liabilities ) / assets
( 146.281 )( 10.570 )( 37.624 )( 194.475 )2012
73.00516.5821.03690.623Receivables
12.22612.226Other financial assets
1.4903.1804.670Available - for - sale financial assets
1.7511.751Total financial assets
74.49516.58218.193109.270Financial liabilities
( 49.278 )( 49.278 )Borrowings
( 148.625 )( 8.919 )( 157.544 )Derivatives held for trading
( 2.685 )( 2.685 )Total financial liabilities
( 148.625 )( 8.919 )( 51.963 )( 209.507 )Net financial ( liabilities ) / assets
( 74.130 )7.663( 33.770 )( 100.237 )
", - "page_start": 102, - "page_end": 102, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**Seasonal changes may adversely aÅect our business and operations.**\n\nOur operations may be adversely aÅected by periods of inclement weather which could increase the \nvolume of waste collected under our existing contracts (without corresponding compensation), delay the \ncollection and disposal of waste, reduce the volume of waste delivered to our disposal sites, or delay the \nconstruction or expansion of our landÑll sites and other facilities. \n\n**We may be unable to extend the maturity of our revolving short-term credit facility.**\n\nWe have a revolving short-term credit facility in the principal amount of $300 million which expires in \nJune 2005. We anticipate extending the maturity of this credit facility until at least June 2006. However, we \ncannot assure you that we will receive such extension and, if so, whether such extension will be on terms as \nfavorable to us as those currently contained in the credit facility. \n\n**The outcome of audits by the Internal Revenue Service may adversely aÅect our company.**\n\n\n \n \n \n \n [html]\n
Number of and adverseNon - consumptionPresenceMean, nTableParametersNo.TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable1555TableTable
", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "SUBSEQUENT EVENT \nof such inventory by product type while considering factors such \nOn August 1, 2012, the Company acquired SKF's company- \nas its age, historic and current demand trends, the physical \nowned distribution businesses in Australia and New Zealand for \ncondition of the inventory, as well as assumptions regarding \ncash consideration. These businesses will expand Applied's global \nfuture demand. Our ability to recover our cost for slow moving \ncapabilities and are part of the Service Center Based Distribution \nor obsolete inventory can be affected by such factors as general \nsegment. The Company funded the acquisition from its available \nmarket conditions, future customer demand and relationships \ncash and existing revolving credit facilities. Results of operations \nwith suppliers. Most of the products we hold in inventory have \nacquired will be included in the Company's results of operations \nlong shelf lives, are not highly susceptible to obsolescence and \nfrom the date of closing. \nare eligible for return under various supplier return programs. \n\nCRITICAL ACCOUNTING POLICIES \nAllowances for Doubtful Accounts \nThe preparation of financial statements and related disclosures in \nWe evaluate the collectibility of trade accounts receivable based \nconformity with accounting principles generally accepted in the \non a combination of factors. Initially, we estimate an allowance \nUnited States of America requires management to make \nfor doubtful accounts as a percentage of net sales based on \njudgments, assumptions and estimates at a specific point in time \n\nrecognized $34.4 million of net deferred tax assets. This includes a \n\nSelf-Insurance Liabilities $0.2 million valuation allowance recorded related to estimated \n\nlimitations in the deductibility of certain expenses. Management We maintain business insurance programs with significant self- \n\nbelieves that sufficient income will be earned in the future to insured retention covering workers’ compensation, business, \n\nrealize its deferred income tax assets. The realization of these automobile, general product liability and other claims. We accrue \n\ndeferred tax assets can be impacted by changes to tax laws, estimated losses using actuarial calculations, models and \n\nstatutory tax rates and future taxable income levels. assumptions based on historical loss experience. We maintain a \n\nself-insured health benefits plan, which provides medical benefits \n\nto U.S. based employees electing coverage. We maintain a reserve \n\nfor all unpaid medical claims including those incurred but not \n\nreported based on historical experience and other assumptions. \n\n7 \n\nApplied Industrial Technologies, Inc. and Subsidiaries 11", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "The third component of interest rate risk is marked increases in interest rates which may adversely impact the rate at \nwhich the Company may borrow funds for growth in the future. Although this risk is real, it is not significant at this \ntime as the Company has adequate cash for operations, payment of debt and near-term capital projects. \n\nManagement does not view market risk as having a significant impact on the Company's results of operations, although \nfuture results could be adversely impacted if interest rates were to escalate markedly and the company required external \nfinancing. Since the Company does not currently have significant investments in publicly traded stock, currently there \nis limited risk related to the Company’s available for sale securities. General economic conditions impacted by \nregulatory changes, competition or other external influences may play a higher risk to the Company’s overall results. \n\nAs of December 31, 2003, the Company has $7.3 million invested in privately held companies directly or through \ninvestments with portfolio managers. Most of the companies are early stage and significant increases in interest rates \ncould have an adverse impact on their results, ability to raise capital and viability. The Company’s market risk is \nlimited to the funds previously invested and an additional $1.8 million committed under contracts the Company has \nsigned with portfolio managers. \n\n**Evaluation of Disclosure Controls and Procedures**\n\nThe Company maintains disclosure controls and procedures that are designed to ensure that information required to be \ndisclosed in Exchange Act reports is recorded, processed, summarized and reported within the time periods specified in \nthe Commission’s rules and forms, and that such information is accumulated and communicated to management \nincluding our Chief Executive Officer and Chief Financial Officer, as appropriate, to allow timely decisions regarding \nrequired disclosure. \n\nAs of the end of the period covered by this report, December 31, 2003 (the “Evaluation Date”), we carried out an \nevaluation, under the supervision and with the participation of the Company’s management, including our Chief \nExecutive Officer and Chief Financial Officer of the effectiveness of the design and operation of our disclosure \ncontrols and procedures. Based upon that evaluation, the Chief Executive Officer and the Chief Financial Officer \nconcluded that our disclosure controls and procedures were effective as of the Evaluation Date. \n\nUnder our agreements with Sprint, Sprint provides us with billing, collections, customer care, certain network \noperations and other back office services. As a result, Sprint remits to the Company approximately 61% of the \nCompany’s total revenues. In addition, approximately 42% of the expenses reflected in the Company’s consolidated \nfinancial statements relate to charges by or through Sprint for expenses such as billing, collections and customer care, \nroaming expense, long-distance, and travel. Due to this relationship, the Company necessarily relies on Sprint to \nprovide accurate, timely and sufficient data and information to properly record our revenues, expenses and accounts \nreceivable, which underlie a substantial portion of our periodic financial statements and other financial disclosures.", - "page_start": 57, - "page_end": 57, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
266. Russell & Norvig 2021, p. 1001.267. Bostrom ( 2014 ).
268. Russell ( 2019 ).269. Bostrom ( 2014 ); Muller & Bostrom ( 2014 ); Bostrom ( 2015 ).
270. Harari ( 2023 ).271. Muller & Bostrom ( 2014 ).
272 Leaders ’ concerns about the existential risks of AI around 2015. Rawlinson ( 2015 ), Holley ( 2015 ), G00s ( 2014 ). Sainato ( 2015 )273.
“ Cochafter of artificial infeliolence ”, “ babis impact and potential of new A ” [ Mitps :// www. cttoneyse. com / index / graffiather < underline > of all fitciential migrence - tails ampact and postertial < of news ). CIG “ Arer274.
Pitis : Don ( AMy 2013 ): “ Conadian antifical imblionce levels of cardiover ( Heritor pilier on fears of compader baketover ” ( Tritos : Jinnex calcular dose - dosm - clinician pilicit - baby ). Calcitation, Edicity / 2 carboxidy ( Intips :// l275.
“ SS - SS chance that AI outsmants humanity, Gestfrey Hinton says ”, ( Trittzzs / Twwo bmr0bosmb etg. carSS - SS - chance - thip delay - depthage / trumatity - humanity - before - tritist - says - L - 2085594 ), Bloomberg BWN 1, June 2024. Retrieve -276.
< underline > Valance ( 2023 ).277.
Tasks : 2which 17 May 2012. Thise of antificial infilligamon is everydable but should not be heaved, “ harter of at least ”. Thips : “ Interachequardishs controller ( 2D23 / 3max / GT / 3mine / GT / 3mine / Gatther - of attitude interaction inter278.
Colony : Emma ( 7 May 2003 ): “ Father of At aged tech fears migraplaced, “ has cannot stop it ” ( Yetps :// kww. however. mitechfattee = samples = schrothuber = segre - tech - fearuringdaced - can not disp ). Found. Atthered ( 19thps :// well. arch279.
Jown, Henair ( 23 May 2012 ): \" Suergen \" Schmidee : \" Ethnoees \" Ethnoees \" Eather Chltebrtship. Its, Stays 166, Uthink World : \" It ' s Chystopia \",( throughwas forthers, com / detective / enosion / enochrosis / complex / complex / controlles /280.
Motivators • Payan ( 13 December 2013 ). “ Analyses ( kg ; “ Do we think the want ) is before off with more or less itemligence?” “ [ https :// www. ft. contricurrencits / 30 %– GL65 – 4099 / s1440 - 605292575Step37, planacial Trimes. Actively ( Hty281.
Levy, Disever ( 22 December 2002 ). How hist to be Stupid Aboval A, With Yairn LeCuythips : Study decidentifical - interventions ( ethical Aminifingamsce - meta - year - interview ). Witned Archived ( http :// tw ): Next arthrest / class / LEUS
", - "page_start": 44, - "page_end": 44, - "source_file": "wikipedia3.pdf" - }, - { - "text": "These factors can also affect our objectives, strategies and intentions. \nthese factors are beyond our control or our current \nMany of \nexpectations. Should one or more of these risks, uncertainties or other \nfactors materialize, our objectives, strategies or intentions change, or \nany other \nfactors or assumptions underlying the forward-looking \ninformation prove incorrect, our actual results and our plans could vary \nsignificantly from what we currently foresee. \n\nAccordingly, we warn investors to exercise caution when considering \nstatements containing forward-looking information and that it would \nbe unreasonable to rely on such statements as creating legal rights \nregarding our future results or plans. We are under no obligation (and \nwe expressly disclaim any such obligation) to update or alter any \nstatements containing forward-looking information or the factors or \nassumptions underlying them, whether as a result of new information, \nfuture events or otherwise, except as required by law. All of the \nforward-looking information in this MD&A is qualified by the cautionary \nstatements herein. \n\n\n \n \n \n \n [html]\n
AAF 1DataNumberSpeciesTeverParametersParametersPercentageSpeciesPatientscan fTableParameterParameterSpecificationTableNursestedAge ( years )
", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "[html]Increased by the following the following the following the following the following the following the following the following the following the following the following the following the following the following the following the follouAETADISESISESISEALISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISERESISand / or and / or month is a vastly and / or waster the waster they was and they ' s and they ' s and they ' s and they ' s and they ' s and they ' s and they ' s and they ' s and they ' s and they ' s and there ' s and they ' s and there a research ' s and there a researcheattractive area in which to associated with attractive and substant to associated with the core area. Me were politing to the core area. Me were politing to the found one with herder. Found one with herders to the long the founding to the foouWith 2004 marking the Softh annivenary of Santas ' markers ' markers ' may not reminded of how much the world of commerce, tachnology and requlation has changed since those ploneering days of the 1950s and 1960s.Today, we have knowledge and technology injected into the exploration equation that the explanation and explained even dream about. But it is vital that we retain their entrepreneurial spirit. Our alin is to foster a working environmentThis includes striving to the provides includes includes includes includes includes includes. The safest possible manner. I applaud to the partial performance af everyone who rose to the challenges posed by the provides. The provide thand has important strategic and confirms that our explanation ( including the confirms that our explanation the company well positioned to capture the upside velue available to the provide the facility in the survey of our strategy in theComplicated corporate entitles trade onl around the world and problems and problems and relicit act will be and mich willing and three - diseases insputer images we can more clearly ‘ see ’ the structures that might hold the old the ask as fouIn which we encourage and support people and build the confidence required to make boid sut informed decisions of controlled controlled controlled controlled controlled controlled controlled controlled controlled controlled conte2004 -, ine error : by everyoneInvolved to repair and return the plant to full production was first class and a credit to their cooperation and professionalism. 2EBJK STANDS 9JTEast 2ava helps us balance the risk in our exploration program and, with the 3eruk discovery pointing the way to other potential targets, we can add some attractive lower riskBut some things never change ( subjects ) and the changes in the changes in the challenges in this milestone period to neflect on the Santos story – not ln an environment. But ratio of the challenges in the challenges and to the challenges in ththat we work together in a way that enhances our team spirit and ability to be successful. VALUES AR : 1KPORTANThere is another attribute there is another attribute there was there was their thought area of their thought area of their thoughThe Jenuk of discovery in components with any the partners and success for many years, is the result of deliberately the growth strategy put in place or applicated by the strategy in the community for the community for the community for thesprospects to our portfolio, leruk stands out from the processes. At 18.700 feel, it was the depect will being and and arterial articles. At 100 mm of the depect will [ 21 tertis of the controlled in the linked to the linked to the linked to the", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**32. Additional Financial Instruments Disclosure (continued)**\n\n**(b) Interest rate risk exposure**", - "page_start": 86, - "page_end": 86, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
has been amouncid to offer training a I bargine. Descripted and Darwine for those who lives in the North Wort and with it work in the effillore industry there. Planning for this new institutive is well advised and we respect to be ramining couWorld prospects for energy, the need for Australia to add value to its resources, Government initiatives for the support of these activities and environmental imperatives, heavily favour gas, giving every indication that Memaid MarinIt is also important to dose attention to increased efferts in toms of health, safety and environmental protection. Che workplace is langinly at sea, where sperations involve natural dangers and the safety of our pople is paramesent. Wer
Over the past twelve months, we have worked over more closely with produces to take this side of our biomess to the highers possible standard. We are proad of the achievement and at the time of the report, dengite the inherent dangers involveAssrage tumour for the last two sear was B22 million, out turget in the near tumn is is achieve coming of a least 101 / bedlines, with sperpresse levels of accompensing profet. That with be adhessed theored our reslays of strainips : positior
", - "page_start": 9, - "page_end": 9, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", - "query": "To what system of logic do OWL ontologies belong to ?", - "target_page": 7, - "target_passage": "OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
Chapter 1 Introduction4
1.1 Licensing4
1.2 Conventions4
Chapter 2 Requirements and the Protege User Interface6
Chapter 3 What are OWL Ontologies?6
3.1 Components of OWL Ontologies6
3.1. 1 Individuals.7
3.1. 2 Properties8
3.1. 3 Classes8
Chapter 4 Building an OWL Ontology10
4.1 Named Classes13
4.2 Using a Reasoner15
4.4 Using Create Class Hierarchy17
4.5 Create a PizzaTopping Hierarchy19
4.6 OWL Properties22
4.7 Inverse Properties23
4.8 OWL Object Property Characteristics24
4.8. 1 Functional Properties24
4.8. 2 Inverse Functional Properties.25
4.8. 3 Transitive Properties25
4.8. 4 Symmetric and Asymmetric Properties...25
4.8. 5 Reflexive and Irreflexive Properties26
4.8. 6 Reasoners Automatically Enforce Property Characteristics26
4.9 OWL Property Domains and Ranges26
4.10 Describing and Defining Classes29
4.10.1 Property restrictions29
4.10.2 Existential Restrictions31
4.10.3 Creating Subclasses of Pizza33
4.10.4 Detecting a Class that can ’ t Have Members37
4.11 Primitive and Defined Classes ( Necessary and Sufficient Axioms )38
4.12 Universal Restrictions41
4.13 Automated Classification and Open World Reasoning42
", - "page_start": 2, - "page_end": 2, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "OWL classes are assumed to overlap, i.e., by default they are not disjoint. This is often useful \nbecause in OWL, unlike in most object-oriented models, multiple inheritance is not discouraged \nand can be a powerful tool to model data. If we want classes to be disjoint, we must explicitly \ndeclare them to be so. It is often a good development strategy to start with classes that are not \ndisjoint and then make them disjoint once the model is more fully fleshed out as it is not always \nobvious which classes are disjoint from the beginning.", - "page_start": 17, - "page_end": 17, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "So far, we have created some simple named classes and subclasses which hopefully seem \nintuitive and obvious. However, what does it actually mean to be a subclass of something in \nOWL? For example, what does it mean for VegetableTopping to be a subclass of \nPizzaTopping? In OWL subclass means*necessary implication*. I.e., if VegetableTopping is a \nsubclass of PizzaTopping then*all*instances of VegetableTopping are also instances of \nPizzaTopping. It is for this reason that we try to have standards such as having all \nPizzaTopping classes end with the word “Topping”. Otherwise, it might seem we are saying \nthat anything that is a kind of*Ham*like the*Ham*in your sandwich is a kind of MeatTopping or \nPizzaTopping which is not what we mean. For large ontologies strict attention to the naming \nof classes and other entities can prevent potential confusion and bugs.", - "page_start": 21, - "page_end": 21, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you \nhave as well as the standards established by your organization or organizations that you work with. \n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have \nworked with most modern programming languages such as Python or Java, you are already familiar with \nthe concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming \nconflicts between different ontologies. For example, you may have a class called Network in an ontology \nabout telecommunications. You might also have a class called Network in an ontology about graph \ntheory. The two concepts are related but are different. Just as with programming languages you use \nnamespace prefixes to determine what specific namespace a name refers to. E.g., in this example you \nmight have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when \nyou referred to the Network class for the Telecom ontology you would use tc:Network and \ngt:Network for the graph theory class. \n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl \nand is used to refer to classes such as owl:Thing and owl:Nothing. The Resource Description \nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that \nontologies use such as rdfs:label leverage this namespace. \n\nIn the bottom view of the Active ontology tab there is a tab called Ontology Prefixes. This tab shows all \nthe current namespace mappings in your ontology. There are certain concepts from OWL, RDF, RDFS, \nXML and XSD that are required for every ontology, so those namespaces are by default mapped in every \nnew Protégé ontology. There is also a mapping to the empty string for whatever the namespace is for your \nontology. This allows you to display and refer to entities in your ontology without entering a namespace \nprefix. If you look at that tab now you should see a row where the first column is blank, and the second \ncolumn has the base IRI for your ontology. It should be the same IRI as the Ontology IRI at the top of the \nActive ontology tab, except it also has a # sign at the end. E.g., the Pizza tutorial developed for this \ntutorial has an IRI of: http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial and the \nrow that has a blank first column in Ontology Prefixes has the IRI: \nhttp://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#.", - "page_start": 61, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "3.1.2 Properties \nProperties are binary relations between individuals. I.e., properties link two individuals together. For \nexample, the property hasFriend might link the individual Biswanath to the individual Michael, or \nthe property hasChild might link the individual Michael to the individual Oriana. Properties can have \ninverses. For example, the inverse of hasChild is hasParent. Properties can be limited to having a \nsingle value – i.e., to being functional. They can also be transitive or symmetric. These property \ncharacteristics are explained in detail in Section 4.8. Figure 3.2 shows a representation of some properties. \n\nProperties are similar to properties in Object-Oriented Programming (OOP). However, there are \nimportant differences between properties in OWL and OOP. The most important difference is that OWL \nproperties are first class entities that exist independent of classes. OOP developers are encouraged to \nread: https://www.w3.org/2001/sw/BestPractices/SE/ODSD/ \n\n\n\n\nOriana \n\n\nItaly \nIndia \n\n\n\n\nhasChild \n\n\nlivesIn \n\n\nUSA \n\n\nCountry \n\n\nPerson \n\n\nRover \n\n\nhasPet \n\n\nDog \n\n\nBuddy \n\n\n\nFigure 3.3: Representation of Classes containing Individuals \n\n3.1.3 Classes \nOWL classes are sets that contain individuals. They are described using formal (mathematical) \ndescriptions that rigorously define the requirements for membership of the class. For example, the class \nCat would contain all the individuals that are cats in our domain of interest.2 Classes may be organized \ninto a superclass-subclass hierarchy, which is also known as a taxonomy. However, taxonomies are often \ntrees. I.e., each node has only one parent node. Class hierarchies in OWL are not restricted to be trees and \nmultiple inheritance can be a powerful tool to represent data in an intuitive manner. \n\nSubclasses specialize (aka*are subsumed by*) their superclasses. For example, consider the classes Animal \nand Dog – Dog might be a subclass of Animal (so Animal is the superclass of Dog). This says that*All*\n*dogs are animals*,*All members of the class*Dog*are members of the class*Animal. OWL and Protégé \n\n2 Individuals can belong to more than one class and classes can have more than one superclass. Unlike OOP where \nmultiple inheritance is typically unavailable or discouraged it is common in OWL.", - "page_start": 8, - "page_end": 8, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Rather than a standard bibliography, this section is divided into various categories based on resources that \nwill be valuable for future exploration of the technologies and methods described in this tutorial. \n\n14.1 W3C Documents \nOWL 2 Primer: https://www.w3.org/TR/owl2-primer/ \n\nOWL 2 Specification: https://www.w3.org/TR/owl2-overview/ \n\nSemantic Web Primer for Object-Oriented Software Developers: https://www.w3.org/TR/sw-oosd- \nprimer/ \n\nSPARQL Specification: https://www.w3.org/TR/sparql11-query/ \n\nSWRL Specification and Built-ins: https://www.w3.org/Submission/SWRL/ \n\n14.2 Web Sites, Tools, And Presentations. \nAgile Alliance: https://www.agilealliance.org/agile101/ \n\nCellfie: https://github.com/protegeproject/cellfie-plugin/wiki/Grocery-Tutorial \n\nGartner Hype Cycle: https://www.gartner.com/en/research/methodologies/gartner-hype-cycle \n\nJena: Open Source Java Framework for Semantic Web and Linked Data Applications: \nhttps://jena.apache.org/ \n\nOpen World Assumption (OWA) presentation by Nick Drummond and Rob Shearer: \nhttp://www.cs.man.ac.uk/~drummond/presentations/OWA.pdf \n\nProtégé: https://protege.stanford.edu/ \n\nProtégé Best Practices. Summary page on my blog for all my articles on Protégé, OWL, SWRL, etc.: \nhttps://www.michaeldebellis.com/post/best-practices-for-new-protege-users \n\nSHACL Playground: https://shacl.org/playground/ \n\nSWRL Presentation by Martin O’Connor: \nhttps://protege.stanford.edu/conference/2009/slides/SWRL2009ProtegeConference.pdf \n\nWebProtégé: https://webprotege.stanford.edu/ \n\nWebVOWL: Web-based Visualization of Ontologies: http://vowl.visualdataweb.org/webvowl.html \n\n14.3 Papers \nBerners-Lee (2001). The Semantic Web: A new form of Web content that is meaningful to computers will \nunleash a revolution of new possibilities. With James Hendler and Ora Lassila. Scientific American, May \n17, 2001. https://tinyurl.com/BernersLeeSemanticWeb \n\nMacGregor, Robert (1991). \"Using a description classifier to enhance knowledge representation\". IEEE \nExpert. 6 (3): 41–46. doi:10.1109/64.87683 https://tinyurl.com/MacGregorLoom", - "page_start": 89, - "page_end": 89, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "relations, transitive relations, and many more. An understanding of the basic concepts of set theory will \nhelp the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents \nan intuitive GUI that enables domain experts to define models without a background in set theory. \nHowever, developers are encouraged to refresh their knowledge on logic and set theory. A good source is \nthe first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another \ngood source is the PDF document*Overview of Set Theory*available at: \nhttps://www.michaeldebellis.com/post/owl-theoretical-basics \n\n3.1.1 Individuals \nIndividuals represent objects in the domain of interest. An important difference between OWL and most \nprogramming and knowledge representation languages is that OWL does not use the Unique Name \nAssumption (UNA). This means that two different names could actually refer to the same individual. For \nexample, “Queen Elizabeth”, “The Queen” and “Elizabeth Windsor” might all refer to the same \nindividual. In OWL, it must be explicitly stated that individuals are the same as each other, or different \nfrom each other. Figure 3.1 shows a representation of some individuals in a domain of people, nations, \nand relations — in this tutorial we represent individuals as diamonds. \n\n\nDiane \n\n\nItaly \n\n\nUSA \n\n\nTim \n\n\n\n\n\n\n\n\n\n\nIndia \n\nJenna \n\nFigure 3.1: Representation of Individuals \n\nlivesIn \nIndia \n\nBiswanath \n\n\n\n\nhasFriend \n\n\nFigure 3.2: Representation of Properties \n\n\nIndividuals are also known as*instances*. Individuals can be referred to as*instances of classes*.", - "page_start": 7, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. \n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in \nwhat is called an undirected or network graph because objects can be subjects and vice versa. Whenever \nyou define a property in OWL you are defining a predicate. An individual can be a subject or an object \n(or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1. In this example \nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object. \n\nHowever, classes and properties themselves are also represented as triples. So for example, when you \ncreate the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to \nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class. Similarly when you add \nNamedPizza as a subclass of Pizza, Protégé adds the triple: NamedPizza rdfs:**s**ubClassOf \nPizza. \n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities \nthat are the subjects of triples where the predicate is rdfs:**s**ubClassOf and the object is any other \nentity. The*?*before a name indicates that the name is a wildcard that can match anything that fits with the \nrest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate \nor even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this \ncase our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the \nname of a class while in others it is a class expression with an orange circle in front of it. This is because \nwhen defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL \naxioms. \n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query \ndetermines what to match in the query. If you want to display everything matched in the WHERE clause \nyou can just use a*for the SELECT clause. The initial default query in this tab is set up with no \nknowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes \nregardless of the ontology. To get information about Pizzas the first thing we need to do is to add \nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a \nmapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab \ndiscussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement: \n\nPREFIX pizza: ", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "This introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions \nspecific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you \nhave general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the \nUser Support for Protégé and Web Protégé email list. This list has many people (including me) who \nmonitor it and can contribute their knowledge to help you understand how to get the most out of this \ntechnology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first \norange Subscribe button. That will enable you to subscribe to the list and give you the email to send \nquestions to. \n\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the \nrequirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of \nthe OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object \nproperties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the \nontology and automatically compute the ontology class hierarchy. \n\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: \nadding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of \nan OWL entity. \n\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology \nhas a small number of instances and property values already created which can be used to illustrate the \ntools in the later chapters for writing rules, doing queries, and defining constraints. \n\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter \n10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and \nSQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the \ndifference between defining logical axioms in Description Logic and data integrity constraints in \nSHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography. \n\n1.1 Licensing \nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International \nPublic License. I typically distribute it as a PDF but if you want to make your own version send me an \nemail and I will send you the Word version. For details on licensing see: \nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode \n\n1.2 Conventions \nClass, property, rule, and individual names are written in Consolas font like this. The term used for \nany such construct in Protégé and in this document is an*Entity*. Individuals and classes can also be \nreferred to as objects. \n\nNames for user interface tabs, views, menu selections, buttons, and text entry are highlighted like this. \n\nAny time you see highlighted text such as File>Preferences or OK or PizzaTopping it refers to something \nthat you should or optionally could view or enter into the user interface. If you ever aren’t sure what to \ndo to accomplish some task look for the highlighted text. Often, as with PizzaTopping the text you \nenter into a field in the Protégé UI will be the name of a class, property, etc. In those cases, where the \n\n\n \n \n \n \n [html]\n
TableTableTableTable
TableTableTableTable
TableTableTable
", - "page_start": 4, - "page_end": 4, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "**OLAF : Ontology Learning Applied Framework**\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) \nJean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK \n\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically**extracting and structuring knowledge**\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a**modular ontology**\n**learning framework**considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning \nsystems as tools to help the domain expert, we developed the proposed framework with**full automation**in mind. An implementation as an**open-**\n**source and collaborative python library**is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning. \n\n\n\n\n\n\n \n \n \n \n [html]\n
Text2Onto, 2005, [ 1 ]It is the reference in the field as it defines a representation - agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a CATE module.Ontologies can be exported in various formats. CATE system adds great visualisations. But it is not maintained since 2011.
OntoCain, 2010, [ 2 ]It focusives on multivord terms to construct a “ lexicalised contology ” by adapting an agglomerative clustering and an PCA method. It impliements & steps text preprocessing, concept extraction ( C / NC - value ). Takonomy construction, aIt considers only multiword terms and relies on WordNet and POS tags. It cloes not distinguish between terms and concepts and implements different adaptable approaches.
OntoLearn ( Reloaded ), 2O13, [ 3 ]It focuses on “ lexicalised ontologies ” and uses seed knowledge. It implements 5 steps : terminology extraction. hypermym graph construction, domain filtering of hypernyms. hypernym graph pruning and edge recovery.It relies on WordNet and PDS tags and does not distinguish between terms and concepts It implements different adaptable approaches.
\n\nMost ontology learning systems do not consider the targeted ontology- \nbased system. Though an ideal ontology should model a domain in an \napplication-independent manner, in practice,**concepts and relations**\n**represented largely depend on one or more business use cases**. As \nwe designed our framework with industry application in mind, we need \nto consider it within its**real-world usage context**. \n\n***C-value-based filtering***\n***Linguistic-based filtering***\n***TF-IDF value-based filtering***\n\nOur implementation is largely based on the**Python NLP**\n**library spaCy**. The text processing on spaCy helps us \nwork with data in**many different languages**while \nstaying flexible on the methods used. The only constraint \nis to end up with a list of**spaCy Doc objects**. \n\nTerm Extraction \n\n***Embedding-based similar term extraction***\n***ConceptNet synonym extraction***\n***WordNet synonym extraction***\n\nTerm Enrichment \n\n***ConceptNet-based extraction***\n***Grouping terms based on synonyms***\n***Term cooccurrences-based extraction***\n***Similarity-based extraction***\n*Formal concept Analysis*\n\n**OLAF**\n\nConcept/Relation \nExtraction \n\n***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - } - ] - }, - { - "references": { - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", - "query": "Concerning ontologies, what is an anonymous class ?", - "target_page": 30, - "target_passage": "They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Exercise 3: Add a Comment Annotation to Your Ontology**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Make sure you are in the Active Ontology tab. In the view just below the Ontology IRI and Ontology \nVersion IRI fields find the Annotations option and click on the + sign. This will bring up a menu to create \na new annotation on the ontology. \n\n2. The rdfs:comment annotation should be highlighted by default. If it isn’t highlighted click on it. Then \ntype a new comment into the view to the right. Something like A tutorial ontology for the Pizza domain. \n\n3. Click OK. Your Active Ontology tab should like Figure 4.3. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n\nAdd Subclass \n\nAdd Sibling Class \n\n\n\n\nDelete Class \n\n\n\n4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. \n\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the \nClass hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or \nto create them as independent tabs. \n\n13", - "page_start": 13, - "page_end": 13, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "So far, we have created some simple named classes and subclasses which hopefully seem \nintuitive and obvious. However, what does it actually mean to be a subclass of something in \nOWL? For example, what does it mean for VegetableTopping to be a subclass of \nPizzaTopping? In OWL subclass means*necessary implication*. I.e., if VegetableTopping is a \nsubclass of PizzaTopping then*all*instances of VegetableTopping are also instances of \nPizzaTopping. It is for this reason that we try to have standards such as having all \nPizzaTopping classes end with the word “Topping”. Otherwise, it might seem we are saying \nthat anything that is a kind of*Ham*like the*Ham*in your sandwich is a kind of MeatTopping or \nPizzaTopping which is not what we mean. For large ontologies strict attention to the naming \nof classes and other entities can prevent potential confusion and bugs.", - "page_start": 21, - "page_end": 21, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Chapter 1 Introduction4
1.1 Licensing4
1.2 Conventions4
Chapter 2 Requirements and the Protege User Interface6
Chapter 3 What are OWL Ontologies?6
3.1 Components of OWL Ontologies6
3.1. 1 Individuals.7
3.1. 2 Properties8
3.1. 3 Classes8
Chapter 4 Building an OWL Ontology10
4.1 Named Classes13
4.2 Using a Reasoner15
4.4 Using Create Class Hierarchy17
4.5 Create a PizzaTopping Hierarchy19
4.6 OWL Properties22
4.7 Inverse Properties23
4.8 OWL Object Property Characteristics24
4.8. 1 Functional Properties24
4.8. 2 Inverse Functional Properties.25
4.8. 3 Transitive Properties25
4.8. 4 Symmetric and Asymmetric Properties...25
4.8. 5 Reflexive and Irreflexive Properties26
4.8. 6 Reasoners Automatically Enforce Property Characteristics26
4.9 OWL Property Domains and Ranges26
4.10 Describing and Defining Classes29
4.10.1 Property restrictions29
4.10.2 Existential Restrictions31
4.10.3 Creating Subclasses of Pizza33
4.10.4 Detecting a Class that can ’ t Have Members37
4.11 Primitive and Defined Classes ( Necessary and Sufficient Axioms )38
4.12 Universal Restrictions41
4.13 Automated Classification and Open World Reasoning42
", - "page_start": 2, - "page_end": 2, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you \nhave as well as the standards established by your organization or organizations that you work with. \n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have \nworked with most modern programming languages such as Python or Java, you are already familiar with \nthe concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming \nconflicts between different ontologies. For example, you may have a class called Network in an ontology \nabout telecommunications. You might also have a class called Network in an ontology about graph \ntheory. The two concepts are related but are different. Just as with programming languages you use \nnamespace prefixes to determine what specific namespace a name refers to. E.g., in this example you \nmight have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when \nyou referred to the Network class for the Telecom ontology you would use tc:Network and \ngt:Network for the graph theory class. \n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl \nand is used to refer to classes such as owl:Thing and owl:Nothing. The Resource Description \nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that \nontologies use such as rdfs:label leverage this namespace. \n\nIn the bottom view of the Active ontology tab there is a tab called Ontology Prefixes. This tab shows all \nthe current namespace mappings in your ontology. There are certain concepts from OWL, RDF, RDFS, \nXML and XSD that are required for every ontology, so those namespaces are by default mapped in every \nnew Protégé ontology. There is also a mapping to the empty string for whatever the namespace is for your \nontology. This allows you to display and refer to entities in your ontology without entering a namespace \nprefix. If you look at that tab now you should see a row where the first column is blank, and the second \ncolumn has the base IRI for your ontology. It should be the same IRI as the Ontology IRI at the top of the \nActive ontology tab, except it also has a # sign at the end. E.g., the Pizza tutorial developed for this \ntutorial has an IRI of: http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial and the \nrow that has a blank first column in Ontology Prefixes has the IRI: \nhttp://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#.", - "page_start": 61, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "4.10.4 Detecting a Class that can’t Have Members \nNext, we are going to use the reasoner to detect a class with a definition that means it can never have any \nmembers. In the current version of Protégé when the reasoner detects an inconsistency or problem on \nsome operating systems the UI can occasionally lock up and be hard to use. So to make sure you don’t \nlose any of your work save your ontology using File>Save. \n\nSometimes it can be useful to create a class that we think should be impossible to instantiate to make sure \nthe ontology is modeled as we think it is. Such a class is called a Probe Class. \n\n**Exercise 19: Add a Probe Class called ProbeInconsistentTopping**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Select the class CheeseTopping from the class hierarchy. \n\n2. Create a subclass of CheeseTopping called ProbeInconsistentTopping. \n\n3. Click on the Add icon (+) next to the SubClass Of field in the Description view for \nProbeInconsistentTopping. \n\n4. Select the Class hierarchy tab from the dialogue that pops up. This will bring up a small view that \nlooks like the class hierarchy tab you have been using to add new classes. Use this to navigate to and \nselect the class VegetableTopping. Click on OK. \n\n5. Make sure to save your current ontology file. Now run the reasoner. You should see that \nProbeInconsistentTopping is now highlighted in red indicating it is inconsistent. \n\n6. Click on ProbeInconsistentTopping to see why it is highlighted in red. Notice that at the top of the \nDescription view you should now see owl:Nothing under the Equivalent To field. This means that the \nprobe class is equivalent to owl:Nothing. The owl:Nothing class is the opposite of owl:Thing. \nWhereas all individuals are instances of owl:Thing, no individual can ever be an instance of \nowl:Nothing. The owl:Nothing class is equivalent to the empty set in set theory. \n\n7. There should be a ? icon just to the right of owl:Nothing. As with any inference of the reasoner it is \npossible to click on the new information and generate an explanation for it. Do that now, click on the ? \nicon. This should generate a new window that looks like figure 4.20. The explanation is that \nProbeInconsistentTopping is a subclass of CheeseTopping and VegetableTopping but those \ntwo classes are disjoint. \n\n8. Click OK to dismiss the window. Delete the class ProbeInconsistentTopping by selecting it and then \nclicking on the delete class icon at the top of the classes view (see figure 4.4). \n\n9. Synchronize the reasoner.", - "page_start": 37, - "page_end": 37, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "\n \n \n \n \n [html]1.initially use quantifier restrictions. Quantifier restrictions can be further categorized as existential and antiversal restrictionsa. Both types of restrictions will be illustrated with examples in this\n
members of Mut2arvel LiaTopp1rig – i. e. the class of things that have at least a morzarella topping.
The class of individuals that are P2 zzas and only have bas7αpp1ng relations to instances of the class Veget ; abl. is Topp1ng ( i. e., Veget1ar12ar12an ).
OWL. we can describe all of the above classes using restrictions. OWL restrictions fall into three main ex :
Quantifier restrictions. These describe that a property must have some or all values that are of a particular class.2.
Cardinality restrictions. These describe the number of individuals that must be related to a class by a specific property.3.
hasValue restrictions. These describe specific values that a property must have.Nursing
Existential resitutions describe classes of individuals that participate in at least one relation along a specified proppty. For example, the class of individuals who have at feast one ( or some ). PatsTopp1 / or example, the class to ons a
Universal restrictions describe classes of individuals that for a given property only have relations along a proporty to individuals that are members of a specific class. For example, the class of individuals that only have Na17apti1 / h
\n\nA restriction always describes a class. Sometimes (as we will soon see) it can be a defined class. \nOther times it may be an anonymous class. In all cases the class contains all of the individuals \nthat satisfy the restriction, i.e., all of the individuals that have the relationships required to be a \nmember of the class. In section 9.2 one of our SPARQL queries will return several anonymous \nclasses.", - "page_start": 30, - "page_end": 30, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "5. One last thing we want to do is to configure the reasoner. By default, the reasoner does not perform all \npossible inferences because some inferences can take a long time for large and complex ontologies. In \nthis tutorial we will always be dealing with small and simple ontologies so we want to see everything the \nreasoner can do. Go to: Reasoner>Configure. This will bring up a dialog with several check boxes of \ninferences that the reasoner can perform. If they aren’t all checked then check them all. You may receive \na warning that some inferences can take a lot of time, but you can ignore those since your ontology will \nbe small. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n4.3 Disjoint Classes \n\nHaving added the classes Pizza, PizzaTopping, and PizzaBase to the ontology, we now want to say \nthat these classes are*disjoint*. I.e., no individual can be an instance of more than one of those classes. In \nset theory terminology the intersection of these three classes is the empty set: owl:Nothing. \n\n**Exercise 6: Make Pizza, PizzaTopping, and PizzaBase disjoint from each other**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", - "page_start": 15, - "page_end": 15, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "relations, transitive relations, and many more. An understanding of the basic concepts of set theory will \nhelp the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents \nan intuitive GUI that enables domain experts to define models without a background in set theory. \nHowever, developers are encouraged to refresh their knowledge on logic and set theory. A good source is \nthe first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another \ngood source is the PDF document*Overview of Set Theory*available at: \nhttps://www.michaeldebellis.com/post/owl-theoretical-basics \n\n3.1.1 Individuals \nIndividuals represent objects in the domain of interest. An important difference between OWL and most \nprogramming and knowledge representation languages is that OWL does not use the Unique Name \nAssumption (UNA). This means that two different names could actually refer to the same individual. For \nexample, “Queen Elizabeth”, “The Queen” and “Elizabeth Windsor” might all refer to the same \nindividual. In OWL, it must be explicitly stated that individuals are the same as each other, or different \nfrom each other. Figure 3.1 shows a representation of some individuals in a domain of people, nations, \nand relations — in this tutorial we represent individuals as diamonds. \n\n\nDiane \n\n\nItaly \n\n\nUSA \n\n\nTim \n\n\n\n\n\n\n\n\n\n\nIndia \n\nJenna \n\nFigure 3.1: Representation of Individuals \n\nlivesIn \nIndia \n\nBiswanath \n\n\n\n\nhasFriend \n\n\nFigure 3.2: Representation of Properties \n\n\nIndividuals are also known as*instances*. Individuals can be referred to as*instances of classes*.", - "page_start": 7, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "3.1.2 Properties \nProperties are binary relations between individuals. I.e., properties link two individuals together. For \nexample, the property hasFriend might link the individual Biswanath to the individual Michael, or \nthe property hasChild might link the individual Michael to the individual Oriana. Properties can have \ninverses. For example, the inverse of hasChild is hasParent. Properties can be limited to having a \nsingle value – i.e., to being functional. They can also be transitive or symmetric. These property \ncharacteristics are explained in detail in Section 4.8. Figure 3.2 shows a representation of some properties. \n\nProperties are similar to properties in Object-Oriented Programming (OOP). However, there are \nimportant differences between properties in OWL and OOP. The most important difference is that OWL \nproperties are first class entities that exist independent of classes. OOP developers are encouraged to \nread: https://www.w3.org/2001/sw/BestPractices/SE/ODSD/ \n\n\n\n\nOriana \n\n\nItaly \nIndia \n\n\n\n\nhasChild \n\n\nlivesIn \n\n\nUSA \n\n\nCountry \n\n\nPerson \n\n\nRover \n\n\nhasPet \n\n\nDog \n\n\nBuddy \n\n\n\nFigure 3.3: Representation of Classes containing Individuals \n\n3.1.3 Classes \nOWL classes are sets that contain individuals. They are described using formal (mathematical) \ndescriptions that rigorously define the requirements for membership of the class. For example, the class \nCat would contain all the individuals that are cats in our domain of interest.2 Classes may be organized \ninto a superclass-subclass hierarchy, which is also known as a taxonomy. However, taxonomies are often \ntrees. I.e., each node has only one parent node. Class hierarchies in OWL are not restricted to be trees and \nmultiple inheritance can be a powerful tool to represent data in an intuitive manner. \n\nSubclasses specialize (aka*are subsumed by*) their superclasses. For example, consider the classes Animal \nand Dog – Dog might be a subclass of Animal (so Animal is the superclass of Dog). This says that*All*\n*dogs are animals*,*All members of the class*Dog*are members of the class*Animal. OWL and Protégé \n\n2 Individuals can belong to more than one class and classes can have more than one superclass. Unlike OOP where \nmultiple inheritance is typically unavailable or discouraged it is common in OWL.", - "page_start": 8, - "page_end": 8, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "OWL classes are assumed to overlap, i.e., by default they are not disjoint. This is often useful \nbecause in OWL, unlike in most object-oriented models, multiple inheritance is not discouraged \nand can be a powerful tool to model data. If we want classes to be disjoint, we must explicitly \ndeclare them to be so. It is often a good development strategy to start with classes that are not \ndisjoint and then make them disjoint once the model is more fully fleshed out as it is not always \nobvious which classes are disjoint from the beginning.", - "page_start": 17, - "page_end": 17, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - } - ] - }, - { - "references": { - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", - "query": "When to use an enumerated class in OWL ontologies ?", - "target_page": 46, - "target_passage": "When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you \nhave as well as the standards established by your organization or organizations that you work with. \n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have \nworked with most modern programming languages such as Python or Java, you are already familiar with \nthe concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming \nconflicts between different ontologies. For example, you may have a class called Network in an ontology \nabout telecommunications. You might also have a class called Network in an ontology about graph \ntheory. The two concepts are related but are different. Just as with programming languages you use \nnamespace prefixes to determine what specific namespace a name refers to. E.g., in this example you \nmight have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when \nyou referred to the Network class for the Telecom ontology you would use tc:Network and \ngt:Network for the graph theory class. \n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl \nand is used to refer to classes such as owl:Thing and owl:Nothing. The Resource Description \nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that \nontologies use such as rdfs:label leverage this namespace. \n\nIn the bottom view of the Active ontology tab there is a tab called Ontology Prefixes. This tab shows all \nthe current namespace mappings in your ontology. There are certain concepts from OWL, RDF, RDFS, \nXML and XSD that are required for every ontology, so those namespaces are by default mapped in every \nnew Protégé ontology. There is also a mapping to the empty string for whatever the namespace is for your \nontology. This allows you to display and refer to entities in your ontology without entering a namespace \nprefix. If you look at that tab now you should see a row where the first column is blank, and the second \ncolumn has the base IRI for your ontology. It should be the same IRI as the Ontology IRI at the top of the \nActive ontology tab, except it also has a # sign at the end. E.g., the Pizza tutorial developed for this \ntutorial has an IRI of: http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial and the \nrow that has a blank first column in Ontology Prefixes has the IRI: \nhttp://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#.", - "page_start": 61, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Figure 4.23 The Reasoner Inferred that Margherita and Soho Pizzas are subclasses of VegetarianPizza \n\n4.14 Defining an Enumerated Class \nA powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. \nThe idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a \nspecific code library. One of the first and most common design patterns was the Model-View-Controller \npattern first used in Smalltalk and now almost the default standard for good user interface design. Since \nthere are significant differences between OWL and standard OOP the many excellent books on OOP \ndesign patterns don’t directly translate into OWL design patterns. Also, since the use of OWL is more \nrecent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP \ncommunity has. However, there are already many design patterns that have been documented for OWL \nand that can provide users with ways to save time and to standardize their designs according to best \npractices. \n\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few \npossible values it can be useful to create a class to represent those values and to explicitly define the class \nby listing each possible value. We will show an example of such an enumerated class by creating a new", - "page_start": 44, - "page_end": 44, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "So far, we have created some simple named classes and subclasses which hopefully seem \nintuitive and obvious. However, what does it actually mean to be a subclass of something in \nOWL? For example, what does it mean for VegetableTopping to be a subclass of \nPizzaTopping? In OWL subclass means*necessary implication*. I.e., if VegetableTopping is a \nsubclass of PizzaTopping then*all*instances of VegetableTopping are also instances of \nPizzaTopping. It is for this reason that we try to have standards such as having all \nPizzaTopping classes end with the word “Topping”. Otherwise, it might seem we are saying \nthat anything that is a kind of*Ham*like the*Ham*in your sandwich is a kind of MeatTopping or \nPizzaTopping which is not what we mean. For large ontologies strict attention to the naming \nof classes and other entities can prevent potential confusion and bugs.", - "page_start": 21, - "page_end": 21, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "OWL classes are assumed to overlap, i.e., by default they are not disjoint. This is often useful \nbecause in OWL, unlike in most object-oriented models, multiple inheritance is not discouraged \nand can be a powerful tool to model data. If we want classes to be disjoint, we must explicitly \ndeclare them to be so. It is often a good development strategy to start with classes that are not \ndisjoint and then make them disjoint once the model is more fully fleshed out as it is not always \nobvious which classes are disjoint from the beginning.", - "page_start": 17, - "page_end": 17, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Chapter 1 Introduction4
1.1 Licensing4
1.2 Conventions4
Chapter 2 Requirements and the Protege User Interface6
Chapter 3 What are OWL Ontologies?6
3.1 Components of OWL Ontologies6
3.1. 1 Individuals.7
3.1. 2 Properties8
3.1. 3 Classes8
Chapter 4 Building an OWL Ontology10
4.1 Named Classes13
4.2 Using a Reasoner15
4.4 Using Create Class Hierarchy17
4.5 Create a PizzaTopping Hierarchy19
4.6 OWL Properties22
4.7 Inverse Properties23
4.8 OWL Object Property Characteristics24
4.8. 1 Functional Properties24
4.8. 2 Inverse Functional Properties.25
4.8. 3 Transitive Properties25
4.8. 4 Symmetric and Asymmetric Properties...25
4.8. 5 Reflexive and Irreflexive Properties26
4.8. 6 Reasoners Automatically Enforce Property Characteristics26
4.9 OWL Property Domains and Ranges26
4.10 Describing and Defining Classes29
4.10.1 Property restrictions29
4.10.2 Existential Restrictions31
4.10.3 Creating Subclasses of Pizza33
4.10.4 Detecting a Class that can ’ t Have Members37
4.11 Primitive and Defined Classes ( Necessary and Sufficient Axioms )38
4.12 Universal Restrictions41
4.13 Automated Classification and Open World Reasoning42
", - "page_start": 2, - "page_end": 2, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "**Exercise 3: Add a Comment Annotation to Your Ontology**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Make sure you are in the Active Ontology tab. In the view just below the Ontology IRI and Ontology \nVersion IRI fields find the Annotations option and click on the + sign. This will bring up a menu to create \na new annotation on the ontology. \n\n2. The rdfs:comment annotation should be highlighted by default. If it isn’t highlighted click on it. Then \ntype a new comment into the view to the right. Something like A tutorial ontology for the Pizza domain. \n\n3. Click OK. Your Active Ontology tab should like Figure 4.3. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n\nAdd Subclass \n\nAdd Sibling Class \n\n\n\n\nDelete Class \n\n\n\n4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. \n\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the \nClass hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or \nto create them as independent tabs. \n\n13", - "page_start": 13, - "page_end": 13, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. \n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in \nwhat is called an undirected or network graph because objects can be subjects and vice versa. Whenever \nyou define a property in OWL you are defining a predicate. An individual can be a subject or an object \n(or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1. In this example \nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object. \n\nHowever, classes and properties themselves are also represented as triples. So for example, when you \ncreate the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to \nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class. Similarly when you add \nNamedPizza as a subclass of Pizza, Protégé adds the triple: NamedPizza rdfs:**s**ubClassOf \nPizza. \n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities \nthat are the subjects of triples where the predicate is rdfs:**s**ubClassOf and the object is any other \nentity. The*?*before a name indicates that the name is a wildcard that can match anything that fits with the \nrest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate \nor even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this \ncase our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the \nname of a class while in others it is a class expression with an orange circle in front of it. This is because \nwhen defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL \naxioms. \n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query \ndetermines what to match in the query. If you want to display everything matched in the WHERE clause \nyou can just use a*for the SELECT clause. The initial default query in this tab is set up with no \nknowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes \nregardless of the ontology. To get information about Pizzas the first thing we need to do is to add \nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a \nmapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab \ndiscussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement: \n\nPREFIX pizza: ", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "property called hasSpiciness with only a few possible values ranging from Mild to Hot. In this \nsection we will also create the first individuals in our ontology. \n\n**Exercise 24: Create an Enumerated Class to Represent the Spiciness of a Pizza**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Create a new subclass of owl:Thing called Spiciness. \n\n2. Make sure that Spiciness is selected. Click on the Add icon (+) next to the Instances field in the \nDescription view. \n\n3. You will be prompted with a window that looks like figure 4.24. The diamond icon at the top is for \ncreating a new individual. The circle with an X through it is for deleting an individual. Use the diamond \nicon to create 3 individuals: Hot, Medium, and Mild, so your UI looks like figure 4.24, then click on OK. \n\n4. You may notice that only one of the new individuals was actually created as an instance of \nSpiciness. That’s okay. The next step will supply the reasoner with enough information to make the \nother two also be instances of Spiciness. \n\n5. Make sure that Spiciness is still selected. Click on the Add icon (+) next to the Equivalent To field in \nthe Description view. This time we will create a defined class by directly entering the definition for the \nclass into this field. Select the Class expression editor tab and enter the DL axiom: {Hot, Medium, Mild}. \nSelect OK. \n\n6. Now run the reasoner. You should see that Spiciness is now a defined class and all three individuals: \nHot, Medium, and Mild, are now instances of that class.", - "page_start": 45, - "page_end": 45, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "So far we have been describing object properties. These are properties that have a range that is some \nclass. As with most other object-oriented languages OWL also has the capability to define properties with \nthe range of a simple datatype such as a string or integer. Object purists will argue that everything should \nbe an object. However, to borrow a quote from The Amazing Spiderman: “with great power comes great \noverhead”. I.e., the extra capabilities that one has with a class and an instance also means that instances \ntake up more space and can be slower to process than simple datatypes. For that reason, OWL comes with \na large library of pre-existing datatypes that are mostly imported from XML. That is why many of the \npredefined datatypes in Protégé have a prefix of*xsd*for example xsd:string and xsd:integer. It is \nalso possible to create new basic datatypes. However, for the majority of use cases, if one needs a \ndatatype that doesn’t map to one of the predefined types the best solution is to usually just define a class. \n\nA property with a range that is a simple datatype is known as a datatype property. This is analogous to the \ndistinction between an association and an attribute in the Unified Modeling Language (UML) OOP \nmodeling language. A UML association is similar to an OWL object property and a UML attribute is \nsimilar to an OWL datatype property. It is also analogous to the distinction between relations and \nattributes in entity-relation modeling. A relation in an E/R model is similar to an object property in OWL \nand an attribute is similar to a datatype property. Because datatypes don’t have all the power of OWL \nobjects, many of the capabilities for object properties described in section 4.8 such as having an inverse or \nbeing transitive aren’t available for datatype properties. \n\n5.1 Defining a Data Property \nAs with other OWL entities, datatype properties can be defined either via the Data properties tab in the \nEntities tab or in the Data properties tab available via the Window>Tabs>Data properties option. \n\nWe will use datatype properties to describe the calorie content of pizzas. We will then use some numeric \nranges to broadly classify particular pizzas as high or low calorie. In order to do this we need to complete \nthe following steps: \n\n1. Create a datatype property hasCaloricContent, which will be used to state the calorie content \n\nof particular pizzas. \n\n2. Create several example Pizza individuals with specific calorie contents. \n3. Create two classes broadly categorizing pizzas as low or high calorie. \n\n**Exercise 27: Create a Datatype Property called hasCaloricContent**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Open a Data properties tab. Select owl:topDataProperty. \n\n2. Click on the Add sub property icon in the upper left corner. This works just the same as the UI for \nadding object properties. \n\n3. Name the new data property hasCaloricContent and select OK. \n\n4. Click on the (+) icon next to Domains in the Description view for hasCaloricContent. Use the Class \nhierarchy tab to select the Pizza class as the domain. \n\n5. Click on the (+) icon next to Ranges in the Description view for hasCaloricContent. Select the Built in \ndatatypes tab from the pop-up menu. Select xsd:integer7 from the rather long menu of possible built-in \ndatatypes. This is the default datatype to use for integer data properties. \n\n6. Click the Functional check box next to the Description view. A Pizza can only have one caloric content \nand hence is functional. Data properties are often functional. \n\n5. Select OK and run the reasoner. Your UI should look similar to figure 5.1. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", - "page_start": 48, - "page_end": 48, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "relations, transitive relations, and many more. An understanding of the basic concepts of set theory will \nhelp the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents \nan intuitive GUI that enables domain experts to define models without a background in set theory. \nHowever, developers are encouraged to refresh their knowledge on logic and set theory. A good source is \nthe first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another \ngood source is the PDF document*Overview of Set Theory*available at: \nhttps://www.michaeldebellis.com/post/owl-theoretical-basics \n\n3.1.1 Individuals \nIndividuals represent objects in the domain of interest. An important difference between OWL and most \nprogramming and knowledge representation languages is that OWL does not use the Unique Name \nAssumption (UNA). This means that two different names could actually refer to the same individual. For \nexample, “Queen Elizabeth”, “The Queen” and “Elizabeth Windsor” might all refer to the same \nindividual. In OWL, it must be explicitly stated that individuals are the same as each other, or different \nfrom each other. Figure 3.1 shows a representation of some individuals in a domain of people, nations, \nand relations — in this tutorial we represent individuals as diamonds. \n\n\nDiane \n\n\nItaly \n\n\nUSA \n\n\nTim \n\n\n\n\n\n\n\n\n\n\nIndia \n\nJenna \n\nFigure 3.1: Representation of Individuals \n\nlivesIn \nIndia \n\nBiswanath \n\n\n\n\nhasFriend \n\n\nFigure 3.2: Representation of Properties \n\n\nIndividuals are also known as*instances*. Individuals can be referred to as*instances of classes*.", - "page_start": 7, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - } - ] - }, - { - "references": { - "source_file": "sg246915.pdf", - "query": "Howcan I specify to Content Manager OnDemand to store the data on the server on which the program runs ?", - "target_page": 121, - "target_passage": "Local: Content Manager OnDemand stores data in a primary storage node on the server on which the data loading program runs", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Content Manager OnDemand servers manage control information and index data, store and \nretrieve documents and resource group files, and process query requests from Content \nManager OnDemand Client programs. The documents can be on disk and tape storage \nvolumes. New reports can be loaded into Content Manager OnDemand every day. This way, \nContent Manager OnDemand can retrieve the latest information that is generated by \napplication programs. \n\nWhen a user submits a query, the client program sends a search request to the Content \nManager OnDemand library server. The library server returns a list of the documents that \nmatch the query to the user. When the user selects a document for viewing, the client \nprogram retrieves a copy of the document from the object server where the document is \nstored, opens a viewing window, and displays the document. \n\nFull text search allows users to search the full content of stored documents. For example, \nusers can perform wildcard searches, fuzzy (or similar) searches, proximity searches, and \nboolean searches. \n\nDocuments or reports can also be automatically distributed to users through email or network \nprinters. The distributions can be scheduled to occur at the time that the data is loaded or at \nspecific times during the day. \n\n**1.2 Content Manager OnDemand concepts**\n\nIn this section, we examine basic concepts of Content Manager OnDemand: \n\n(cid:2) Report and document \n(cid:2) Application, application group, folder, and cabinet \n\n**1.2.1 Background information of an example company**\n\nAs we examine these concepts, we use an example company. Our fictitious company is called \nAFinancial Co. AFinancial Co is one of the largest custodians of financial transactions in the \nworld. It is one of the leaders in managing customer assets, providing financial services and \nforeign exchange services. It is also one of the leading credit card providers in the world. \n\nThe timely delivery of information and reports is fundamental to maintaining this leadership \nstatus. Products and services that provide real-time, online access to a customer’s account \nand fund information are key to competitive differentiation and are key to customer retention. \nAFinancial Co’s customers want personalized fund information, in various standard formats, \nwhich are delivered through both web and desktop interfaces. \n\n**1.2.2 Reports and documents**\n\n\n \n \n \n \n [html]\n
or searcher / interletion, e. colorinities / each as transaction / categories / represent at projust portion of a large report. For example, if a large report does not contain logical groups of paper, such as transaction lops, Content MantSensors
", - "page_start": 29, - "page_end": 29, - "source_file": "sg246915.pdf" - }, - { - "text": "OnDemand \nObject Server \n\n\n\n\n\n\n\nOnDemand \nLibrary Server Full Text Search \nServer \n\n*Figure 1-1 Content Manager OnDemand system overview*\n\nContent Manager OnDemand Client programs provide authorized users with high-speed \naccess to the archived data that runs on the user devices (workstations) that are attached to \nthe network and communicate with the Content Manager OnDemand servers. \n\nA Content Manager OnDemand server consists of multiple components that can be installed \non a single system or multiple systems. In all cases, the installation appears to the users as a \nsingle server. The installation and is administered by the Content Manager OnDemand \nadministrator as a single system. \n\nThe Content Manager OnDemand server includes the following components: \n\n(cid:2) A single library server: The library server manages a database that contains the \n\ninformation about the users of the system, and the reports and data that are stored on the \nsystem. \n\n(cid:2) One or more object servers: The object servers manage the data on disk or tape storage \ndevices. \n\n(cid:2) One or more archive servers: The archive server stores the archived data objects. \n\nDepending on the operating system, the archive servers might be IBM Tivoli® Storage \nManager, object access method (OAM), or Archive Storage Manager (ASM). \n\nThe library server and the object server can be packaged separately or as a single executable \nfile. \n\n**Content Manager OnDemand Client programs**\nContent Manager OnDemand Client programs operate on various environments, including \npersonal computers that are running on Windows, web browsers, and mobile devices. By \nusing the client program, users can search for and retrieve reports that are stored on the \nsystem. Specifically, users can construct queries and search for reports, retrieve documents \nfrom Content Manager OnDemand, view, print, and fax copies or pages of documents, and \nattach electronic notes to the pages of a document.", - "page_start": 28, - "page_end": 28, - "source_file": "sg246915.pdf" - }, - { - "text": "*Figure 5-5 Storage set definition*\n\n**Load Type parameter**\nThe Load Type parameter determines where Content Manager OnDemand stores data. Two \nvalues are possible (Figure 5-5): \n\n(cid:2) Fixed: Content Manager OnDemand stores data in the primary storage node that has the \nload data field selected. When Load Type is set to*Fixed*, you must select the load data \ncheck box for one primary storage node. Content Manager OnDemand loads data to only \none primary storage node regardless of the number of primary nodes that are defined in \nthe storage set. \n\n(cid:2) Local: Content Manager OnDemand stores data in a primary storage node on the server \non which the data loading program runs. When the Load Type is*Local*, the load data \ncheck box must be selected for a primary storage node on each of the object servers that \nis identified in the storage set. A storage set can contain one or more primary storage \nnodes that are on one or more object servers. \n\nNext, we examine several parameters on the Add a Primary Node window (Figure 5-6 on \npage 98).", - "page_start": 120, - "page_end": 120, - "source_file": "sg246915.pdf" - }, - { - "text": "**5.2.3 Content Manager OnDemand storage management**\n\nThe storage management criteria that you specify for the Content Manager OnDemand \nlibrary server determines where and when Content Manager OnDemand stores reports and \nhow those reports are maintained. \n\nFigure 5-4 illustrates Content Manager OnDemand storage object relationships. When a \nreport is loaded into Content Manager OnDemand, it is assigned to an application group. The \napplication group is associated with a storage set. The storage set contains one or more \nstorage nodes that can be used by several application groups that have the same archive \nstorage requirements. \n\n**Storage node**\n\n\n\n**A rchive Storage**\n\n*Figure 5-4 Content Manager OnDemand storage objects*\n\nFor example, a storage set can be used to maintain data from different application groups that \nmust retain documents for the same length of time and require the data to be kept on the \nsame type of media. Different storage sets can be created to handle different data retention \nrequirements. One storage set can be set up to maintain data on cache-only magnetic \nstorage. Another storage set can be set up to point to a Tivoli Storage Manager client node \nthat stores a copy of the report in archive storage. \n\nIf Tivoli Storage Manager is used as the ASM, the same storage management criteria must \nbe specified for both Content Manager OnDemand and Tivoli Storage Manager. That is, the \n*Life of Data and Indexes*in Content Manager OnDemand and the*retention period*in Tivoli \nStorage Manager must have the same value.", - "page_start": 118, - "page_end": 118, - "source_file": "sg246915.pdf" - }, - { - "text": "**10.1 Introduction**\n\nFor this chapter, unless explicitly stated otherwise, the term “data” is used to refer to the \nreport data, the extracted documents or segments, and their related indexes and the \nextracted resources. \n\nA Content Manager OnDemand system logically stores data in*application groups*. An \napplication group is defined by the Content Manager OnDemand administrator. It consists of \ndata that has the same indexing, data storage, and expiration requirements. The application \ngroup definition also specifies where the report and document data are stored, how long the \ndata is stored, and how the data expires. The method or methods that can be used to expire \nthe data are a function of the application group parameters that are defined before the data is \nloaded into Content Manager OnDemand. In a Content Manager OnDemand system, data \ntypically goes through a lifecycle of loading, storing, migration, and an expiration process. \n\n**10.2 Loading and storing the data**\n\nThe Content Manager OnDemand architecture allows the control and management of the \ndata throughout its lifecycle. The data lifecycle begins with running an efficient load process. \nEach load process invocation ingests report data for a specified application group. \n\nDuring a load process, Content Manager OnDemand stores report (document) data, its \nresources, and index data, as shown in Figure 10-1. \n\n\n\n**Load**\n**Process**\n\n**Indexes**\nSeg ment-1 \ntabl e \n\nAg Data \nTab le \nD ataba se \nMa nag er \n\nSeg ment-n \ntabl e \n\n*Figure 10-1 Data and index storage locations*\n\nThe Content Manager OnDemand load process identifies, segments, and compresses \ngroups of documents into storage objects that are then stored in the Content Manager \nOnDemand archive, as illustrated in Figure 10-1. To improve the efficiency of the storage \nprocess, Content Manager OnDemand aggregates the stored documents (typically a few \nkilobytes in size) into storage objects. This aggregation provides efficient, high-volume \nstorage, retrieval, and expiration performance.", - "page_start": 243, - "page_end": 243, - "source_file": "sg246915.pdf" - }, - { - "text": "*Figure 5-12 Adding an OAM storage set*\n\nThe administrator must define values for the following fields to add a storage set: \n\n(cid:2) Name: The name of the storage set. \n\n(cid:2) Description: The storage set description, up to 120 characters. \n\n(cid:2) Load Type: Where Content Manager OnDemand stores data. Two choices are available: \n\n– Fixed: Content Manager OnDemand stores data in the primary storage node that has \nthe load data field selected. When you set load type to Fixed, you must select the**Load**\n**Data**check box for one primary storage node. A storage set can contain one or more \nprimary storage nodes. Several different collection names can be used. Content \nManager OnDemand loads data in one primary storage node regardless of the number \nof primary nodes in the storage set. \n\n– Local: Content Manager OnDemand stores data in a primary node on the server on \n\nwhich the data loading program runs. This load type applies to z/OS. \n\nThen, the administrator clicks**Add**to add a primary storage node to this storage set. The Add \na Primary Node window opens, as shown in Figure 5-13 on page 115.", - "page_start": 137, - "page_end": 137, - "source_file": "sg246915.pdf" - }, - { - "text": "**1.1 Overview of Content Manager OnDemand**\n\nTo compete in today’s global business environment, businesses must increase both the \nefficiency and effectiveness of their operations. Conflicting business requirements, such as \nincreasing productivity while reducing costs and increasing personalization yet at the same \ntime expanding to larger customer bases, can be achieved only through more streamlined \nand coordinated processes. Content Manager OnDemand helps address these issues by \nsecurely storing information and managing its delivery on demand whenever and wherever it \nis needed. \n\nContent Manager OnDemand is the leading report archive system and it is used by \nthousands of organizations worldwide. The high scalability and high-speed information \narchiving and retrieving benefit any organization that requires instant access to information, \nhardcopy replacement, or long-term archival of data. A Content Manager OnDemand system \ncan support small office environments and large enterprise installations with hundreds or \nthousands of system users. It can dramatically improve productivity and customer service in \nmany businesses by providing fast access to information that is stored in the system. \n\nContent Manager OnDemand is a robust report management system to perform the following \ntasks: \n\n(cid:2)*Capture*: Captures various data types from various sources through a batch capture \nsystem or interactively through custom-built interfaces. \n\n(cid:2)*Store*: Stores data for immediate retrieval. \n\n(cid:2)*Search*: Indexes data so that users can easily and quickly find the information. \n\n(cid:2)*Full Text Search*: Allows searching the full text of stored documents. \n\n(cid:2)*Integrate*: Enables organizations to integrate Content Manager OnDemand into their \n\nexisting software stack by using components, such as OnDemand Web Enablement Kit \n(ODWEK). Organizations can also enable access through federated searches to other \nIBM Enterprise Content Management data and third-party products. \n\n(cid:2)*Display*: Supports multiple viewers for different data types, providing fast access for \n\nbrowsing and printing the retrieved data. For example, by using ready-for-use products, \nsuch as IBM Content Navigator, users can search and access Content Manager \nOnDemand, other IBM Enterprise Content Management data stores, and third-party \nproducts. \n\n(cid:2)*Distribute*: Distributes data to selected users (through email or print). \n\n(cid:2)*Manage*: Expires or archives data based on defined policies. \n\n(cid:2)*Archive*: Provides data archives online, near-line, or offline, enabling rapid archiving of \ndata to the storage system. \n\n(cid:2)*Control*: Controls system and data access, allowing only authorized users to access \nspecified data. \n\nIn summary, Content Manager OnDemand enables you to gain control of your information by \nproviding access to your business’ data, as needed, regardless of the size of the business or \nthe hardware platform. Content Manager OnDemand improves your organization’s bottom \nline by helping you become more efficient and responsive. \n\nFigure 1-1 on page 5 presents an overview of the Content Manager OnDemand (OnDemand) \nsystem.", - "page_start": 27, - "page_end": 27, - "source_file": "sg246915.pdf" - }, - { - "text": "Even though the various components can be distributed across the network, the Content \nManager OnDemand Instance appears as a “single system” to both the administrator and the \nusers. \n\n**2.2.1 Configuration consideration**\n\nThe basic Content Manager OnDemand configuration is to install the library server and object \nserver on the same machine. This design is the default and most common configuration. \nHowever, under certain conditions, it might be beneficial to distribute the library server, the \nobject server, and the load process to different systems. \n\nConsider the following information to help you decide whether to run one or more of the load \nprocesses on one or more separate systems: \n\n(cid:2) Reducing system resource (processor or memory) consumption competition on the library \nand object server system. \n\n(cid:2) Reducing the network traffic time by running the load process on the system on which the \nload data is created. \n\n(cid:2) Better performance for a certain index or load process to run on another system. \n\n(cid:2) More convenient to operate and manage the data because the data is in a smaller set. \n\nThe considerations for separate object servers are listed: \n\n(cid:2) Distributing the workload among multiple systems. \n\n(cid:2) Distributing the data storage among multiple systems. \n\n(cid:2) Storing the data closer to where it will be accessed from. For example, your main \n\noperations (library server and object server) are in the US but many of your users are in \nChina and France. You can install an object server in France to keep French data and \nanother object server in China to store Chinese data. The original object server can \nremain in the US where the US data is kept. \n\nThe considerations for distributed library server, object servers, and load processes are listed: \n\n(cid:2) Using different operating systems. For example, the library server might be on a z/OS \n\nsystem while an object server can be on an AIX system and another object server can be \non a Linux system. \n\n(cid:2) All of the system components must be at the same release level of Content Manager \nOnDemand, for example, Content Manager OnDemand 9.5. \n\n**2.2.2 Library server and object server functions**\n\nFunctionality is distributed between the library server and object servers in the following \nmanner: \n\n(cid:2) Library server: \n\n– Manages access to the administration definitions \n\n– Provides data integrity \n\n– Maintains data archive index information, configuration, and user account information \n\n– Controls access to data archives on object servers \n\n– Directs query, retrieve, and print requests from the clients \n\n– Routes store, retrieve, and delete requests from the clients", - "page_start": 40, - "page_end": 40, - "source_file": "sg246915.pdf" - }, - { - "text": "**5.1 Content Manager OnDemand cache storage**\n\nContent Manager OnDemand has a built-in cache storage management that is used to store \ndocuments on locally mounted disk subsystems. These subsystems can be network-attached \nstorage (NAS), storage area networks (SAN), or any type of locally addressable disk that is \navailable to the supported operating system. The cache storage manager uses a list of \ndirectories or file systems that are available to determine where space is available for storing \nand maintaining documents. \n\nEach Content Manager OnDemand object server in the system has a defined set of cache \nstorage devices on which you can maintain the report data for a period to provide the fastest \naccess times for system users. \n\nCertain implementations of Content Manager OnDemand use an all cache system to \nmaintain data for its full retention. Other implementations store to both cache and archive \nstorage. Other implementations store only to the archive. \n\nYou can configure Content Manager OnDemand so that at load time one of the following \nmethods of data storage occurs: \n\n(cid:2) Data is stored in cache and later is automatically migrated from the cache subsystem to \nan archive system. \n\n(cid:2) Data is stored to both local cache and archive storage. \n\n(cid:2) Data is stored directly to archive storage. \n\n**5.2 IBM Tivoli Storage Manager for Multiplatforms**\n\nContent Manager OnDemand for Multiplatforms integrates with Tivoli Storage Manager and a \nlicense for this usage is included with Content Manager OnDemand. Within Tivoli Storage \nManager, documents can be archived on various media, such as disk, optical, tape, and \ncontent-addressable storage (CAS) devices. These archive storage devices must be defined \nto the Tivoli Storage Manager system. Content Manager OnDemand uses the archive \napplication programming interface (API) that is provided by Tivoli Storage Manager to store \nand retrieve documents. \n\nTo store application group data to the Tivoli Storage Manager ASM, the application group \nmust be configured within Content Manager OnDemand to a defined storage set. This \nstorage set contains a storage node that is defined within Tivoli Storage Manager and points \nto a specific storage area or media. \n\nWith the application group definition, you can specify whether and when the data is migrated \nto archive storage. For example, you can specify that the data will be migrated to archive \nstorage when the document is originally loaded into the system, or that the data migration \noccurs the next time that the migration maintenance process is run, or that the data migration \noccurs after a certain number of days pass from the date that the data was loaded; or never. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable.
\n\n**90**", - "page_start": 113, - "page_end": 113, - "source_file": "sg246915.pdf" - }, - { - "text": "**2.1 Introduction**\n\nA*Content Manager OnDemand instance*is a logical server environment. The base system \ncomponents are a library server and one or more object servers. Optional components \ninclude one or more archive managers and one or more Full Text servers. \n\n**2.2 Architecture and platform**\n\nBefore you begin your installation and configuration, it is important to understand the general \narchitecture of the Content Manager OnDemand server to help you determine the type of \nconfiguration that meets your business requirements. As illustrated in Figure 2-1, from an \narchitectural perspective, the base Content Manager OnDemand server consists of two \ncomponents: a library server and one or more object servers. The library server contains the \ndatabase system tables and the application group data tables. The object server contains the \nstored reports and documents. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**Architecture overview of OnDemand**\n\nTemp \nStorage \n\nHFS \nzFS (z/OS) \nIFS \nNFS \nNAS Cache \nStorage \n\nTCP/IP \nNetwork \nodbc \nLibrary Server (1) \nDB2DB2 \n\nClient \n\nTemp \nStorage \n\nHFS \nzFS (z/OS) \nIFS \nNFS \nNAS \n\nTCP/IP or No TCP/IP \nLoad Process \nArchive Storage \nTSM – OAM - ASM \nObject Server(s) \n(1 or more) \n\nSame or different machine/platform \n\n*Figure 2-1 Architectural view of Content Manager OnDemand*\n\nData is loaded and retrieved from the Content Manager OnDemand server through a network \nconnection (TCP/IP). The advantages of this design are listed: \n\n(cid:2) The instance components can be physically distributed across the network. \n\n(cid:2) System users (client systems) can be anywhere on the network. By using the Internet, the \nclients can be anywhere in the world. \n\n(cid:2) The “load process” can run either on the library server, the object server, or on any other \nsystem (containing the appropriate software) that is attached by network to both the library \nand object server. \n\n(cid:2) This design also allows the library server and object servers to be placed on the same \nsystem (or logical partition (LPAR)) or on two (or more) systems (LPARs).", - "page_start": 39, - "page_end": 39, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "sg246915.pdf", - "query": "Does the XML indexer of Content Manager OnDemand support large objects ?", - "target_page": 188, - "target_passage": "No", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "– The*XML Indexer*allows the rapid increase in XML archiving mandates that are based \non ISO 20022 standards with XML (including SEPA in Europe). The XML Indexer is \noptimized for high-volume batch archiving of XML, batch PDF, AFP, Line Data, and \ncheck images. \n\n– The*Full Text Indexer*provides the capability to index the full text of a document (or \nreport). You can search through an indexed document. \n\n(cid:2)*Data loading programs*can be set up to automatically store report data into application \ngroups and update the database. The data loading programs can run on any Content \nManager OnDemand server. \n\n(cid:2)*Report Distribution Facility*provides an easy way to automatically group reports and \nportions of reports and distribute the reports to multiple users. Distributions can be \nprinted, created as an output file, or emailed as an attachment. \n\n(cid:2) Both the archived reports and their resources are stored in the Content Manager \n\nOnDemand Archive. The Content Manager OnDemand system manages the stored data \nthroughout its lifetime. It provides authorized users rapid access to the data and allows the \ndata to be converted into different formats for display or print. \n\n(cid:2) A*server print*facility allows users to reprint a large volume of documents at high speed. \nPrint servers, such as Infoprint (on AIX), can be started to manage the server print \ndevices. These print servers are not part of Content Manager OnDemand and must be \npurchased separately. \n\n(cid:2) Content Manager OnDemand*management programs*maintain the Content Manager \nOnDemand database and documents in cache storage. \n\n(cid:2) A*system logging*facility provides administrators with tools to monitor server activity and \nrespond to specific events as they occur. The interface to the system logging facility is \nthrough the system log folder and the system log user exit.", - "page_start": 35, - "page_end": 35, - "source_file": "sg246915.pdf" - }, - { - "text": "**7.7 Getting started with XML Indexing**\n\nThe XML indexer enables the high-volume archiving of XML data in a scalable and extensible \nmanner. \n\nThe XML indexer was developed to support the growing need to efficiently and effectively \nstore large quantities of XML data, for example: \n\n(cid:2) The European Union’s implementation of a Single Euro Payments Area (SEPA). SEPA \nreplaced the existing domestic retail credit transfers and direct debits with standardized \nEuropean payments that are based on Extensible Markup Language (XML) International \nOrganization for Standardization (ISO) 20022 messages. ISO 20022 provides a more \nefficient way of developing and implementing messaging standards that financial \ninstitutions and clients use to exchange massive amounts of transactional information. \n\n(cid:2) Other XML standards exist and continued to be developed, such as ACORD (Insurance \nindustry), AgXML (Agriculture), and Health Level Seven (Health industry). \n\n(cid:2) XML document formats were developed, such as Office Open XML (OOXML) and Open \nDocument (OASIS). \n\nWith XML indexing, you can automatically batch index and archive XML transactional \nmessages and statements into the Content Manager OnDemand repository. Documents are \nidentified and extracted during indexing. Resources are extracted, and, together with the \ndata, compressed and archived. Multiple stylesheets can be specified to meet device and \naccessibility requirements. \n\nXML steeliest (resource) archiving is critical. Content Manager OnDemand optimizes the \nstorage of XML data by storing only a single version of a resource and then associating it with \nall of the archived documents. Document resources can be automatically collected and \nmanaged.", - "page_start": 205, - "page_end": 205, - "source_file": "sg246915.pdf" - }, - { - "text": "You must consider several factors when you use large object support: \n\n(cid:2) The report must be indexed with an indexing program that generates a large object by \n\ndividing large documents into smaller parts and defining the indexing information that is \nused to retrieve the documents. \n\n(cid:2) The amount of data per page and the number of pages that you divide documents into \naffects retrieval and viewing response time. The number of bytes per page typically \ndictates the number of pages that you can divide documents into. In general, the larger the \npage size in bytes, the smaller the number of pages that you can divide your documents \ninto. For example, if the average page in the document contains 2.5 KB of data, choose \n100 - 1000 pages per Large Object (LO) segment; if the average page in the document \ncontains 50 KB of data, choose 1 - 100 pages per LO segment. \n\n(cid:2) The capacity of your network and the traffic in the network might determine the number of \npages that you need to divide your documents into. Larger document sizes (large byte size \neven when compressed) require more network bandwidth (or more time if the bandwidth is \nnot available) to transfer from a Content Manager OnDemand server to a client. The \nnumber of users that are concurrently accessing Content Manager OnDemand and the \nsizes of the documents that are being retrieved determine the overall load in the network. \n\n(cid:2) Response time requirements. The goal of Content Manager OnDemand large objects is to \nprovide better performance and usability. Large object support clearly provides enhanced \nusability. However, you must implement large object support so that dividing your \ndocuments into parts provides better overall performance than other methods of \nsegmenting the input data. \n\nWhen you choose a large object, Content Manager OnDemand displays the Number of \nPages field. Specify the number of pages that you want Content Manager OnDemand to \ndivide documents into in the Number of Pages field. \n\nTo generate large objects, the indexer that is specified on the Indexing Information page must \nbe AFP Conversion and Indexing Facility (ACIF), OS/390, or OS/400. When you select the \nLarge Object check box, Content Manager OnDemand automatically adds the INDEXOBJ=ALL \nparameter to the indexing parameters (which causes the indexing program to generate the \nlarge object indexing information). \n\n**Exporting an application**\nIt is not possible to export an application to application groups with different database fields or \nattributes. However, you can export applications to a different server if the application group \non the target server is identical to the application group on the source server (the server on \nwhich the applications are defined). \n\nEnsure that no existing application has the same application ID in the target application \ngroup. For more information, see the section “Adding items to a server” in the*IBM Content*\n*Manager OnDemand for Multiplatforms, V9.5, Administration Guide*, SC19-3352. \n\n**Selecting font by line data graphical indexer**\nThe font that is used by the line data graphical indexer to display a document can be changed \nfrom within the line data graphical indexer at the Content Manager OnDemand Administrator \nClient.", - "page_start": 76, - "page_end": 76, - "source_file": "sg246915.pdf" - }, - { - "text": "The OS/390 indexer is enhanced to allow the storage of documents (or large object \nsegments) that exceed 2 GB. A report might contain multiple documents (or large object \nsegments), each of which exceeds 2 GB. This enhancement does not affect the limitations \nthat are imposed by other indexers. The limitations on the document size are based on the \navailable hardware and any other limitations that are placed on the operating environment. \n\nFor more information about the use of the OS/390 indexer, see*IBM Content Manager*\n*OnDemand - Indexing Reference*, SC19-3354. \n\n**7.6 OS/400 indexer on Content Manager OnDemand on IBM i**\n\nThe OS/400 indexer is a powerful tool to index the print data streams of IBM i application \nprograms. Supported data streams include SCS, AFP, and the less common SCS-Extended \nand Line Data. \n\nThe OS/400 indexer provides three major functions: \n\n(cid:2) Print data stream processing: The OS/400 indexer processes the output print data \n\nstreams of application programs, for example, SCS, AFP, and Line Data reports. The \noutput can be viewed, printed, and archived by Content Manager OnDemand. \n\n(cid:2) Sophisticated indexing functions: The OS/400 indexer can logically divide reports into \nindividual items, such as statements, policies, and bills. You can define up to 32 index \nfields for each item in a report if you are running a Content Manager OnDemand server \nversion that is earlier than version 9.0.0.1. Beginning at version 9.0.0.1 of the server, \n128 index fields can be defined. \n\n(cid:2) AFP resource collection: For AFP spooled files, the OS/400 indexer determines the \n\nresources that are necessary to view, print, and archive the print data stream and collect \nthe resources (except fonts, which are not stored but are mapped by the client during \ndisplay). Resources allow users to view the report as it displayed in the original printed \nversion, regardless of when or where the report was created. \n\nThe OS/400 indexer supports many advanced features: \n\n(cid:2) Multi-key indexes \n(cid:2) Spool File Archive compatibility \n(cid:2) Start Indexing on Page \n(cid:2) Translate Print Control \n(cid:2) AFP support with or without TLEs \n(cid:2) Large object support \n\nThe OS/400 indexer processes three input sources: \n\n(cid:2) Indexing parameters that specify how the data needs to be indexed. The indexing \nparameters are created when you define a Content Manager OnDemand application. \n\n(cid:2) AFP resources that are required to view and print the data if the application created an \nAFP print data stream. \n\n(cid:2) The print data stream, which can be in a spooled file (all data types) or in a physical file \n(Line Data or SCS data that was converted to Line Data with First Character Forms \nControl (FCFC) characters in column one of the data).", - "page_start": 203, - "page_end": 203, - "source_file": "sg246915.pdf" - }, - { - "text": "**Document indexing**\n*Document indexing*is used for reports that contain logical items, such as customer name or \nnumber. Each of the items in a report can be individually indexed on values, such as account \nnumber, customer name, and balance. Content Manager OnDemand supports up to 128 \nindex values per item. With document indexing, the user is not necessarily required to know \nabout reports or report cycles to retrieve a document from Content Manager OnDemand. \n\n**Report indexing**\n*Report indexing*is used for reports that contain many pages of the same type of data, such as \na transaction log. Each line in the report usually identifies a specific transaction, and it is not \ncost-effective to index each line. Content Manager OnDemand stores the report as groups of \npages and indexes each group. \n\nWhen reports include a sorted transaction value (for example, transaction date and number), \nContent Manager OnDemand can index the data on the transaction value. This indexing is \ndone by extracting the beginning and ending transaction values for each group of pages and \nstoring the values in the database. This type of indexing lets users retrieve a specific \ntransaction value directly. \n\n**1.3 Content Manager OnDemand server and its components**\n\nOn IBM z/OS® and Multiplatforms (MP) systems, the Content Manager OnDemand server \ncan be implemented as a library server and one or more object servers that are on one or \nmore nodes that are connected to a Internet Protocol network. For the Content Manager \nOnDemand system overview, see Figure 1-1 on page 5. \n\n**1.3.1 Library server and object server**\n\nA Content Manager OnDemand*library server*maintains two sets of database tables: \n\n(cid:2) The first set of database tables contains indexes about the reports that are stored in the \nContent Manager OnDemand Archive. \n\n(cid:2) The second set of database tables contains information about the objects that are defined \nto the system, such as users, groups, printers, application groups, applications, folders, \ncabinets, and storage sets. \n\nThe database manager provides the database engine and utilities to administer the database. \nThe library server processes client logons, queries, and print requests and updates to the \ndatabase. The major functions that run on the library server are the request manager, the \ndatabase manager, and the server print manager. \n\nA Content Manager OnDemand*object server*maintains documents on cache storage \nvolumes and an ASM. ASMs, such as Tivoli Storage Manager on Multiplatform systems, OAM \non z/OS systems, or ASM on IBM i systems, allow hierarchical storage management \ntechniques to be applied to the stored documents. An object server loads data, retrieves \ndocuments, and expires documents. The major functions that run on an object server are the \ncache storage manager, data loading and maintenance programs, and optionally, the ASM. \n\nThe basic Content Manager OnDemand configuration is a library server and an object server \non the same physical system or node. This single library or object server configuration \nsupports the database functions and cache storage on one system. You can add an ASM to \nthe single library or object server configuration to maintain documents on archive media.", - "page_start": 33, - "page_end": 33, - "source_file": "sg246915.pdf" - }, - { - "text": "The File Format, Preprocessor Parameters, and Postprocessor Parameters (Figure 3-6) are \ndefined as part of the load information: \n\n(cid:2) File Format: Provides settings that control how the Content Manager OnDemand system \ncompresses and stores documents and resources \n\n(cid:2) Preprocessor: Specifies processing that is carried out on database fields before indexing \ndata \n\n(cid:2) Postprocessor: Specifies a system command or exit program that runs against an index \nfile before the index records are loaded into the database \n\n*Figure 3-6 Application Load Information*\n\n**Large object**\nIn the File Format section, you can set support for large objects. Content Manager \nOnDemand large object support provides enhanced usability and better retrieval performance \nfor reports that contain large documents. \n\nFor example, suppose that a report contains statements that typically exceed 1,000 pages. \nWith large object support, the statements can be divided into parts of 100 pages. When a \nuser views a statement, Content Manager OnDemand retrieves and uncompresses the first \npart of the statement. To view a specific page of a statement, the user can choose the Go To \ncommand in the viewer window and enter the page number. Content Manager OnDemand \nautomatically retrieves and uncompresses the part of the statement that contains the \nrequested page. When the user moves from page to page of a statement, Content Manager \nOnDemand automatically retrieves and uncompresses parts of the statement as needed. \n\nWhen you use large object support, users experience consistent response time when they \nmove from page to page of the document.", - "page_start": 75, - "page_end": 75, - "source_file": "sg246915.pdf" - }, - { - "text": "**1.1 Overview of Content Manager OnDemand**\n\nTo compete in today’s global business environment, businesses must increase both the \nefficiency and effectiveness of their operations. Conflicting business requirements, such as \nincreasing productivity while reducing costs and increasing personalization yet at the same \ntime expanding to larger customer bases, can be achieved only through more streamlined \nand coordinated processes. Content Manager OnDemand helps address these issues by \nsecurely storing information and managing its delivery on demand whenever and wherever it \nis needed. \n\nContent Manager OnDemand is the leading report archive system and it is used by \nthousands of organizations worldwide. The high scalability and high-speed information \narchiving and retrieving benefit any organization that requires instant access to information, \nhardcopy replacement, or long-term archival of data. A Content Manager OnDemand system \ncan support small office environments and large enterprise installations with hundreds or \nthousands of system users. It can dramatically improve productivity and customer service in \nmany businesses by providing fast access to information that is stored in the system. \n\nContent Manager OnDemand is a robust report management system to perform the following \ntasks: \n\n(cid:2)*Capture*: Captures various data types from various sources through a batch capture \nsystem or interactively through custom-built interfaces. \n\n(cid:2)*Store*: Stores data for immediate retrieval. \n\n(cid:2)*Search*: Indexes data so that users can easily and quickly find the information. \n\n(cid:2)*Full Text Search*: Allows searching the full text of stored documents. \n\n(cid:2)*Integrate*: Enables organizations to integrate Content Manager OnDemand into their \n\nexisting software stack by using components, such as OnDemand Web Enablement Kit \n(ODWEK). Organizations can also enable access through federated searches to other \nIBM Enterprise Content Management data and third-party products. \n\n(cid:2)*Display*: Supports multiple viewers for different data types, providing fast access for \n\nbrowsing and printing the retrieved data. For example, by using ready-for-use products, \nsuch as IBM Content Navigator, users can search and access Content Manager \nOnDemand, other IBM Enterprise Content Management data stores, and third-party \nproducts. \n\n(cid:2)*Distribute*: Distributes data to selected users (through email or print). \n\n(cid:2)*Manage*: Expires or archives data based on defined policies. \n\n(cid:2)*Archive*: Provides data archives online, near-line, or offline, enabling rapid archiving of \ndata to the storage system. \n\n(cid:2)*Control*: Controls system and data access, allowing only authorized users to access \nspecified data. \n\nIn summary, Content Manager OnDemand enables you to gain control of your information by \nproviding access to your business’ data, as needed, regardless of the size of the business or \nthe hardware platform. Content Manager OnDemand improves your organization’s bottom \nline by helping you become more efficient and responsive. \n\nFigure 1-1 on page 5 presents an overview of the Content Manager OnDemand (OnDemand) \nsystem.", - "page_start": 27, - "page_end": 27, - "source_file": "sg246915.pdf" - }, - { - "text": "**Indexing and loading**\n\nIn this chapter, we describe the various indexers that are available for IBM Content Manager \nOnDemand (Content Manager OnDemand). \n\nIn this chapter, we cover the following topics: \n\n(cid:2) Introduction \n(cid:2) Getting started with PDF indexing \n(cid:2) Getting started with ACIF indexing \n(cid:2) OS/390 indexer on z/OS and AIX \n(cid:2) OS/400 indexer on Content Manager OnDemand on IBM i \n(cid:2) User exits \n(cid:2) Additional references", - "page_start": 184, - "page_end": 184, - "source_file": "sg246915.pdf" - }, - { - "text": "On certain platforms, you can also configure your Content Manager OnDemand system with \na library server on one node and one or more object servers on different nodes. These nodes \ncan run the same or different operating systems. This configuration is known as a*distributed*\nlibrary/object server system. The distributed library and object server configuration supports \nthe caching of documents on different servers. You can add an ASM to one or more of the \nobject servers to maintain documents on archive media that are attached to different servers. \nOne of the key requirements in a distributed library or object server system is that all of the \ndistributed components must be at the same Content Manager OnDemand code level. \n\n**1.3.2 Content Manager OnDemand server components**\n\nA Content Manager OnDemand server environment contains several components: \n\n(cid:2) A*request manager*provides client, network, and operating system services, security, and \naccounting. The request manager is on the library server. \n\n(cid:2) A*database manager*maintains the index data for the reports that you store on the system. \nThe database manager is a relational database management product, such as IBM DB2®. \nThe database manager is on the library server. \n\n(cid:2) Database*control information*is information about the users, groups, application groups, \napplications, folders, cabinets, storage sets, and printers that you define on the system. \nThe control information determines who can access the system, the folders that a user \ncan open, and the application group data that a user can query and retrieve. The database \nis on the library server. \n\n(cid:2) A*cache storage manager*maintains documents in cache storage. If the archive storage \nserver is accessed through the network, cache storage can be used for high-speed \naccess to the most frequently used documents. \n\n(cid:2) An*Archive Storage Manager (ASM)*is an optional part of the system. The ASM is for the \nlong-term storage of one or more copies of documents on archive media, such as slower \ndisk or tape storage libraries. \n\n(cid:2) If your Content Management OnDemand System is installed on an MP platform and you \nneed to download documents from a z/OS system, you can use a*download facility*to \nautomatically transfer spooled files to the MP server. As a preferred practice, use \nDownload for IBM z/OS, which is a licensed feature of IBM Print Services Facility™ (PSF) \nfor z/OS. Download for IBM z/OS provides the automatic, high-speed download of Job \nEntry Subsystem (JES) spooled files from an z/OS system to Content Manager \nOnDemand servers. The download facility is not applicable to the IBM i server. \n\n(cid:2)*Data indexing and conversion programs*can create index data, collect required resources, \nand optionally convert Line Data reports to AFP data. Content Manager OnDemand \nprovides several indexing programs: \n\n– The*Advanced Function Presentation (AFP) Conversion and Indexing Facility*(ACIF) \ncan be used to index IBM z/OS Line Data, ASCII data, and AFP files, collect resources \nthat are necessary to view the reports, and convert Line Data files to AFP data. \n\n– The*IBM OS/390 Indexer*is a high-performance indexer that can be used to index \n\nvarious data types and is available on both IBM z/OS and IBM AIX®. \n\n– The*IBM OS/400 Indexer*can be used to index various data types. It is the most \ncommon Content Manager OnDemand indexer for IBM i spooled files. \n\n– The*Content Manager OnDemand PDF Indexer*can be used to create index data for \nAdobe Portable Document File (PDF) files. \n\n– The*Content Manager OnDemand Generic Index File Format*can be used to provide \n\nindex data for almost any other type of data, such as HTML documents, \nword-processing documents, and Tagged Image File Format (TIFF) files. \n\n**11** Chapter 1. Overview and concepts", - "page_start": 34, - "page_end": 34, - "source_file": "sg246915.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Column nameData typeSizeIndexDescription
field_1VariesVariesNFirst user - defined field in the application group.
field_nVariesVariesNLast user - defined field in the application group. You can have up to 128 index fields that are defined in Content Manager OnDemand.
doc - namevarchar11YDocument name ( object name ).
doc_offinteger4NDocument that is offset in the object.
doc_leninteger4NDocument length.
\n\nThe application group data table is indexed on one or more of the user-defined fields, from \nfield_1 to field_n. \n\nFour major factors influence the amount of storage that is needed for the Content Manager \nOnDemand database: \n\n(cid:2) The number of index and filter fields \n(cid:2) The size of the index and filter fields \n(cid:2) The number of indexed items per month \n(cid:2) The number of months (years) Content Manager OnDemand keeps the indexes in the \ndatabase", - "page_start": 104, - "page_end": 104, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "sg246915.pdf", - "query": "Considering storage efficiency, should I store my AFP documents as PDF to distribute them over the web ?", - "target_page": 232, - "target_passage": "If a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval tim", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**9.1 Overview of data conversion**\n\nTo work with data conversion, understand the data conversions that are required, and when \nand how to convert the data. Perform detailed planning before you build your solution so that \nyou achieve a design that remains efficient for many years. \n\nIn this section, we describe why you might need data conversion, when to convert the data \nstream, and how to convert the data. \n\n**9.1.1 Why convert data streams**\n\nYou might want to convert data streams for many reasons: \n\n(cid:2) Certain data streams, such as Hewlett-Packard (HP) Printer Command Language (PCL) \nor Xerox metacode, are printer-specific and cannot be displayed. Before you archive or \ndisplay the documents, these data streams must be transformed into a compatible format. \n\n(cid:2) The archived data stream might need to comply with a company’s internal rules or \n\nregulations. Therefore, the produced data streams must be transformed into the defined \nand required final format before they are archived. \n\n(cid:2) The documents might need to be accessible by a user that is outside of the company. The \ndocument must be displayed through standard tools that are available on any or at least \nmost of the clients, such as an Internet browser or Adobe Acrobat Reader. \n\n(cid:2) The documents might need to be manipulated so that only part of the document is \ndisplayed in a personalized way. \n\n**9.1.2 When to convert data streams**\n\nThe decision of*when*to convert data streams relies mainly on the use of the system. \nTypically, converting data at load time requires more time to process the print stream file, and \nconverting data at retrieval time causes the user retrieval to be a little slower. The decision \nmight depend on how many documents are retrieved, compared to how many documents are \nloaded daily. It might also depend on legal requirements about the format of stored data. \n\n**AFP to PDF**\nIf a requirement exists to present AFP documents in the Portable Document Format (PDF) \nformat over the web, from a storage perspective, it is more efficient to store the documents in \ntheir native format and then convert them to PDF at retrieval time. AFP documents are stored \nmore efficiently than PDF documents. \n\nThe PDF print stream, when it is divided into separate customer statements, is larger than \nAFP because each statement contains its own set of structures that are required by the PDF \narchitecture to define a document. \n\nElapsed time and processor time are also essential factors in the decision-making process. \nThe amount of time (elapsed and CPU) that is needed to convert the document depends on \nhow large the document is and how many resources or fonts are associated with the \ndocument. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTablePatients
", - "page_start": 231, - "page_end": 231, - "source_file": "sg246915.pdf" - }, - { - "text": "**13.4.1 PDF data**\n\nPortable Document Format (PDF) data is an increasingly common data type that can be \narchived within Content Manager OnDemand. The following key advantages are available by \nusing this data type as a document format: \n\n(cid:2) It is a read-only format that does not require any external resources, such as images or \nfonts. It is self-contained. \n\n(cid:2) The viewer for PDF can be downloaded at no charge from the Adobe website and the \nbrowser plug-ins for PDF are also available at no charge. \n\nDuring PDF document creation, resources, such as images and custom fonts, are placed in \nthe data stream once and then referenced many times from within the PDF file. If a large \nreport is produced from many small documents, that report requires only one copy of the \nresources. \n\nHowever, when the PDF is indexed, the PDF Indexer creates many PDF documents from the \ninput file. Each of these documents requires a certain number of PDF structures, which define \na document. These documents are concatenated together in the .out file, and then loaded \ninto Content Manager OnDemand as separate documents. Because the resources are \nextracted and placed into a separate resource file, they are not included in each document. \nFor an illustration of the process, see Figure 13-3. \n\n\n\n\n\n\n\n*Figure 13-3 PDF indexing*\n\nIf no resources are collected, the size of the .out file, which contains all of the individual \ndocuments, might be larger than the original file. For tips about how to reduce the size of the \noutput file, see 7.3.5, “PDF indexing: Using internal indexes (Page Piece Dictionary)” on \npage 173.", - "page_start": 331, - "page_end": 331, - "source_file": "sg246915.pdf" - }, - { - "text": "Another benefit to using ODF is that you can select and combine documents from different \nreports and organize them by defining their order and separating them by using banner \npages. \n\nFigure 14-2 is an overview of the OnDemand Distribution Facility and its interaction with the \nContent Manager OnDemand server. \n\n\n\n*Figure 14-2 Content Manager OnDemand Distribution Facility overview*\n\nFigure 14-2 shows that the Content Manager OnDemand server and its operation did not \nchange. Reports and documents are loaded into the server, and system users continue to \nview and print their documents normally. The only addition to the library server is a set of ODF \ntables that define the documents that are to be distributed to which users and when. The ODF \nprocess reads the ODF tables and collects the required documents and bundles them for \neach recipient. ODF then send out the “bundles” to the appropriate destinations (email, file, \nand print). Alternatively, ODF can send each recipient (based on system definitions) an email \nnotification that the report and document were loaded and are available for viewing. \n\nDifferent organizations have different report and document load and retrieval patterns. In \ncertain cases, documents are loaded and never retrieved. In other cases, a loaded document \nis retrieved multiple times by multiple users. In other cases, it is known that when a specific \nreport or document is loaded, one or more copies must be distributed to one or more \ndestinations. What benefit does automating this distribution process provide? \n\nThe biggest benefit is that as reports are loaded into Content Manager OnDemand regularly, \nthey can be delivered automatically to one or more users as they are loaded. Also, after the \ndistribution is set up, no other changes are required, such as changing the document \nselection criteria to identify the latest data that is loaded. \n\n\n \n \n \n \n [html]\n
IT - BIII
OnDemand and sends them to a spool file for printing.
", - "page_start": 340, - "page_end": 340, - "source_file": "sg246915.pdf" - }, - { - "text": "Consider the following information about Table 7-1 on page 164: \n\n(cid:2) The Generic indexer requires the user to manually create an index file in the generic index \nformat before the user starts the load process. The Generic indexer allows the capture of \ndocuments, index values, and resources that are identified to it. These documents, index \nvalues, and resources are then loaded into the Content Manager OnDemand archive and \nstored in the same manner as though they were loaded through any of the other indexers. \nAn existing resource file can be loaded with a generic index file. \n\nFor more information about the generic index format, see*IBM Content Manager*\n*OnDemand - Indexing Reference,*SC19-3354. \n\n(cid:2) The ACIF, PDF, XML, and OS/400 indexers all generate intermediate files. These files are \nthen used to load the indexes and data into the Content Management OnDemand system. \n\n(cid:2) The OS/390 indexer creates the index data while it loads the indexes and data into the \nContent Management OnDemand system. \n\n(cid:2)*Conversion*refers to a conversion by the indexer. Other products integrate with Content \nManager OnDemand that also convert data. \n\n(cid:2) Because of the architecture of PDF documents, large object support for PDF documents is \n\nnot possible. \n\n(cid:2) Starting with V9.5, the PDF Indexer runs in the PASE environment on IBM i. PASE is a \nprerequisite on IBM i for V9.5. \n\n(cid:2) Starting with V9.5, the PDF Indexer is no longer supported on z/OS. \n\n**7.2 Getting started with PDF indexing**\n\nPDF is a standard that is specified by Adobe Systems, Incorporated, for the electronic \ndistribution of documents. PDF files are compact. They can be distributed globally through \nemail, the web, intranets, or CD-ROM, and viewed with Adobe Reader. \n\nPDF is a data type or file format that is platform (hardware, operating system)-independent. A \nPDF file contains a complete PDF document that is composed of text, graphics, and the \nresources that are referenced by that document. \n\nTwo PDF file layouts are possible: \n\n(cid:2) Non-Linear (not “optimized”) \n\nThis file layout is optimized for space savings. Storing a PDF file by using a Non-Linear \nlayout consumes less disk space than storing the same PDF file linearly. It is slower to \naccess or display this type of layout because portions of the data that is required to \nassemble pages of the document are scattered throughout the PDF file, so the whole PDF \nfile must be downloaded and accessed before the file can be displayed. \n\n(cid:2) Linear (“optimized” or “web optimized”) \n\nIn this file format, the PDF file is created in a linear (in page order) fashion. This file format \nallows the PDF viewer to start displaying the PDF document pages when they are \ndownloading without waiting for the whole PDF file to be downloaded.", - "page_start": 188, - "page_end": 188, - "source_file": "sg246915.pdf" - }, - { - "text": "[html]6.3. 1 Multiple systems....................................................................................................................................................................................6.3. 2 Multiple object servers..............................................................................................................................................................................6.3. 3 Multiple archive servers.............................................................................................................................................................................6.4 API access1376.5 Data security1386.5. 1 Content Manager OnDemand object - owner model............................................................................................................................................................6.5. 2 Administrative features.............................................................................................................................................................................6.5. 3 SQL macro support....................................................................................................................................................................................6.5. 4 Annotations security1456.5. 5 Securing access with ARSSTASH and the stash file1476.6 Data encryption1496.6. 1 Encrypting data at rest1496.6. 2 Encrypting data in motion : Secure communications.1496.7 Security exits1516.7. 1 User security and permissions exits1526.7. 2 Security systems other than SAF ( z / OS only )1556.7. 3 Unified logon exit ( ARSPTGN ): z / OS only1566.7. 4 System log user exit1576.8 Summary.157Part 2. Data indexing, loading, retrieval, and expiration159Chapter 7. Indexing and loading161Introduction1627.1. 1 Loading and indexing files that were created on another system.1637.1. 2 Understanding input data types1637.1. 3 Choosing an indexer1647.2 Getting started with PDF indexing.1657.2. 1 Limitations1667.3 Performance considerations1667.3. 1 PDF fonts and output file size....1667.3. 2 Reducing output flie size with PDF documents.............................................................................................................................................................1677.3. 3 PDF indexing : Using PDF metadata1687.3. 4 PDF indexing : Using the report wizard ( graphical indexer )1687.3. 5 PDF indexing : Using internal indexes ( Page Piece Dictionary )1737.4 Getting started with ACIF indexing1737.4. 1 Understanding the input data1757.4. 2 The index file.1777.4. 3 Fully composed AFP input1787.5 OS / 390 indexer on z / OS and AIX1797.6 OS / 400 indexer on Content Manager OnDemand on IBM i1807.7 Getting started with XML Indexing1827.8 User exits1837.9 Additional references183Chapter 8. User clients1858.1 Choosing the correct client for your", - "page_start": 6, - "page_end": 6, - "source_file": "sg246915.pdf" - }, - { - "text": "12.Click**Yes**to save the changes to the indexer parameters. \n\n13.In the Sample Data window, click**Next**to continue with the report wizard. \n\n**7.3.5 PDF indexing: Using internal indexes (Page Piece Dictionary)**\n\nWhen the PDF document is created, the user or application must insert indexes into the Page \nPiece Dictionary. For Content Manager OnDemand, the Page Piece Dictionary must be \nnamed “IBM-ODIndexes” to allow the PDF Indexer to find the Page Piece Dictionary and \ncollect the index values. \n\nSetting INDEXMODE=INTERNAL (for the application) causes the PDF Indexer to segment the \ninput file into the individual documents, gather the various PDF resources (fonts, images, and \nforms), and then load the PDF indexes, documents, and resources into Content Manager \nOnDemand. \n\nThe use of internal indexes offers multiple advantages: \n\n(cid:2) Fast indexing: A single PDF file can contain many PDF documents. Extracting the indexes \nfor these documents is now fast because Content Manager OnDemand now scans the \ndocuments and reads the index values directly from the Page Piece Dictionary. (No search \nexists for the indexes within the document data.) \n\n(cid:2) Different formats can exist in a single PDF input file: This flexibility is possible if the \n\nindexes are similar because only the index is read and processed by Content Manager \nOnDemand. \n\n(cid:2) The indexed PDFs can be either static or dynamic: Static PDF forms render once and are \ndisplayed on the client in Adobe Acrobat or Adobe Reader. Static PDF forms are not \nre-rendered in response to user interactions. Dynamic PDF forms render on the client in \nAdobe Reader and, depending on the user interactions, can re-render on the client several \ntimes. Re-rendering causes the content of the form (all objects, including text and image) \nto change. \n\nBoth the static and dynamic PDFs can be indexed because the PDF Indexer is only \nlooking at the Page Piece Dictionary. The PDF document data is not examined or \nprocessed. \n\n**7.4 Getting started with ACIF indexing**\n\nThe AFP Conversion and Indexing Facility (ACIF) consists of three separate but related \nfunctions. ACIF can perform the following tasks: \n\n(cid:2) Convert line data to AFP. \n(cid:2) Index line or AFP data. \n(cid:2) Collect resources. \n\nACIF accepts either line data or AFP as input and can produce three output files: \n\n(cid:2) The output file, which is called the “out” file, is either line data or AFP. \n(cid:2) The index file, which is called the “ind” file, is an AFP file. \n(cid:2) The resource file, which is called the “res” file, is an AFP file.", - "page_start": 196, - "page_end": 196, - "source_file": "sg246915.pdf" - }, - { - "text": "From a performance perspective, the use of the transaction data field for transaction-style line \ndata optimizes indexing performance by reducing the number of index values to be inserted \ninto the database. Therefore, the process of loading and retrieving these large reports is \nfaster and the Content Manager OnDemand database is many times smaller. \n\n**13.4.3 AFP data**\n\nAFP data is a multi-part data type. In addition to the variable data, external resources, such \nas images, fonts, and logos, are also referenced by the AFP data stream. When Content \nManager OnDemand stores AFP data, the resources are also archived. When the data is \nviewed, the referenced resources are displayed. \n\nIt is a common misconception that if fonts are collected when the data is loaded, they are \navailable for viewing in the Windows client. However, Windows does not recognize AFP fonts. \nIt is not possible to use these fonts even if they are sent to the client as part of the resource. \nWindows clients require a mapping from AFP fonts to Adobe Type Manager (ATM) fonts or \nTrueType (TT) fonts. Content Manager OnDemand provides this mapping for most standard \nfonts. For more information about mapping custom fonts, see*IBM Content Manager -*\n*Windows Client Customization Guide and Reference*, SC27-0837. \n\nOne possibly useful implementation of storing fonts with the resource group is when server \nreprint is necessary. If the fonts are stored with the resource group, they can be retrieved from \nContent Manager OnDemand and used by AFP printers. However, if fonts are collected, they \nare also sent to the client as part of the resources group and then discarded. Storing the fonts \nwith the resource group serves only to increase network traffic when transferring the resource \nto the workstation. A more practical option for server printing is to store the font in a fontlib \nand to keep only the reference (path) to the fontlib. Although the font is accessible on the \nserver, Print Services Facility (PSF) or InfoPrint does not need the font to be inline (stored in \nthe resource group). The use of this approach also allows all AFP data that references the \nfont to use the single instance of the font without redundant inline storage. \n\nFigure 13-5 on page 311 shows the indexer information in the application where you can \nselect the resources to collect with the Restype= parameter. Unless reprints to AFP printers \nwith 100% fidelity is a requirement, do not collect the fonts.", - "page_start": 333, - "page_end": 333, - "source_file": "sg246915.pdf" - }, - { - "text": "(cid:2) For IBM i, depending on your retrieval patterns and system hardware configuration, it \n\nmight be advantageous to*not*store a duplicate set of documents in the Content Manager \nOnDemand cache when you use ASM because ASM might already be using disk space. If \nthe application group uses ASM, caches the data, and specifies the migration of data at \nload time, two copies of the data are stored during the load. One copy is stored in cache, \nand one copy is stored in the ASMREQUEST directory. \n\nTo avoid storing a duplicate set of documents in cache for non-AFP data, change Cache \nData to No on the Storage Management tab of your application group definition. To avoid \nstoring a duplicate set of documents in cache for AFP data, you might change Document \nData to No Cache but leave Resource Data in cache for faster retrieval. \n\n(cid:2) For IBM i, every user that loads data must have a home directory. If users do not have a \nhome directory, the temporary files are stored in the root directory of the integrated file \nsystem (IFS). \n\n(cid:2) If the data source is on a remote system, you can load the data into Content Manager \nOnDemand on the remote system and directly store the export data to the specified \nContent Manager OnDemand library and object server. \n\nOr, if the data source is on a remote system, you also can upload the data to the specified \nContent Manager OnDemand server through FTP and then load the data on the selected \nContent Manager OnDemand system. \n\n(cid:2) For Multiplatforms and z/OS, all file systems must be dedicated file systems that are \nmounted on their own mount points. \n\n(cid:2) For z/OS, when you load PDF reports (by using the PDF Indexer), placing the input report \nin the HFS or zFS causes the load to run nearly 50 times faster that compared to the input \nreport that is placed in a VSAM file. \n\n**13.2.3 Load testing**\n\nThe goal of load testing is to verify that, under stressful system conditions, the required \namount of data can be loaded into the Content Manager OnDemand system within a time \nwindow. \n\nA general approach to load testing a system is described: \n\n(cid:2) Parallel loads: Run a single load and measure the load throughput. If the throughput does \nnot meet the requirements, run two loads in parallel and measure the throughput. While \nthe loads are run, collect system statistics to determine the system resources that are \nbeing used and any potential bottlenecks. Tune or acquire additional system resources as \nneeded. Progressively increase the number of parallel loads until the required throughput \nis met. \n\n**Note:**For most users, a single load process meets the ingestion throughput \nrequirements. \n\n(cid:2) Data types and exits: A different data type, and whether an exit is started during the load \nprocess, affects the load throughput. Test samples of the different types that represent the \ngeneral loads.", - "page_start": 326, - "page_end": 326, - "source_file": "sg246915.pdf" - }, - { - "text": "– The*XML Indexer*allows the rapid increase in XML archiving mandates that are based \non ISO 20022 standards with XML (including SEPA in Europe). The XML Indexer is \noptimized for high-volume batch archiving of XML, batch PDF, AFP, Line Data, and \ncheck images. \n\n– The*Full Text Indexer*provides the capability to index the full text of a document (or \nreport). You can search through an indexed document. \n\n(cid:2)*Data loading programs*can be set up to automatically store report data into application \ngroups and update the database. The data loading programs can run on any Content \nManager OnDemand server. \n\n(cid:2)*Report Distribution Facility*provides an easy way to automatically group reports and \nportions of reports and distribute the reports to multiple users. Distributions can be \nprinted, created as an output file, or emailed as an attachment. \n\n(cid:2) Both the archived reports and their resources are stored in the Content Manager \n\nOnDemand Archive. The Content Manager OnDemand system manages the stored data \nthroughout its lifetime. It provides authorized users rapid access to the data and allows the \ndata to be converted into different formats for display or print. \n\n(cid:2) A*server print*facility allows users to reprint a large volume of documents at high speed. \nPrint servers, such as Infoprint (on AIX), can be started to manage the server print \ndevices. These print servers are not part of Content Manager OnDemand and must be \npurchased separately. \n\n(cid:2) Content Manager OnDemand*management programs*maintain the Content Manager \nOnDemand database and documents in cache storage. \n\n(cid:2) A*system logging*facility provides administrators with tools to monitor server activity and \nrespond to specific events as they occur. The interface to the system logging facility is \nthrough the system log folder and the system log user exit.", - "page_start": 35, - "page_end": 35, - "source_file": "sg246915.pdf" - }, - { - "text": "**7.2.1 Limitations**\n\nThe maximum input file size that is supported by PDF Indexer is 4 GB. The amount of data \nthat can be processed from an input file is also limited by the amount of memory that is \navailable on the server on which you are running the PDF Indexer. The maximum size of a \nsingle document within the input file that can be loaded into Content Manager OnDemand is \n2 GB; however, we suggest that the size of a single PDF document does not exceed 50 MB. \n\nSecure PDF documents are not supported. PDF Digital Signatures are not supported. If a \nPDF document contains a digital signature, after indexing, the .out file does not contain the \ndigital signature. To load a file that contains a PDF Digital Signature, create a generic index \nfile for it, and load the file as one document. \n\n**7.3 Performance considerations**\n\nThe best performance of the PDF Indexer is on the Windows platform. For the preferred \nperformance practices, see 13.4.1, “PDF data” on page 308. \n\n**7.3.1 PDF fonts and output file size**\n\nThe fonts that are used in a PDF document are one of the factors that determines the \nindexing’s output file size. \n\n**The base 14 Type 1 fonts**\nThe base 14 Type 1 fonts are a core set of fonts that are always available to the Acrobat \nprogram. Because they are available on the system, they are*not*embedded in the document. \nTherefore, documents that are created with these fonts are more compact. The base 14 fonts \nare listed: \n\n(cid:2) Courier \n(cid:2) Courier-Bold \n(cid:2) Courier-BoldOblique \n(cid:2) Courier-Oblique \n(cid:2) Helvetica \n(cid:2) Helvetica-Bold \n(cid:2) Helvetica-BoldOblique \n(cid:2) Helvetica-Oblique \n(cid:2) Times-Roman \n(cid:2) Times-Bold \n(cid:2) Times-Italic \n(cid:2) Times-BoldItalic \n(cid:2) Symbol \n(cid:2) ZapfDingbats \n\nFonts that are not members of the base 14 fonts might be embedded in the document, or they \nmight be stored in a font directory. \n\nImages and bar code fonts are also embedded in the document. \n\nThe PDF Indexer collects resources, such as fonts and images, removes them from the \ndocument, and places them in a resource file. The number of embedded fonts in the \ndocument directly affects the size of the resource file.", - "page_start": 189, - "page_end": 189, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200438_en.pdf", - "query": "Where can I consult a summary of the impact of the International tax compliance regulations ?", - "target_page": 3, - "target_passage": "A Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- uks-automatic-exchange-of-information-agreements", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be \nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments. \n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts \nwhich were previously excluded accounts. \n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 \nwas published on 18th March 2015 and \nthe HMRC website at \nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- \nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the \nimpacts that apply to this instrument. \n\nis available on \n\n© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S \n\n\n \n \n \n \n [html]\n
Thenternational
ax ComDevelopment ( Accuracy expensions )ndmen
RegTableMade
.-20th Apri
0Laid beforee House of
Comm21st Apri0
\n\nThe Treasury make these Regulations in exercise of the powers conferred by section 222 of the \nFinance Act 2013(**a**): \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the International Tax Compliance (Amendment) \n\nRegulations 2020 and come into force on 13th May 2020. \n\n**Amendments to the International Tax Compliance Regulations 2015**\n\n**2.**—(1) The International Tax Compliance Regulations 2015(**b**) are amended as follows. \n(2) In regulation 1(3)(b)(i), for “16th May 2019” substitute “19th April 2020”(**c**). \n(3) In regulation 3(4A)(a), at the beginning insert “subject to regulation 24(3)”. \n(4) In regulation 24— \n\n(a) in the table in paragraph (2), in the column headed “the CRS”— \n\n(i) at the beginning of the entry for “new account” insert “subject to paragraph (3)”, and \n(ii) at the beginning of the entry for “pre-existing account” insert “subject to regulation \n\n3(4A)(a) and paragraph (3)”, and \n\n(b) after paragraph (2) insert— \n\n“(3) In respect of the accounts listed in paragraph (4)— \n\n(**a**) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not \nrelevant to these Regulations. \n(**b**) S.I. 2015/878 (referred to in these footnotes as “the principal Regulations”); relevant amending instruments are S.I. \n\n2017/598, 2018/490 and 2019/881. \nIn accordance with the common reporting standard for automatic exchange of financial account information developed by \nthe Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom \nexchanges information received from financial institutions under the principal Regulations with a territory which is a \n“Reportable Jurisdiction” under the CRS and with which the United Kingdom has entered into international exchange \narrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrc- \ninternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at \nthe offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU. \n\n(**c**)", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "References \n1. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al*.), pp. \n1–32. Cambridge, UK: Cambridge University Press.", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed11.pdf" - }, - { - "text": "• \n\n• \n\n•**Compliance**with and impact of legislation. Currently, there are data on the percentage of \nenterprises with a risk assessment but very limited information about the**quality of these risk**\n**assessments and of implemented risk management and reduction measures**. Previous \nstudies indicate that in many cases the risk assessment is conducted by an enterprise just to \ncomply with legal obligations (paper compliance). A possible approach could be an**anonymous**\n**evaluation of the quality of a representative share**of risk assessments. \n\n\n \n \n \n \n [html]\n
TableEurope
ComplementalTable
", - "page_start": 139, - "page_end": 139, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**22. Investments in Controlled Entities**", - "page_start": 71, - "page_end": 71, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**35. Australian Equivalents to International Financial Reporting Standards (continued)**", - "page_start": 88, - "page_end": 88, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "As of January 31, 2015 and February 1, 2014, we were in compliance with this covenant. We will continue to monitor this covenant and \nbelieve that we will remain in compliance with this covenant during 2015.", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Management’s Discussion and Analysis … 32 \n\nConsolidated Financial Statements and Notes … 39 \n\nEleven-Year Summary … 56 \n\nReports of Independent Auditors … 58 \n\nA Message from the Board of Directors … 61 \n\nBoard of Directors and Officers … 62", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "**Income Taxes**\nWe regularly evaluate the likelihood of realizing the benefit for income tax positions we have taken in various federal, state and foreign filings \nby considering all relevant facts, circumstances and information available. If we believe it is more likely than not that our position will be \nsustained, we recognize a benefit at the largest amount that we believe is cumulatively greater than 50% likely to be realized. Our \nunrecognized tax benefit was $15 as of January 31, 2015 and $14 as of February 1, 2014. \n\nUnrecognized tax benefits require significant management judgment regarding applicable statutes and their related interpretation, the status \nof various income tax audits and our particular facts and circumstances. Also, as audits are completed or statutes of limitations lapse, it may \nbe necessary to record adjustments to our taxes payable, deferred taxes, tax reserves or income tax expense. Such adjustments did not \nmaterially impact our effective income tax rate in 2014 or 2013. \n\n**RECENT ACCOUNTING PRONOUNCEMENTS**\nSee Note 1: Nature of Operations and Summary of Significant Accounting Policies in the Notes to Consolidated Financial Statements of \nItem 8: Financial Statements and Supplementary Data for a discussion of recent accounting pronouncements. We are currently evaluating \nthe impact of these standards or do not expect any of these pronouncements to have a material effect on our results of operations, liquidity or \ncapital resources.", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed12.pdf", - "query": "What was the muscle volume of the knee flexors of the 2024 word's strongest man ?", - "target_page": 7, - "target_passage": "Knee flexors 3,060 ", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "All muscles \n\nPlantar flexors \nKnee flexors \nHip extensors \nKnee extensors \nHip flexors \nIsometric Midthigh Pull and Countermovement Jump \n\nGross (including body weight) and net (above body \nweight) IMTP peak forces of the WSM were 9,171 N and 7,480 \nN, respectively. The WSM’s gross IMTP peak force was 54% \ngreater than the highest comparable group mean we located \n(subelite weightlifters: 5,942 ± 844 N (20); Fig. 2A). The \nWSM’s net IMTP peak force was 100% greater than the high- \nest comparable group mean value in the literature (collegiate \nsoccer athletes: 3,740 ± 692 N (26); Fig. 2B). \n\nSartorius \nSemitendinosus \nGracilis \nSoleus \nVastus medialis \nAdductor Magnus \nGluteus maximus \nBiceps femoris long head \nMedial gastrocnemius \nVastus lateralis \nGluteus medius and minimus \nLateral gastrocnemius \nVastus intermedius \nTensor fasciae latae \nLateral compartment \nAnterior compartment \nSemimembranosus \nRectus femoris \nPopliteus \nIliopsoas \nPosterior compartment \nBiceps femoris short head \n\nThe WSM’s CMJ peak power and jump height were 9,866 W \nand 53.3 cm, respectively. The peak CMJ power of the WSM \nwas >2.5-fold (164%) that of the mean of an untrained control \ngroup previously measured in our laboratory (3,735 ± 760 W; \nunpublished) and 51% greater than the highest comparable \ngroup mean value we located in the literature (professional \nbasketball players: 6,518 ± 923 W (32); Fig. 2C). Not surpris- \ningly, given the WSM’s high body mass, his jump height was \nless exceptional, while still being 20% greater than that of a \ngroup of untrained control participants previously measured \nin our laboratory (44.3 ± 9.2 cm; unpublished). However, his \njump height was 25% lower than the highest group mean CMJ \nheight we are aware of in the published literature (elite inter- \nnational gymnasts: 71.3 ± 4.5 cm (37); Fig. 2D). \n\nLeg Muscle Volumes \n\n+201.9% \n+157.1% \n+139.8% \n+134.6% \n+128.6% \n+113.8% \n+112.7% \n+105.4% \n+105.2% \n+103.0% \n+101.0% \n+98.8% \n+96.5% \n+94.1% \n+65.6% \n+52.9% \n+49.8% \n+49.6% \n+42.2% \n+32.4% \n+24.6% \n+23.1% \n\n0 250 \n\n**Difference in muscle volume (%)**\n\nFigure 3. Percentage differences in muscle volumes of all muscles, 5 func- \ntional muscle groups, and 23 individual muscles/compartments between \nthe World’s Strongest Man and deadlift champion (WSM; n ¼ 1) and \nuntrained control participants (n ¼ 11) from the work by Miller et al. (13). A \npositive value indicates greater muscle volume of WSM relative to the \ngroup mean of the untrained controls. The functional muscle groups and \nindividual muscles are ordered according to the magnitude of the percent- \nage differences for absolute muscle volume. \n\nThe total unilateral muscle volume of the 22 measured \nmuscles/compartments of WSM (14,922 cm3) was nearly \ntwice that of a relatively modest (n ¼ 11) sample of untrained \ncontrols (7,628 ± 1,548 cm3; þ 96%; Fig. 3), while being 63% \ngreater than subelite (9,164 ± 1,207 cm3) and þ 32% greater \nthan elite 100-m sprinters (11,323 ± 1,328 cm3; Table 2). The \nmuscle group differences were largest for the plantar flexors \n( þ 120% vs. untrained; þ 100% vs. subelite sprinters; þ 70% \nvs. elite sprinters) and smallest for the hip flexors ( þ 65% vs. \nuntrained; þ 30% vs. subelite sprinters; þ 5% vs. elite \nsprinters). The WSM had the highest values of any individ- \nual we have observed for four out of five muscle groups, but \nnot the hip flexors, which were inferior to three of the elite \n100-m sprinters (n ¼ 5).", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed12.pdf" - }, - { - "text": "0 1000 2000 3000 4000 5000 \n\n**QF volume (cm3)**\n\nFigure 4. Quadriceps femoris (QF; A), \nvastus medialis (VM; B), vastus lateralis \n(VL; C), vastus intermedius (VI; D), and rec- \ntus femoris (RF; E) muscle volume of a \nWorld’s Strongest Man and deadlift cham- \npion (WSM) compared with long-term re- \nsistance-trained (n ¼ 16, from the work by \nMaden-Wilkinson et al. \n(10)], elite sprint \nrunners [n ¼ 5, from the work by Miller \net al. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 102, \npooled population from the works by \nMiller et al. (13) (n ¼ 11), Balshaw et al. (11) \n(n ¼ 52), and Balshaw et al. (14) (pretest \ndata n ¼ 39)]. \n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\n**D**\n\n0 200 400 600 800 1000 1200 0 200 400 600 800 1000 1200 1400 1600 \n\n**VM volume (cm3)** **VL volume (cm3)**\n\n**E**\n\nWSM \n\nLong-term resistance-trained \n\nElite sprint runners \n\nSub-elite sprint runners \n\nUntrained control \n\n0 200 400 600 800 1000 1200 1400 0 100 200 300 400 500 600 \n\n**VI volume (cm3)** **RF volume (cm3)**\n\nflexors, potentially placing a higher demand on the contract- \nile apparatus than for running and jumping tasks. \n\nConsidering individual muscles/compartments, the mus- \ncular development of the WSM was distinctly nonuniform. It \nis striking that the largest muscles relative to the untrained \ncontrol population were the three “guy ropes” (sartorius, gra- \ncilis, and semitendinosus: þ 140–202%). These three muscles \nprovide stability to the pelvis and femur by having origins at \ndiverse points around the pelvis while sharing a common \ninsertion onto the anteromedial tibia [via pes anserinus, the \nconjoined tendons of these three muscles (39)]. Large guy \nrope muscles likely enhance stabilization of the femur and \npelvis and would be expected to be critical during heavy \nweight-bearing tasks. In contrast, the WSM’s five smallest \nmuscles (relative to untrained controls) consisted of two hip \nflexors (iliopsoas and RF) and two monoarticular knee flexors; \nactions that appear far less important for lifting, carrying, and \npulling tasks. \n\nAlthough it was anticipated that the WSM would possess a \nlarger total lower-body muscle volume/mass than untrained \ncontrols and other athletic/trained groups we have previ- \nously measured, the magnitude and pattern of the differen- \nces were unknown. The results indicated that the total \nvolume of the measured muscles was almost twice that of av- \nerage untrained participants and 32–63% larger than subelite \nand elite sprinters. Pronounced development of the anti- \ngravity muscles (i.e., hip extensors, knee extensors, and plan- \ntar flexors) was perhaps not that surprising given the WSM’s \nbackground in heavy lifting events (including being a double \ndeadlift world champion and record holder). However, the \nhip flexors appear less important in these tasks, possibly \nexplaining their more modest size, which was inferior to that \nof three elite 100-m sprinters we have previously assessed. \nThe WSM’s plantar flexors were particularly large relative to \nuntrained controls ( þ 120%). This could be due to the plan- \ntar flexors being the smallest of the antigravity muscle \ngroups that may experience very high mechanical stress \nand, thus, a pronounced adaptive stimulus during heavy lift- \ning, carrying, and pulling tasks. Furthermore, the very heavy \nand, therefore, low-velocity nature of these tasks may limit \nthe contribution of the stretch-shortening cycle and tendon \nrecoil to the positive/concentric work done by the plantar \n\nThe WSM’s quadriceps volume and patellar \n\ntendon \nmoment arm were both greater than that of untrained con- \ntrols and indeed any individual we have previously measured. \nHowever, \nrelative to the \nuntrained controls, was noticeably larger for quadriceps femo- \nris volume (greater than or equal to twice as large) than for \n\nthe magnitude of difference,", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed12.pdf" - }, - { - "text": "RESEARCH ARTICLE \n\nMuscle and tendon morphology of a world strongman and deadlift champion \n\nThomas G. Balshaw,1 Garry J. Massey,1,2 \nThomas M. Maden-Wilkinson,6 and \n\nRobert Miller,1,3,4 Emmet J. McDermott,1,5 \n\nJonathan P. Folland1 \n\n1School of Sport, Exercise, and Health Sciences, Loughborough University, Loughborough, United Kingdom; 2College of Life \nand Environmental Sciences, University of Exeter, Exeter, United Kingdom; 3UK Athletics, Loughborough University, \nLoughborough, United Kingdom; 4Department of Sport Science, Aspire Academy, Doha, Qatar; 5Department of Physical \nEducation and Sport Sciences, University of Limerick, Limerick, Ireland; and 6Academy of Sport and Physical Activity, Faculty \nof Health and Wellbeing, Sheffield Hallam University, Sheffield, United Kingdom \n\nAbstract \n\nThis study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. \n\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed12.pdf" - }, - { - "text": "Although the current investigation provides a detailed \nassessment of an individual at/toward the upper limit of \nhuman strength performance, it is important to appreciate \nstudy limitations. First, the participant was not measured im- \nmediately before their World’s Strongest Man championship \nsuccess or other landmark performances, and it is entirely pos- \nsible the functional and structural characteristics we assessed \nmay have been even higher directly prior to peak performan- \nces. Despite using a wide-bore MRI scanner, due to the size of \nthe WSM’s shoulders and arms, it was not possible to scan their \nupper body. Thus, we were not able to investigate this aspect of \nthe WSM’s muscle morphology; although given that greater hy- \npertrophy occurs in the upper body compared with the lower \nbody (42), it is possible that the WSM’s upper-body muscle size \nrelative to untrained controls may have been even more pro- \nnounced than what we have documented for the lower body. \nIn the current study to provide the most representative data on \nuntrained control participants, the largest available untrained \ncontrol populations were used for each category of measure- \nments. Thus, different untrained control populations were \nused [e.g., comparison of quadricep and hamstring size (n ¼ \n102) vs. comparison of all the leg muscles (n ¼ 11)], which led to \nsome subtle discrepancies in the contrasts between these \ngroups and the WSM [e.g., quadriceps femoris/knee extensors, \nþ 127% and þ 99% relative to our large pooled (n ¼ 102) and \nsmaller (n ¼ 11) untrained control samples, respectively]. \nImportantly, however, this discrepancy does not appear to \nmeaningfully affect the interpretation of the findings. There \nwere subtle differences in the precise scanning and analysis \napproaches used with the reference populations featured in \nthis study, including 1) magnetic field strength [1.5 T (10, 11, 15) \nvs. 3.0 T, WSM and (13, 14)]; 2) the interslice distance used to \nquantify quadriceps femoris and hamstrings muscle volume \n[1.5 cm (10, 11, 14) vs. 2.0 cm, WSM and (13)]; 3) the calculation \nof muscle volume [area under the cubic spline ACSA-muscle \nlength curve: (10, 11, 14) vs. the equation detailed earlier: WSM \nand (13)]; and 4) the use of unilateral MRI measures derived \nfrom one limb (10, 11, 14, 15) or collapsed across two limbs \n[WSM and (13)]. However, it seems likely that these subtle dif- \nferences would have had at most a very minor effect on the \nfindings. Finally, it is also important to highlight that the differ- \nences documented between the WSM and comparative popula- \ntions for the various measures included in the current study \ncannot be assumed to be anything other than a combination of \nboth innate (genetic) and environmental (training and nutri- \ntion) factors. \n\n5. McLeod M, Breen L, Hamilton DL, Philp A. Live strong and prosper: \nthe importance of skeletal muscle strength for healthy ageing. \nBiogerontology 17: 497–510, 2016. doi:10.1007/s10522-015-9631-7. \nKraemer WJ, Caldwell LK, Post EM, DuPont WH, Martini ER, \nRatamess NA, Szivak TK, Shurley JP, Beeler MK, Volek JS, Maresh \nCM, Todd JS, Walrod BJ, Hyde PN, Fairman C, Best TM. Body com- \nposition in elite strongman competitors. J Strength Cond Res 34: \n3326–3330, 2020. doi:10.1519/jsc.0000000000003763. \nAbe T, Buckner SL, Dankel SJ, Jessee MB, Mattocks KT, Mouser \nJG, Loenneke JP. Skeletal muscle mass in human athletes: what is \nthe upper limit? Am J Hum Biol 30: e23102, 2018. doi:10.1002/ \najhb.23102. \n\n6. \n\nConclusions \n\nIn conclusion, this novel investigation documented the \nmuscle and tendon morphology and whole body strength \nand power characteristics of an exceptionally strong individ- \nual, relative to comparative athletic, trained, and untrained \n\n798 J Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "\n \n \n \n \n [html]Muscle Group / Muscle or CompartmentMuscle Volume, cm3\n
WSMElite Sprinters ( n = 5 )Subelite Sprinters ( n = 26 )Untrained ( n = 11 )
All muscles14.92211.323 ± 1.3289.164 ± 1.2077.628 ± 1.548
Hip flexors1.7041.620 ± 2001.314 ± 2161.031 ± 151
Hip extensors4.7244.002 ± 4893.029 ± 4222.257 ± 220
Knee flexors3.0602.304 ± 1781.859 ± 3011.460 ± 196
Knee extensors4.3863.218 ± 4002.636 ± 4012.202 ± 315
Plantar flexors1.8881.112 ± 181943 ± 156860 ± 172
Iliopsoas681702 ± 97618 ± 101514 ± 75
Sartorius429306 ± 46209 ± 50142 ± 25
Tensor fasciae latae142135 ± 4186 ± 2573 ± 24
Adductor magnus1.3341.056 ± 83828 ± 128624 ± 81
Gracilis235180 ± 37142 ± 3798 ± 23
Gluteus maximus1.9801.797 ± 3761.257 ± 197931 ± 108
Gluteus medius and minimus1.172626 ± 129575 ± 97583 ± 76
Rectus femoris453476 ± 45401 ± 78303 ± 55
Vastus lateralis1.5081.132 ± 180925 ± 156743 ± 98
Vastus intermedius1.336962 ± 145789 ± 140680 ± 115
Vastus medialis1.088649 ± 97521 ± 79476 ± 1 †¶
Semimembranosus392359 ± 60327 ± 59262 ± 18
Semitendinosus563449 ± 70350 ± 79219 ± 39
Biceps femoris long head454340 ± 31267 ± 47221 ± 42
Biceps femoris short head135167 ± 26131 ± 34110 ± 28
Popliteus2723 ± 517 ± 519 ± 6
Lateral gastrocnemius310202 ± 34170 ± 37156 ± 41
Medial gastrocnemius515300 ± 38262 ± 58251 ± 52
Soleus1.063610 ± 137510 ± 76453 ± 95
Anterior compartment445302 ± 59273 ± 47291 ± 47
Lateral compartment253147 ± 32161 ± 42153 ± 35
Posterior compartment406401 ± 76345 ± 71326 ± 93
\n\nassessed (Fig. 5B). BFsh volume (135 cm3) of the WSM was a \nmodest 26% greater than that of our pool of untrained control \nparticipants (107 ± 31 cm3; Fig. 5E) but smaller than that of \nboth long-term resistance-trained individuals ((cid:5)1%; 136 ± 27 \ncm3) and elite sprinters ((cid:5)19%; 167 ± 26 cm3; Fig. 5E). \n\nPatella Tendon Cross-Sectional Area and Moment Arm", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "Patella Tendon Cross-Sectional Area and Moment Arm \n\nThe patellar tendon mean CSA of the WSM (133.8 mm2) was \nlarger than that of average untrained ( þ 30%; 103.2 ± 12.5 \nmm2) and long-term resistance-trained individuals ( þ 27%; \n105.4 ± 13.0 mm2; Fig. 6A) but was smaller than the largest \nindividual we have measured from these groups (149.5 mm2). \nThe WSM’s patellar tendon moment arm (51.5 mm) was also \nlarger than that of average untrained ( þ 18%; 43.8 ± 2.7 mm) \nor long-term resistance-trained groups ( þ 12%; 45.8 ± 2.5 mm; \nFig. 6B) as well as being 3% greater than the highest individ- \nual moment arm we have previously assessed within these \ngroups (49.9 mm). \n\nand net) and CMJ power values previously reported by 54%, \n100%, and 164%, respectively. The WSM had overall lower- \nbody muscularity approximately twice that of untrained con- \ntrols ( þ 96%) and 32% greater than that of elite 100-m sprint- \ners. However, there was substantial anatomical variability in \nthe magnitude of the differences, ranging from the plantar \nflexors ( þ 120% vs. untrained) to the hip flexors ( þ 65% vs. \nuntrained). Similarly, some specific muscles, such as the guy \nrope muscles that stabilize the femur and pelvis, were 2.5–3.0 \ntimes the volume of untrained individuals (gracilis þ 140%, \nsemitendinosus þ 157%, and sartorius þ 202%) but others dis- \nplayed more marginal differences (BFsh þ 23%, iliopsoas \nþ 32% vs. untrained). Considering the knee extensors, the \nWSM had both quadriceps femoris volume greater than or \nequal to twofold that of untrained controls and a greater pa- \ntella tendon moment arm than we have previously measured \n( þ 18% vs. untrained), which would be expected to combine \nto facilitate extraordinary strength. Furthermore, despite the \nWSM’s extremely large quadriceps femoris, their patellar ten- \ndon CSA was only 30% greater than that of untrained controls \nand not outside the range of tendons we have previously \nassessed. The results of this study provide novel insights into \nthe muscle and tendon characteristics, as well as the strength \nand power capabilities, of an extraordinarily strong individual \nthat may be toward the upper limit of human variation in \nthese characteristics. \n\nDISCUSSION \n\nThis study is the first to document the lower-body muscle \nand tendon morphology of a World’s Strongest Man and \ndeadlift champion (i.e., an exceptionally strong individual), \nand these are presented alongside functional whole body \nassessments, which exceeded the highest IMTP force (gross \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "supplement consumption included protein, branched-chain \namino acids, and electrolytes. \n\npredictions of skeletal muscle mass nor dual-energy X-ray \nabsorptiometry provides detailed information on the size of \nspecific individual muscles. Given the known importance of \nmuscle size as a determinant of muscular strength (9–11), pro- \nnounced muscle size seems likely to be critical to extreme \nthe specific muscle size of \nhuman strength; however, \nextremely strong individuals remains unknown. Similarly, a \nlarge moment arm (e.g., of the patella tendon at the knee joint) \ncould contribute to the expression of high muscular strength \n(10, 12), and a large tendon may mitigate the mechanical stress \nit experiences with very high muscular loads, and therefore, \nthese characteristics may also be expected in individuals \nselected for exceptional strength. \n\nOverview \n\nThe WSM reported for a single test session that involved \nthe following assessments (listed in order): axial T1 weighted \n3.0-T MRI scans from T12 to the lateral malleolus [to assess \nmuscle size throughout the lower body (left and right sides)], \naxial and sagittal T1-weighted MRI scans of both knees [to \nassess patellar tendon cross-sectional area (CSA) and patellar \ntendon moment arm], maximum countermovement jumps \n(CMJ), and maximum isometric midthigh pulls (IMTPs). The \nmuscle size, patellar tendon CSA, and patellar tendon \nmoment arm of the WSM were compared with various popu- \nlations measured within our laboratory, as indicated in \nTable 1, alongside participant descriptives (10, 11, 13–15). In \naddition, the IMTP and CMJ measures were compared with \nexisting published literature (included studies are summar- \nized in Supplemental Materials 1 and 2, alongside participant \ndescriptives). \n\nIn this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "26. Suchomel TJ, Nimphius S, Stone MH. Scaling isometric mid-thigh \npull maximum strength in division I athletes: are we meeting the \nassumptions? Sports Biomech 19: 532–546, 2020. doi:10.1080/ \n14763141.2018.1498910. \n\n8. \n\nAbe T, Buckner SL, Mattocks KT, Jessee MB, Dankel SJ, Mouser \nJG, Bell ZW, Loenneke JP. Skeletal muscle mass and architecture \nof the world’s strongest raw powerlifter: a case study. Asian J Sports \nMed 9: e61763, 2018. doi:10.5812/asjsm.61763. \nPowell PL, Roy RR, Kanim P, Bello MA, Edgerton VR. Predictability \nof skeletal muscle tension from architectural determinations in \nguinea pig hindlimbs. J Appl Physiol Respir Environ Exerc Physiol \n57: 1715–1721, 1984. doi:10.1152/jappl.1984.57.6.1715. \n\n9. \n\n27. Cunningham DJ, Shearer DA, Drawer S, Pollard B, Cook CJ, \nBennett M, Russell M, Kilduff LP. Relationships between physical \nqualities and key performance indicators during match-play in senior \ninternational rugby union players. PLoS One 13: e0202811, 2018. \ndoi:10.1371/journal.pone.0202811. \n\n10. Maden-Wilkinson TM, Balshaw TG, Massey G, Folland JP. What \nmakes long-term resistance-trained individuals so strong? A com- \nparison of skeletal muscle morphology, architecture, and joint \nmechanics. J Appl Physiol (1985) 128: 1000–1011, 2019. doi:10.1152/ \njapplphysiol.00224.2019. \nBalshaw TG, Maden-Wilkinson TM, Massey GJ, Folland JP. The \nhuman muscle size and strength relationship: effects of architecture, \nmuscle force, and measurement location. Med Sci Sports Exerc 53: \n2140–2151, 2021. doi:10.1249/mss.0000000000002691. \n\n28. Doyle TLA, Fain AC, Wills JA, Cooper D, Toonen K, Kamphius B. \nMeasures of \nlower body strength associated with injuries in \nAustralian special forces selection candidates. J Appl Biomech 38: \n255–262, 2022. doi:10.1123/jab.2021-0134. \n\n29. Kawamori N, Rossi SJ, Justice BD, Haff EE, Pistilli EE, O’Bryant HS, \nStone MH, Haff GG. Peak force and rate of force development dur- \ning isometric and dynamic mid-thigh clean pulls performed at vari- \nous intensities. J Strength Cond Res 20: 483–491, 2006. doi:10.1519/ \n18025.1. \n\n11. \n\n12. Baxter JR, Piazza SJ. Plantar flexor moment arm and muscle volume \npredict torque-generating capacity in young men. J Appl Physiol \n(1985)116: 538–544, 2014. doi:10.1152/japplphysiol.01140.2013. \n13. Miller R, Balshaw TG, Massey GJ, Maeo S, Lanza MB, Johnston \nM, Allen SJ, Folland JP. The muscle morphology of elite sprint \nrunning. Med Sci Sports Exerc 53: 804–815, 2021. doi:10.1249/ \nmss.0000000000002522. \nBalshaw TG, Funnell MP, McDermott E, Maden-Wilkinson TM, \nAbela S, Quteishat B, Edsey M, James LJ, Folland JP. The effect of \nspecific bioactive collagen peptides on function and muscle remod- \neling during human resistance training. Acta Physiol \n(Oxf) 237: \n(Oxf) 237:e13952, 2023]. \ne13903, 2023 [Erratum in Acta Physiol \ndoi:10.1111/apha.13903. \n\n30. Wang R, Hoffman JR, Tanigawa S, Miramonti AA, Monica MB, \nBeyer KS, Church DD, Fukuda DH, Stout JR. Isometric mid-thigh \npull correlates with strength, sprint, and agility performance in colle- \ngiate rugby union players. J Strength Cond Res 30: 3051–3056, \n2016. doi:10.1519/jsc.0000000000001416. \n\n31. Haff GG, Stone M, O’Bryant HS, Harman E, Dinan C, Johnson R, \nHan KH. Force-time dependent characteristics of dynamic and iso- \nmetric muscle actions. J Strength Cond Res 11: 269–272, 1997. \ndoi:10.1519/1533-4287(1997)011<0269:FTDCOD>2.3.CO;2. \n\n14. \n\n32. Mercer RAJ, Russell JL, McGuigan LC, Coutts AJ, Strack DS, \nMcLean BD. Finding the signal in the noise—interday reliability and \nseasonal sensitivity of 84 countermovement jump variables in pro- \nfessional basketball players. J Strength Cond Res 37: 394–402, \n2023. doi:10.1519/jsc.0000000000004182.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed12.pdf" - }, - { - "text": "changes in response to functional overload/resistance \ntraining. For example, we previously found patellar ten- \ndon CSA to show very subtle changes after 15 wk (45 train- \ning sessions) of heavy resistance training [ þ 1.4% (41)] and \nno differences between long-term resistance-trained indi- \nviduals and untrained controls (15). \n\npopulations. Overall leg muscle volume of the WSM was \napproximately twice that of untrained controls but with pro- \nnounced anatomical variability in the extent of muscular de- \nvelopment. The plantar flexor muscle group and the guy \nrope muscles (sartorius, gracilis, and semitendinosus: þ 140 \nto þ 202%), which stabilize the pelvis and femur, demon- \nstrated the largest differences. The pronounced quadriceps \nfemoris size of the WSM (greater than or equal to twice that \nof untrained) was accompanied by a more modest difference \nin patella tendon moment arm ( þ 18%) and was not matched \nby a proportional difference in tendon size ( þ 30%). \n\nLimitations \n\nDATA AVAILABILITY \n\nData will be made available upon reasonable request. \n\nSUPPLEMENTAL MATERIAL \n\nSupplemental Material: https://doi.org/10.6084/m9.figshare. \n26152939. \n\nACKNOWLEDGMENTS \n\nThe authors thank radiographer Julie Thompson. \n\nDISCLOSURES \nNo conflicts of interest, financial or otherwise, are declared by \nthe authors. \n\nAUTHOR CONTRIBUTIONS \n\nT.G.B. and J.P.F. conceived and designed research; T.G.B., G.J.M., \nR.M., E.J.M., and J.P.F. performed experiments; T.G.B., G.J.M., R.M., \nE.J.M., and T.M.M.-W. analyzed data; T.G.B. and J.P.F. interpreted \nresults of experiments; T.G.B. prepared figures; T.G.B. and J.P.F. \ndrafted manuscript; T.G.B. and J.P.F. edited and revised manuscript; \nT.G.B., G.J.M., R.M., E.J.M., T.M.M.-W., and J.P.F. approved final ver- \nsion of manuscript. \n\nREFERENCES \n\n1. \n\nCrowther NB. Weightlifting in antiquity: achievement and training. \nGreece Rome 24: 111–120, 1977. doi:10.1017/s0017383500018416. \n2. Dixon E. How Wave.tv is making the World’s Strongest Man think \nbigger with its digital plans (Online). SportsPro, 2020.https://www. \nsportspromedia.com/insights/analysis/worlds-strongest-man-wavetv- \nthe-pump-snapchat-brian-verne-interview/ [Apr 6, 2024]. \nSuchomel TJ, Nimphius S, Stone MH. The importance of muscular \nstrength in athletic performance. Sports Med 46: 1419–1449, 2016. \ndoi:10.1007/s40279-016-0486-0. \n\n3. \n\n4. Opar DA, Williams MD, Timmins RG, Hickey J, Duhig SJ, Shield AJ. \nEccentric hamstring strength and hamstring injury risk in Australian \nfootballers. Med Sci Sports Exerc 47: 857–865, 2015. doi:10.1249/ \nmss.0000000000000465.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "**B**\nWSM WSM \n\nSub-elite weightlifters (*n*=10) (20) Collegiate soccer players (*n*=23) (26) \n\nCompetitive weightlifters (*n*=4) (21) Collegiate baseball players (*n*=28) (26) \n\nCompetitive powerlifters (*n*=14) (22) International rugby union forwards (*n*=15) (27) \n\nCompetitive weighlifters (*n*=31) (19) Special Forces Selection Candidates (*n*=59) (28) \n\nInternational level weightlifters (*n*=9) (23) International Rugby union backs (*n*=14) (27) \n\nExperienced weightlifters (*n*=5) (18) Collegiate weightlifters (*n*=8) (29) \n\nCollege athletes*(*n*=11) (24) Collegiate rugby union athletes (*n*=15) (30) \n\nStrength-trained population*(*n*=13) (25) Resistance-trained population (*n*=8) (31) \n\n0 2000 4000 6000 8000 10000 \n**Gross IMTP peak force (N)**\n\n**D**\nWSM \n\nInternational gymnasts (*n*=5) (37) \n\nCollegiate athletes*(*n*=69) (36) \n\nVarsity rugby union players (*n*=18) (34) \n\nProfessional basketballers (*n*=13) (32) \n\nUntrained controls (*n*=39) (14) \n\nProfessional Australian rules footballers (*n*=14) (35) \n\nProfessional basketballers (*n*=10) (33) \n\nPhysically active college students (*n*=25) (38) \n\n**C**\nWSM \n\nProfessional basketballers (*n*=13) (32) \n\nProfessional basketballers (*n*=10) (33) \n\nVarsity rugby union players (*n*=18) (34) \n\nProfessional Australian rules footballers (*n*=14) (35) \n\nCollegiate athletes*(*n*=69) (36) \n\nInternational gymnasts (*n*=5) (37) \n\nPhysically active college students (*n*=25) (38) \n\nUntrained controls (*n*=39) (14) \n\n0 0 2000 4000 6000 8000 1000012000 \n**CMJ peak power (W)**\n\nFigure 2. Gross (including body weight) isometric midthigh pull (IMTP) peak force (A), net (above body weight) IMTP peak force (B), countermovement \njump (CMJ) peak power (C), and CMJ height (D) of a World’s Strongest Man and deadlift champion (WSM) displayed against comparative data from the \nexisting research literature. CMJ was performed with an arm swing by WSM and within all comparative data included in the figure. (cid:8)Athletes from differ- \nent sports or disciplines featured within the sample. Descriptive information (age, height, and body mass) of the groups included as comparative data \ncan be found in Supplemental Materials 1 (IMTP) and 2 (CMJ). \n\n(26–31); CMJ performed with an arm swing on a force plat- \nform (32–38)]. Where the numerical values (means and SD) \nfrom previously published studies were not reported, they \nwere extracted using online software (WebPlotDigitizer, ver- \nsion 4.6, https://automeris.io/WebPlotDigitizer). For IMTP \npeak force in cases where it was not clearly stated that body \nweight was subtracted from gross IMTP peak force, measures \nwere assumed to be gross IMTP peak force. Muscle and ten- \ndon morphology figures display means ± SD as well as indi- \nvidual participant data for comparative populations, as these \nvalues are from published research from our laboratory. IMTP \npeak force and CMJ outcome figures display only means ± SD \nvalues for comparative populations, as we relied on published \nvalues from the literature where individual participant values \nwere not typically available. \n\nthe load cells across the two platforms) was displayed in \nfront of the participant during the IMTP efforts, and a hori- \nzontal marker was placed on the highest force obtained after \nthe first maximum effort. In the offline analysis, the force \nsignals were low pass filtered (10 Hz using a fourth-order \nzero-lag Butterworth filter) before summating the force out- \nput from the two platforms to derive overall force produced. \nThe instantaneous highest force during maximum efforts \nwas identified as the measure of gross IMTP peak force (i.e., \nincluding body weight). Force while the WSM was standing \nupright on the platform at rest (i.e., body weight) was also \nsubtracted from the peak instantaneous force to calculate \nnet IMTP peak force. \n\nAnalysis and Comparative Data", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed12.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed12.pdf", - "query": "What are the nutritionnal added components to the word's strongest man regime ?", - "target_page": 2, - "target_passage": "The WSM’s nutritional supplement consumption included protein, branched-chain amino acids, and electrolytes", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Although the current investigation provides a detailed \nassessment of an individual at/toward the upper limit of \nhuman strength performance, it is important to appreciate \nstudy limitations. First, the participant was not measured im- \nmediately before their World’s Strongest Man championship \nsuccess or other landmark performances, and it is entirely pos- \nsible the functional and structural characteristics we assessed \nmay have been even higher directly prior to peak performan- \nces. Despite using a wide-bore MRI scanner, due to the size of \nthe WSM’s shoulders and arms, it was not possible to scan their \nupper body. Thus, we were not able to investigate this aspect of \nthe WSM’s muscle morphology; although given that greater hy- \npertrophy occurs in the upper body compared with the lower \nbody (42), it is possible that the WSM’s upper-body muscle size \nrelative to untrained controls may have been even more pro- \nnounced than what we have documented for the lower body. \nIn the current study to provide the most representative data on \nuntrained control participants, the largest available untrained \ncontrol populations were used for each category of measure- \nments. Thus, different untrained control populations were \nused [e.g., comparison of quadricep and hamstring size (n ¼ \n102) vs. comparison of all the leg muscles (n ¼ 11)], which led to \nsome subtle discrepancies in the contrasts between these \ngroups and the WSM [e.g., quadriceps femoris/knee extensors, \nþ 127% and þ 99% relative to our large pooled (n ¼ 102) and \nsmaller (n ¼ 11) untrained control samples, respectively]. \nImportantly, however, this discrepancy does not appear to \nmeaningfully affect the interpretation of the findings. There \nwere subtle differences in the precise scanning and analysis \napproaches used with the reference populations featured in \nthis study, including 1) magnetic field strength [1.5 T (10, 11, 15) \nvs. 3.0 T, WSM and (13, 14)]; 2) the interslice distance used to \nquantify quadriceps femoris and hamstrings muscle volume \n[1.5 cm (10, 11, 14) vs. 2.0 cm, WSM and (13)]; 3) the calculation \nof muscle volume [area under the cubic spline ACSA-muscle \nlength curve: (10, 11, 14) vs. the equation detailed earlier: WSM \nand (13)]; and 4) the use of unilateral MRI measures derived \nfrom one limb (10, 11, 14, 15) or collapsed across two limbs \n[WSM and (13)]. However, it seems likely that these subtle dif- \nferences would have had at most a very minor effect on the \nfindings. Finally, it is also important to highlight that the differ- \nences documented between the WSM and comparative popula- \ntions for the various measures included in the current study \ncannot be assumed to be anything other than a combination of \nboth innate (genetic) and environmental (training and nutri- \ntion) factors. \n\n5. McLeod M, Breen L, Hamilton DL, Philp A. Live strong and prosper: \nthe importance of skeletal muscle strength for healthy ageing. \nBiogerontology 17: 497–510, 2016. doi:10.1007/s10522-015-9631-7. \nKraemer WJ, Caldwell LK, Post EM, DuPont WH, Martini ER, \nRatamess NA, Szivak TK, Shurley JP, Beeler MK, Volek JS, Maresh \nCM, Todd JS, Walrod BJ, Hyde PN, Fairman C, Best TM. Body com- \nposition in elite strongman competitors. J Strength Cond Res 34: \n3326–3330, 2020. doi:10.1519/jsc.0000000000003763. \nAbe T, Buckner SL, Dankel SJ, Jessee MB, Mattocks KT, Mouser \nJG, Loenneke JP. Skeletal muscle mass in human athletes: what is \nthe upper limit? Am J Hum Biol 30: e23102, 2018. doi:10.1002/ \najhb.23102. \n\n6. \n\nConclusions \n\nIn conclusion, this novel investigation documented the \nmuscle and tendon morphology and whole body strength \nand power characteristics of an exceptionally strong individ- \nual, relative to comparative athletic, trained, and untrained \n\n798 J Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "0 1000 2000 3000 4000 5000 \n\n**QF volume (cm3)**\n\nFigure 4. Quadriceps femoris (QF; A), \nvastus medialis (VM; B), vastus lateralis \n(VL; C), vastus intermedius (VI; D), and rec- \ntus femoris (RF; E) muscle volume of a \nWorld’s Strongest Man and deadlift cham- \npion (WSM) compared with long-term re- \nsistance-trained (n ¼ 16, from the work by \nMaden-Wilkinson et al. \n(10)], elite sprint \nrunners [n ¼ 5, from the work by Miller \net al. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 102, \npooled population from the works by \nMiller et al. (13) (n ¼ 11), Balshaw et al. (11) \n(n ¼ 52), and Balshaw et al. (14) (pretest \ndata n ¼ 39)]. \n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\n**D**\n\n0 200 400 600 800 1000 1200 0 200 400 600 800 1000 1200 1400 1600 \n\n**VM volume (cm3)** **VL volume (cm3)**\n\n**E**\n\nWSM \n\nLong-term resistance-trained \n\nElite sprint runners \n\nSub-elite sprint runners \n\nUntrained control \n\n0 200 400 600 800 1000 1200 1400 0 100 200 300 400 500 600 \n\n**VI volume (cm3)** **RF volume (cm3)**\n\nflexors, potentially placing a higher demand on the contract- \nile apparatus than for running and jumping tasks. \n\nConsidering individual muscles/compartments, the mus- \ncular development of the WSM was distinctly nonuniform. It \nis striking that the largest muscles relative to the untrained \ncontrol population were the three “guy ropes” (sartorius, gra- \ncilis, and semitendinosus: þ 140–202%). These three muscles \nprovide stability to the pelvis and femur by having origins at \ndiverse points around the pelvis while sharing a common \ninsertion onto the anteromedial tibia [via pes anserinus, the \nconjoined tendons of these three muscles (39)]. Large guy \nrope muscles likely enhance stabilization of the femur and \npelvis and would be expected to be critical during heavy \nweight-bearing tasks. In contrast, the WSM’s five smallest \nmuscles (relative to untrained controls) consisted of two hip \nflexors (iliopsoas and RF) and two monoarticular knee flexors; \nactions that appear far less important for lifting, carrying, and \npulling tasks. \n\nAlthough it was anticipated that the WSM would possess a \nlarger total lower-body muscle volume/mass than untrained \ncontrols and other athletic/trained groups we have previ- \nously measured, the magnitude and pattern of the differen- \nces were unknown. The results indicated that the total \nvolume of the measured muscles was almost twice that of av- \nerage untrained participants and 32–63% larger than subelite \nand elite sprinters. Pronounced development of the anti- \ngravity muscles (i.e., hip extensors, knee extensors, and plan- \ntar flexors) was perhaps not that surprising given the WSM’s \nbackground in heavy lifting events (including being a double \ndeadlift world champion and record holder). However, the \nhip flexors appear less important in these tasks, possibly \nexplaining their more modest size, which was inferior to that \nof three elite 100-m sprinters we have previously assessed. \nThe WSM’s plantar flexors were particularly large relative to \nuntrained controls ( þ 120%). This could be due to the plan- \ntar flexors being the smallest of the antigravity muscle \ngroups that may experience very high mechanical stress \nand, thus, a pronounced adaptive stimulus during heavy lift- \ning, carrying, and pulling tasks. Furthermore, the very heavy \nand, therefore, low-velocity nature of these tasks may limit \nthe contribution of the stretch-shortening cycle and tendon \nrecoil to the positive/concentric work done by the plantar \n\nThe WSM’s quadriceps volume and patellar \n\ntendon \nmoment arm were both greater than that of untrained con- \ntrols and indeed any individual we have previously measured. \nHowever, \nrelative to the \nuntrained controls, was noticeably larger for quadriceps femo- \nris volume (greater than or equal to twice as large) than for \n\nthe magnitude of difference,", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed12.pdf" - }, - { - "text": "supplement consumption included protein, branched-chain \namino acids, and electrolytes. \n\npredictions of skeletal muscle mass nor dual-energy X-ray \nabsorptiometry provides detailed information on the size of \nspecific individual muscles. Given the known importance of \nmuscle size as a determinant of muscular strength (9–11), pro- \nnounced muscle size seems likely to be critical to extreme \nthe specific muscle size of \nhuman strength; however, \nextremely strong individuals remains unknown. Similarly, a \nlarge moment arm (e.g., of the patella tendon at the knee joint) \ncould contribute to the expression of high muscular strength \n(10, 12), and a large tendon may mitigate the mechanical stress \nit experiences with very high muscular loads, and therefore, \nthese characteristics may also be expected in individuals \nselected for exceptional strength. \n\nOverview \n\nThe WSM reported for a single test session that involved \nthe following assessments (listed in order): axial T1 weighted \n3.0-T MRI scans from T12 to the lateral malleolus [to assess \nmuscle size throughout the lower body (left and right sides)], \naxial and sagittal T1-weighted MRI scans of both knees [to \nassess patellar tendon cross-sectional area (CSA) and patellar \ntendon moment arm], maximum countermovement jumps \n(CMJ), and maximum isometric midthigh pulls (IMTPs). The \nmuscle size, patellar tendon CSA, and patellar tendon \nmoment arm of the WSM were compared with various popu- \nlations measured within our laboratory, as indicated in \nTable 1, alongside participant descriptives (10, 11, 13–15). In \naddition, the IMTP and CMJ measures were compared with \nexisting published literature (included studies are summar- \nized in Supplemental Materials 1 and 2, alongside participant \ndescriptives). \n\nIn this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "isometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited. \n\nTo date, there is little scientific information on the charac- \nteristics of extremely strong humans in terms of laboratory- \nbased tests of strength and power, particularly the size and dis- \ntribution of their muscle mass, as well as tendon size and joint \nmechanics (moment arm). Kraemer et al. (6) examined the \nbody composition of elite strongman competitors using dual- \nenergy X-ray absorptiometry scanning and found that they \nhad a body mass (153 ± 19 kg) and lean mass (118 ± 12 kg) \napproximately twice that of an average untrained healthy \nyoung man. Whole body skeletal muscle mass of athletes from \nstrength- and power-based sports has also been estimated \nusing ultrasound measurements at a limited number of ana- \ntomical locations (7, 8). However, neither ultrasound-derived Feats of strength have fascinated man since the early stages \nof human civilization, as shown by the archeological evidence \nof inscribed heavy stones at Olympia and Thera in Greece, \ndated to the 6th century BC, detailing the way they were lifted \nby Bybon and Eumastus, respectively (1). Over the centuries, \nmany types of strength competitions have existed; some of \nwhich have been codified and endured within modern sport- \ning competitions (e.g., weightlifting, powerlifting, and shot \nput). In addition, professional strongman competitions, such \nas the annually contested “World’s Strongest Man” event, \ngenerate extensive global interest (2). Moreover, scientific \nunderstanding of muscular strength is important because of \nits role in athletic performance (3), injury prevention (4), and \n\nCorrespondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk). \nSubmitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024 \n\n8750-7587/24 Copyright © 2024 The Authors. Licensed under Creative Commons Attribution CC-BY 4.0. \nPublished by the American Physiological Society. \nwww.jappl.org", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed12.pdf" - }, - { - "text": "RESEARCH ARTICLE \n\nMuscle and tendon morphology of a world strongman and deadlift champion \n\nThomas G. Balshaw,1 Garry J. Massey,1,2 \nThomas M. Maden-Wilkinson,6 and \n\nRobert Miller,1,3,4 Emmet J. McDermott,1,5 \n\nJonathan P. Folland1 \n\n1School of Sport, Exercise, and Health Sciences, Loughborough University, Loughborough, United Kingdom; 2College of Life \nand Environmental Sciences, University of Exeter, Exeter, United Kingdom; 3UK Athletics, Loughborough University, \nLoughborough, United Kingdom; 4Department of Sport Science, Aspire Academy, Doha, Qatar; 5Department of Physical \nEducation and Sport Sciences, University of Limerick, Limerick, Ireland; and 6Academy of Sport and Physical Activity, Faculty \nof Health and Wellbeing, Sheffield Hallam University, Sheffield, United Kingdom \n\nAbstract \n\nThis study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. \n\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed12.pdf" - }, - { - "text": "All muscles \n\nPlantar flexors \nKnee flexors \nHip extensors \nKnee extensors \nHip flexors \nIsometric Midthigh Pull and Countermovement Jump \n\nGross (including body weight) and net (above body \nweight) IMTP peak forces of the WSM were 9,171 N and 7,480 \nN, respectively. The WSM’s gross IMTP peak force was 54% \ngreater than the highest comparable group mean we located \n(subelite weightlifters: 5,942 ± 844 N (20); Fig. 2A). The \nWSM’s net IMTP peak force was 100% greater than the high- \nest comparable group mean value in the literature (collegiate \nsoccer athletes: 3,740 ± 692 N (26); Fig. 2B). \n\nSartorius \nSemitendinosus \nGracilis \nSoleus \nVastus medialis \nAdductor Magnus \nGluteus maximus \nBiceps femoris long head \nMedial gastrocnemius \nVastus lateralis \nGluteus medius and minimus \nLateral gastrocnemius \nVastus intermedius \nTensor fasciae latae \nLateral compartment \nAnterior compartment \nSemimembranosus \nRectus femoris \nPopliteus \nIliopsoas \nPosterior compartment \nBiceps femoris short head \n\nThe WSM’s CMJ peak power and jump height were 9,866 W \nand 53.3 cm, respectively. The peak CMJ power of the WSM \nwas >2.5-fold (164%) that of the mean of an untrained control \ngroup previously measured in our laboratory (3,735 ± 760 W; \nunpublished) and 51% greater than the highest comparable \ngroup mean value we located in the literature (professional \nbasketball players: 6,518 ± 923 W (32); Fig. 2C). Not surpris- \ningly, given the WSM’s high body mass, his jump height was \nless exceptional, while still being 20% greater than that of a \ngroup of untrained control participants previously measured \nin our laboratory (44.3 ± 9.2 cm; unpublished). However, his \njump height was 25% lower than the highest group mean CMJ \nheight we are aware of in the published literature (elite inter- \nnational gymnasts: 71.3 ± 4.5 cm (37); Fig. 2D). \n\nLeg Muscle Volumes \n\n+201.9% \n+157.1% \n+139.8% \n+134.6% \n+128.6% \n+113.8% \n+112.7% \n+105.4% \n+105.2% \n+103.0% \n+101.0% \n+98.8% \n+96.5% \n+94.1% \n+65.6% \n+52.9% \n+49.8% \n+49.6% \n+42.2% \n+32.4% \n+24.6% \n+23.1% \n\n0 250 \n\n**Difference in muscle volume (%)**\n\nFigure 3. Percentage differences in muscle volumes of all muscles, 5 func- \ntional muscle groups, and 23 individual muscles/compartments between \nthe World’s Strongest Man and deadlift champion (WSM; n ¼ 1) and \nuntrained control participants (n ¼ 11) from the work by Miller et al. (13). A \npositive value indicates greater muscle volume of WSM relative to the \ngroup mean of the untrained controls. The functional muscle groups and \nindividual muscles are ordered according to the magnitude of the percent- \nage differences for absolute muscle volume. \n\nThe total unilateral muscle volume of the 22 measured \nmuscles/compartments of WSM (14,922 cm3) was nearly \ntwice that of a relatively modest (n ¼ 11) sample of untrained \ncontrols (7,628 ± 1,548 cm3; þ 96%; Fig. 3), while being 63% \ngreater than subelite (9,164 ± 1,207 cm3) and þ 32% greater \nthan elite 100-m sprinters (11,323 ± 1,328 cm3; Table 2). The \nmuscle group differences were largest for the plantar flexors \n( þ 120% vs. untrained; þ 100% vs. subelite sprinters; þ 70% \nvs. elite sprinters) and smallest for the hip flexors ( þ 65% vs. \nuntrained; þ 30% vs. subelite sprinters; þ 5% vs. elite \nsprinters). The WSM had the highest values of any individ- \nual we have observed for four out of five muscle groups, but \nnot the hip flexors, which were inferior to three of the elite \n100-m sprinters (n ¼ 5).", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed12.pdf" - }, - { - "text": "**B**\nWSM WSM \n\nSub-elite weightlifters (*n*=10) (20) Collegiate soccer players (*n*=23) (26) \n\nCompetitive weightlifters (*n*=4) (21) Collegiate baseball players (*n*=28) (26) \n\nCompetitive powerlifters (*n*=14) (22) International rugby union forwards (*n*=15) (27) \n\nCompetitive weighlifters (*n*=31) (19) Special Forces Selection Candidates (*n*=59) (28) \n\nInternational level weightlifters (*n*=9) (23) International Rugby union backs (*n*=14) (27) \n\nExperienced weightlifters (*n*=5) (18) Collegiate weightlifters (*n*=8) (29) \n\nCollege athletes*(*n*=11) (24) Collegiate rugby union athletes (*n*=15) (30) \n\nStrength-trained population*(*n*=13) (25) Resistance-trained population (*n*=8) (31) \n\n0 2000 4000 6000 8000 10000 \n**Gross IMTP peak force (N)**\n\n**D**\nWSM \n\nInternational gymnasts (*n*=5) (37) \n\nCollegiate athletes*(*n*=69) (36) \n\nVarsity rugby union players (*n*=18) (34) \n\nProfessional basketballers (*n*=13) (32) \n\nUntrained controls (*n*=39) (14) \n\nProfessional Australian rules footballers (*n*=14) (35) \n\nProfessional basketballers (*n*=10) (33) \n\nPhysically active college students (*n*=25) (38) \n\n**C**\nWSM \n\nProfessional basketballers (*n*=13) (32) \n\nProfessional basketballers (*n*=10) (33) \n\nVarsity rugby union players (*n*=18) (34) \n\nProfessional Australian rules footballers (*n*=14) (35) \n\nCollegiate athletes*(*n*=69) (36) \n\nInternational gymnasts (*n*=5) (37) \n\nPhysically active college students (*n*=25) (38) \n\nUntrained controls (*n*=39) (14) \n\n0 0 2000 4000 6000 8000 1000012000 \n**CMJ peak power (W)**\n\nFigure 2. Gross (including body weight) isometric midthigh pull (IMTP) peak force (A), net (above body weight) IMTP peak force (B), countermovement \njump (CMJ) peak power (C), and CMJ height (D) of a World’s Strongest Man and deadlift champion (WSM) displayed against comparative data from the \nexisting research literature. CMJ was performed with an arm swing by WSM and within all comparative data included in the figure. (cid:8)Athletes from differ- \nent sports or disciplines featured within the sample. Descriptive information (age, height, and body mass) of the groups included as comparative data \ncan be found in Supplemental Materials 1 (IMTP) and 2 (CMJ). \n\n(26–31); CMJ performed with an arm swing on a force plat- \nform (32–38)]. Where the numerical values (means and SD) \nfrom previously published studies were not reported, they \nwere extracted using online software (WebPlotDigitizer, ver- \nsion 4.6, https://automeris.io/WebPlotDigitizer). For IMTP \npeak force in cases where it was not clearly stated that body \nweight was subtracted from gross IMTP peak force, measures \nwere assumed to be gross IMTP peak force. Muscle and ten- \ndon morphology figures display means ± SD as well as indi- \nvidual participant data for comparative populations, as these \nvalues are from published research from our laboratory. IMTP \npeak force and CMJ outcome figures display only means ± SD \nvalues for comparative populations, as we relied on published \nvalues from the literature where individual participant values \nwere not typically available. \n\nthe load cells across the two platforms) was displayed in \nfront of the participant during the IMTP efforts, and a hori- \nzontal marker was placed on the highest force obtained after \nthe first maximum effort. In the offline analysis, the force \nsignals were low pass filtered (10 Hz using a fourth-order \nzero-lag Butterworth filter) before summating the force out- \nput from the two platforms to derive overall force produced. \nThe instantaneous highest force during maximum efforts \nwas identified as the measure of gross IMTP peak force (i.e., \nincluding body weight). Force while the WSM was standing \nupright on the platform at rest (i.e., body weight) was also \nsubtracted from the peak instantaneous force to calculate \nnet IMTP peak force. \n\nAnalysis and Comparative Data", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed12.pdf" - }, - { - "text": "changes in response to functional overload/resistance \ntraining. For example, we previously found patellar ten- \ndon CSA to show very subtle changes after 15 wk (45 train- \ning sessions) of heavy resistance training [ þ 1.4% (41)] and \nno differences between long-term resistance-trained indi- \nviduals and untrained controls (15). \n\npopulations. Overall leg muscle volume of the WSM was \napproximately twice that of untrained controls but with pro- \nnounced anatomical variability in the extent of muscular de- \nvelopment. The plantar flexor muscle group and the guy \nrope muscles (sartorius, gracilis, and semitendinosus: þ 140 \nto þ 202%), which stabilize the pelvis and femur, demon- \nstrated the largest differences. The pronounced quadriceps \nfemoris size of the WSM (greater than or equal to twice that \nof untrained) was accompanied by a more modest difference \nin patella tendon moment arm ( þ 18%) and was not matched \nby a proportional difference in tendon size ( þ 30%). \n\nLimitations \n\nDATA AVAILABILITY \n\nData will be made available upon reasonable request. \n\nSUPPLEMENTAL MATERIAL \n\nSupplemental Material: https://doi.org/10.6084/m9.figshare. \n26152939. \n\nACKNOWLEDGMENTS \n\nThe authors thank radiographer Julie Thompson. \n\nDISCLOSURES \nNo conflicts of interest, financial or otherwise, are declared by \nthe authors. \n\nAUTHOR CONTRIBUTIONS \n\nT.G.B. and J.P.F. conceived and designed research; T.G.B., G.J.M., \nR.M., E.J.M., and J.P.F. performed experiments; T.G.B., G.J.M., R.M., \nE.J.M., and T.M.M.-W. analyzed data; T.G.B. and J.P.F. interpreted \nresults of experiments; T.G.B. prepared figures; T.G.B. and J.P.F. \ndrafted manuscript; T.G.B. and J.P.F. edited and revised manuscript; \nT.G.B., G.J.M., R.M., E.J.M., T.M.M.-W., and J.P.F. approved final ver- \nsion of manuscript. \n\nREFERENCES \n\n1. \n\nCrowther NB. Weightlifting in antiquity: achievement and training. \nGreece Rome 24: 111–120, 1977. doi:10.1017/s0017383500018416. \n2. Dixon E. How Wave.tv is making the World’s Strongest Man think \nbigger with its digital plans (Online). SportsPro, 2020.https://www. \nsportspromedia.com/insights/analysis/worlds-strongest-man-wavetv- \nthe-pump-snapchat-brian-verne-interview/ [Apr 6, 2024]. \nSuchomel TJ, Nimphius S, Stone MH. The importance of muscular \nstrength in athletic performance. Sports Med 46: 1419–1449, 2016. \ndoi:10.1007/s40279-016-0486-0. \n\n3. \n\n4. Opar DA, Williams MD, Timmins RG, Hickey J, Duhig SJ, Shield AJ. \nEccentric hamstring strength and hamstring injury risk in Australian \nfootballers. Med Sci Sports Exerc 47: 857–865, 2015. doi:10.1249/ \nmss.0000000000000465.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "0 300 \n600 \n900 \n1200 \n**HAMS volume (cm3)**\n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\nElite sprint runners \n\nSub-elite sprint runners \n\nUntrained control \n\n0 100 200 300 400 500 600 \n\n**SM volume (cm3)**\n\n1500 1800 \n\nFigure 5. Overall hamstrings (HAMS; A), \nsemimembranosus (SM; B), semitendino- \nsus (ST; C), biceps femoris long head \n(BFlh; D), and biceps femoris short head \n(BFsh; E) muscle volume of a World’s \nStrongest Man and deadlift champion \n(WSM) compared with long-term resist- \nance trained [n ¼ 16, from the work by \n(10)], elite sprint \nMaden-Wilkinson et al. \nrunners [n ¼ 5, from the work by Miller et \nal. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 50, \npooled population from the works by \nMiller et al. (13) (n ¼ 11) and Balshaw et al. \n(14) (pretest data n ¼ 39)]. \n\n0 100 200 300 400 500 600 \n\n**ST volume (cm3)**\n\n**D** **E**\n\nWSM \n\nLong-term resistance-trained \n\npatellar tendon moment arm ( þ 18%). Therefore, of these two \nkey strength determinants, muscle size, rather than joint lever- \nage, appeared to be the predominant factor responsible for the \nWSM’s extraordinary strength. Indeed, when we previously \ncompared the muscle morphology and joint mechanics of indi- \nviduals with distinct maximum strength capacity (long-term \nresistance-trained individuals vs. untrained controls), muscle \nsize was the primary factor separating the groups with much \nmore subtle differences in moment arm (10). The extreme \nexample of muscle size provided by the WSM’s quadriceps femoris also gave the opportunity to investigate the scaling of \ntendon size to muscle size; extreme muscular size (greater \nthan or equal to twice that for untrained controls) might be \nexpected to be accompanied by comparable tendinous tissue \nsize to effectively transmit high muscular forces to the skele- \nton. However, the WSM’s patellar tendon CSA was only 30% \nlarger than untrained controls and within the range of indi- \nviduals we have previously measured (Fig. 6A). This obser- \nvation supports the notion that tendon structure may be \nlargely fixed by adulthood (40), with only slow/limited \n\n**A** **B**\n\nFigure 6. Patellar tendon mean cross-sec- \ntional area (A) and patellar tendon moment \narm (B) of a World’s Strongest Man and \ndeadlift champion (WSM) compared with \nlong-term resistance trained [n ¼ 16, from \nthe work by Massey et al. (15)] and untrained \ncontrol populations [n ¼ 39, from the work \nby Massey et al. (15)]. \n\nWSM \n\nUntrained control \n\n30 35 40 45 50 55 \n60 \n**Patellar tendon cross-sectional area (mm2)**\n160 \n**Patellar tendon moment arm (mm)**", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed12.pdf" - }, - { - "text": "Figure 1. Example axial MRI images from \nthe World’s Strongest Man and deadlift \nchampion (WSM; A–C) and an untrained \nfrom the hip \ncontrol participant \n(A and D), thigh (B and E), and lower leg (C \nand F). Image location relative to femur \nand shank length was matched between \nthe WSM and the untrained control as fol- \nlows: hip image is at approximately midfe- \nmoral head, thigh image is at (cid:6)52% of \nfemur length (0% is distal end of femur, \n100% is greater trochanter), and lower leg \nimage is at (cid:6)70% of shank length (0% is \nlateral malleolus, 100% is proximal end of \ntibia). The untrained control participant \ndisplayed was from the work by Miller et al. \n(13) and had a total measured muscle vol- \nume of all measured muscles that was 5.1% \nsmaller than the mean of the untrained \ngroup within that study. \n\n(D–F) \n\nadjustment to different heights. A bar height producing a \nknee joint angle of 145(cid:7) (measured by a manual goniometer) \nwas selected, and the participant was instructed to keep his \ntorso upright while completing the IMTP efforts. Two cali- \nbrated 10-kN-capacity force platforms (model 9286B, Kistler \nInstruments, Ltd., London, UK), one underneath each foot, \nwere placed on top of the isometric rig’s base plate, and verti- \ncal force signals from the eight individual load cells across the \ntwo force platforms were outputted (External Control Unit \nmodel 5233 A, Kistler Instruments, Ltd.) and sampled at 2,000 \nHz using an external analog-to-digital converter (Micro 1401; \n\nCED, Cambridge, UK) and recorded with Spike 2 computer \nsoftware (CED, Cambridge, UK). \n\nFollowing a warm-up consisting of a series of incremental \nwarm-up contractions of (cid:6)5 s duration ranging from 50% to \n90% of maximum perceived effort, two maximum IMTP \nefforts of 3–5 s duration were performed under the instruc- \ntion to “pull as hard as possible.” Six minutes separated the \nmaximum efforts, based on a self-selected recovery period. \nWrist wraps were worn to remove the influence of grip \nstrength from the assessment. Real-time overall feedback \nfrom the force platforms (the sum of the force signals from", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed12.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed12.pdf", - "query": "Why constraint made the scanning of the word's strongest man's upper body impossible using a MRI ?", - "target_page": 10, - "target_passage": "Despite using a wide-bore MRI scanner, due to the size of the WSM’s shoulders and arms, it was not possible to scan their upper body", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Although the current investigation provides a detailed \nassessment of an individual at/toward the upper limit of \nhuman strength performance, it is important to appreciate \nstudy limitations. First, the participant was not measured im- \nmediately before their World’s Strongest Man championship \nsuccess or other landmark performances, and it is entirely pos- \nsible the functional and structural characteristics we assessed \nmay have been even higher directly prior to peak performan- \nces. Despite using a wide-bore MRI scanner, due to the size of \nthe WSM’s shoulders and arms, it was not possible to scan their \nupper body. Thus, we were not able to investigate this aspect of \nthe WSM’s muscle morphology; although given that greater hy- \npertrophy occurs in the upper body compared with the lower \nbody (42), it is possible that the WSM’s upper-body muscle size \nrelative to untrained controls may have been even more pro- \nnounced than what we have documented for the lower body. \nIn the current study to provide the most representative data on \nuntrained control participants, the largest available untrained \ncontrol populations were used for each category of measure- \nments. Thus, different untrained control populations were \nused [e.g., comparison of quadricep and hamstring size (n ¼ \n102) vs. comparison of all the leg muscles (n ¼ 11)], which led to \nsome subtle discrepancies in the contrasts between these \ngroups and the WSM [e.g., quadriceps femoris/knee extensors, \nþ 127% and þ 99% relative to our large pooled (n ¼ 102) and \nsmaller (n ¼ 11) untrained control samples, respectively]. \nImportantly, however, this discrepancy does not appear to \nmeaningfully affect the interpretation of the findings. There \nwere subtle differences in the precise scanning and analysis \napproaches used with the reference populations featured in \nthis study, including 1) magnetic field strength [1.5 T (10, 11, 15) \nvs. 3.0 T, WSM and (13, 14)]; 2) the interslice distance used to \nquantify quadriceps femoris and hamstrings muscle volume \n[1.5 cm (10, 11, 14) vs. 2.0 cm, WSM and (13)]; 3) the calculation \nof muscle volume [area under the cubic spline ACSA-muscle \nlength curve: (10, 11, 14) vs. the equation detailed earlier: WSM \nand (13)]; and 4) the use of unilateral MRI measures derived \nfrom one limb (10, 11, 14, 15) or collapsed across two limbs \n[WSM and (13)]. However, it seems likely that these subtle dif- \nferences would have had at most a very minor effect on the \nfindings. Finally, it is also important to highlight that the differ- \nences documented between the WSM and comparative popula- \ntions for the various measures included in the current study \ncannot be assumed to be anything other than a combination of \nboth innate (genetic) and environmental (training and nutri- \ntion) factors. \n\n5. McLeod M, Breen L, Hamilton DL, Philp A. Live strong and prosper: \nthe importance of skeletal muscle strength for healthy ageing. \nBiogerontology 17: 497–510, 2016. doi:10.1007/s10522-015-9631-7. \nKraemer WJ, Caldwell LK, Post EM, DuPont WH, Martini ER, \nRatamess NA, Szivak TK, Shurley JP, Beeler MK, Volek JS, Maresh \nCM, Todd JS, Walrod BJ, Hyde PN, Fairman C, Best TM. Body com- \nposition in elite strongman competitors. J Strength Cond Res 34: \n3326–3330, 2020. doi:10.1519/jsc.0000000000003763. \nAbe T, Buckner SL, Dankel SJ, Jessee MB, Mattocks KT, Mouser \nJG, Loenneke JP. Skeletal muscle mass in human athletes: what is \nthe upper limit? Am J Hum Biol 30: e23102, 2018. doi:10.1002/ \najhb.23102. \n\n6. \n\nConclusions \n\nIn conclusion, this novel investigation documented the \nmuscle and tendon morphology and whole body strength \nand power characteristics of an exceptionally strong individ- \nual, relative to comparative athletic, trained, and untrained \n\n798 J Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "The participant reported for their MRI scan [3.0-T \nDiscovery MR750W (70-cm-wide bore), GE Medical] having \nnot completed any strenuous physical activity in (cid:2)24 h and \nhad received prior instruction to arrive in a relaxed state hav- \ning eaten and drunk normally. The participant sat quietly for \n15 min prior to their scan. The participant lay supine for the \nMRI scan of the lower-body musculature from T12 to the lat- \neral malleolus. A body coil (GE Medical) allowed axial T1- \nweighted images (time of repetition/time to echo 600/8.144 \nms, image matrix 512 (cid:3) 512, field of view 500 (cid:3) 500 mm, \npixel size 0.9766 (cid:3) 0.9766 mm, slice thickness 5 mm, and \ninterslice gap 5 mm) to be acquired in five overlapping \nblocks. Images of both sides of the body were acquired \nwithin a single scan for blocks 1 (T12 to pelvis), 4 (knee joint \nspace to midshank), and 5 (midshank to lateral malleolus). \nHowever, due to the size of the participant’s thighs, it was \nnecessary to scan each thigh individually for blocks 2 (pelvis \nto midthigh) and 3 (midthigh to knee joint space); this \ninvolved the radiographer repositioning the field of view \nbetween scanning the first and the second thigh but not \nphysically moving the coil or the participant. Oil-filled cap- \nsules were secured to the surface of the participant’s skin \nwith Transpore tape at intervals along the length of the lower \nbody prior to the scan and in an offline analysis used to ver- \nify the alignment of the blocks (Horos software, Version 3.36, \nhttps://horosproject.org/). \n\nTraining History \n\nThe WSM had been continuously involved in systematic, \nregular upper- and lower-body resistance training for 15 yr at \nthe time of testing. In the 12 mo prior to testing, the partici- \npant’s resistance training consisted of the following typical \nexercises: lower body: squats, deadlifts, leg press, and knee \nextension; and upper body: bench press, shoulder press, \ndumbbell/barbell rows, and lat pull-down. The proportion of \nthe participant’s training within the following repetition \nranges over the last 12 mo was as follows: near maximum \nloads [1–5 repetition maximum (RM)]: 10%; heavy loads (6– \n14 RM): 80%; and moderate loads ((cid:2)15 RM): 10%. The partici- \npant reported only occasional (<1(cid:3)/week) use of advanced \nresistance training practices (i.e., complex training and ac- \nfrequently (>3(cid:3)/ \ncommodating resistance method) but \nweek) executed training repetitions with the intention to \nmove the load as fast as possible. The WSM’s nutritional \n\n790 \n\nThe offline analysis was of the following muscles/com- \npartments (Fig. 1): iliopsoas (psoas major and iliacus com- \nbined); sartorius; tensor fasciae latae; adductor magnus; \ngracilis; gluteus maximus; gluteus medius and minimus \n(combined, due to difficulty separating the two muscles); \nrectus femoris (RF); vastus lateralis (VL), medialis (VM), and \nintermedius (VI); semimembranosus (SM); semitendinosus \n(ST); biceps femoris long (BFlh) and short heads (BFsh); pop- \nliteus; lateral and medial gastrocnemius; soleus; and the an- \nlateral, and deep posterior compartments of the \nterior, \nshank. The anterior shank compartment consisted of the \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "Figure 1. Example axial MRI images from \nthe World’s Strongest Man and deadlift \nchampion (WSM; A–C) and an untrained \nfrom the hip \ncontrol participant \n(A and D), thigh (B and E), and lower leg (C \nand F). Image location relative to femur \nand shank length was matched between \nthe WSM and the untrained control as fol- \nlows: hip image is at approximately midfe- \nmoral head, thigh image is at (cid:6)52% of \nfemur length (0% is distal end of femur, \n100% is greater trochanter), and lower leg \nimage is at (cid:6)70% of shank length (0% is \nlateral malleolus, 100% is proximal end of \ntibia). The untrained control participant \ndisplayed was from the work by Miller et al. \n(13) and had a total measured muscle vol- \nume of all measured muscles that was 5.1% \nsmaller than the mean of the untrained \ngroup within that study. \n\n(D–F) \n\nadjustment to different heights. A bar height producing a \nknee joint angle of 145(cid:7) (measured by a manual goniometer) \nwas selected, and the participant was instructed to keep his \ntorso upright while completing the IMTP efforts. Two cali- \nbrated 10-kN-capacity force platforms (model 9286B, Kistler \nInstruments, Ltd., London, UK), one underneath each foot, \nwere placed on top of the isometric rig’s base plate, and verti- \ncal force signals from the eight individual load cells across the \ntwo force platforms were outputted (External Control Unit \nmodel 5233 A, Kistler Instruments, Ltd.) and sampled at 2,000 \nHz using an external analog-to-digital converter (Micro 1401; \n\nCED, Cambridge, UK) and recorded with Spike 2 computer \nsoftware (CED, Cambridge, UK). \n\nFollowing a warm-up consisting of a series of incremental \nwarm-up contractions of (cid:6)5 s duration ranging from 50% to \n90% of maximum perceived effort, two maximum IMTP \nefforts of 3–5 s duration were performed under the instruc- \ntion to “pull as hard as possible.” Six minutes separated the \nmaximum efforts, based on a self-selected recovery period. \nWrist wraps were worn to remove the influence of grip \nstrength from the assessment. Real-time overall feedback \nfrom the force platforms (the sum of the force signals from", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed12.pdf" - }, - { - "text": "isometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited. \n\nTo date, there is little scientific information on the charac- \nteristics of extremely strong humans in terms of laboratory- \nbased tests of strength and power, particularly the size and dis- \ntribution of their muscle mass, as well as tendon size and joint \nmechanics (moment arm). Kraemer et al. (6) examined the \nbody composition of elite strongman competitors using dual- \nenergy X-ray absorptiometry scanning and found that they \nhad a body mass (153 ± 19 kg) and lean mass (118 ± 12 kg) \napproximately twice that of an average untrained healthy \nyoung man. Whole body skeletal muscle mass of athletes from \nstrength- and power-based sports has also been estimated \nusing ultrasound measurements at a limited number of ana- \ntomical locations (7, 8). However, neither ultrasound-derived Feats of strength have fascinated man since the early stages \nof human civilization, as shown by the archeological evidence \nof inscribed heavy stones at Olympia and Thera in Greece, \ndated to the 6th century BC, detailing the way they were lifted \nby Bybon and Eumastus, respectively (1). Over the centuries, \nmany types of strength competitions have existed; some of \nwhich have been codified and endured within modern sport- \ning competitions (e.g., weightlifting, powerlifting, and shot \nput). In addition, professional strongman competitions, such \nas the annually contested “World’s Strongest Man” event, \ngenerate extensive global interest (2). Moreover, scientific \nunderstanding of muscular strength is important because of \nits role in athletic performance (3), injury prevention (4), and \n\nCorrespondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk). \nSubmitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024 \n\n8750-7587/24 Copyright © 2024 The Authors. Licensed under Creative Commons Attribution CC-BY 4.0. \nPublished by the American Physiological Society. \nwww.jappl.org", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed12.pdf" - }, - { - "text": "supplement consumption included protein, branched-chain \namino acids, and electrolytes. \n\npredictions of skeletal muscle mass nor dual-energy X-ray \nabsorptiometry provides detailed information on the size of \nspecific individual muscles. Given the known importance of \nmuscle size as a determinant of muscular strength (9–11), pro- \nnounced muscle size seems likely to be critical to extreme \nthe specific muscle size of \nhuman strength; however, \nextremely strong individuals remains unknown. Similarly, a \nlarge moment arm (e.g., of the patella tendon at the knee joint) \ncould contribute to the expression of high muscular strength \n(10, 12), and a large tendon may mitigate the mechanical stress \nit experiences with very high muscular loads, and therefore, \nthese characteristics may also be expected in individuals \nselected for exceptional strength. \n\nOverview \n\nThe WSM reported for a single test session that involved \nthe following assessments (listed in order): axial T1 weighted \n3.0-T MRI scans from T12 to the lateral malleolus [to assess \nmuscle size throughout the lower body (left and right sides)], \naxial and sagittal T1-weighted MRI scans of both knees [to \nassess patellar tendon cross-sectional area (CSA) and patellar \ntendon moment arm], maximum countermovement jumps \n(CMJ), and maximum isometric midthigh pulls (IMTPs). The \nmuscle size, patellar tendon CSA, and patellar tendon \nmoment arm of the WSM were compared with various popu- \nlations measured within our laboratory, as indicated in \nTable 1, alongside participant descriptives (10, 11, 13–15). In \naddition, the IMTP and CMJ measures were compared with \nexisting published literature (included studies are summar- \nized in Supplemental Materials 1 and 2, alongside participant \ndescriptives). \n\nIn this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "RESEARCH ARTICLE \n\nMuscle and tendon morphology of a world strongman and deadlift champion \n\nThomas G. Balshaw,1 Garry J. Massey,1,2 \nThomas M. Maden-Wilkinson,6 and \n\nRobert Miller,1,3,4 Emmet J. McDermott,1,5 \n\nJonathan P. Folland1 \n\n1School of Sport, Exercise, and Health Sciences, Loughborough University, Loughborough, United Kingdom; 2College of Life \nand Environmental Sciences, University of Exeter, Exeter, United Kingdom; 3UK Athletics, Loughborough University, \nLoughborough, United Kingdom; 4Department of Sport Science, Aspire Academy, Doha, Qatar; 5Department of Physical \nEducation and Sport Sciences, University of Limerick, Limerick, Ireland; and 6Academy of Sport and Physical Activity, Faculty \nof Health and Wellbeing, Sheffield Hallam University, Sheffield, United Kingdom \n\nAbstract \n\nThis study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. \n\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed12.pdf" - }, - { - "text": "0 1000 2000 3000 4000 5000 \n\n**QF volume (cm3)**\n\nFigure 4. Quadriceps femoris (QF; A), \nvastus medialis (VM; B), vastus lateralis \n(VL; C), vastus intermedius (VI; D), and rec- \ntus femoris (RF; E) muscle volume of a \nWorld’s Strongest Man and deadlift cham- \npion (WSM) compared with long-term re- \nsistance-trained (n ¼ 16, from the work by \nMaden-Wilkinson et al. \n(10)], elite sprint \nrunners [n ¼ 5, from the work by Miller \net al. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 102, \npooled population from the works by \nMiller et al. (13) (n ¼ 11), Balshaw et al. (11) \n(n ¼ 52), and Balshaw et al. (14) (pretest \ndata n ¼ 39)]. \n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\n**D**\n\n0 200 400 600 800 1000 1200 0 200 400 600 800 1000 1200 1400 1600 \n\n**VM volume (cm3)** **VL volume (cm3)**\n\n**E**\n\nWSM \n\nLong-term resistance-trained \n\nElite sprint runners \n\nSub-elite sprint runners \n\nUntrained control \n\n0 200 400 600 800 1000 1200 1400 0 100 200 300 400 500 600 \n\n**VI volume (cm3)** **RF volume (cm3)**\n\nflexors, potentially placing a higher demand on the contract- \nile apparatus than for running and jumping tasks. \n\nConsidering individual muscles/compartments, the mus- \ncular development of the WSM was distinctly nonuniform. It \nis striking that the largest muscles relative to the untrained \ncontrol population were the three “guy ropes” (sartorius, gra- \ncilis, and semitendinosus: þ 140–202%). These three muscles \nprovide stability to the pelvis and femur by having origins at \ndiverse points around the pelvis while sharing a common \ninsertion onto the anteromedial tibia [via pes anserinus, the \nconjoined tendons of these three muscles (39)]. Large guy \nrope muscles likely enhance stabilization of the femur and \npelvis and would be expected to be critical during heavy \nweight-bearing tasks. In contrast, the WSM’s five smallest \nmuscles (relative to untrained controls) consisted of two hip \nflexors (iliopsoas and RF) and two monoarticular knee flexors; \nactions that appear far less important for lifting, carrying, and \npulling tasks. \n\nAlthough it was anticipated that the WSM would possess a \nlarger total lower-body muscle volume/mass than untrained \ncontrols and other athletic/trained groups we have previ- \nously measured, the magnitude and pattern of the differen- \nces were unknown. The results indicated that the total \nvolume of the measured muscles was almost twice that of av- \nerage untrained participants and 32–63% larger than subelite \nand elite sprinters. Pronounced development of the anti- \ngravity muscles (i.e., hip extensors, knee extensors, and plan- \ntar flexors) was perhaps not that surprising given the WSM’s \nbackground in heavy lifting events (including being a double \ndeadlift world champion and record holder). However, the \nhip flexors appear less important in these tasks, possibly \nexplaining their more modest size, which was inferior to that \nof three elite 100-m sprinters we have previously assessed. \nThe WSM’s plantar flexors were particularly large relative to \nuntrained controls ( þ 120%). This could be due to the plan- \ntar flexors being the smallest of the antigravity muscle \ngroups that may experience very high mechanical stress \nand, thus, a pronounced adaptive stimulus during heavy lift- \ning, carrying, and pulling tasks. Furthermore, the very heavy \nand, therefore, low-velocity nature of these tasks may limit \nthe contribution of the stretch-shortening cycle and tendon \nrecoil to the positive/concentric work done by the plantar \n\nThe WSM’s quadriceps volume and patellar \n\ntendon \nmoment arm were both greater than that of untrained con- \ntrols and indeed any individual we have previously measured. \nHowever, \nrelative to the \nuntrained controls, was noticeably larger for quadriceps femo- \nris volume (greater than or equal to twice as large) than for \n\nthe magnitude of difference,", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed12.pdf" - }, - { - "text": "0 300 \n600 \n900 \n1200 \n**HAMS volume (cm3)**\n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\nElite sprint runners \n\nSub-elite sprint runners \n\nUntrained control \n\n0 100 200 300 400 500 600 \n\n**SM volume (cm3)**\n\n1500 1800 \n\nFigure 5. Overall hamstrings (HAMS; A), \nsemimembranosus (SM; B), semitendino- \nsus (ST; C), biceps femoris long head \n(BFlh; D), and biceps femoris short head \n(BFsh; E) muscle volume of a World’s \nStrongest Man and deadlift champion \n(WSM) compared with long-term resist- \nance trained [n ¼ 16, from the work by \n(10)], elite sprint \nMaden-Wilkinson et al. \nrunners [n ¼ 5, from the work by Miller et \nal. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 50, \npooled population from the works by \nMiller et al. (13) (n ¼ 11) and Balshaw et al. \n(14) (pretest data n ¼ 39)]. \n\n0 100 200 300 400 500 600 \n\n**ST volume (cm3)**\n\n**D** **E**\n\nWSM \n\nLong-term resistance-trained \n\npatellar tendon moment arm ( þ 18%). Therefore, of these two \nkey strength determinants, muscle size, rather than joint lever- \nage, appeared to be the predominant factor responsible for the \nWSM’s extraordinary strength. Indeed, when we previously \ncompared the muscle morphology and joint mechanics of indi- \nviduals with distinct maximum strength capacity (long-term \nresistance-trained individuals vs. untrained controls), muscle \nsize was the primary factor separating the groups with much \nmore subtle differences in moment arm (10). The extreme \nexample of muscle size provided by the WSM’s quadriceps femoris also gave the opportunity to investigate the scaling of \ntendon size to muscle size; extreme muscular size (greater \nthan or equal to twice that for untrained controls) might be \nexpected to be accompanied by comparable tendinous tissue \nsize to effectively transmit high muscular forces to the skele- \nton. However, the WSM’s patellar tendon CSA was only 30% \nlarger than untrained controls and within the range of indi- \nviduals we have previously measured (Fig. 6A). This obser- \nvation supports the notion that tendon structure may be \nlargely fixed by adulthood (40), with only slow/limited \n\n**A** **B**\n\nFigure 6. Patellar tendon mean cross-sec- \ntional area (A) and patellar tendon moment \narm (B) of a World’s Strongest Man and \ndeadlift champion (WSM) compared with \nlong-term resistance trained [n ¼ 16, from \nthe work by Massey et al. (15)] and untrained \ncontrol populations [n ¼ 39, from the work \nby Massey et al. (15)]. \n\nWSM \n\nUntrained control \n\n30 35 40 45 50 55 \n60 \n**Patellar tendon cross-sectional area (mm2)**\n160 \n**Patellar tendon moment arm (mm)**", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed12.pdf" - }, - { - "text": "Jumper, John; Evans, Richard; Pritzel, Alexander; et al. (26 August 2021). \"Highly accurate \n\nprotein structure prediction with AlphaFold\" (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC \n8371605).*Nature*.**596**(7873): 583–589. Bibcode:2021Natur.596..583J (https://ui.adsabs.ha \nrvard.edu/abs/2021Natur.596..583J). doi:10.1038/s41586-021-03819-2 (https://doi.org/10.10 \n38%2Fs41586-021-03819-2). PMC 8371605 (https://www.ncbi.nlm.nih.gov/pmc/articles/PM \nC8371605). PMID 34265844 (https://pubmed.ncbi.nlm.nih.gov/34265844). \nS2CID 235959867 (https://api.semanticscholar.org/CorpusID:235959867). \n\nLeCun, Yann; Bengio, Yoshua; Hinton, Geoffrey (28 May 2015). \"Deep learning\" (https://www.na \nture.com/articles/nature14539).*Nature*.**521**(7553): 436–444. Bibcode:2015Natur.521..436L \n(https://ui.adsabs.harvard.edu/abs/2015Natur.521..436L). doi:10.1038/nature14539 (https:// \ndoi.org/10.1038%2Fnature14539). PMID 26017442 (https://pubmed.ncbi.nlm.nih.gov/26017 \n442). S2CID 3074096 (https://api.semanticscholar.org/CorpusID:3074096). Archived (https:// \nweb.archive.org/web/20230605235832/https://www.nature.com/articles/nature14539) from \nthe original on 5 June 2023. Retrieved 19 June 2023. \n\nLeffer, Lauren, \"The Risks of Trusting AI: We must avoid humanizing machine-learning models \nused in scientific research\",*Scientific American*, vol. 330, no. 6 (June 2024), pp. 80–81. \nLepore, Jill, \"The Chit-Chatbot: Is talking with a machine a conversation?\",*The New Yorker*, 7 \n\nOctober 2024, pp. 12–16. \n\nMaschafilm (2010). \"Content: Plug & Pray Film – Artificial Intelligence – Robots\" (http://www.plu \ngandpray-film.de/en/content.html).*plugandpray-film.de*. Archived (https://web.archive.org/w \neb/20160212040134/http://www.plugandpray-film.de/en/content.html) from the original on 12 \nFebruary 2016. \n\nMarcus, Gary, \"Artificial Confidence: Even the newest, buzziest systems of artificial general \n\nintelligence are stymmied by the same old problems\",*Scientific American*, vol. 327, no. 4 \n(October 2022), pp. 42–45. \n\nMitchell, Melanie (2019).*Artificial intelligence: a guide for thinking humans*. New York: Farrar, \n\nStraus and Giroux. ISBN 978-0-3742-5783-5. \n\nMnih, Volodymyr; Kavukcuoglu, Koray; Silver, David; et al. (26 February 2015). \"Human-level \n\ncontrol through deep reinforcement learning\" (https://www.nature.com/articles/nature14236). \n*Nature*.**518**(7540): 529–533. Bibcode:2015Natur.518..529M (https://ui.adsabs.harvard.edu/ \nabs/2015Natur.518..529M). doi:10.1038/nature14236 (https://doi.org/10.1038%2Fnature142 \n36). PMID 25719670 (https://pubmed.ncbi.nlm.nih.gov/25719670). S2CID 205242740 (http \ns://api.semanticscholar.org/CorpusID:205242740). Archived (https://web.archive.org/web/20 \n230619055525/https://www.nature.com/articles/nature14236) from the original on 19 June \n2023. Retrieved 19 June 2023. Introduced DQN, which produced human-level performance \non some Atari games. \n\nPress, Eyal, \"In Front of Their Faces: Does facial-recognition technology lead police to ignore \n\ncontradictory evidence?\",*The New Yorker*, 20 November 2023, pp. 20–26. \n\n\"Robots could demand legal rights\" (http://news.bbc.co.uk/2/hi/technology/6200005.stm).*BBC*\n\n*News*. 21 December 2006. Archived (https://web.archive.org/web/20191015042628/http://ne \nws.bbc.co.uk/2/hi/technology/6200005.stm) from the original on 15 October 2019. Retrieved \n3 February 2011. \n\nRoivainen, Eka, \"AI's IQ: ChatGPT aced a [standard intelligence] test but showed that \nintelligence cannot be measured by IQ alone\",*Scientific American*, vol. 329, no. 1 \n(July/August 2023), p. 7. \"Despite its high IQ, ChatGPT fails at tasks that require real \nhumanlike reasoning or an understanding of the physical and social world.... ChatGPT \nseemed unable to reason logically and tried to rely on its vast database of... facts derived \nfrom online texts.\"", - "page_start": 68, - "page_end": 68, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**B**\nWSM WSM \n\nSub-elite weightlifters (*n*=10) (20) Collegiate soccer players (*n*=23) (26) \n\nCompetitive weightlifters (*n*=4) (21) Collegiate baseball players (*n*=28) (26) \n\nCompetitive powerlifters (*n*=14) (22) International rugby union forwards (*n*=15) (27) \n\nCompetitive weighlifters (*n*=31) (19) Special Forces Selection Candidates (*n*=59) (28) \n\nInternational level weightlifters (*n*=9) (23) International Rugby union backs (*n*=14) (27) \n\nExperienced weightlifters (*n*=5) (18) Collegiate weightlifters (*n*=8) (29) \n\nCollege athletes*(*n*=11) (24) Collegiate rugby union athletes (*n*=15) (30) \n\nStrength-trained population*(*n*=13) (25) Resistance-trained population (*n*=8) (31) \n\n0 2000 4000 6000 8000 10000 \n**Gross IMTP peak force (N)**\n\n**D**\nWSM \n\nInternational gymnasts (*n*=5) (37) \n\nCollegiate athletes*(*n*=69) (36) \n\nVarsity rugby union players (*n*=18) (34) \n\nProfessional basketballers (*n*=13) (32) \n\nUntrained controls (*n*=39) (14) \n\nProfessional Australian rules footballers (*n*=14) (35) \n\nProfessional basketballers (*n*=10) (33) \n\nPhysically active college students (*n*=25) (38) \n\n**C**\nWSM \n\nProfessional basketballers (*n*=13) (32) \n\nProfessional basketballers (*n*=10) (33) \n\nVarsity rugby union players (*n*=18) (34) \n\nProfessional Australian rules footballers (*n*=14) (35) \n\nCollegiate athletes*(*n*=69) (36) \n\nInternational gymnasts (*n*=5) (37) \n\nPhysically active college students (*n*=25) (38) \n\nUntrained controls (*n*=39) (14) \n\n0 0 2000 4000 6000 8000 1000012000 \n**CMJ peak power (W)**\n\nFigure 2. Gross (including body weight) isometric midthigh pull (IMTP) peak force (A), net (above body weight) IMTP peak force (B), countermovement \njump (CMJ) peak power (C), and CMJ height (D) of a World’s Strongest Man and deadlift champion (WSM) displayed against comparative data from the \nexisting research literature. CMJ was performed with an arm swing by WSM and within all comparative data included in the figure. (cid:8)Athletes from differ- \nent sports or disciplines featured within the sample. Descriptive information (age, height, and body mass) of the groups included as comparative data \ncan be found in Supplemental Materials 1 (IMTP) and 2 (CMJ). \n\n(26–31); CMJ performed with an arm swing on a force plat- \nform (32–38)]. Where the numerical values (means and SD) \nfrom previously published studies were not reported, they \nwere extracted using online software (WebPlotDigitizer, ver- \nsion 4.6, https://automeris.io/WebPlotDigitizer). For IMTP \npeak force in cases where it was not clearly stated that body \nweight was subtracted from gross IMTP peak force, measures \nwere assumed to be gross IMTP peak force. Muscle and ten- \ndon morphology figures display means ± SD as well as indi- \nvidual participant data for comparative populations, as these \nvalues are from published research from our laboratory. IMTP \npeak force and CMJ outcome figures display only means ± SD \nvalues for comparative populations, as we relied on published \nvalues from the literature where individual participant values \nwere not typically available. \n\nthe load cells across the two platforms) was displayed in \nfront of the participant during the IMTP efforts, and a hori- \nzontal marker was placed on the highest force obtained after \nthe first maximum effort. In the offline analysis, the force \nsignals were low pass filtered (10 Hz using a fourth-order \nzero-lag Butterworth filter) before summating the force out- \nput from the two platforms to derive overall force produced. \nThe instantaneous highest force during maximum efforts \nwas identified as the measure of gross IMTP peak force (i.e., \nincluding body weight). Force while the WSM was standing \nupright on the platform at rest (i.e., body weight) was also \nsubtracted from the peak instantaneous force to calculate \nnet IMTP peak force. \n\nAnalysis and Comparative Data", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed12.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed13.pdf", - "query": "What is typical age at which multiple sclerosis is diagnosed ?", - "target_page": 2, - "target_passage": "Multiple sclerosis (MS) is a progressive inflammatory disease of the central nervous system (CNS) that is typically diagnosed at 30– 40 years of ag", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. \n\n\n \n \n \n \n [html]\n
2. Casey B, Coste S, Galvin R, Domndly A. Objector physical activity levels in people with multiple sclerosis : meta - analysis. Sured J Med Sci Sperts ( 2018 ) 28 ( 9 ): 1900 – 9 : doe 10.111 / oma 13214
3. Kimuth - Hopkin D, Adamon B, Rouguea R, Mofi RW, People with MS are less physically active than healthy controls but as active as those with other clientic diseases an updated muta - analysis. Multi Scler Relat Disead. ( 2017 ) 1338 – A3 doch
4. Houng PD, Lerd S, Gandevia S, Menant J. Eurcise and sports science Australia ( ESSA ) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Mad Sport. ( 2022 ) 25 ( 2 ) 146 – 54 doc 101010 ( t ) nama 201103
5. Didga - U, Langokon - Christensen M, Stmage E, Bimenschnider M, Fivid LG. Eurecise as medicine in multiple sclerosis - ine for a paradiges shift : preventive, symptomatic, and disease - modifying appects and perspectives. Carr Neuroly
6. Remonschnider M., Hival 1. G. Hisegued 1. Stypared MEE, Eskilleen SI, Gaemalke T, et al. Invotigating the potential doese - molifying and neuroprotective efficacy of exercise therapy cells in the disease course of multiple sclerosie
7. KaB - II, Itom TB, Coste S, Costello K, Dalga U, Garmon E, et al. Enexise and likelyle physical activity recommendations for people with multiple sclerosis througheut the disease course. Mult Scler. ( 2020 ) 26 ( 12 ) 149 – 69, due : 10113 / 10
6. Moreno - Naruro P, Mana a A, Martino G, Ventura L, Burhado D, Veno - Garcia FJ, et al. Too stoutest relatibility and known - groups validity of traumacie tento in people with multiple sclerosis : a cross - sciented, case control study. Phys :
9 Rate J, Arntan EC, Lamers I, Fey P, Normann B. What is the distribution of trank impairments and in velationship with disability level in individuals with multiple sclerosis? Multi - Relat Doord ( 2011 ) 5.10325. doc 10.10108 / mused 20112
", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "34. Gallagher S, Bower M. Making enactivism even more embodied. AVANT: \nJ Philos Interdiscip Vanguard. (2014) 5(2):232–47. doi: 10.26913/50202014.0109.0011 \n\n35. Di Paolo E, Cuffari E, Jaegher H. Linguistic Bodies: The Continuity between Life \nand Language. Cambridge: MIT press (2018). \n36. Colombetti G. The embodied and situated nature of moods. Philosophia (Ramat \nGan). (2017) 45(4):1437–51. doi: 10.1007/s11406-017-9817-0 \n\n37. Bandura A. Health promotion by social cognitive means. Health Educ Behav. \n(2004) 31(2):143–64. doi: 10.1177/1090198104263660 \n\n38. Casey B, Coote S, Hayes S, Gallagher S. Changing physical activity behavior in \npeople with multiple sclerosis: a systematic review and meta-analysis. Arch Phys Med \nRehabil. (2018) 99(10):2059–75. doi: 10.1016/j.apmr.2017.12.013 \n\n39. Silveira SL, Cederberg KLJ, Jeng B, Sikes EM, Sandroff BM, Jones CD, et al. Do \nphysical activity and social cognitive theory variable scores differ across symptom \ncluser severity groups in multiple sclerosis? Disabil Health J. (2021) 14(4):101163. \ndoi: 10.1016/j.dhjo.2021.101163 \n\n40. Learmonth YC, Motl RW. Exercise training for multiple sclerosis: a narrative \nreview of history, benefits, safety, guidelines, and promotion. Int J Environ Res \nPublic Health. (2021) 18(24):13245. doi: 10.3390/ijerph182413245 \n\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical \nactivity interventions among persons with multiple sclerosis. Neurorehabil Neural \nRepair. (2019) 33(1):3–14. doi: 10.1177/1545968318818904 \n\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in fitness, \nmobility and cognition with exercise-training in MS. Acta Neurol Scand. (2019) 139 \n(2):183–91. doi: 10.1111/ane.13041 \n\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based, \nindividualized physiotherapy intervention for people with multiple sclerosis: a \nqualitative study. Physiother Res Int. (2019) 25(3):e1829. doi: 10.1002/pri.1829 \n\n44. Normann B. Facilitation of movement: new perspectives provide expanded \ninsights to guide clinical practice. Physiother Theory Pract. (2020) 36(7):769–78. \ndoi: 10.1080/09593985.2018.1493165 \n\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in \n(2015) 31(4):244–52. doi: 10.3109/ \nphysical \n09593985.2014.1002873 \ntherapy. Physiother Theory Pract. \n\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported \nphysical \na \ncross-sectional study. BMC Neurol. (2017) 17(1):204. doi: 10.1186/s12883-017- \n0981-4 \n\nactivity correlates in Swedish adults with multiple sclerosis:", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" - }, - { - "text": "activity correlates in Swedish adults with multiple sclerosis: \n\n\n \n \n \n \n [html]\n
22 De Jagher H, Ds Paslo E. Participatory sense - making an enactive approach to social oupation. Phenomenel Cogni lici. ( 2007 ) 6 ( 4 ): 485 – 507. doi : 1011007 / A1197 - 9076 - 9
23. DiCicco - Bloom B, Crabtee BF. The qualitative research interview. Med Educ ( 2006 ) 40 ( 4 ) 314 – 21. doi : 10.111 ( 1.165 - 2929.200.02418. x
24 Malternal K. The art and scimce of clinical knowledge : evidence beyond measures and numbers. Lavcet : ( 2001 ) 358 ( 9279 ; 397 – 400. doi : 10106 / 60140 – 6736 ( 01 ) 10548 - 9
25. Tong A, Sainsbury P, Crag 1. Consolidated criteria for neporting qualitative research ( COREQ ): a 32 - term checklist for interviews and focus groups. Int J Qual Health Care : ( 2007 ) 19 ( 6 ): 349 – 37. doi : 10.10.100 / integluc / mam042
26 Antiers EC, Breaten T, Fikke HE, Normane Is, Feasibility of a now intervention addressing group - hased balance and ligh - intensity training, physical activity, and omployment in individuals with multiple sclerosis a pist randomizo
27 : Podgaate G : Foltabuli : sgen kitter insotins, steeths aller bogge diet? / failored in there own culture : from within, vatuile or both? In : Foundalent E, Fugistal OL, Aue TB, edure. Mendole Foltarbuli. Produleson or Evaluative Data / M
28. Malteral X. Theory and interprotation in qualitative studies from general practice : why and how? Scored / Public Hoslib. ( 2016 ) 44 ( 2 ): 120 - 9 doi : 10.1177 / 1405494815621181
29. Kartike JF. Rating neurologic impairment in multiple sclerosis an expanded disability stutus scale ( EDSS ). Neurology. ( 1983 ) 33 ( 11 ) 1444 – 52. doi : 10.1212 / wnl 33.11144
30. Malteral X. Systematic test condenation : a strategy for qualitative analysis. Scand J Public Health ( 2012 ) 40 ( 8 ): 795 – 805. dos : 10.11177 / 1403404812465030
31. Rused N, Gallagher S, Meti RM, Hayes S, Meti RW, Coste S. Experiences of people with multiple sclerosis participating in a secal cognitive behavior change physical activity interention. Physiother Therry Pract. ( 2012 ) 39 ( 3 ) 1 – 9 dot
32. Smith M, Neibling B, Wiflumo G, Hisks M, Barker R. Consumer experience of a featible exercise participation program ( HIP ) for individuals with multiple ederesis : a minad - methods study. Physiother flox Jot ( 2011 ) 26 ( 4 ): e102 ): inta
\n\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018).", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" - }, - { - "text": "The strong differences in the**expectations to do the job until 60 years of age**are probably also \ncaused by the circumstance that the labour market for physically demanding jobs is more rigid. For \nexample, one serious musculoskeletal issue might mean being out of a manual job far before the \npension age. For diseases caused by excessive psychosocial burden, other difficulties can be observed: \nthe recognition as work-related is less accepted, work-related and private life causes are closely \nintertwined, and the diagnosis can be difficult. \n\n\n\nk \nc \no \nt \nS \ne \nb \no \nd \nA \n/ \nk \nc \no \nh \ns \n. \n© \n\n\n \n \n \n \n [html]\n
TableTableTableTablestrategyAge ( IC )
\n\n97", - "page_start": 96, - "page_end": 96, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Acknowledgments \ninstitutional requirements. The participants provided their written \ninformed consent to participate in this study. \n\nThe authors would like to thank the participants in this study \nand the user representatives from Nordland MS Association for \ntheir valuable contributions. The authors also acknowledge \nphilosopher of \nthe mind and cognitive sciences Hanne De \nJaegher for the valuable comments on the interpretations and \ndiscussions of the results. \n\nAuthor contributions \n\ncuration, Formal Analysis, \nInvestigation, Methodology, Project administration, Resources, \nVisualization, Writing – original draft, Writing – review & \nediting. EA: Conceptualization, Formal Analysis, Methodology, \nSupervision, Writing – review & editing. BN: Conceptualization, \nFormal Analysis, Funding acquisition, Methodology, Project \nadministration, Resources, Supervision, Writing – review & editing. \n\nSD: Conceptualization, Data \n\nConflict of interest \n\nThe authors declare that the research was conducted in the \nabsence of any commercial or financial relationships that could \nbe construed as a potential conflict of interest. \n\nFunding \n\nPublisher’s note \n\nThe author(s) declare that financial support was received for \n\nthe research, authorship, and/or publication of this article. \n\nAll claims expressed in this article are solely those of the authors \nand do not necessarily represent those of their affiliated organizations, \nor those of the publisher, the editors and the reviewers. Any product \nthat may be evaluated in this article, or claim that may be made by its \nmanufacturer, is not guaranteed or endorsed by the publisher. The development of the CoreDISTparticipation and the RCT is \nfunded by the Northern Norway Health Authority (Helse Nord \nRHF). This interview study was funded by Nord University \n(PhD salary). \n\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising \ninsights from the Atlas of MS, third \n\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the \nrelationship between trunk motor control and balance, functional mobility, and gait \ncapacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor \nkontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin \nincelenmesi. Türk Nöroloji Dergisi. (2021) 27(3):283. doi: 10.4274/tdn.2021.41017 \n\nprevalence of multiple sclerosis worldwide: \nedition. Mult Scler. (2020) 26(14):1816–21. doi: 10.1177/1352458520970841 \n\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple \nsclerosis: a review and content analysis of qualitative research identifying perceived \ndeterminants and consequences. Disabil Rehabil. (2016) 38(13):1227–42. doi: 10. \n3109/09638288.2015.1077397 \n\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing \nsensorimotor function, physical activity and employment for people with MS—a \n10.52705/ \nfeasibility \nc14a8ca05f7546dabc18bd0275cf2edd \n90(1):32–42. study. Fysioterapeuten. (2023) doi: \n\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, \nindividualized, comprehensive core stability and balance intervention provides \nimmediate and long-term improvements in walking in individuals with multiple \nsclerosis: a randomized controlled trial. Physiother Res Int. (2019) 25(1):e1798. \ndoi: 10.1002/pri.1798 \n\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Group- \nbased individualized comprehensive core stability intervention improves balance in \npersons with multiple sclerosis: a randomized controlled trial. Phys Ther. (2019) 99 \n(8):1027–38. doi: 10.1093/ptj/pzz017 \n\n16. Arntzen EC, Øberg GK, Gallagher S, Normann B. Group-based, individualized \nexercises can provide perceived bodily changes and strengthen aspects of self in \nindividuals with MS: a qualitative interview study. Physiother Theory Pract. (2019) \n37(10):1080–95. doi: 10.1080/09593985.2019.1683923", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "**Charts showing age-of-onset distributions (by percentage of total cohort) for different**\n**cohorts based on year of first treatment**", - "page_start": 30, - "page_end": 30, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "to spirometry to avoid influencing patients’ perceptions \nof their dyspnea. \n\nprerecorded message then inquired whether any house- \nhold member was $ 18 years of age and had experi- \nenced respiratory symptoms (eg, shortness of breath, \nwheezing, \nsputum, prolonged \ncough) within the past 6 months. Households with affir- \nmative responses were subsequently contacted by the \nlocal study coordinator for a follow-up call. The house- \nhold member \nreporting respiratory symptoms was \nverbally consented and screened for eligibility to partic- \nipate in the study over the telephone.8,9 \n\nincreased mucus or \n\nExclusion criteria included the following: (1) a history of \ndiagnosis of lung or airway disease, (2) use of respiratory \ninhalers aside from as-needed salbutamol, (3) contrain- \ndications for spirometry (eg, occurrences of myocardial \ninfarction, stroke, aortic or cerebral aneurysm, eye sur- \ngery, detached retina within the last 3 months), (4) \ninability or refusal to provide informed consent, (5) be- \ning in the third trimester of pregnancy, and (6) being < \n18 years of age. \n\nClassification of Undiagnosed Cases \nCertified study personnel administered spirometry tests \nbefore and after BD use. Participants showing an in- \ncrease of at least 12% and 200 mL in their FEV1 after \nreceiving 400 mg of salbutamol were classified as having \nspirometry indicative of asthma.17 Those whose post-BD \nratio of FEV1/FVC fell below the lower 95% confidence \nlimit (ie, FEV1/FVC < lower limit of normal) were clas- \nsified as having spirometry indicative of COPD.18 Partic- \nipants meeting the criteria for both conditions were \nlabeled as having COPD. Those with a post-BD \n< 80% of the predicted normal and a post-BD \nFEV1 \nFEV1/FVC ratio > 0.70 were classified as having \nspirometry indicative of preserved ratio impaired \nspirometry (PRISm). PRISm was defined based on \npost-BD spirometry values for a more specific classifica- \ntion.19 Participants not meeting criteria for asthma, \nCOPD, or PRISm were labeled as having normal \nspirometry. \n\nEach participant completed the Asthma Screening Ques- \ntionnaire (ASQ)10 via telephone. Individuals aged $ 60 \nyears, and those aged < 60 years who scored < 6 points \non the ASQ, also completed the COPD-Diagnostic \nQuestionnaire.11,12 Participants scoring $ 6 points on \nthe ASQ or $ 20 points on the COPD-Diagnostic Ques- \ntionnaire were invited to the study site for pre- and post- \nbronchodilator (BD) spirometry. \n\nAssessment of the Impact of Participants’ Dyspnea \n\nA control group without respiratory symptoms was \nselected randomly using identical random digit dialing \nreported no respiratory \nmethods. Control patients \nsymptoms in the preceding 6 months and obtained a \nscore of 0 on the ASQ. Participants were recruited as \ncontrol patients if they could be matched with an indi- \nvidual from the undiagnosed group based on age ((cid:2) 5 \nyears) and sex. This matching process aimed to have \nsimilar demographic profiles between the control group \nand the newly found cases. This matching was imple- \nmented solely to ensure demographic comparability \nacross the study groups and not for pairing patients \nfor statistical analysis purposes.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. \n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\n\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the \naverage age at positive test is 32, the peak is quite flat, with high numbers of positive tests still \nbeing recorded by individuals in their late 30s and even into their 40s.", - "page_start": 9, - "page_end": 9, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "community healthcare in the two municipalities. The project team \nincluded three individuals representing users from the Nordland \nMS Association, along with an MS nurse and a neurologist from \nthe MS-outpatient clinic, and three physiotherapists/ researchers. \n\nTABLE 3 Participant demographic information. \n\n\n \n \n \n \n [html]\n
VariableTotal ( n = 15 )
Age in yearsMean 47.6 ( SD 6.04 )
Gender ( women / men )12 woman / 3 men ( 80 %/ 20 %)
Type of MSRelapsing remitting 15 ( 100 %)
EDSSMean 1.8 ( SD 0.9 )
Years since diagnosisMean 10.4 ( SD 7.8 )
Participation in the outdoor groupMean 4.6 sessions / total mean attendance 57.3 %
\n\n2.4 Research team and reflexivity \n\nin \nneurological physiotherapy. BN and ECA developed the \nCoreDISTparticipation intervention, and SSHD contributed to \nthe development of the outdoor part. \n\nAll researchers on the team are clinical specialists \n\nThe researchers’ closeness to the intervention and the \nclinical field may have strengthened the depth and relevance \nof their interpretations in this study (27), as it was easy to \nunderstand what participants described and helped form \nfollow-up questions during the interviews. However, closeness \nmay also produce a risk of “blind spots”, as the researchers \nmay prejudice participants’ experiences, omitting questions \nwhere the answers are believed to be obvious (27). Thus, \nand rigor were \nthe process, \nthroughout \nenhanced by discussing \nand \ninterpretations with external researchers (including specialists \nin enactive theory), as well as user \nrepresentatives. The \nframework (enactive theory) enhanced \npresented theoretical \nthe distance to the material, as recommended in qualitative \nresearch (28). \n\ntrustworthiness \nthe methodology, findings,", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "**Table 9: Table showing the age breakdown of individuals testing positive for opiates-only or**\n**positive-for-both as a proportion of all individuals first testing positive in that year.**\n\n\n \n \n \n \n [html]\n
Year of first testAge 18 - 24Age 25 – 29Age 30 - 34Age 35 – 39Age 40 overTotal
200426 %27 %24 %16 %7 %100 %
200523 %27 %24 %17 %9 %100 %
200625 %26 %22 %17 %11 %100 %
200724 %25 %21 %16 %13 %100 %
200821 %23 %21 %18 %16 %100 %
200923 %22 %20 %17 %18 %100 %
201022 %21 %20 %17 %20 %100 %
201122 %19 %20 %16 %22 %100 %
201219 %20 %22 %17 %23 %100 %
201317 %20 %22 %16 %25 %100 %
\n\nComparing 2004 with 2013 shows that the younger age groups have seen falls in both the \nnumber and the proportion of new positive testers. However, the proportion of those aged 40+ \nhas consistently risen and now constitutes the largest group of all new individuals testing \npositive. \n\nThis means that the 4,281 individuals testing positive for the first time in 2013 has a very \ndifferent age profile to that we would expect from a cohort of recent initiates. It is far older, \nsuggesting again that many of those are actually pre-existing users only tested (positively) for \nthe first time in 2013. This adds further weight to the back-of-the-envelope modelling evidence \ndemonstrating that a substantial proportion of the 4,281 new positive testers in 2013 are likely to \nbe longer-term users who have only been first arrested in 2013, rather than genuinely new \nOCUs. \n\nIn the next section, analysis will examine whether there has been a possible shift towards an \nolder profile amongst new initiates. But even taking this into account, it is unlikely that the \nmajority of those 4,281 individuals are recent initiates. This can be seen clearly in Figure 8 \nbelow, which compares the age-of-initiation curve from Figure 11 (in the next section) to the \n2013 ‘new-individuals’ cohort in the DIP data.", - "page_start": 19, - "page_end": 19, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed13.pdf", - "query": "What was the average year of the group that participated to the study concerning the impact of outdoor pysiotherapy on patient with multiple sclerosis", - "target_page": 4, - "target_passage": "Age in years Mean 47.6", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "community healthcare in the two municipalities. The project team \nincluded three individuals representing users from the Nordland \nMS Association, along with an MS nurse and a neurologist from \nthe MS-outpatient clinic, and three physiotherapists/ researchers. \n\nTABLE 3 Participant demographic information. \n\n\n \n \n \n \n [html]\n
VariableTotal ( n = 15 )
Age in yearsMean 47.6 ( SD 6.04 )
Gender ( women / men )12 woman / 3 men ( 80 %/ 20 %)
Type of MSRelapsing remitting 15 ( 100 %)
EDSSMean 1.8 ( SD 0.9 )
Years since diagnosisMean 10.4 ( SD 7.8 )
Participation in the outdoor groupMean 4.6 sessions / total mean attendance 57.3 %
\n\n2.4 Research team and reflexivity \n\nin \nneurological physiotherapy. BN and ECA developed the \nCoreDISTparticipation intervention, and SSHD contributed to \nthe development of the outdoor part. \n\nAll researchers on the team are clinical specialists \n\nThe researchers’ closeness to the intervention and the \nclinical field may have strengthened the depth and relevance \nof their interpretations in this study (27), as it was easy to \nunderstand what participants described and helped form \nfollow-up questions during the interviews. However, closeness \nmay also produce a risk of “blind spots”, as the researchers \nmay prejudice participants’ experiences, omitting questions \nwhere the answers are believed to be obvious (27). Thus, \nand rigor were \nthe process, \nthroughout \nenhanced by discussing \nand \ninterpretations with external researchers (including specialists \nin enactive theory), as well as user \nrepresentatives. The \nframework (enactive theory) enhanced \npresented theoretical \nthe distance to the material, as recommended in qualitative \nresearch (28). \n\ntrustworthiness \nthe methodology, findings,", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "The meaningfulness of exploring \none’s own limits through \ninteractions and enjoyment \nin outdoor high-intensity \nphysiotherapy for people \nwith multiple sclerosis: a \nqualitative study \n\nStine Susanne Haakonsen Dahl1*, Ellen Christin Arntzen1 and \nBritt Normann1,2 \n\n1Faculty of Nursing and Health Sciences, Nord University, Bodø, Norway, 2Department of Physiotherapy, \nNordland Hospital Trust, Bodø, Norway \n\n\n \n \n \n \n [html]\n
OPEN ACCESS
EDITED IIY
Jacqui H Morris,
University of Dundee, United Kingdom
REVIEWED IIY
Nicola Saywell, Auckland University of Technology, New Zealand
Verna Stavric,
Auckland University of Technology, New Zealand
+ CORRISPONDENCE
Stine Susanne Haakonsen Dahl
# stine. s. dahl @ nord. no
RECEIVED 27 September 2023
AcccrTto 06 March 2024
Pumusved 18 March 2024
CITATION
Dahl SSH, Arntzen EC and Normann B ( 2024 ) The meaningfulness of exploring one ' s own limits through interactions and enjoyment in
The meaningfulness of exploring one ’ s own limits through interactions and enjoyment in outdoor high - intensity physiotherapy for
people with multiple sclerosis : a qualitative study.
Front. Rehabil. Sci. 5 : 1303094.
doi : 10.5389 / fresc. 2024.1303094
COPYRIGHT
© 2024 Dahl, Arntzen and Normann. This is an open - access article distributed under the terms of the Creative Commons Attribution
License ( CC BY ). The use, distribution or reproduction in other forums is permitted, provided the original author ( s ) and the
copyright owner ( s ) are credited and that the original publication in this journal is cited, in accordance with accepted academic practic
No use, distribution or reproduction is permitted which does not comply with these terms.
", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed13.pdf" - }, - { - "text": "\n \n \n \n \n [html]Week 1 : MS outpatient clinicWeek 2 - 5 : MunicipalityOutlies proup 94 mix × 2 weekly, for 4 weeks. It maximum of ton participants and two physiotherapists were included in outs program. Trank ; control and halance ( Group ) and / OUT rearcises ) were addressed, and high - intensity walking or mav\n
Consultations with 66 MS were 120 min / n address were rolered issues based on a structured gaids comprising the following themes : howebdge ). of MS at the workplace, experienced work - educated challenges due to 180, potential nonb and far
Physiotherapy associoteneity to explore the potential for changes in balance and walking aiming to term focus toward possibilities and thus.’ motivate the patient.
Based on those assessments the 105 nurse and the physiotherapist indicated the appects of impertance on a standardized form to inferm the monicipal physiotherapist.
Standardized testing ( baseline, for the RCT ).
Physiotherapy usessest ( 40 – 90 min ) to oxplore the pelont ' s impairments and protential for improvements in a clinical examination prior to group - teaming
Inder proup ( 60 min × 2 would ); These wore these to they participants in acid group and on physiotherapist. Treated, halance ) and physical activity were adhressed ( Group Ceref / M5D ). Participants restred a fails to GerdNST Algial cortis
Digital morting with a multidisciplinary team ( proMS, employee, physiotherapist & MS search ( 20 min ) regarding herien to work participations ) and needs for adaptations regarding work and physical activity, according to structuredi
Week 6
Standardized testing ( midway, for the RCT ).Week 7 – 10. Municipality
Additionally, porticipants were exoveraged to comply with the exercise - videos through a weekly SMS - reminder.
Week 11 – 14
Standardized testing ( final, for the RCT ) and qualitative interviews.
\n\n2 Materials and methods \n\n2.1 Design \n\nin-depth interviews using a phenomenological- \ninspired approach were chosen, as this is suitable for exploring \nthe meaning and significance of pwMS’s \nexperiences and \nreflections (23, 24). \n\nIndividual \n\n2.2 Ethical considerations \n\nThe study was conducted according to the Declaration of \nHelsinki and approved by the Regional Committee for Medical \nResearch Ethics in North Norway (REK North: 174837). Written \ninformed consent was obtained prior to the intervention and \nconfirmed verbally when arranging the interviews. Participation \nwas voluntary and anonymous, \nand the participants were \ninformed about the opportunity to withdraw from the study. The \nConsolidated Criteria for Reporting Qualitative Research (COREQ) \n(25) were used to optimize the conduct and reporting of the study. \n\n2.3 Study context \n\ninterview study was nested within a randomized \n(RCT) comparing the CoreDISTparticipation \ncontrolled trial \nintervention to usual care (26) and conducted at a regional \nhospital MS-outpatient clinic (Nordland Hospital Trust) and in \ntwo affiliated municipalities in the northern Norway. The current \nintervention group’s \nstudy investigates participants \nexperiences of the four-week outdoor group, which was part of \nthis new intervention (Table 2). The outdoor sessions were \nconducted by three trained physiotherapists working in the \n\nThis \n\nin the", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed13.pdf" - }, - { - "text": "17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. \n\n\n \n \n \n \n [html]\n
2. Casey B, Coste S, Galvin R, Domndly A. Objector physical activity levels in people with multiple sclerosis : meta - analysis. Sured J Med Sci Sperts ( 2018 ) 28 ( 9 ): 1900 – 9 : doe 10.111 / oma 13214
3. Kimuth - Hopkin D, Adamon B, Rouguea R, Mofi RW, People with MS are less physically active than healthy controls but as active as those with other clientic diseases an updated muta - analysis. Multi Scler Relat Disead. ( 2017 ) 1338 – A3 doch
4. Houng PD, Lerd S, Gandevia S, Menant J. Eurcise and sports science Australia ( ESSA ) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Mad Sport. ( 2022 ) 25 ( 2 ) 146 – 54 doc 101010 ( t ) nama 201103
5. Didga - U, Langokon - Christensen M, Stmage E, Bimenschnider M, Fivid LG. Eurecise as medicine in multiple sclerosis - ine for a paradiges shift : preventive, symptomatic, and disease - modifying appects and perspectives. Carr Neuroly
6. Remonschnider M., Hival 1. G. Hisegued 1. Stypared MEE, Eskilleen SI, Gaemalke T, et al. Invotigating the potential doese - molifying and neuroprotective efficacy of exercise therapy cells in the disease course of multiple sclerosie
7. KaB - II, Itom TB, Coste S, Costello K, Dalga U, Garmon E, et al. Enexise and likelyle physical activity recommendations for people with multiple sclerosis througheut the disease course. Mult Scler. ( 2020 ) 26 ( 12 ) 149 – 69, due : 10113 / 10
6. Moreno - Naruro P, Mana a A, Martino G, Ventura L, Burhado D, Veno - Garcia FJ, et al. Too stoutest relatibility and known - groups validity of traumacie tento in people with multiple sclerosis : a cross - sciented, case control study. Phys :
9 Rate J, Arntan EC, Lamers I, Fey P, Normann B. What is the distribution of trank impairments and in velationship with disability level in individuals with multiple sclerosis? Multi - Relat Doord ( 2011 ) 5.10325. doc 10.10108 / mused 20112
", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "in a \nDiscussion: High-intensity training combined with detailed exercises \nphysiotherapy outdoor group was perceived to create meaningful bodily changes \nand enhance PA and prospects for both PA and life. Importantly, however, some \nnegative experiences were also reported from the high-intensity training. Enactive \nthe importance of \nthe illumination of new perspectives: \ntheory allowed for \nembodiment for self-efficacy and of tailored physiotherapy and an outdoor-group \nenvironment for exploring one’s own limits to physical capabilities. These aspects \nshould inform future exercise interventions in pwMS with low disability. \n\nKEYWORDS \n\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy, \npostural balance, enactive theory \n\n1 Introduction \n\nMultiple sclerosis (MS) is a progressive inflammatory disease of \nthe central nervous system (CNS) that is typically diagnosed at 30– \n40 years of age (1). A great concern is the significantly lower levels \nof physical activity (PA) in people with MS (pwMS) across \ndisability levels than in their healthy counterparts (2, 3). \n\nphysically active as their sensorimotor impairments improved \n(16). To address PA challenges in pwMS, GroupCoreDIST was \nfurther developed to include a four-week period of outdoor \ntraining, \nand \nGroupCoreDIST exercises are integrated (Table 2). To our \ntraining \nknowledge, \nand \nfunctions have been \nrehabilitation of \nfor \nsparsely explored. Patient perspectives are essential \nthe \nthe new \nevaluation of healthcare interventions (17); however, \nto be \noutdoor component of CoreDISTparticipation has yet \nfirst-person \nParticularly \ninvestigated \ninteresting is what participants perceive as meaningful regarding \nthe intervention, as \nfor motivation, motor \nlearning and exercise adherence (18). \n\nin which high-intensity walking/running \n\ncombinations \n\nof \nspecific sensorimotor \n\nhigh-intensity \n\nEarly promotion of PA and exercise is recommended due to \nnumerous established benefits in health, symptom management \nand well-being for pwMS (4). \nIn particular, high-intensity \ntraining is endorsed, as it has possible neuroprotective effects in \nIn addition, exercises addressing \nthe disease course (5, 6). \nsensorimotor \nstrength, \n(e.g., \nimpairments \nreduced neuromuscular control) are recommended, as they target \nindividuals’ \n(7). \nSensorimotor impairments can influence trunk control, which is \ncommonly disturbed in pwMS, even when disability is low (8, 9), \nand correlate with impaired balance, walking capacity and \nexercise benefits, \ndistance \nattitudes and motivations, as well as contextual aspects such as \nlack of optimal exercise interventions, accessibility and support, \naffect the level of PA and exercise participation (12). \n\nTo deepen our understanding of what \n\nis concurrently expressing \n\nan exercise \n\nrepertoire for perception and action \n\nCoreDISTparticipation (Table 1) is a new comprehensive \nintervention addressing sensorimotor function, \ntrunk control, \nhigh-intensity running/walking and work participation in pwMS \nwith low disability (13). It is based on the GroupCoreDIST1 \nintervention, which has been shown to have significant short- \nand long-term effects on trunk control, balance and walking \namong pwMS (14, 15). However, no effects of the intervention \non objectively measured PA have been identified, even though \nthe participants reported perceptions of new possibilities to be", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed13.pdf" - }, - { - "text": "trustworthiness \nthe methodology, findings, \n\n\n \n \n \n \n [html]Potential questionsWhat did you perceive as negative?What did the physiotherapists do? What was the value of this to you?How did you perceive the atmosphere in the group?How did you perceive the city park environment for exercise?\n
TABLE 4 Interview guide.Theme
Overall experiences and reflections from participation
Generally, what are your main experiences of perticipation?
What did you perceive as meaningful?
Content
How did you experience :
• The content of the sessions in general • The high - intensity walking / running • The specific exercises • The combination of specific exercises
• The exercise intensity
How did you respond to the exercises? How did you experience getting tired?
How do you perceive your specific movement impairments ( if any ) being addressed?
Please elaborate on situations where you experienced the feeling of mastery / failure. If anything What was challenging? What would
did you enjoy?
What was the value of participating in the indoor exercise group beforehand?
How did you experience this kind of exercise intervention compared to other type of exercise you may have experience with?The role of the physiotherapists
The group setting
How did you experience the group setting?
The outdoor environment
How was it to exercise outdoors?
Closing questions
Are there any experiences from participation that you would like to elaberate on? Is anything related to this project that we have not talked about that you would like to say?
\n\nPrior to recruitment, the study was introduced to individuals \nwith multiple sclerosis (pwMS) through a seminar hosted by the \nNordland MS Association. Additionally, \nseminars were \nconducted for health professionals in community healthcare and \nat the regional hospital. Written information about this study \n(and the RCT) was sent from the MS clinic at the regional \nto all eligible individuals affiliated with the \nhospital by post \nIndividuals who wished to participate signed the \nhospital. \nattached consent \nin the pre-stamped \nfollows: had been \nenvelope. The inclusion criteria were as \ndiagnosed with MS, had a score on the Expanded Disability \nStatus Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed \n(10%–100% of \nfull-time) and residential address in the two \npredefined municipalities. The exclusion criteria were as follows: \npregnancy, exacerbation of symptoms within two weeks prior to \nenrollment and other serious conditions compromising balance, \nwalking or work capacity. All participants in the intervention \ngroup of the RCT (n = 15) were included (Table 3). \n\nform and returned it \n\nconducted (with pwMS who were not part of the sample), and the \ninterview guide was then refined around the following themes: \noverall experience and reflections from participation, content, \noutdoor setting, the group, and the physiotherapists. Questions \nin-depth reflections regarding \nwere open-ended to capture rich, \nparticipants’ experiences, following a phenomenological approach. \nThe interviewer asked for both negative and positive experiences \n\n2.6 Data collection", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "Enjoyment has previously been reported to promote PA \nin pwMS, and our study brings requested knowledge of what \nin an exercise intervention (46): \ncan constitute enjoyment \nplayful group-exercise tasks, a cheerful physiotherapist, and the \noutdoor environment. \n\nThe appreciation of being active outdoors in the study sample \naligns with that in the general population (47). The outdoors \nprovided a natural environment, which both invited participants to \nactively explore abilities thought of as left behind after their \ndiagnosis with MS, such as running, and provided an appreciated \nbreak from focusing on MS symptoms. We also suggest that the \npositive \nchallenging weather \nconditions and the added meaning of exercising among other \npeople in the city park can be explained according to such terms. \nThese positive experiences show how we are enmeshed in our \nhistory, context and social encounters (35) and how these aspects \nshould also be accounted for when designing exercise interventions. \n\nexperiences of mastering the \n\nEthics statement \n\nThis study involving humans was approved by Regional \nCommittee for Medical Research Ethics in North Norway (REK \nNorth: \nat \nthe Data \nNordlandssykehuset Hospital Trust, Norway. This study was \nlegislation and \nconducted in accordance with the \n\nProtection Officer 174,837) and \n\nlocal \n\n4.3 Methodological considerations \n\nfor deriving \nknowledge from individuals’ experiences. The participants self- \nreferred to the intervention and were recruited based on pre-set \ncriteria. This approach yielded rich information from people \nwith mild to moderate disabilities due to MS who were \n\nThe design and methods were adequate", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed13.pdf" - }, - { - "text": "given the heterogenic pathology and symptoms of MS (41, 42). \nHowever, our findings illuminate qualitative aspects of how to \nachieve tailored and meaningful intersubjective interactions in an \nexercise intervention. \n\nmotivated for physical activity (PA), employed, and residing in \nnorthern Norway. Ethnicity or socio-economic class were not \nrecorded. However, considering that all \nthese factors can \ninfluence PA engagement (46), \nit is possible that additional \naspects of the phenomenon could be uncovered in a different \nsample \n(48). There was a higher percentage of women \nparticipating than men; however, this corresponds to the gender \ndistribution in the MS population (1). \n\nThe use of enactive theory was innovative within the field and \nallowed for, \nimportance for self- \nefficacy to be identified. Transference of our results to similar \npopulations can be achieved through theoretical generalization (28). \n\nit appears that \n\nin particular, new aspects of \n\nthe physiotherapists’ ability to adapt \n\nWe consider the instances of the physiotherapist running \ntogether with the participant, which were perceived as important \nfor participants’ performance, to be an example of “participatory \nsense-making” (22). As participants appreciated being guided or \nthe \neven pushed by the physiotherapists, \nphysiotherapists were trusted in directing this interaction. As \nsuch, we argue that \nto \nparticipants’ movements, \nspeech and gestures—tailoring the \ninteraction to their needs—was important for this ability to be \nperceived as purposeful. This is supported by the few negative \nincidents \nparticipant-physiotherapist \ninteraction seemed to not be jointly coordinated and appeared to \nfail. The reported mutual influences of sensorimotor capabilities \nand interpersonal coordination, with the physiotherapists but \nalso the group, are in accordance with sensorimotor capacities \nand intersubjective interactions being important \nsense- \nmaking in the world (35). The benefits of these individualized \nparticipant-physiotherapist \ninteractions are also described in \nspecific core-stability exercises in indoor groups (16, 43) and are \nin line with the \nfacilitation of \nthrough hands-on interaction previously proposed \nmovement \n(44, 45). Our study informs new knowledge of physiotherapist- \nparticipant \nto achieve the recommended high- \nintensity training and calls for physiotherapy clinical reasoning \nthrough bodily and verbal communication skills adapted to the \nparticipants’ responses in an ongoing and situated way. \n\ndescribed where the \n\nand detailed \nsensorimotor exercises was valued and provided meaningful \nembodied experiences, improving participants’ ability to master \nPA and their beliefs of their own possibilities for being active in \nthe future. However, the manner in which the content of an \nexercise intervention is delivered and the environment in which \nit is delivered should be accounted for, as these aspects were \nperceived to be of great importance in creating and shaping \nparticipants’ experiences. In particular, tailored physiotherapist- \nparticipant bodily interactions and an engaging group and \noutdoor \nfor \nexploring one’s own potential. \n\nCombining high-intensity walking/running \n\nenvironment were perceived to be pertinent \n\nTo minimize negative incidents in future interventions, we \nsuggest that (1) the effort required from one’s leg muscles \nduring the detailed exercises (in between the running/walking \nnegative \nintervals) \nconsequences of \nleg muscle fatigue prior to high-intensity \nrunning/walking, (2) the capacity for running/walking at high- \nintensity should be explored in one-to-one physiotherapy \nassessment prior to group training to optimize individuals \ncapabilities and safety, and (3) homogenous and small-sized \ngroups \nshould be used to enable ongoing and tailored \nphysiotherapist-participant interactions.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed13.pdf" - }, - { - "text": "3.3 An engaging environment \n\nIt was somewhat distressing during the last interval, as my feet \nwere not working, and I did not know what to do to increase my \nheart rate—when I could not run or walk quickly anymore. \n(ID2, EDSS: 2) \n\ntheir performances were \npositively influenced and motivated by the group setting, \nfor \nexample, through cooperating in exercises with balls, seeing other \nindividuals in the group who were “doing well”, cheering each \nother and competing when running and walking next to each \nother. However, one participant emphasized that observing \npeople with visible disabilities from MS was distressing, as it \nrevealed negative thoughts about one’s own future. \nIt was \nemphasized that mastering challenges in the group sessions \nadded more meaning than doing the same alone: \n\nMost participants reported that \n\nThe focus on the core or the middle of the body in the detailed \nexercises was stated to improve participants’ PA performance; \nparticipants described being less clumsy or unsteady or walking \nwithout holding on to the walls. Having practiced the detailed \nCoreDIST exercises \nindoor group beforehand was \ndescribed as a helpful and pertinent preparation by some \nparticipants, as it was regarded as more difficult to accurately \nexecute the exercise techniques outdoors due to their higher \nintensity, the uneven surface, or bad weather. Some participants \ncommented that the standing exercises (in-between the running/ \nleaving their legs \nwalking intervals) required too much effort, \ntired for running afterward. \n\n3.2 New insights and beliefs \n\nA key feature of the participants’ stories was their new insights \ninto their own physical abilities, which were perceived to influence \ntheir beliefs about their own possibilities for PA and life in general: \n\nWhat meant the most for me was the high-pulse training, as I had \nthoughts of it being a left behind phase for me. The experience of \nbeing able to master it felt so good. It enhances my focus on future \npossibilities rather than limitations. (ID4, EDSS: 0) \n\nI think this particular exercise is hard work, and then it becomes \nvery tiring to do it on my own. However, when I did it in the \ngroup and we could laugh a bit in between and so on, it was \neasier because of the social element. (ID12, EDSS: 1.5) \n\nBeing active outdoors was preferred by many participants \nbecause of the fresh air and the natural and varied environment: \n\nIt was an added positive experience to use our city park and \nnotice all the other people who were there…it is something \nabout challenging our comfort-zone. (ID4, EDSS: 0) \n\nThe natural environment was also described as taking focus \naway from MS symptoms. Cold, \nsnowy weather \nconditions required planning of adequate clothing; in addition, \nthese conditions led some participants to use cautious behavior \nwhen the ground was slippery and led a few to omit sessions. \nHowever, mastering outdoor exercise was highlighted in positive \nterms, such as discovering new ways to become active. \n\nrainy or \n\nGains in insight were also reported from the detailed exercise \npart of the sessions, highlighting how the function of body parts \nthrough movements and sensations was linked to performance in \nPA, as illustrated below: \n3.4 Professional leadership, tailoring and \nco-creation of enjoyment \n\nThe way the physiotherapists led the group and, in particular, \ninteracted with each participant were regarded as helpful \nfor \nimproving their bodily functions and activity levels. Some \nparticipants reported being afraid to try out new activities or \ntraining at high intensities after being diagnosed with MS but felt \nsafe to explore when supervised by the physiotherapist because of \nin the relationship between them and in the \ntheir \nphysiotherapist’s professional knowledge.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed13.pdf" - }, - { - "text": "34. Gallagher S, Bower M. Making enactivism even more embodied. AVANT: \nJ Philos Interdiscip Vanguard. (2014) 5(2):232–47. doi: 10.26913/50202014.0109.0011 \n\n35. Di Paolo E, Cuffari E, Jaegher H. Linguistic Bodies: The Continuity between Life \nand Language. Cambridge: MIT press (2018). \n36. Colombetti G. The embodied and situated nature of moods. Philosophia (Ramat \nGan). (2017) 45(4):1437–51. doi: 10.1007/s11406-017-9817-0 \n\n37. Bandura A. Health promotion by social cognitive means. Health Educ Behav. \n(2004) 31(2):143–64. doi: 10.1177/1090198104263660 \n\n38. Casey B, Coote S, Hayes S, Gallagher S. Changing physical activity behavior in \npeople with multiple sclerosis: a systematic review and meta-analysis. Arch Phys Med \nRehabil. (2018) 99(10):2059–75. doi: 10.1016/j.apmr.2017.12.013 \n\n39. Silveira SL, Cederberg KLJ, Jeng B, Sikes EM, Sandroff BM, Jones CD, et al. Do \nphysical activity and social cognitive theory variable scores differ across symptom \ncluser severity groups in multiple sclerosis? Disabil Health J. (2021) 14(4):101163. \ndoi: 10.1016/j.dhjo.2021.101163 \n\n40. Learmonth YC, Motl RW. Exercise training for multiple sclerosis: a narrative \nreview of history, benefits, safety, guidelines, and promotion. Int J Environ Res \nPublic Health. (2021) 18(24):13245. doi: 10.3390/ijerph182413245 \n\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical \nactivity interventions among persons with multiple sclerosis. Neurorehabil Neural \nRepair. (2019) 33(1):3–14. doi: 10.1177/1545968318818904 \n\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in fitness, \nmobility and cognition with exercise-training in MS. Acta Neurol Scand. (2019) 139 \n(2):183–91. doi: 10.1111/ane.13041 \n\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based, \nindividualized physiotherapy intervention for people with multiple sclerosis: a \nqualitative study. Physiother Res Int. (2019) 25(3):e1829. doi: 10.1002/pri.1829 \n\n44. Normann B. Facilitation of movement: new perspectives provide expanded \ninsights to guide clinical practice. Physiother Theory Pract. (2020) 36(7):769–78. \ndoi: 10.1080/09593985.2018.1493165 \n\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in \n(2015) 31(4):244–52. doi: 10.3109/ \nphysical \n09593985.2014.1002873 \ntherapy. Physiother Theory Pract. \n\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported \nphysical \na \ncross-sectional study. BMC Neurol. (2017) 17(1):204. doi: 10.1186/s12883-017- \n0981-4 \n\nactivity correlates in Swedish adults with multiple sclerosis:", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed13.pdf", - "query": "What were the prerequisites allowing to be involved in the study concerning the impact of outdoor sport on patients witg multiple sclerosis ?", - "target_page": 4, - "target_passage": "The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed (10%–100% of full-time) and residential address in the two predefined municipalities", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. \n\n\n \n \n \n \n [html]\n
2. Casey B, Coste S, Galvin R, Domndly A. Objector physical activity levels in people with multiple sclerosis : meta - analysis. Sured J Med Sci Sperts ( 2018 ) 28 ( 9 ): 1900 – 9 : doe 10.111 / oma 13214
3. Kimuth - Hopkin D, Adamon B, Rouguea R, Mofi RW, People with MS are less physically active than healthy controls but as active as those with other clientic diseases an updated muta - analysis. Multi Scler Relat Disead. ( 2017 ) 1338 – A3 doch
4. Houng PD, Lerd S, Gandevia S, Menant J. Eurcise and sports science Australia ( ESSA ) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Mad Sport. ( 2022 ) 25 ( 2 ) 146 – 54 doc 101010 ( t ) nama 201103
5. Didga - U, Langokon - Christensen M, Stmage E, Bimenschnider M, Fivid LG. Eurecise as medicine in multiple sclerosis - ine for a paradiges shift : preventive, symptomatic, and disease - modifying appects and perspectives. Carr Neuroly
6. Remonschnider M., Hival 1. G. Hisegued 1. Stypared MEE, Eskilleen SI, Gaemalke T, et al. Invotigating the potential doese - molifying and neuroprotective efficacy of exercise therapy cells in the disease course of multiple sclerosie
7. KaB - II, Itom TB, Coste S, Costello K, Dalga U, Garmon E, et al. Enexise and likelyle physical activity recommendations for people with multiple sclerosis througheut the disease course. Mult Scler. ( 2020 ) 26 ( 12 ) 149 – 69, due : 10113 / 10
6. Moreno - Naruro P, Mana a A, Martino G, Ventura L, Burhado D, Veno - Garcia FJ, et al. Too stoutest relatibility and known - groups validity of traumacie tento in people with multiple sclerosis : a cross - sciented, case control study. Phys :
9 Rate J, Arntan EC, Lamers I, Fey P, Normann B. What is the distribution of trank impairments and in velationship with disability level in individuals with multiple sclerosis? Multi - Relat Doord ( 2011 ) 5.10325. doc 10.10108 / mused 20112
", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "Enjoyment has previously been reported to promote PA \nin pwMS, and our study brings requested knowledge of what \nin an exercise intervention (46): \ncan constitute enjoyment \nplayful group-exercise tasks, a cheerful physiotherapist, and the \noutdoor environment. \n\nThe appreciation of being active outdoors in the study sample \naligns with that in the general population (47). The outdoors \nprovided a natural environment, which both invited participants to \nactively explore abilities thought of as left behind after their \ndiagnosis with MS, such as running, and provided an appreciated \nbreak from focusing on MS symptoms. We also suggest that the \npositive \nchallenging weather \nconditions and the added meaning of exercising among other \npeople in the city park can be explained according to such terms. \nThese positive experiences show how we are enmeshed in our \nhistory, context and social encounters (35) and how these aspects \nshould also be accounted for when designing exercise interventions. \n\nexperiences of mastering the \n\nEthics statement \n\nThis study involving humans was approved by Regional \nCommittee for Medical Research Ethics in North Norway (REK \nNorth: \nat \nthe Data \nNordlandssykehuset Hospital Trust, Norway. This study was \nlegislation and \nconducted in accordance with the \n\nProtection Officer 174,837) and \n\nlocal \n\n4.3 Methodological considerations \n\nfor deriving \nknowledge from individuals’ experiences. The participants self- \nreferred to the intervention and were recruited based on pre-set \ncriteria. This approach yielded rich information from people \nwith mild to moderate disabilities due to MS who were \n\nThe design and methods were adequate", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed13.pdf" - }, - { - "text": "trustworthiness \nthe methodology, findings, \n\n\n \n \n \n \n [html]Potential questionsWhat did you perceive as negative?What did the physiotherapists do? What was the value of this to you?How did you perceive the atmosphere in the group?How did you perceive the city park environment for exercise?\n
TABLE 4 Interview guide.Theme
Overall experiences and reflections from participation
Generally, what are your main experiences of perticipation?
What did you perceive as meaningful?
Content
How did you experience :
• The content of the sessions in general • The high - intensity walking / running • The specific exercises • The combination of specific exercises
• The exercise intensity
How did you respond to the exercises? How did you experience getting tired?
How do you perceive your specific movement impairments ( if any ) being addressed?
Please elaborate on situations where you experienced the feeling of mastery / failure. If anything What was challenging? What would
did you enjoy?
What was the value of participating in the indoor exercise group beforehand?
How did you experience this kind of exercise intervention compared to other type of exercise you may have experience with?The role of the physiotherapists
The group setting
How did you experience the group setting?
The outdoor environment
How was it to exercise outdoors?
Closing questions
Are there any experiences from participation that you would like to elaberate on? Is anything related to this project that we have not talked about that you would like to say?
\n\nPrior to recruitment, the study was introduced to individuals \nwith multiple sclerosis (pwMS) through a seminar hosted by the \nNordland MS Association. Additionally, \nseminars were \nconducted for health professionals in community healthcare and \nat the regional hospital. Written information about this study \n(and the RCT) was sent from the MS clinic at the regional \nto all eligible individuals affiliated with the \nhospital by post \nIndividuals who wished to participate signed the \nhospital. \nattached consent \nin the pre-stamped \nfollows: had been \nenvelope. The inclusion criteria were as \ndiagnosed with MS, had a score on the Expanded Disability \nStatus Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed \n(10%–100% of \nfull-time) and residential address in the two \npredefined municipalities. The exclusion criteria were as follows: \npregnancy, exacerbation of symptoms within two weeks prior to \nenrollment and other serious conditions compromising balance, \nwalking or work capacity. All participants in the intervention \ngroup of the RCT (n = 15) were included (Table 3). \n\nform and returned it \n\nconducted (with pwMS who were not part of the sample), and the \ninterview guide was then refined around the following themes: \noverall experience and reflections from participation, content, \noutdoor setting, the group, and the physiotherapists. Questions \nin-depth reflections regarding \nwere open-ended to capture rich, \nparticipants’ experiences, following a phenomenological approach. \nThe interviewer asked for both negative and positive experiences \n\n2.6 Data collection", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "in a \nDiscussion: High-intensity training combined with detailed exercises \nphysiotherapy outdoor group was perceived to create meaningful bodily changes \nand enhance PA and prospects for both PA and life. Importantly, however, some \nnegative experiences were also reported from the high-intensity training. Enactive \nthe importance of \nthe illumination of new perspectives: \ntheory allowed for \nembodiment for self-efficacy and of tailored physiotherapy and an outdoor-group \nenvironment for exploring one’s own limits to physical capabilities. These aspects \nshould inform future exercise interventions in pwMS with low disability. \n\nKEYWORDS \n\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy, \npostural balance, enactive theory \n\n1 Introduction \n\nMultiple sclerosis (MS) is a progressive inflammatory disease of \nthe central nervous system (CNS) that is typically diagnosed at 30– \n40 years of age (1). A great concern is the significantly lower levels \nof physical activity (PA) in people with MS (pwMS) across \ndisability levels than in their healthy counterparts (2, 3). \n\nphysically active as their sensorimotor impairments improved \n(16). To address PA challenges in pwMS, GroupCoreDIST was \nfurther developed to include a four-week period of outdoor \ntraining, \nand \nGroupCoreDIST exercises are integrated (Table 2). To our \ntraining \nknowledge, \nand \nfunctions have been \nrehabilitation of \nfor \nsparsely explored. Patient perspectives are essential \nthe \nthe new \nevaluation of healthcare interventions (17); however, \nto be \noutdoor component of CoreDISTparticipation has yet \nfirst-person \nParticularly \ninvestigated \ninteresting is what participants perceive as meaningful regarding \nthe intervention, as \nfor motivation, motor \nlearning and exercise adherence (18). \n\nin which high-intensity walking/running \n\ncombinations \n\nof \nspecific sensorimotor \n\nhigh-intensity \n\nEarly promotion of PA and exercise is recommended due to \nnumerous established benefits in health, symptom management \nand well-being for pwMS (4). \nIn particular, high-intensity \ntraining is endorsed, as it has possible neuroprotective effects in \nIn addition, exercises addressing \nthe disease course (5, 6). \nsensorimotor \nstrength, \n(e.g., \nimpairments \nreduced neuromuscular control) are recommended, as they target \nindividuals’ \n(7). \nSensorimotor impairments can influence trunk control, which is \ncommonly disturbed in pwMS, even when disability is low (8, 9), \nand correlate with impaired balance, walking capacity and \nexercise benefits, \ndistance \nattitudes and motivations, as well as contextual aspects such as \nlack of optimal exercise interventions, accessibility and support, \naffect the level of PA and exercise participation (12). \n\nTo deepen our understanding of what \n\nis concurrently expressing \n\nan exercise \n\nrepertoire for perception and action \n\nCoreDISTparticipation (Table 1) is a new comprehensive \nintervention addressing sensorimotor function, \ntrunk control, \nhigh-intensity running/walking and work participation in pwMS \nwith low disability (13). It is based on the GroupCoreDIST1 \nintervention, which has been shown to have significant short- \nand long-term effects on trunk control, balance and walking \namong pwMS (14, 15). However, no effects of the intervention \non objectively measured PA have been identified, even though \nthe participants reported perceptions of new possibilities to be", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed13.pdf" - }, - { - "text": "3.3 An engaging environment \n\nIt was somewhat distressing during the last interval, as my feet \nwere not working, and I did not know what to do to increase my \nheart rate—when I could not run or walk quickly anymore. \n(ID2, EDSS: 2) \n\ntheir performances were \npositively influenced and motivated by the group setting, \nfor \nexample, through cooperating in exercises with balls, seeing other \nindividuals in the group who were “doing well”, cheering each \nother and competing when running and walking next to each \nother. However, one participant emphasized that observing \npeople with visible disabilities from MS was distressing, as it \nrevealed negative thoughts about one’s own future. \nIt was \nemphasized that mastering challenges in the group sessions \nadded more meaning than doing the same alone: \n\nMost participants reported that \n\nThe focus on the core or the middle of the body in the detailed \nexercises was stated to improve participants’ PA performance; \nparticipants described being less clumsy or unsteady or walking \nwithout holding on to the walls. Having practiced the detailed \nCoreDIST exercises \nindoor group beforehand was \ndescribed as a helpful and pertinent preparation by some \nparticipants, as it was regarded as more difficult to accurately \nexecute the exercise techniques outdoors due to their higher \nintensity, the uneven surface, or bad weather. Some participants \ncommented that the standing exercises (in-between the running/ \nleaving their legs \nwalking intervals) required too much effort, \ntired for running afterward. \n\n3.2 New insights and beliefs \n\nA key feature of the participants’ stories was their new insights \ninto their own physical abilities, which were perceived to influence \ntheir beliefs about their own possibilities for PA and life in general: \n\nWhat meant the most for me was the high-pulse training, as I had \nthoughts of it being a left behind phase for me. The experience of \nbeing able to master it felt so good. It enhances my focus on future \npossibilities rather than limitations. (ID4, EDSS: 0) \n\nI think this particular exercise is hard work, and then it becomes \nvery tiring to do it on my own. However, when I did it in the \ngroup and we could laugh a bit in between and so on, it was \neasier because of the social element. (ID12, EDSS: 1.5) \n\nBeing active outdoors was preferred by many participants \nbecause of the fresh air and the natural and varied environment: \n\nIt was an added positive experience to use our city park and \nnotice all the other people who were there…it is something \nabout challenging our comfort-zone. (ID4, EDSS: 0) \n\nThe natural environment was also described as taking focus \naway from MS symptoms. Cold, \nsnowy weather \nconditions required planning of adequate clothing; in addition, \nthese conditions led some participants to use cautious behavior \nwhen the ground was slippery and led a few to omit sessions. \nHowever, mastering outdoor exercise was highlighted in positive \nterms, such as discovering new ways to become active. \n\nrainy or \n\nGains in insight were also reported from the detailed exercise \npart of the sessions, highlighting how the function of body parts \nthrough movements and sensations was linked to performance in \nPA, as illustrated below: \n3.4 Professional leadership, tailoring and \nco-creation of enjoyment \n\nThe way the physiotherapists led the group and, in particular, \ninteracted with each participant were regarded as helpful \nfor \nimproving their bodily functions and activity levels. Some \nparticipants reported being afraid to try out new activities or \ntraining at high intensities after being diagnosed with MS but felt \nsafe to explore when supervised by the physiotherapist because of \nin the relationship between them and in the \ntheir \nphysiotherapist’s professional knowledge.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed13.pdf" - }, - { - "text": "activity correlates in Swedish adults with multiple sclerosis: \n\n\n \n \n \n \n [html]\n
22 De Jagher H, Ds Paslo E. Participatory sense - making an enactive approach to social oupation. Phenomenel Cogni lici. ( 2007 ) 6 ( 4 ): 485 – 507. doi : 1011007 / A1197 - 9076 - 9
23. DiCicco - Bloom B, Crabtee BF. The qualitative research interview. Med Educ ( 2006 ) 40 ( 4 ) 314 – 21. doi : 10.111 ( 1.165 - 2929.200.02418. x
24 Malternal K. The art and scimce of clinical knowledge : evidence beyond measures and numbers. Lavcet : ( 2001 ) 358 ( 9279 ; 397 – 400. doi : 10106 / 60140 – 6736 ( 01 ) 10548 - 9
25. Tong A, Sainsbury P, Crag 1. Consolidated criteria for neporting qualitative research ( COREQ ): a 32 - term checklist for interviews and focus groups. Int J Qual Health Care : ( 2007 ) 19 ( 6 ): 349 – 37. doi : 10.10.100 / integluc / mam042
26 Antiers EC, Breaten T, Fikke HE, Normane Is, Feasibility of a now intervention addressing group - hased balance and ligh - intensity training, physical activity, and omployment in individuals with multiple sclerosis a pist randomizo
27 : Podgaate G : Foltabuli : sgen kitter insotins, steeths aller bogge diet? / failored in there own culture : from within, vatuile or both? In : Foundalent E, Fugistal OL, Aue TB, edure. Mendole Foltarbuli. Produleson or Evaluative Data / M
28. Malteral X. Theory and interprotation in qualitative studies from general practice : why and how? Scored / Public Hoslib. ( 2016 ) 44 ( 2 ): 120 - 9 doi : 10.1177 / 1405494815621181
29. Kartike JF. Rating neurologic impairment in multiple sclerosis an expanded disability stutus scale ( EDSS ). Neurology. ( 1983 ) 33 ( 11 ) 1444 – 52. doi : 10.1212 / wnl 33.11144
30. Malteral X. Systematic test condenation : a strategy for qualitative analysis. Scand J Public Health ( 2012 ) 40 ( 8 ): 795 – 805. dos : 10.11177 / 1403404812465030
31. Rused N, Gallagher S, Meti RM, Hayes S, Meti RW, Coste S. Experiences of people with multiple sclerosis participating in a secal cognitive behavior change physical activity interention. Physiother Therry Pract. ( 2012 ) 39 ( 3 ) 1 – 9 dot
32. Smith M, Neibling B, Wiflumo G, Hisks M, Barker R. Consumer experience of a featible exercise participation program ( HIP ) for individuals with multiple ederesis : a minad - methods study. Physiother flox Jot ( 2011 ) 26 ( 4 ): e102 ): inta
\n\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018).", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" - }, - { - "text": "community healthcare in the two municipalities. The project team \nincluded three individuals representing users from the Nordland \nMS Association, along with an MS nurse and a neurologist from \nthe MS-outpatient clinic, and three physiotherapists/ researchers. \n\nTABLE 3 Participant demographic information. \n\n\n \n \n \n \n [html]\n
VariableTotal ( n = 15 )
Age in yearsMean 47.6 ( SD 6.04 )
Gender ( women / men )12 woman / 3 men ( 80 %/ 20 %)
Type of MSRelapsing remitting 15 ( 100 %)
EDSSMean 1.8 ( SD 0.9 )
Years since diagnosisMean 10.4 ( SD 7.8 )
Participation in the outdoor groupMean 4.6 sessions / total mean attendance 57.3 %
\n\n2.4 Research team and reflexivity \n\nin \nneurological physiotherapy. BN and ECA developed the \nCoreDISTparticipation intervention, and SSHD contributed to \nthe development of the outdoor part. \n\nAll researchers on the team are clinical specialists \n\nThe researchers’ closeness to the intervention and the \nclinical field may have strengthened the depth and relevance \nof their interpretations in this study (27), as it was easy to \nunderstand what participants described and helped form \nfollow-up questions during the interviews. However, closeness \nmay also produce a risk of “blind spots”, as the researchers \nmay prejudice participants’ experiences, omitting questions \nwhere the answers are believed to be obvious (27). Thus, \nand rigor were \nthe process, \nthroughout \nenhanced by discussing \nand \ninterpretations with external researchers (including specialists \nin enactive theory), as well as user \nrepresentatives. The \nframework (enactive theory) enhanced \npresented theoretical \nthe distance to the material, as recommended in qualitative \nresearch (28). \n\ntrustworthiness \nthe methodology, findings,", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "given the heterogenic pathology and symptoms of MS (41, 42). \nHowever, our findings illuminate qualitative aspects of how to \nachieve tailored and meaningful intersubjective interactions in an \nexercise intervention. \n\nmotivated for physical activity (PA), employed, and residing in \nnorthern Norway. Ethnicity or socio-economic class were not \nrecorded. However, considering that all \nthese factors can \ninfluence PA engagement (46), \nit is possible that additional \naspects of the phenomenon could be uncovered in a different \nsample \n(48). There was a higher percentage of women \nparticipating than men; however, this corresponds to the gender \ndistribution in the MS population (1). \n\nThe use of enactive theory was innovative within the field and \nallowed for, \nimportance for self- \nefficacy to be identified. Transference of our results to similar \npopulations can be achieved through theoretical generalization (28). \n\nit appears that \n\nin particular, new aspects of \n\nthe physiotherapists’ ability to adapt \n\nWe consider the instances of the physiotherapist running \ntogether with the participant, which were perceived as important \nfor participants’ performance, to be an example of “participatory \nsense-making” (22). As participants appreciated being guided or \nthe \neven pushed by the physiotherapists, \nphysiotherapists were trusted in directing this interaction. As \nsuch, we argue that \nto \nparticipants’ movements, \nspeech and gestures—tailoring the \ninteraction to their needs—was important for this ability to be \nperceived as purposeful. This is supported by the few negative \nincidents \nparticipant-physiotherapist \ninteraction seemed to not be jointly coordinated and appeared to \nfail. The reported mutual influences of sensorimotor capabilities \nand interpersonal coordination, with the physiotherapists but \nalso the group, are in accordance with sensorimotor capacities \nand intersubjective interactions being important \nsense- \nmaking in the world (35). The benefits of these individualized \nparticipant-physiotherapist \ninteractions are also described in \nspecific core-stability exercises in indoor groups (16, 43) and are \nin line with the \nfacilitation of \nthrough hands-on interaction previously proposed \nmovement \n(44, 45). Our study informs new knowledge of physiotherapist- \nparticipant \nto achieve the recommended high- \nintensity training and calls for physiotherapy clinical reasoning \nthrough bodily and verbal communication skills adapted to the \nparticipants’ responses in an ongoing and situated way. \n\ndescribed where the \n\nand detailed \nsensorimotor exercises was valued and provided meaningful \nembodied experiences, improving participants’ ability to master \nPA and their beliefs of their own possibilities for being active in \nthe future. However, the manner in which the content of an \nexercise intervention is delivered and the environment in which \nit is delivered should be accounted for, as these aspects were \nperceived to be of great importance in creating and shaping \nparticipants’ experiences. In particular, tailored physiotherapist- \nparticipant bodily interactions and an engaging group and \noutdoor \nfor \nexploring one’s own potential. \n\nCombining high-intensity walking/running \n\nenvironment were perceived to be pertinent \n\nTo minimize negative incidents in future interventions, we \nsuggest that (1) the effort required from one’s leg muscles \nduring the detailed exercises (in between the running/walking \nnegative \nintervals) \nconsequences of \nleg muscle fatigue prior to high-intensity \nrunning/walking, (2) the capacity for running/walking at high- \nintensity should be explored in one-to-one physiotherapy \nassessment prior to group training to optimize individuals \ncapabilities and safety, and (3) homogenous and small-sized \ngroups \nshould be used to enable ongoing and tailored \nphysiotherapist-participant interactions.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed13.pdf" - }, - { - "text": "Background and purpose: Physical activity (PA) is often reduced in people with \nMS (pwMS), even when disability is low. Understanding the perspectives of pwMS \non interventions aiming to improve PA is important to inform the development \nof such services. The aim of \nthis study was to explore the experiences \nof pwMS participating in an outdoor, high-intensity and balance exercise \ngroup intervention. \nMethods: This qualitative study was nested within an RCT exploring a novel \nintervention integrating sensorimotor exercises with high-intensity intervals of \nin-depth interviews with the intervention group \nrunning/walking. \n(n = 15; 12 women, 3 men; age 38–66; EDSS score 0–3.5) were conducted \npostintervention (mean days = 14), analyzed using a phenomenological- \ninspired approach with systematic text condensation, and interpreted based on \nenactive theory. \nResults: Four categories were generated: (1) Exploration of one’s own physical \nabilities: Challenging one’s own limits was perceived by all participants to \nimprove movement performance and/or intensity level. Such bodily changes \nengendered strong positive feelings. Some negative consequences of high- \nintensity training were described, increasing a feeling of loss. (2) New insights \nand beliefs: Participants experienced enhanced beliefs \nin their own \ncapabilities, which they integrated in activities outside the intervention. (3) An \nengaging environment: The group setting was perceived as supportive, and \nthe outdoor environment was perceived as stimulating activity. (4) Professional \nleadership, \ntailoring and co-creation of enjoyment: Physiotherapist-led, \nindividualized interactions were regarded as necessary to safely revisit prior \nactivities, such as running. Co-creating enjoyment facilitated high-intensity \ntraining and intervention adherence. \n\nIndividual,", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed13.pdf" - }, - { - "text": "The meaningfulness of exploring \none’s own limits through \ninteractions and enjoyment \nin outdoor high-intensity \nphysiotherapy for people \nwith multiple sclerosis: a \nqualitative study \n\nStine Susanne Haakonsen Dahl1*, Ellen Christin Arntzen1 and \nBritt Normann1,2 \n\n1Faculty of Nursing and Health Sciences, Nord University, Bodø, Norway, 2Department of Physiotherapy, \nNordland Hospital Trust, Bodø, Norway \n\n\n \n \n \n \n [html]\n
OPEN ACCESS
EDITED IIY
Jacqui H Morris,
University of Dundee, United Kingdom
REVIEWED IIY
Nicola Saywell, Auckland University of Technology, New Zealand
Verna Stavric,
Auckland University of Technology, New Zealand
+ CORRISPONDENCE
Stine Susanne Haakonsen Dahl
# stine. s. dahl @ nord. no
RECEIVED 27 September 2023
AcccrTto 06 March 2024
Pumusved 18 March 2024
CITATION
Dahl SSH, Arntzen EC and Normann B ( 2024 ) The meaningfulness of exploring one ' s own limits through interactions and enjoyment in
The meaningfulness of exploring one ’ s own limits through interactions and enjoyment in outdoor high - intensity physiotherapy for
people with multiple sclerosis : a qualitative study.
Front. Rehabil. Sci. 5 : 1303094.
doi : 10.5389 / fresc. 2024.1303094
COPYRIGHT
© 2024 Dahl, Arntzen and Normann. This is an open - access article distributed under the terms of the Creative Commons Attribution
License ( CC BY ). The use, distribution or reproduction in other forums is permitted, provided the original author ( s ) and the
copyright owner ( s ) are credited and that the original publication in this journal is cited, in accordance with accepted academic practic
No use, distribution or reproduction is permitted which does not comply with these terms.
", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed13.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_STO_2004.pdf", - "query": "What was the sales revenue of Santos in 2004 ?", - "target_page": 12, - "target_passage": " Sales revenue was a record $1,501 million", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "STATEMENTS OF FINANCIAL PERFORMANCE \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n\n \n \n \n \n [html]NoteCo2004Smillion619Earnings per share ( cents )Diluted\n
2003 $ millionS2004SmillionLtd2003 $ millionProduct sales
21.500.91.465.0568.8616.3
Cost of sales3( 1.049.8 )( 974.4 )( 414.5 )( 356.6 )
Gross profit451.1490.6154.3259.7Other revenue
2252.3154.4858.0126.2
Other expenses3( 129.0 )( 179.5 )( 221.0 )( 108.3 )
Borrowing costs4( 33.6 )( 34.6 )( 91.1 )( 84.0 )
Profit from ordinary activities before income tax expense540.8430.9700.2193.6Income tax expense relating to ordinary activities
( 160.9 )( 103.9 )( 57.1 )( 10.7 )
Net profit after income tax attributable to the shareholders of Santos Ltd379.9327.0643.1182.9Net exchange differences relating to self - sustaining foreign operations
( 0.2 )( 4.7 )
Total changes in equity from non - owner related transactions attributableto the shareholders of Santos Ltd379.7322.3643.1182.9
Basic2158.652.1
2158.551.5
", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**2004 WAS A YEAR OF GOOD**\n**OPERATING RESULTS**\nOverall the increase in 2004 profit \nof 16% reflected a year of sound \noperating performance. Sales \nrevenue was a record $1,501 \nmillion, up 2.5% on 2003, \nreflecting higher prices across \nmost products and was achieved \ndespite lower production as a \nresult of the Moomba incident \nand declining output from late \nlife fields. \n\n**‘The sound operating results**\n**achieved in 2004 underline**\n**the changing face of Santos**\n**towards a higher value, higher**\n**margin business. We ended the**\n**year with a strong financial**\n**position and our financial**\n**flexibility intact.’**\n\nSantos benefited from higher \nworld oil prices and realised \nUS$51.83 per boe in 2004, an \nincrease of 19% over 2003. The \nbenefit of higher world oil prices \nsubstantially offset the impact \nof lower production volumes. \n**PETER WASOW**\nChief Financial Officer \n\nSantos was also able to negotiate \nhigher domestic gas prices (up \n4% on average) and deliver new \nrevenue streams from project \nstart-ups and acquisitions during \nthe year. \n\n\n \n \n \n \n [html]decline reduced n by a furthern boe.to effectively control its casts in the face of significant external pressures in the form of risingthese factors, Santos ’ ojects are starting to jine and have bequn toExamining production costs in detail. reveals :edecline experienced oast three years. Two vere commissioned in Bayu - Undan liquids▪ the start - up of Bayu - Undan and acquisitions added $ 16 million to Santos ’ cost baseand the Minerva gas n addition, acquisitions▪ changes in our accounting added a further $ 16 million to Santos ’ production costsproduction is expected• higher insurance premiums ($ 8 mllion ) and one - off stock res.The impact of the ncident. Santos now roduction to be around boe in 2005. Thisoffset by $ 17 million in cost savings largely as a result of Santos ' continuous improvement initiativess largely driven by the oning of Mutineer - Exeter 2005 and the 3ohnthe Moomba incident resulted in $ 17 million of one - off costs in 2004.as field in the middle ar.Piecing this together, the key themes in our financial performance were :ION COSTS DNTROLcosts in 2004 were lon, up $ 45 million or 003. Analysis shows os was able to continue\n
▪ cost savings in established production areas more than offset increases in the price of services and materialsMean definitionε0Santos ’ cost : base rose as production from new developments and acquisitions were added to the Company ’ s expanding portfolio of producing assets.
0.465Table4030
zo32710
", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\n**1,544.3**\n**–**\n**3.5**\n**14.5**\n**19.9**\n**(583.6)**\n**(169.6)**\n**(65.2)**\n**(158.8)** 1,637.3 \n0.4 \n2.5 \n17.0 \n28.2 \n(439.9) \n(118.7) \n(60.9) \n(168.6) **644.4**\n**251.7**\n**45.1**\n**19.0**\n**18.0**\n**(279.0)**\n**(78.4)**\n**(90.6)**\n**(137.5)** 683.0 \n0.4 \n36.9 \n22.1 \n1.6 \n(186.4) \n(39.8) \n(83.6) \n(65.1) \n\n**605.0** 897.3 **392.7** 369.1 \n\n**Cash flows from operating activities**\nReceipts from customers \nDividends received \nInterest received \nOverriding royalties received \nPipeline tariffs and other receipts \nPayments to suppliers and employees \nRoyalty, excise and PRRT payments \nBorrowing costs paid \nIncome taxes paid \n\n**Net cash provided by operating activities**\n\n**Cash flows from investing activities**\nPayments for: \n\nExploration \nDelineation \nDevelopment \nLand and buildings, plant and equipment \nAcquisitions of oil and gas assets \nAcquisitions of controlled entities \nShare subscriptions in controlled entities \nRestoration \n\nProceeds from disposal of non-current assets \nProceeds from disposal of controlled entities \nOther investments \n\n**Net cash used in investing activities**\n\n**Cash flows from financing activities**\nDividends paid \nProceeds from issues of ordinary shares \nProceeds from issue of redeemable convertible preference shares \nRedemption of reset convertible preference shares \nNet drawdowns/(repayments) of borrowings \nNet (payments to)/receipts from controlled entities \nPremium paid on buy-back of reset convertible preference shares \nOther \n\n**Net cash (used in)/provided by financing activities**\n\n**Net increase/(decrease) in cash**\n**Cash at the beginning of the year**\nEffects of exchange rate changes on the balances of cash held in foreign currencies \n\n**Cash at the end of the year**\n\n(149.8) \n(75.0) \n(188.1) \n(337.8) \n(7.6) \n(22.7) \n– \n(2.6) \n108.0 \n22.6 \n– \n\n(653.0) \n\n(198.0) \n8.3 \n– \n– \n(20.4) \n– \n– \n– \n\n(210.1) \n\n34.2 \n84.8 \n(7.9) \n\n111.1 \n\n**(65.7)**\n**(6.1)**\n**(124.4)**\n**(127.7)**\n**–**\n**(93.6)**\n**(151.7)**\n**(0.1)**\n**430.0**\n**–**\n**(0.5)**\n\n**(139.8)**\n\n**(212.8)**\n**6.4**\n**589.5**\n**(350.0)**\n**–**\n**(297.0)**\n**(2.4)**\n**–**\n\n**(266.3)**\n\n**(13.4)**\n**52.9**\n**(0.2)**\n\n**39.3**\n\n(30.6) \n(29.5) \n(68.7) \n(91.7) \n(1.5) \n(22.7) \n(469.9) \n(0.3) \n62.7 \n3.9 \n– \n\n(648.3) \n\n(198.0) \n8.3 \n– \n– \n– \n494.1 \n– \n– \n\n304.4 \n\n25.2 \n26.6 \n1.1 \n\n52.9 \n\n**(126.0)**\n**(73.7)**\n**(256.1)**\n**(343.1)**\n**(14.5)**\n**(112.3)**\n**–**\n**(7.3)**\n**39.9**\n**–**\n**(0.5)**\n\n**(893.6)**\n\n**(212.8)**\n**6.4**\n**589.5**\n**(350.0)**\n**282.8**\n**–**\n**(2.4)**\n**0.4**\n\n18 \n18 \n\n**313.9**\n\n**25.3**\n**111.1**\n**(8.4)**\n\n**128.0**\n\nThe statements of cash flows are to be read in conjunction with the notes of the financial statements.", - "page_start": 53, - "page_end": 53, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Electronic enquiries can also be submitted through the Contact Us \nsection of the Santos website, www.santos.com. \n\n**SHAREHOLDERS’ CALENDAR**\n\n2004 full year results announcement 23 February 2005 \n\n\n \n \n \n \n [html]\n
2004 full year results announcement23 February 2005
Ex - dividend date for 2004 full, year dividend28 February 2005
Record date for 2004 full year dividend4 March 2005
Payment date for 2004 full year dividend31 March 2005
Annual General Meeting20 May 2005
Half year end30 June 2005
2005 interim results announcement16 August 2005
Full, year end31 December 2005
QUARTERLY REPORTING CALENDAR2005 First Quarter Activities Report
27 April 20052005 Second Quarter Activities Report
27 July 20052005 Third Quarter Activities Report
2.0ctober 20052005 Fourth Quarter Activities Report
25 January 2006
", - "page_start": 93, - "page_end": 93, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Consolidated** **Santos Ltd**\n\n\n \n \n \n \n [html]20. Retained Profitsated2003 $ millionSa2004Smillion871.97 October 2004 on 2.865.821 shares, fully franked14.387.4Interim dividend of 15.0 cents per ordinary share paid on 30 September 2004,fully franked ( 2003 : 15.0 cents per share, fully franked )Subsequent to reporting dateSince the end of the financial year, the Directors have declared the following dividends payable on 31 March 2005 :\n
Co2004Smillion
Ltd2003 $ millionBalance at the end of the year1.368.31.203.61.299.8
Movements during the yearBalance at the beginning of the year1.203.6983.2
871.9795.5Effect of irritial adoption of revised AASB 1028 “ Employee Benefits ”( 1.9 )
-( 1.8 )Effect of initial adoption of AASB 1044 “ Provisions, Contingent Liabilities andContingent Assets *
93.3-93.3Net profit after income tax attributable to the shareholders of Santos Ltd379.9
327.0643.1182.9Dividends recognised during the year( 212.8 )
( 198.0 )( 212.8 )( 198.0 )Premium paid on buy - back of reset convertible preference share( 2.4 )
( 2.4 )Balance at the end of the year1.368.3
1.203.61.299.8871.9Dividends provided for and paid by the CompanySpecial dividend of $ 5.00 per redeemable convertible preference share paid on
14.3Preferential, non - cumulative dividend of $ 3.2940 per reset convertible preference share paid on 31 March 2004, fully franked ( 2003 : 53.2760 per share providedand paid on 31 March 2003, fully franked )
11.511.511.511.5Preferential, non - cumulative dividend of $ 3.2940 per reset convertible preference share paid on 30 September 2004, fully franked ( 2003 : $ 3.2940 per share pald on
30 September 2003, fully franked )11.511.511.511.5
Final 2003 dividend of 15.0 cents per ordinary share paid on 31 March 2004,fully franked ( 2003 : 15.0 cents per share, fully franked )87.787.487.7
87.887.687.8
87.6212.8198.0
212.8198.0
Final 2004 dividend of 18.0 cents per ordinary share, fully franked105.4105.4
", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "A large proportion of the costs \nand foregone revenues associated \nwith the repair of the damaged \nplant and the reduced oil and \ngas production volumes are \nbeing recovered under \ninsurance policies. \n\nImportantly, Santos was able \nto work effectively with its key \nstakeholders, including customers, \njoint venturers and government \ndepartments, to minimise the \ncommercial impacts. \nEven with the large effort \nexpended on the Moomba \nincident, Santos was able to \ndeliver strong results for 2004, \nreflecting higher average prices \nacross most products. \n\nNatural gas supplies were quickly \nrestored, in part by recovering \nprocessed gas from underground \nstorage reservoirs. Liquids \nprocessing facilities were \nprogressively reinstated allowing \nfurther increases to gas production \nand sales volumes, with the \nramp-up to full liquids production \nachieved by August as planned. \n\nThis strong financial performance, \ncombined with the confidence \nthat Santos will continue to grow \nearnings in the future, enabled \nthe Board to increase the final \ndividend on ordinary shares by \n20% from 15 cents to 18 cents \nper share, fully franked. For the \nfull year, dividends increased \nby 10% to 33 cents per share, \ncompared with 30 cents per share \n\nAnnual Report 2004", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Consolidated** **Santos Ltd**\n\n\n \n \n \n \n [html]18. Contributed EquityCo2004Smillionated2003 $ million1.557.2( a )157.014Santos Employee Share Purchase Plan( f )Balance at the end of the year3.500.000( g )Share issue costTransfer from reset convertible preference shares581.8\n
S2004SmillionSantos Ltd4nShare capital585.520.675 ( 2003 : 584.475.013 ) ordinary shares, fully paid
1.550.81.557.21.550.8181.000 ( 2003 : 231.000 ) ordinary shares, paid to one cent
Nii ( 2003 : 3.500.000 ) reset convertible preference shares342.3
342.36.000.000 ( 2003 : nil ) redeemable convertible preference shares581.8581.8
Movement in fully paid ordinary sharesObte2004Number of shares2004Smillion2003 $ millionBalance at the beginning of the year
584.475.013582.782.2931.550.81.542.5Santos Executive Share Plan
50.00035.7500.10.1Santos Employee Share Acquisition Plan
( b )254.1061.3
1.5( c )123.648152.864
0.91.0Shares issued on exercise of options( d )715.0001.250.000
4.15.7Balance at the end of the year585.520.675584.475.0131.557.2
1.550.8Movement in reset convertible preference sharesBalance at the beginning of the year3.500.0003.500.000342.3
342.3Transfer to redeemable convertible preference sharesTable7.7
Shares redeemed0 )( 350.0 )
342.3Movement in redeemable convertible preference shares
Balance at the beginning of the year
Shares issued6.000.000600.0
( 10.5 )
( 7.7 )Balance at the end of the year6.000.000
\n\nShares were issued principally on: 22 December 1987; 7 February and 5 December 1989; and 24 December 1990. In 1997 the Board determined \nthat the Plan be discontinued and, accordingly, there has been no further issues of shares under the Plan. \n\nAt the beginning of the financial year there were 231,000 Plan Shares on issue. During the financial year 50,000 Plan Shares were fully paid and \naggregate proceeds of $138,200 received by the Company. As at 31 December 2004 there were 181,000 Plan Shares outstanding. \n\n**(b) Santos Employee Share Acquisition Plan**", - "page_start": 63, - "page_end": 63, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million **15. Interest-Bearing Liabilities**\n\n**Current**\nAmounts owing to controlled entities \nLong-term notes \nBank loans \nOther **–**\n**43.7**\n**5.2**\n**1.0** – \n45.4 \n– \n– **1,685.4**\n**–**\n**–**\n**1.0** 1,411.7 \n– \n– \n– \n\n**49.9** 45.4 **1,686.4** 1,411.7 \n\nThe interest-bearing amounts owing to controlled entities are for loans made in the \nordinary course of business on normal market terms and conditions for an indefinite period. \n\n**Non-current**\nBank loans \nCommercial paper \nMedium-term notes \nLong-term notes **222.7**\n**209.0**\n**20.0**\n**757.8** – \n110.0 \n20.0 \n833.3 **–**\n**–**\n**–**\n**–** – \n– \n– \n– \n\n**1,209.5** 963.3 **–** – \n\n**Details of major credit facilities**\n**(a) Bank loans**\nThe Santos Group has access to the following committed revolving facilities: \n\n***Revolving facilities at 31 December 2004***\n**Year of maturity** **Currency**\n\n2005 \n2006 \n2008 \n2009 Multi-currency \nMulti-currency \nMulti-currency \nMulti-currency \n\n**Amount**\n**A$million**\n\n**75.0**\n**125.0**\n**300.0**\n**200.0**\n\n**700.0**\n\nRevolving bank loans bear interest at the relevant interbank reference rate plus 0.25% to 0.43%. The amount drawn at 31 December 2004 \nis $nil (2003: $nil). \n\n***Term facilities at 31 December 2004***\n**Year of maturity** **Currency** **Amount**\n\n**Amount Drawn at**\n**31 December 2004**\n**A$million** **A$million**\n\n2005 \n2006 \n2007 \n2008 \n2009 \n2010 \n2011 \n2012 \n2013 \n2014 \n2015 \n2016 \n2017 USD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD **5.2**\n**10.5**\n**20.6**\n**19.7**\n**24.5**\n**25.4**\n**26.3**\n**22.6**\n**19.0**\n**20.0**\n**20.4**\n**20.8**\n**21.9** **5.2**\n**10.5**\n**18.6**\n**18.1**\n**22.3**\n**23.0**\n**23.8**\n**20.0**\n**16.2**\n**17.0**\n**17.3**\n**17.5**\n**18.4**\n\n**256.9** **227.9**\n\nDrawdowns under the term loans are dependent upon expenditure for specific projects. \n\nTerm loans bear interest at the relevant interbank reference rate plus a margin of up to 0.75%. The amount drawn at 31 December 2004 \nis US$177.5 million (A$227.9 million) at a weighted average annual effective interest rate of 2.70%. \n\n**(b) Commercial paper**\n\nThe Santos Group has an A$800.0 million (2003: A$800.0 million) Australian commercial paper program supported by the revolving facilities \nreferred to in (a) above. At 31 December 2004, A$209.0 million (2003: A$110.0 million) of commercial paper is on issue and the weighted \naverage annual effective interest rate is 5.61% (2003: 5.50%).", - "page_start": 61, - "page_end": 61, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Due to the long cycle times \ninherent in the oil and gas \nbusiness, it had been recognised \nthat 2004 would be a year in \nwhich production was marginally \nbelow the previous year, with \nsubsequent increases in 2005 \nand beyond driven by new \ndevelopment projects. \n\nin each of the four previous \nyears. On a grossed up basis, this \nrepresents a yield of over 5%. \n\nyear of safety improvement \nwith an 11% reduction in the \n2004 total recordable case \nfrequency rate. \n\nIn response to increasing interest \nand enquiry from shareholders, \nthe Dividend Reinvestment Plan \nhas been reintroduced and \napplied to the final dividend \npaid during March 2005. \n\nMr Frank Conroy retired from \nthe Board of Directors during \nDecember 2004. A member of the \nBoard for five years, Mr Conroy \nbrought extensive business and \ncorporate experience to the \nBoard and I thank him for his \noutstanding contribution. \n\nIn this light, it is pleasing to \nreport that the Minerva gas and \nBayu-Undan liquids projects \ncommenced production during the \nyear as planned, while first oil \nfrom Mutineer-Exeter and several \nother key growth projects are \nprogressing to plan. \n\nSantos continued its proactive \napproach to capital management \nwith the redemption and buyback \nof the outstanding Preference \nShares and the issue of FUELS \n(Franked Unsecured Equity Listed \nSecurities). This initiative was \ndriven by the alignment of \nAustralian accounting standards \nwith international requirements, \nand closed oversubscribed, raising \n$600 million in new equity. \n\nIn February 2005 we appointed \ntwo new Board members, Mr \nKenneth Dean from Shell, and \nMr Christopher Recny from the \ninternational management \nconsultancy firm, L.E.K. These \nindividuals further strengthen \nthe composition of the Board, \nbringing strong international \noil and gas expertise and \noutstanding management \nexperience. \n\nIndonesia matured into a core \narea during 2004, through a \nstrategy of prudent acquisition, \nportfolio management and \nexploration. In particular, the \nJeruk discovery has the potential \nto add significant value, with \nfurther evaluation activities \nunderway. \nThe total shareholder return for \nthe year, including share price \nappreciation and dividends paid, \nwas 28% – an excellent result. \n\nFinally, I’d like to acknowledge \nthe extraordinary effort made by \neveryone at Santos to keep the \nCompany moving forward during \nthis challenging year. \n\n\n\nStephen Gerlach \n**Chairman**\n21 March 2005 \n\nDear Shareholder, \n\nI am pleased to report that \nin 2004 Santos continued \nto deliver on its strategy to \ntransform the Company into a \ntruly international exploration \nand production business with \nworld-class operations. \n\nWhile the year saw many \npositives in terms of development \nand exploration success, it did \nnot get off to a good start with \nthe incident on New Year’s Day \nat the Moomba processing facility \nin central Australia. \n\nIn addition to our focus \non shareholder value, Santos \ntakes its corporate social \nresponsibilities seriously and \nis committed to sustainability \nas a core value in all operations. \nThe Company’s first Sustainability \nReview was released during \nthe year. \n\nI am confident that the \nsignificant achievements made \nduring 2004 provide Santos with \na solid platform from which to \nachieve future growth with \nincreased value for our \nshareholders. \n\nGroup sales revenue increased by \n2.5% to a record $1,501 million, \nearnings before interest and tax \nimproved by 23% to $574 million \nand net profit after tax rose by \n16% to $380 million. \n\nSantos continues to be \nrecognised for the high quality \nof its corporate governance, \nreceiving a measure of five out \nof five for corporate governance \nfor the third successive year \nin an independent report prepared \nby leading accounting and \nmanagement firm, Horwath, \nand the University of Newcastle.", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "1002.2525.pdf", - "query": "How have been confirmed nonvanishing neutrino ?", - "target_page": 2, - "target_passage": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation \n\nphenomena and indicate the evidence of new physics beyond the Standard Model. The most \n\nattractive idea to naturally explain the tiny neutrino masses is the seesaw mechanism [1], in \n\nwhich the right-handed (RH) neutrinos singlet under the SM gauge group are introduced. \nU(1)Y × \nL model based on the gauge group SU(3)C × \nL [2] is an elegant and simple extension of the SM, in which the RH neutrinos of \n\nThe minimal gauged U(1)B \nSU(2)L × \n− \n\nU(1)B \n− \n\nthree generations are necessarily introduced because of the gauge and gravitational anomaly \n\nIn addition, the mass of RH neutrinos arises associated with the U(1)B cancellations. L \n− \n\ngauge symmetry breaking. \n\nAlthough the scale of the B L gauge symmetry breaking is basically arbitrary as long as \n− \n\nphenomenological constraints are satisfied, one interesting option is to take it to be the TeV \n\nscale [3]. It has been recently pointed out [4] that when the classical conformal invariance \n\nis imposed on the minimal U(1)B L model, the symmetry breaking scale appears to be the \n− \n\nTeV scale naturally. If this is the case, all new particles, the Z ′ gauge boson, the B L \n\n− \nL gauge Higgs boson H and the RH neutrinos appear at the TeV scale unless the U(1)B \n− \n\ncoupling is extremely small, and they can be discovered at Large Hadron Collider [5–8]. \n\nThen we may be able to understand the relation between the gauge symmetry breaking and \n\nthe origin of neutrino masses. \n\nAlthough such a TeV scale model is interesting and appealing, one might think that the \n\nabsence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino \n\nwith mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple \n\nidea to introduce the DM candidate in the minimal gauged U(1)B L model. We introduce \n− \n\nthe Z2 parity into the model and impose one of three RH neutrinos to be odd, while the \n\nothers even. In this way, the Z2-odd RH neutrino becomes stable and the DM candidate. \n\nNote that two RH neutrinos are enough to reconcile with the observed neutrino oscillation \n\ndata, with a prediction of one massless light neutrino. Therefore, without introducing any \n\nadditional new dynamical degrees of freedom, the DM particle arises in the minimal gauged \n\nU(1)B L model. \n− \n\nThe paper is organized as follows. In the next section, we briefly describe our model. In \n\nsection III, we estimate the thermal relic density of the RH neutrino and identify the model", - "page_start": 1, - "page_end": 1, - "source_file": "1002.2525.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "(2009). \n21 A. B. Harris, A. J. Berlinsky, C. Bruder, J. Appl. Phys. \n69, 5200 (1991). \n22 K. A. Chao, J. Spa lek, A. M. Ole´s, Phys. Rev. B 18, 3453 \n\n(1978). \n23 A. H. MacDonald, S. M. Girvin, D. Yoshioka, Phys. Rev. (2007). \n11 S. Yang, D. L. Zhou, C. P. Sun, Phys. Rev. B 76, B 37, 9753 (1988). \n24 J. T. Chayes, L. Chayes, S. A. Kivelson, Commun. Math. 180404(R) (2007). \n12 Hong Yao, Shou-Cheng Zhang, Steven A. Kivelson, Phys. Phys. 123, 53 (1989). \n25 C. D. Batista, S. A. Trugman, Phys. Rev. Lett. 93, 217202 Rev. Lett. 102, 217202 (2009). \n13 Zohar Nussinov, Gerardo Ortiz, Phys. Rev. B 79, 214440 (2004).", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0266.pdf" - }, - { - "text": "26 K. S. Raman, R. Moessner, S. L. Sondhi, Phys. Rev. B 72, \n33 D. L. Bergman, R. Shindou, G. A. Fiete, L. Balents, Phys. 064413 (2005). \n\n27 D. F. Schroeter, E. Kapit, R. Thomale, and M. Greiter, \nPhys. Rev. Lett. 99, 097202 (2007); R. Thomale, E. Kapit, \nD. F. Schroeter, and M. Greiter, Phys. Rev. B 80, 104406 \n(2009). \n\nRev. B 74, 134409 (2006). \n34 Fa Wang, Ashvin Vishwanath, Phys. Rev. Lett. 100, \n077201 (2008). \n\n35 O. Tchernyshyov, G.-W. Chern, arXiv:0907.1693 (2009). \n36 Y. Taguchi, Y. Oohara, H. Yoshizawa, N. Nagaosa, Y. 28 O. Tchernyshyov, R. Moessner, S. L. Sondhi, Phys. Rev. \n\nLett. 88, 067203 (2002). Tokura, Science 291, 2573 (2001). \n\n29 F. Becca, F. Mila, Phys. Rev. Lett. 89, 037204 (2002). \n30 K. Penc, N. Shannon, H. Shiba, Phys. Rev. Lett. 93, \n37 X. G. Wen, Frank Wilczek, A. Zee, Phys. Rev. B 39, 11413 \n(1989); X. G. Wen, Phys. Rev. B 40, 7387 (1989). \n\n38 Dimitris I. Tsomokos, Juan Jos´e Garc´ıa-Ripoll, Nigel R. \nCooper, Jiannis K. Pachos, Phys. Rev. A 77, 012106 \n(2008). \n\n197203 (2004). \n31 C. Weber, F. Becca, F. Mila, Phys. Rev. B 72, 024449 \n(2005). \n32 G.-W. Chern, C. J. Fennie, O. Tchernyshyov, Phys. Rev.", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0266.pdf" - }, - { - "text": "The DM RH neutrino interacts with the SM particles through couplings with B L \n− \n\ngauge and B L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent \n− \n\nbecause of the Z2 parity. The most of annihilation of the RH neutrinos occurs via Z ′, H and \n\nh exchange processes in the s-channel. In practice, the dominant contributions come from \n\nthe Higgs (h and H) exchange diagrams, because the Z ′ exchange processes are suppressed \n\nL Higgs VEV v′ & 3 TeV. Thus, we obtain Higgs portal DM \nby the inverse square of the B \nof RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯f , \n\n− \n\nW +W −, ZZ, and h(H)h(H). Since RH neutrino DM couples to only B L Higgs Ψ while \n− \n\na SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing \n\nbetween these two Higgs bosons. Although it is not so severe, the precision electroweak \n\nmeasurements [12] as well as the unitarity bound [13] give constraints on the mixing angle \n\nand mass spectrum of the Higgs bosons. \n\nThe thermal relic abundance of DM \n\n109 mN /Td \n√g \nσv \nMP h \n\nΩN h2 = 1.1 1, GeV− (14) \n× \ni \n\nwith the Planck mass MP , the thermal averaged product of the annihilation cross section \n\nσv and the relative velocity , the total number of relativistic degrees of freedom in the \nh i \n\nthermal bath g , and the decoupling temperature Td, is evaluated by solving the Boltzmann \n∗ \n\nequation for the number density of RH neutrino nN ; \n\ndnN \ndt \n(n2 \nn2 \nEQ), \n+ 3HnN = σv \nN − −h i \n\nand the Friedmann equation \n\n2 \n\n˙a \na(cid:19) \n8π \n3M 2 \nP \n= \n≡ (cid:18) \n\nwith nEQ and a(t) being the equilibrium number density and the scale factor, under the \n\nradiation dominated Universe with the energy density ρ = ρrad [14]. \n\n5", - "page_start": 4, - "page_end": 4, - "source_file": "1002.2525.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
912 ( 1980 ).IL 3. Mediapatters and IL E. Marduk. Pleys. Ilev. Lett, 44.1110 ( 1090 ) [ Erratum - bid. 44.161080 ]: IL E. Menhak and R. N. Melaquera, Pleys. Lett. II HI : 222 ( 1390 ). S. Exalel, J. Pleys. G. ID5001 ( 200 ).
[ 4 ] S. los, X. Olads and Y. Ordinoa, Phys. Lett. 13.676.83 ( 2009 ); Plev. Bev. D. 80.11007 ( 2009 ).[ 3 ] W. Emain and S. Khalil, Eur. Phys. J. ( 122.625 ( 2907 ),[ 6 ] K. Huitu, S. Khali, H. Olasla and S. K. Rai, Phys. Rev. Lett. 101.181802 ( 2008 ).7 ) L. Daseo, A. Belyaer, S. Morrtti and C. H. Shenkers '- Theuistocleume, Phyx. Rev. D. 80.0G000 ( 2009 ).
[ 8 ] P. F. Perea, T. Hian and T. Li, Flyx. Ilev : D. 80, ( 73015 ( 2009 ). [ 9 ] S. Khalil and O. Seto, JCAP 0810.021 ( 2008 ).[ 10 ] M. S. Cureus. A. Duleo, B. A. Dohoroexn and T. M. P. Tait, Pley, Bev. D. T0.00009 ( 2000 ). [ 11 ] G. Cuerispaglia, C. Osaki, G. Marandella and A. Strenia, Piyx. Bev. D P4.03011 ( 2000 ).[ 12 ] S. Davson and W. Yan, Plys. Rev. D 79.095002 ( 2009 ). [ 13 ] L. Bases, A. Belyaev, S. Moretti and G. M. Pruna, arkiv
[ 14 ] E. W. Koilb and M. S. Turner, The Eirly Universe, Addison - Wodey ( 1990 ). [ 15 ] D. N. Spergel et al. [ WMAP Collaboration ], Astrophys. J. Strppl. IFN, 377[ 16 ] J. McDonald, Phys. Rev. D 50.3637 ( 1994 ).[ 17 ] C. P. Ehrgese, M. Psepdov and T. text Veldhike. Nucl. Phys. B 619.709 ( 2001 ). [ 19 ] H. Dovondiaed, B. Kitano, T. Li and H. Muropamas, Phys. Lett.. I3 609.117 ( 200
[ 19 ] T. Kikuchi and N. Okada, Phys. Lett. B 665.186 ( 2008 ).[ 20 ]. C. E. Yaguna, JCAP 0003.000 ( 2000 )].[ 21 ] L. M. Kcauus, S. Naori and M. Trodifen, Phys. Rev. II - 67.085002 ( 2003 ). [ 22 ]. E. A. Baltz and L. Bergstroma, Pleys. Rev. D 67.043516 ( 2000 ).
[ 23 ]. K. Cheung and O. Seto, Phys. Rev. D 69.113009 ( 2004 ).[ 24 ]. J. Angle et al. [ XENON Collaboration ]. Phys. Rev : Lett. 10.021803 ( 2008 ). [ 25 ]. Z. Almed et al. [ The CDMS - II Collaboration ], acKiv : 9012.3002 [ setre - pk. CO ].[ 26 ] http :// xenon. astro. columbia. edu /.
", - "page_start": 12, - "page_end": 12, - "source_file": "1002.2525.pdf" - }, - { - "text": "The Higgs fields φ and ψ are obtained by expanding Φ and Ψ as \n\n0 \n(5) \n\n1 \n√2 \n\n \n1 \n√2 \n\naround the true vacuum with the vacuum expectation values v and v′. These are related \n\nwith the mass eigenstates h and H through \n\nh cos θ sin θ φ \n\n− \ncos θ \n, \n=  \n(7) \n     \nH sin θ ψ \n\n \n \nwith θ being the mixing angle. Their masses are given by \n\n    \n\nM 2 \nh = 2λ1v2 cos2 θ + 2λ2v′ \n2 sin2 θ 2λ3vv′ sin θ cos θ, (8) \n− \n\nM 2 \nH = 2λ1v2 sin2 θ + 2λ2v′ 2 cos2 θ + 2λ3vv′ sin θ cos θ. (9) \n\nThe mass of the new neutral gauge boson Z ′ arises by the U(1)B L gauge symmetry \n− \n\nbreaking, \n\nM 2 \nZ ′ = 4g2 \nB \n2. \nLv′ \n(10) \n− \n\nAssociated with the U(1)B L gauge symmetry breaking, the RH neutrinos Ni acquire masses \n− \n\nv′ \n√2 \nMNi = \n(11) \n\nFrom LEP experiment, the current lower bound on the Z ′ boson mass has been found to \n\nbe [10, 11] \n\nMZ ′ \ngB \n= 2v′ & 6 7 TeV. (12) \n− L \n− \n\nTwo Z2-even RH neutrinos N1 and N2 are responsible for light neutrino masses via the \n\nseesaw mechanism, \n\nv2 \n2MNi \nmναβ = yαiyiβ . (13) \n\n− Xi=1,2 \nNote that the rank of this mass matrix is two, so that the lightest neutrino is massless.", - "page_start": 3, - "page_end": 3, - "source_file": "1002.2525.pdf" - }, - { - "text": "ports 61, 129 (2006). \n\n13 E. Weschke, et al., Phys. Rev. Lett. 93, 157204 (2004). \n14 F. Cinti, A. Cuccoli, and A. Rettori, Phys. Rev. B 78, \n020402(R) (2008). \n15 F. Cinti, A. Cuccoli, and A. Rettori, Phys. Rev. B 79,", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" - }, - { - "text": "Our RH neutrino DM can elastically scatter off with nucleon, unlike another RH neutrino \n\nDM model has been proposed by Krauss et. al. [21] and studied [22, 23]. The main process \n\nis Higgs exchange and the resultant cross section for a proton is given by \n\n2 \n\nmpmN \nmp + mN (cid:19) 4 \nπ (cid:18) \nσ(p) \nSI = f 2 \np , \n(17) \n\nwith the hadronic matrix element \n\nfp \nmp αq \nmq αq \nmq 2 \n27 \nf (p) \nT q f (p) \nT G \n, = + (18) \n\nXq=u,d,s Xc,b,t \n\nand the effective vertex (see Appendix for notations) \n\n∂Φ \n∂h ∂Ψ \n∂h ∂Φ \n∂H ∂Ψ \n∂H (cid:19) \n1 \nM 2 \nh 1 \nM 2 \nH \nαq = \nλN yq (cid:18) \n− \n, + (19)", - "page_start": 6, - "page_end": 6, - "source_file": "1002.2525.pdf" - } - ] - }, - { - "references": { - "source_file": "1002.2525.pdf", - "query": "What are the dominant contributions in thermal relic density ?", - "target_page": 5, - "target_passage": "In practice, the dominant contributions come from the Higgs (h and H) exchange diagrams.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Fig. 1 shows the relic density ΩN h2 as a function of the DM mass mN for a set of \n\nparameters: (v′, Mh, MH, MZ ′, sin θ) = (4000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7), for \n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as \n\nΩDM h2 \nonly near Higgs resonances, mN ≈ \n\n0.1 [15]. The figure shows that a desired DM relic abundance can be obtained for \n≃ \n\nMh/2 or MH /2. \n\nFig. 2 shows the relic density ΩN h2 as a function of the DM mass mN for a smaller Higgs \n\nmixing sin θ = 0.3 (others are the same as in Fig. 1). Compared with Fig. 1, for mN . MW \nwhere the DM particles dominantly annihilate into f ¯f , the relic density further increases \n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into \n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not \n\nenough to reach ΩN h2 \n≃ \n\n 1000 \n\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter \n\nset: (v′, Mh, MH, MZ ′, sin θ) = (3000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7). \n\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16–18]. \n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the \n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and \n\nthe DM particle. In our model, B L Higgs VEV v′ can play the same role for mN < MW , \n− \n\nnamely a larger v′ corresponds to weaker coupling between DM and Higgs for a fixed DM \n\nmass. On the other hand, for mN > MW the difference appears. Even if the annihilation \n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1002.2525.pdf" - }, - { - "text": "**(a)**\n1 \n*TN*(8) = 92(2)K \n\n90K \n91K \n92K \n93K \n94K \n95K \n\n*e*\n*P*\n0.5 \n\n0 \n-140 -139 -138 -137 -136 -135 -134 -133 -132 -131 \n*e*\n**(b)**\n\n129K \n130K \n131K \n132K \n133K \n134K \n\n*TC*(8) = 133.3(3)K \n0.4 \n*e*\n*P*\n0.2 \n\n0 \n-94 -92 -90 -88 \n-86 \n*e*\n-84 -82 -80 -78 \n\nFIG. 10: (colors online) Equilibrium probability distribution \nof the energy for the thickness n = 8 for some temperatures \naround TN (8), (a), and TC(8), (b), respectively. \n\nopposite magnetization. We can thus confidently assert \nthat, regardless of the underlying lattice structure, by \ndecreasing the number of the out-of-plane interactions, \nfor thicknesses close to the helical bulk pitch, the block \n\nAs a final issue we address the problem of the order \nof the transitions observed at TN (n) and TC(n), respec- \ntively. In particular, we focus our attention to the thick- \nness ranges where the chiral order parameter is relevant, \nregions i) and ii) as defined at the beginning of \ni.e. \nthis Section. In Fig. 10 the equilibrium probability dis- \ntribution of the energy for temperatures around TN (8) \n(Fig. 10a) and TC(8) (Fig. 10b) is plotted: \nfor both \ntemperatures, no double peak structure is observed, so \nthat we have no direct indication for a first order tran- \nsition even if, according to precedent studies of Loison \nand Diep17,18, the presence of a first-order transition at \nTN (n), cannot be completely excluded, as it could reveal \nitself only when the lateral dimension L are much larger \nthan the largest correlation length. The same conclusion \nabout the order of transition is reached for any other in- \nvestigated film thickness, as the energy probability distri- \nbution shape does not qualitatively change. This findings \nagree with the results we got in previous MC simulations \ndiscussed in Ref. 15, so that we may conclude that the \norder of the observed transitions is not affected by the \nrange of interactions. \n\n1 Frustrated spin Systems, edited by H. T. Diep (World Sci- 134420 (2009). \n\n16 J. Bohr D. Gibbs, J. D. Axe, D. E. Moncton, K. L. \nD’Amico, C. F. Majkrzak, J. Kwo, M. Hong, C. L. Chien, \nand J. Jensen, Physica B 159, 93 (1989). \n17 H. T. Diep, Phys. Rev. B 39, 397 (1989). \n18 D. Loison, Physica A 275, 207 (2000). \n19 N. Metropolis, et al., J. Chem. Phys. 21, 1087 (1953). \n20 F. R. Brown and T. J. Woch, Phys. Rev. Lett. 58, 2394 \n\nentific, 2004). \n\n2 H. Kawamura, J. Phys.: Cond. Matt. 10, 4707 (1998). \n3 T. Kimura et al., Nature (London) 426, 55 (2003). \n4 F. Cinti et al., Phys. Rev. Lett. 100, 057203 (2008). \n5 J.H. Park, S. Onoda, N. Nagaosa, and J. H. Han, Phys. \nRev. Lett. 101, 167202 (2008), and references therein. \n6 S. W. Cheong and M. Mostovoy, Nature Materials (Lon- \n\ndon) 6, 13 (2007). (1987). \n7 Minhyea Lee, W. Kang, Y. Onose, Y. Tokura, and N. P. \n\n21 D. P. Landau, and K. Binder, A Guide to Monte Carlo \nSimulation in Statistical Physics, Cambridge University \nPress, Cambridge (2000). \nOng, Phys. Rev. Lett. 102, 186601 (2009) \n\n8 P. Pedrazzini et al., Phys. Rev. Lett. 98, 047204 (2007). \n9 H. Kawamura and M. S. Li, Phys. Rev. Lett. 87, 187204 \n22 M. E.J. Newman, and G. T. Barkema, Monte Carlo Meth- \nods in Statistical Physics, Clarendon Press, Oxford (1999). (2001). \n\n10 P. J. Jensen, and A. R. Mackintosh, Rere Earth Mag- \nnetism (Structure and Excitations), Clarendon Press, Ox- \nford (1991). \n11 S. Konings, C. Schuessler-Langeheine, H. Ott, E. Weschke, \n\n23 B. Efron, The Annals of Statistics 7, 1 (1979). \n24 P. M. Chaikin, T. C. Lubensky Principles of condensed \nmatter physics, Cambridge University Press, New York \n(1995). \n25 K. Binder, Z. Phys. B 43, 119 (1981). K. Binder, Phys. E. Schierle, J. B. Goedkoop, arXiv 0707.2765v2 \n12 P.J. Jensen, and K.H. Bennemann, Surface Science Re- Rev. Lett. 47, 693 (1981). \n\n26 Such observable has been obtained from instantaneous \nevaluation of the structure factor during the stochastic \nprocess, and subsequently statistically analyzed as all the \nother macroscopic quantities.", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "(cid:2) Thin and Compressed \n\nIn addition to on-demand space allocation, data is compressed before being written to \nstorage. \n\n(cid:2) Thin and Deduplicated \n\nIn addition to on-demand space allocation, duplicates of data blocks are detected and are \nreplaced with references to the first copy. \n\n(cid:2) Thin, Compressed, and Deduplicated \n\nThese types provides maximum storage efficiency and capacity savings by combining \nthin, compressed, and deduplicated. \n\nThe following software and hardware requirements are needed for DRP compression and \ndeduplication: \n\n(cid:2) Enabled Compression license \n(cid:2) V8.1.3.2 or higher \n(cid:2) Nodes must have at least 32 GB memory to support deduplication \n\nRandom Access Compression Engine (RACE) compression and DRP compressed volumes \ncan coexist in the same I/O group. However, deduplication is not supported in the same I/O \ngroup as RACE compressed volumes. \n\n**10.4.2 DRP benefits**\n\nDRPs are a new type of storage pool that implement techniques, such as thin-provisioning, \ncompression, and deduplication to reduce the amount of physical capacity that is required to \nstore data. Savings in storage capacity requirements translate into reduction in the cost of \nstoring the data. \n\nThe cost reductions that are achieved through software can facilitate the transition to all Flash \nstorage. Flash storage has lower operating costs, lower power consumption, higher density, \nand are cheaper to cool. However, the cost of Flash storage is still higher than disk storage. \n\nWith technologies, such as DRP, the cost difference can be reduced to a point where an all \nFlash solution is feasible. The first benefit of DRP is in the form of storage savings because of \ndeduplication. The deduplication process identifies unique data patterns, and stores the \nsignature of the data for reference when writing new data. If the signature of the new data \nmatches a signature, the new data is not written to disk, but instead a reference to the stored \ndata is written. The same byte pattern can occur many times, which results in the amount of \ndata that must be stored being greatly reduced. \n\nThe second benefit of DRP comes in the form of performance improvements because of \ncompression. Although deduplication aims to identify the same data elsewhere in the storage \npool and create references to the duplicate data instead of writing extra copies, compression \nis trying to reduce the size of the host data that is written. \n\nCompression and deduplication are not mutually exclusive, one, both, or neither features can \nbe enabled. If the volume is de-duplicated and compressed, data is de-duplicated first and \nthen compressed. Therefore, deduplication references are created on the compressed data \nstored on the physical domain.", - "page_start": 442, - "page_end": 442, - "source_file": "sg247938.pdf" - }, - { - "text": "t CHANGE IN LIFT \n\n\n\n\n\nCENTER \n\n\n\n\n\n\n\n\n- \n\nCL \n\n\n\n\n\n\n\n\n\nFigure 4.6. Wing Contribution", - "page_start": 271, - "page_end": 271, - "source_file": "00-80T-80.pdf" - }, - { - "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" - }, - { - "text": "the temperature rise of \n\n\n\n\n\nWhen air flows over any aerodynamic surface \ncertain reductions in velocity occur with cor- \ntemperature. The \nresponding increases in \ngreatest reduction in velocity and increase in \ntemperature will occur at the various stagna- \ntion points on the aircraft. Of course, similar \nchanges occur at other points on the aircraft \nbut these temperatures can be related to the \nram temperature rise at the stagnation point. \nWhile subsonic flight does not produce temper- \natures of any real concern, supersonic flight \ncan produce temperatures high enough to be \nof major importance to the airframe and power- \nplant structure. The graph of figure 3.21 il- \n1 lustrates the variation of ram temperature rise \nwith airspeed in \nthe standard atmosphere. \nThe ram temperature rise is independent of \naltitude and is a function of true .airspeed. \nActual temperatures would be the sum of the \ntemperature rife and the ambient air temper- \nature. ~Thus, low altitude flight at high Mach \nnumbers will produce the highest temperatures. \nIn addition to the effect on the crew member \nenvironment, aerodynamic heating creates \nspecial problems for \nthe airplane structure \nand the powerplant. The effect of tempera- \nture on the short time strength of three typical \nstructural materials is shown in figure 3.21. \n\nHigher \ntemperatures produce definite reduc- \ntions in the strength of aluminum alloy and \nrequire the use of titanium alloys, stainless \nsteels, etc., at very high temperatures. Con- \ntinued exposure at elevated temperatures effects \nfurther reductions of strength and magnifies the \nproblems of “creep” \nfailure and structural \nstiffness. \n\nThe turbojet engine is adversely affected by \nhigh compressor inlet air temperatures. Since \nthe thrust output of the turbojet is some func- \ntion of the fuel flow, high compressor inlet air \ntemperatures reduce the fuel flow that can be \ntemperature \nturbine operating \nused within \nlimits. The reduction in performance of the \nturbojet engines with high compressor inlet \nair temperatures requires that the inlet design \nproduce the highest practical efficiency and \nminimize \nthe air \ndelivered to the compressor face. \n\nflight speeds and compressible flow \ndictate airplane configurations which are much \ndifferent from the ordinary subsonic airplane. \nTo achieve safe and efficient operation, the pilot \nof the modern, high speed aircraft must under- \nstand and appreciate the advantages and dis- \nadvantages of the configuration. A knowledge \nof high speed aerodynamics will contribute \ngreatly to this understanding. \n\nHigh", - "page_start": 259, - "page_end": 259, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**(a)**\n0.6 \n**(a)**\n) \n. \nu \n. \na \n( \n2 \n*B* κ \n1.5 \n0.4 \nβ \n*k* ∂ \nκ */*\n1 \n*v*\n132 \n134 \nT (K) \n136 *c*\n0.2 \n**(b)** 0.5 \n0 0 \n0.6 \n**(c)**\n**(b)**\n) \n. \nu \n. \na \n( \n0.5 \n) \nκ \n( \n0.4 \n*4*\n*u* κ \n0.3 χ \n**(d)** 0.2 \n0.1 \n20 40 \n80 \n*T*(K) \n100 120 140 20 40 \n80 \n*T*(K) \n100 120 140 60 60 \n\n136 137 138 135 \n\n0.66 \n0.66 \n*)*\n*M* 0.64 \n0.64 \n*(*\n*4*\n*u*\n0.62 \n0.62 \n\n0.65 \n*)*\n\n*M*\n*H*\n*M*\n) \n. \nu \n0.6 \n. \na \n( \n*)*\n*(*\n*z*\n*q*\n*(*\n*S*\n*4*\n0.55 *u*\n\n0.2 0.4 0.6 0.8*qz*\n0 \n0.5 \n130 131 132 133 \n134 \n*T*(K) \n\nFIG. 4: (color online) Thermodynamic quantities obtained for \nthickness n = 8 in the temperature range 0-150 K. Colors and \nsymbols as in Fig. 2. (a): specific heat; (b): chirality order \nparameter. (c): susceptibility χκ. (d): Binder cumulant for \nκ. \n\nFIG. 3: (color online) Binder cumulants at thickness n = \n16, colors as in Fig. 2. (a): Binder cumulant for the order \nparameter defined in Eq. (3). (b): Binder cumulant extracted \nfrom the integral of the structure factor (see Sec. II). Inset: \nstructure factor for L = 64 between T = 131 K (upper curve) \nand T = 140 K (lower), with 1 K temperature step. \n\n133.1(3) K (see Fig. 3b). The crossing points of the \nBinder’s cumulants of the helical order parameter imme- \ndiately appear to be located, within the error bars, at the \nsame temperature of those for the average magnetization \npreviously discussed. In addition, it is worthwhile to ob- \nserve that the peak evolution of S(0, 0, qz), in particular \nclose to TN (16) (inset of Fig. 3b), displays the typical \nbehaviour expected for an helical structure. We can thus \nconclude that for n = 16, as it is commonly observed \nin bulk samples, the establishment of the in-plane order \ncoincides with onset of the perpendicular helical arrange- \nment at TN (16). However, due to helix distortion in the \nsurface regions, the maximum of S(0, 0, qz) stabilizes at \nvalues of qz sensibly smaller (e.g. Qz(TN (16)) ≈ 16◦, \nand Qz(T = 10K) ≈ 28◦) with respect to the bulk one \n(QHo \n\nIII. RESULTS \n\nThe results obtained by MC simulations of the model \nintroduced in Sec. II will be presented starting from \nn = 16, i.e. the highest investigated film thickness which \nstill displays a bulk-like behaviour. \nIn Fig. 2 the spe- \ncific heat for samples with n = 16 and lateral dimension \nL = 24, 32, 48, 64 is shown. The location of the specific \nheat maximum shows a quite definite evolution toward \nthe bulk transition temperature, T Ho \nN ≃ 132 K10 (it is \nworthwhile to note that for this XY model the mean field \ntheory predicts a critical temperature T Ho \nN,MF ≃ 198 K). \nThe intensity of the maximum of cv has been analyzed \nby the MH technique for the same lateral dimensions (see \ninset of Fig. 2): it clearly appears as it increases with L \nin a smooth way. \n\nz = 30.5◦). \nThe MC simulations outcomes for n = 16 we just pre- \nsented appear quite different with respect to those ob- \ntained at the same thickness for the model with six cou- \npling constants along the z direction14,15. \nIndeed, for \nthe J1-J2 model here investigated, we observe that all \nlayers order at the same temperature, and we do not find \nany hint of the block-phase, with inner disordered planes \nintercalated to antiparallel quasi-FM four-layer blocks, \npreviously observed; sample MC runs we made using the \nsame hcp lattice employed in Refs. 14,15 shows that the \npresence or absence of the block phase is not related to \nthe lattice geometry, but it is a consequence of the inter- \naction range only.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0510.pdf" - }, - { - "text": "3 \n\nconductances, i.e. G = (G↑ + G↓)/2. \n\nNext, we estimate the resistance of a CNT containing sev- \neral impurities (a specific metal dopant with different molecu- \nlar adsorbates). Under the assumption that the electron phase- \ncoherence length, lφ, is smaller than the average distance be- \ntween the dopants, d, we may neglect quantum interference \nand obtain the total resistance by adding the scattering resis- \ntances due to each impurity separately. The scattering resis- \ntance due to a single impurity is given by \n\nRs(X) = 1/G(X) − 1/(2G0), (6) \n\nwhere G(X) is the Landauer conductance of the pristine CNT \nwith a single metal dopant occupied by molecule X and \n1/(2G0) is the contact resistance of a (6,6) CNT. \n\nWe may now obtain the total resistance per dopant site rel- \native to the reference background signal as a function of the \ntarget molecule concentration \n\nFIG. 3: Fractional coverage Θ in thermal equilibrium of Ni in a (a) \nmonovacancy, (b) divacancy I, (c) divacancy II and (d) change in \nresistance ∆R per dopant site as a function of CO concentration in \na background of air at room temperature and 1 bar of pressure. The \nreference concentration of CO is taken to be C0 =0.1 ppm. Note the \nchange from linear to log scale on the y-axis at ∆R =10 Ω. \n\n(7) \n\nwhere N is the number of dopants, Θ[X, C] is the fractional \ncoverage of species X at concentration C of the target and C0 \nis the reference concentration. Notice that the contact resis- \ntance drops out as we evaluate a change in resistance. \n\nFor a given background composition we may thus estimate \nthe fractional coverages for each available adsorbate for a \ngiven type of doping. As an example, Fig. 3(a)-(c) shows the \nfractional coverage of a Ni atom occupying a monovacancy, \ndivacancy I, and divacancy II, versus CO concentration in a \nbackground of air at room temperature and 1 bar of pressure. \nDue to the relatively small binding energy of N2 and H2O as \ncompared to O2 and CO, all Ni sites will be either empty or \noccupied by O2 or CO. In particular, Ni in a monovacancy \n(top panel of Fig. 3) will be completely oxidized for all rel- \nevant CO concentrations. For the Ni occupied divacancy II \nstructures we find the coverage of CO changes significantly \naround toxic concentrations (∼10 ppm). \nIn Fig. 3(d) we show the change in resistance calculated \nfrom Eq. (7) as a function of CO concentration for Ni occu- \npying the three types of vacancies. The background reference \nconcentration of CO is taken to be C0 = 0.1 ppm. For the \nmonovacancy there is very little change in resistivity. This is \nbecause most active sites are blocked by O2 at relevant CO \nconcentrations, as shown in the upper panel of Fig. 3. For Ni \nin the divacancies there is, however, a change in resistance on \nthe order of 1Ω per site. For concentrations above ∼1 ppm, \nthe CO coverage of Ni in the divacancy II increases dramati- \ncally and this leads to a significant increase in resistance.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" - }, - { - "text": "(2009). \n21 A. B. Harris, A. J. Berlinsky, C. Bruder, J. Appl. Phys. \n69, 5200 (1991). \n22 K. A. Chao, J. Spa lek, A. M. Ole´s, Phys. Rev. B 18, 3453 \n\n(1978). \n23 A. H. MacDonald, S. M. Girvin, D. Yoshioka, Phys. Rev. (2007). \n11 S. Yang, D. L. Zhou, C. P. Sun, Phys. Rev. B 76, B 37, 9753 (1988). \n24 J. T. Chayes, L. Chayes, S. A. Kivelson, Commun. Math. 180404(R) (2007). \n12 Hong Yao, Shou-Cheng Zhang, Steven A. Kivelson, Phys. Phys. 123, 53 (1989). \n25 C. D. Batista, S. A. Trugman, Phys. Rev. Lett. 93, 217202 Rev. Lett. 102, 217202 (2009). \n13 Zohar Nussinov, Gerardo Ortiz, Phys. Rev. B 79, 214440 (2004).", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "1002.2525.pdf", - "query": "What happend to the annihilation and the relic density when the DM is heavier ?", - "target_page": 6, - "target_passage": "When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Fig. 1 shows the relic density ΩN h2 as a function of the DM mass mN for a set of \n\nparameters: (v′, Mh, MH, MZ ′, sin θ) = (4000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7), for \n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as \n\nΩDM h2 \nonly near Higgs resonances, mN ≈ \n\n0.1 [15]. The figure shows that a desired DM relic abundance can be obtained for \n≃ \n\nMh/2 or MH /2. \n\nFig. 2 shows the relic density ΩN h2 as a function of the DM mass mN for a smaller Higgs \n\nmixing sin θ = 0.3 (others are the same as in Fig. 1). Compared with Fig. 1, for mN . MW \nwhere the DM particles dominantly annihilate into f ¯f , the relic density further increases \n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into \n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not \n\nenough to reach ΩN h2 \n≃ \n\n 1000 \n\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter \n\nset: (v′, Mh, MH, MZ ′, sin θ) = (3000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7). \n\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16–18]. \n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the \n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and \n\nthe DM particle. In our model, B L Higgs VEV v′ can play the same role for mN < MW , \n− \n\nnamely a larger v′ corresponds to weaker coupling between DM and Higgs for a fixed DM \n\nmass. On the other hand, for mN > MW the difference appears. Even if the annihilation \n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1002.2525.pdf" - }, - { - "text": "In the expression of annihilation cross section, we used the following notations : \n\n∂Φ \n∂h \n∂Φ \n∂H \n∂Ψ \n∂h \n∂Ψ \n∂H \n1 \n√2 \n1 \n√2 \n1 \n√2 \n− \n1 \n√2 \n\n= \n\n= \n\n= \n\n= \n\n2 \n\ns \n4 − 3 \n8 \n1 \n2 (cid:16) \n\n4m2 \nm2 \nf \ncos2 θ (s s \nN ) \n(cid:18) (cid:19) − − \n(cid:17) \n2 \ni \n\n∂Ψ \n∂h ∂Φ \n∂H \n\n∂Ψ \n∂H (cid:19)(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\n+ \nM 2 s \nH + iMH ΓH \n− \n\n2 = \n|M| \n\ng2 \nB \n− \nM 2 \nZ ′ + iMZ ′ΓZ ′ (cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \nM 2 \nh + iMhΓh \n\nLqf qN \n32 \n\n(cid:12) \n(cid:12) \n− \n(cid:12) \n(cid:12) \n+16λ2 \n\ns \n\n∂Φ \n∂h \ns \n4 − \nyf (cid:18) \nN (cid:12) \n(cid:12) \n(cid:12) \n4m2 \nN ) \n(cid:12) \n\ns \n\n− \nm2 \nf \n(s . \n− \n(cid:16) (cid:17) \n\n2 = \n|M| \n\ng2 \nB \n− \nM 2 \nZ ′ + iMZ ′ΓZ ′ (cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\nLqf qN \n32 \n\n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\ns \n−", - "page_start": 9, - "page_end": 9, - "source_file": "1002.2525.pdf" - }, - { - "text": "The DM RH neutrino interacts with the SM particles through couplings with B L \n− \n\ngauge and B L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent \n− \n\nbecause of the Z2 parity. The most of annihilation of the RH neutrinos occurs via Z ′, H and \n\nh exchange processes in the s-channel. In practice, the dominant contributions come from \n\nthe Higgs (h and H) exchange diagrams, because the Z ′ exchange processes are suppressed \n\nL Higgs VEV v′ & 3 TeV. Thus, we obtain Higgs portal DM \nby the inverse square of the B \nof RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯f , \n\n− \n\nW +W −, ZZ, and h(H)h(H). Since RH neutrino DM couples to only B L Higgs Ψ while \n− \n\na SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing \n\nbetween these two Higgs bosons. Although it is not so severe, the precision electroweak \n\nmeasurements [12] as well as the unitarity bound [13] give constraints on the mixing angle \n\nand mass spectrum of the Higgs bosons. \n\nThe thermal relic abundance of DM \n\n109 mN /Td \n√g \nσv \nMP h \n\nΩN h2 = 1.1 1, GeV− (14) \n× \ni \n\nwith the Planck mass MP , the thermal averaged product of the annihilation cross section \n\nσv and the relative velocity , the total number of relativistic degrees of freedom in the \nh i \n\nthermal bath g , and the decoupling temperature Td, is evaluated by solving the Boltzmann \n∗ \n\nequation for the number density of RH neutrino nN ; \n\ndnN \ndt \n(n2 \nn2 \nEQ), \n+ 3HnN = σv \nN − −h i \n\nand the Friedmann equation \n\n2 \n\n˙a \na(cid:19) \n8π \n3M 2 \nP \n= \n≡ (cid:18) \n\nwith nEQ and a(t) being the equilibrium number density and the scale factor, under the \n\nradiation dominated Universe with the energy density ρ = ρrad [14]. \n\n5", - "page_start": 4, - "page_end": 4, - "source_file": "1002.2525.pdf" - }, - { - "text": "loss$( 3.00 )$( 2.03 )$( 1.87 )8( 0.64 )8( 15.18 )", - "page_start": 14, - "page_end": 14, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "DENSITY ALTITUDE CHART \n\n+g&", - "page_start": 30, - "page_end": 30, - "source_file": "00-80T-80.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Annexin - related
< underline > Ligula_Eyels ( Crude oil and petroleum products ) Crude oil
Orimulsion
Natural gas liquids
Gasoline
Motor Gasoline
Aviation Gasoline
Jet Gasoline
Jet kerosene
Other kerosene
Shale oil
Gas / Diesel oil
Residual fuel oil
Liquefied petroleum gas
Ethane
Naphtha
Bitumen
Lubricants
Petroleum coke
Refinery Feedstock
Other oil
Refinery gas
Paraffin waxes
White spirit
Heavy fuel - low
Heavy fuel - medium
Heavy fuel - high
Light fuel oil / diesel - low
Light fuel oil / diesel - medium
Light fuel oil / diesel - high
Diesel ( road )
Gasoline ( road )
Solid Fuels ( Coal and coal products ) Anthracite
Coking coal
Other bituminous coal
Sub - bituminous coal
Other sub - bituminous coal
Lignite / brown coal
Oil shale
", - "page_start": 46, - "page_end": 46, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "\n \n \n \n \n [html]SourceCategoryGradeContained MetalChallengerChatreeTotal Mineral Resources\n
Tonnes ( Million )Gold ( g / t )Silver ( g / t )Lead (%)Zinc (%)Au Equiv ( g / t )Ag Equiv ( g / l )Gold ( M αz )Silver ( M αz )Au Equiv ( M αz )Ag Equiv ( M 02 )
Measured0.448.979.05110.130.137.2
Indicated1.0410.610.66040.350.3520.2
Inferred0.6812.112.16900.260.2615.1
Total2.1610.710.76120.750.7542.5
Measured92.80.726.600.7882.22.1519.72.34245
Indicated49.80.644.690.6871.91.027.51.10115
Inferred45.70.583.810.6264.70.855.60.9195.1
Total188.30.665.420.7275.24.0332.84.34455
190.50.785.360.8381.34.7732.85.08498
", - "page_start": 33, - "page_end": 33, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]December 31,\n
20042003
..........................$141.5
$119.2$ 19.0 at
................268.7248.9
................76.4182.1
................9.95.8
........................496.5556.0
........................237.0215.0
................38.7182.4
................2.008.81.931.0
................1.562.71.558.1
................30.225.0
................90.786.6
$ 4.464.6$ 4.554.1UITY
................$119.6
$129.1................
135.3118.6................
99.788.5................
2.4231.1................
89.6104.7....................
446.6672.0................
1.351.91.289.2................
253.5225.5................
406.5353.5................
133.6109.4none
...................
1,N...................
1.91.8........................
1.399.41.347.8........................
( 1.0 )........................
1.222.61.039.3.............
( 750.4 )( 484.3 ).............
", - "page_start": 60, - "page_end": 60, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]No.# Climatechange# Globalwarming\n
HashtagCentralityHashtagCentrality
1climate0.466climate0.530
2environment0.465environment0.446
3climateaction0.391science0.319
4sustainability0.316earth0.296
5science0.314weather0.280
6energy0.283us *0.280
7trump0.257trump0.263
8us *0.247pollution0.256
9cop21 *0.232co20.244
10parisagreement *0.232green0.239
11actonclimate *0.225tcot *0.229
12water0.221nature0.213
13pollution0.210news0.198
14earth0.207energy0.192
15green0.200climatechangeisreal0.187
16climatechangeisreal0.195obama0.181
17renewableenergy *0.194climateaction0.175
18health0.193algore *0.174
19nature0.187water0.171
20renewables0.186agw *0.164
21cleanenergy0.176carbon0.164
22carbon0.175sustainability0.163
", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Surrogate TargetRMPRSWROLSRLLMRSWRMPRCLSRLLMRSWRCLSSPMRLLMRSWRLLMRMPRCLS
MT - Bench0.40.80.61.40.70.31.70.30.70.8− 0.60.0
MMLU0.10.81.10.20.21.10.30.80.91.31.20.9
GSM8K1.91.70.61.61.70.21.71.00.41.31.31.7
\n\nTable 6: Differences between average perplexity of responses to the original and confounded queries, in the black-box \nsetting, when the confounder gadget was generated for a different surrogate router than the target, for LLM pair 1. Positive \nvalues indicate a lower average perplexity (more natural) of responses to the confounded queries; higher values are better \nfor the attacker. Standard errors were omitted for readability but are 0.2 on average. As in the white-box setting, the attack \ndoes not increase the average response perplexity. \n\n\n \n \n \n \n [html]RMPRSWRCLSRLLMRSW− 0.1− 0.2− 0.1\n
Surrogate Target
RMP RCLSRLLMRSWRCLSSPMRLLMRSWRLLMRMPRCLSLLM pair 1MT - Bench− 0.1− 0.10.0
− 0.10.0− 0.10.00.1− 0.2− 0.1− 0.2MMLU− 0.10.3− 0.24.8
1.00.52.5− 1.3− 0.82.6− 0.90.3GSM8K14.99.615.218.6
13.814.713.46.812.613.611.310.4LLM pair 2MT - Bench− 0.1− 0.1− 0.1
− 0.2− 0.2− 0.1− 0.10.0− 0.2− 0.2− 0.2MMLU1.64.04.27.9
5.04.45.0− 2.93.25.2− 0.93.8GSM8K13.68.718.518.9
14.418.313.14.015.511.38.410.8LLM pair 3MT - Bench0.20.00.1
− 0.10.00.00.20.2��� 0.10.1− 0.1MMLU5.06.85.811.3
9.14.78.1− 3.74.87.80.17.2GSM8K20.513.420.924.3
18.621.617.911.218.916.715.214.2
", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv1.pdf", - "query": "What is the aim of LLM routers ?", - "target_page": 1, - "target_passage": "LLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. ", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of \nresponses [31, 45, 57, 58]. \n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes \ndo. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying \nmodels to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, \nbut route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference \ncosts by using fewer and/or less complex underlying models. \n\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several \ncommercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a \nfew lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The \nservice selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant \ncost savings: up to 98% in the case of Martian [5], and 10× in the case of NotDiamond [7]. \n\n3 LLM Control Plane Integrity \n\nIn this section, we define LLM control plane integrity. Informally, it means that decisions made about underlying LLM \nqueries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus \non one class of control plane: predictive LLM routing as used to manage cost. \n\nFormalizing control planes. An LLM control plane Rω is a potentially randomized algorithm. It is parameterized by \na string ω, called the parameters. It utilizes some number n of LLMs denoted by M. We will mostly focus on the \ncase of n = 2, and, for reasons that will be clear in a moment, use Ms (“strong”) and Mw (“weak”) to denote the two \nunderlying LLMs. Then inference on an input x ∈ X for some set X of allowed queries is performed by computing \na response via y ←$ RM \nω (x). Here we use ←$ to denote running R with fresh random coins; we use ← when R is \ndeterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control \nplanes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a \nfunction of a sequence of queries and responses. \n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying \nLLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive \ncontrol plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, \npredictive binary routers use relatively simple classifiers to determine which of Ms or Mw should be used to respond to a \nquery. \n\nInference flow. Given a set of LLMs M, a control plane Rω, and an input x, an LLM inference flow is the sequence of \nLLM invocations Mij (zj) for 1 ≤ j ≤ m and ij ∈ {w, s} made when executing RM \nω (x). Here m is the total number of \nLLM invocations, and z1, . . . , zm are the queries made to the underlying LLMs. Should R be randomized, the sequence \nand its length are random variables. An inference flow can be written as a transcript \n\nT = (i1, z1), (i2, z2), . . . , (im, zm) \nof pairs of model indexes ij ∈ {w, s} and model inputs zj. Note that for simplicity we ignore the potential for paral- \nlelization, assuming execution proceeds serially. For binary routers, we have m = 1 and T ∈ {(w, x), (s, x)}. We write \nsubmitting a sequence of inferences ⃗x = ⃗x1, . . . , ⃗xq to a control plane as \nω (⃗x1), . . . , RM \n\nRM \nω (⃗x) = (RM ω (⃗xq))", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "\n \n \n \n \n [html]Avital Shafran The Hebrew University of Jerusalem\n
Roei Schuster Wild MooseThomas Ristenpart Cornell TechVitaly Shmatikov Cornell Tech
\n\n5 \n2 \n0 \n2 \n\nn \na \nJ \n\n3 \n\n] \n\nR \nC \n. \ns \nc \n[ \n\n1 \nv \n8 \n1 \n8 \n1 \n0 \n. \n1 \n0 \n5 \n2 \n: \nv \ni \nX \nr \na \n\nA natural solution to balancing performance and economic considerations is to take advantage of the availability of mul- \ntiple LLMs at different price-performance points. Recently proposed LLM routing systems [5, 12, 27, 47, 53] orchestrate \ntwo or more LLMs and adaptively route each query to the cheapest LLM they deem likely to generate a response of \nsufficient quality. In the two-LLM case, let Ms be an expensive, high-quality model and Mw a weaker, lower-grade one. \nGiven query q, the routing algorithm R(·) applies a classifier to q that outputs 0 if Mw is sufficient for answering q, or 1 \nif Ms is required. The system then routes q accordingly. \n\nLLM routing is an example of a general class of systems we call LLM control planes, which orchestrate the use of multiple \nLLMs to process inputs, as further described in Section 2. \n\nOur contributions. First, we introduce LLM control plane integrity as a novel problem in AI safety. Recently proposed \nLLM control-plane algorithms are learned, calibrated classifiers (see Section 2). Their inputs are queries from potentially \nadversarial users. Robustness of control-plane algorithms to adversarial queries is a new problem, distinct from adversarial \nrobustness of the underlying LLMs.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv1.pdf" - }, - { - "text": "LLM classifier: The last method is based on asking an LLM to provide a score in the range 1–5 of how an AI expert \nwould struggle to respond to a given query based on the query’s complexity. For this, Ong et al. fine-tuned a Llama-3-8B \nmodel [4] using their reference set of queries and corresponding scores. We denote this method as RLLM . \n\nUnderlying LLMs. In [47], Ong et al. trained the routers with GPT-4-1106-preview [14] as the strong model and Mixtral \n8x7B [39] as the weak model. They report successful generalization between the underlying LLMs, stating that their \nrouters trained for a particular strong-weak LLM pair can be used with other strong-weak LLM pairs. \n\nTo allow our evaluation to scale, we use as the strong model Ms the open-sourced Llama-3.1-8B [3] and as Mw the \n4-bit quantized version of Mixtral 8x7B (for efficiency reasons). This reduced the cost of our experiments by avoiding \nexpensive GPT API calls and lowering the computational costs of Mixtral. Unless mentioned otherwise, all of our results \n\n7", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv1.pdf" - }, - { - "text": "TANDEM ROTOR LONGITUDINAL CONTROL \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nTANDEM ROTOR DIRECTIONAL CONTROL \n\nAFT \nROTOR \n\n\n\n\n\n9 \n\n\n\nF”&%iD", - "page_start": 339, - "page_end": 339, - "source_file": "00-80T-80.pdf" - }, - { - "text": "[1] “Chatbot Arena LLM Leaderboard: Community-driven evaluation for best LLM and AI chatbots,” https:// \nhuggingface.co/spaces/lmarena-ai/chatbot-arena-leaderboard, accessed: 2024-11-14. \n\n[2] “Hello gpt-4o,” https://openai.com/index/hello-gpt-4o/, published: 2024-05-23. \n\n[3] “Introducing Llama 3.1: Our most capable models to date,” https://ai.meta.com/blog/meta-llama-3-1/, published: \n2024-07-23. \n\n[4] “Introducing Meta Llama 3: The most capable openly available LLM to date,” https://ai.meta.com/blog/ \nmeta-llama-3/, published: 2024-04-18. \n\n[5] “Martian LLM router,” https://withmartian.com/. \n\n[6] “New embedding models and API updates,” https://openai.com/index/new-embedding-models-and-api-updates, \npublished: 2024-01-25. \n\n[7] “Notdiamond LLM router,” https://www.notdiamond.ai/. \n\n[8] “OpenAI \nods \nopenai-rivals-seek-new-path-smarter-ai-current-methods-hit-limitations-2024-11-11, published: 2024-11-15. \n\nothers \nseek \nlimitations,” \nnew \n\n[9] “OpenAI, Google and Anthropic are struggling to build more advanced AI,” https://www.bloomberg.com/news/ \narticles/2024-11-13/openai-google-and-anthropic-are-struggling-to-build-more-advanced-ai?sref=CrGXSfHu, \npublished: 2024-11-13. \n\n[10] “OpenAI shifts strategy as rate of ‘GPT’ AI improvements slows,” https://www.theinformation.com/articles/ \nopenai-shifts-strategy-as-rate-of-gpt-ai-improvements-slows, published: 2024-11-9. \n\n[11] “Openrouter LLM router,” https://openrouter.ai/. \n\n[12] “Unify LLM router,” https://unify.ai/. \n\n[13] “What is a control plane?” https://www.ibm.com/think/topics/control-plane, published: 2024-10-31. \n\n[14] J. Achiam, S. Adler, S. Agarwal, L. Ahmad, I. Akkaya, F. L. Aleman, D. Almeida, J. Altenschmidt, S. Altman, \n\nS. Anadkat et al., “GPT-4 technical report,” arXiv preprint arXiv:2303.08774, 2023. \n\n[15] P. Aggarwal, A. Madaan, A. Anand, S. P. Potharaju, S. Mishra, P. Zhou, A. Gupta, D. Rajagopal, K. Kappaganthu, \nY. Yang et al., “Automix: Automatically mixing language models,” arXiv preprint arXiv:2310.12963, 2023. \n[16] G. Alon and M. Kamfonas, “Detecting language model attacks with perplexity,” arXiv preprint arXiv:2308.14132, \n2023. \n\n[17] R. A. Bradley and M. E. Terry, “Rank analysis of incomplete block designs: I. the method of paired comparisons,” \nBiometrika, vol. 39, no. 3/4, 1952. \n\n[18] N. Carlini, D. Paleka, K. D. Dvijotham, T. Steinke, J. Hayase, A. F. Cooper, K. Lee, M. Jagielski, M. Nasr, A. Conmy \n\net al., “Stealing part of a production language model,” arXiv preprint arXiv:2403.06634, 2024. \n\n[19] H. Chaudhari, G. Severi, J. Abascal, M. Jagielski, C. A. Choquette-Choo, M. Nasr, C. Nita-Rotaru, and A. Oprea, \n“Phantom: General trigger attacks on retrieval augmented language generation,” arXiv preprint arXiv:2405.20485, \n2024. \n\n[20] L. Chen, M. Zaharia, and J. Zou, “FrugalGPT: How to use large language models while reducing cost and improving \nperformance,” arXiv preprint arXiv:2305.05176, 2023. \n\n[21] W.-L. Chiang, L. Zheng, Y. Sheng, A. N. Angelopoulos, T. Li, D. Li, B. Zhu, H. Zhang, M. Jordan, J. E. Gon- \nzalez, and I. Stoica, “Chatbot arena: An open platform for evaluating LLMs by human preference,” in Forty-first \nInternational Conference on Machine Learning (ICML), 2024. \n\n[22] S. Cho, S. Jeong, J. Seo, T. Hwang, and J. C. Park, “Typos that broke the RAG’s back: Genetic attack on RAG \npipeline by simulating documents in the wild via low-level perturbations,” arXiv preprint arXiv:2404.13948, 2024. \n\n[23] J. Chu, Y. Liu, Z. Yang, X. Shen, M. Backes, and Y. Zhang, “Comprehensive assessment of jailbreak attacks against \nLLMs,” arXiv preprint arXiv:2402.05668, 2024. \n\n[24] K. Cobbe, V. Kosaraju, M. Bavarian, M. Chen, H. Jun, L. Kaiser, M. Plappert, J. Tworek, J. Hilton, R. Nakano et al., \n“Training verifiers to solve math word problems,” arXiv preprint arXiv:2110.14168, 2021. \n\n[25] N. Dalvi, P. Domingos, Mausam, S. Sanghai, and D. Verma, “Adversarial classification,” in Proceedings of the tenth", - "page_start": 18, - "page_end": 18, - "source_file": "arxiv1.pdf" - }, - { - "text": "Figure 1: LLM routers classify queries and route complex ones to an expensive/strong model, others to a cheaper/weak \nmodel. To control costs, LLM routers can be calibrated to maintain (for an expected workload) a specific ratio between \nqueries sent to the strong and weak models. \n\nTo initiate the study of this problem, we show that existing LLM routing algorithms are not adversarially robust. We \ndesign, implement, and evaluate a method that generates query-independent adversarial token sequences we call “con- \nfounder gadgets.” If a gadget is added to any query, this query is routed to the strong model with high probability. Next, \nwe show that this attack is effective even in the transfer setting where the adversary does not have full knowledge of the \ntarget LLM router (it is black-box), but has access to another router (e.g., an internally trained surrogate). We also evaluate \nthe integrity of commercial LLM routers, showing that they can be confounded as well. \n\nThird, we investigate defenses. Our basic method generates gadgets that have anomalously high perplexity. Confounded \nqueries are thus easily distinguished from normal queries and can be filtered out by the routing system. Unfortunately, this \ndefense can be evaded by an adversary who incorporates a low-perplexity objective into the gadget generation algorithm, \nproducing gadgets that have low perplexity—and yet are effective at re-routing queries to the strong model. We also \ndiscuss higher-level defenses, such as identifying users whose queries are routed to the strong model with abnormal \nfrequency. \n\nRouting attacks can be deployed for various adversarial objectives, e.g., to ensure that the adversary always obtains the \nhighest-quality answer regardless of the target applications’s internal routing policies and cost constraints, or to mali- \nciously inflate the target’s LLM costs. As LLM control planes grow in importance and sophistication, we hope that this \nwork will motivate further research on their adversarial robustness. \n\n2 LLM Control Planes and Routing \n\nInference using large language models (LLMs) is traditionally monolithic: a single model is applied to an input or se- \nquence of inputs. This methodology can be sub-optimal for various reasons. State-of-the-art models are often expensive, \nwith API access to LLMs costing as much as several dollars for each query. Elsewhere, distinct LLMs may excel at dif- \nferent tasks, and selectively using them may improve overall quality on a diverse workload. Finally, combining multiple \nLLMs, even all trained for similar tasks, may become increasingly prevalent as performance improvements of individual \nLLMs plateaus [8–10]. \n\nResearchers and practitioners are therefore now developing inference architectures that use multiple LLMs to answer \nqueries. These LLMs are orchestrated by what we call an LLM control plane (borrowing the terminology from network- \ning [13]). The control plane may route queries or parts of queries to different LLMs, derive new strings to query to \nunderlying LLMs, combine answers from underlying LLMs, and more. \n\nLLM routers. A prominent example of this emerging class of LLM control planes are LLM routers [27, 41, 47, 53, 59]. \nLLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, \nthe router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a \nresponse. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure \na score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative \nworkloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv1.pdf" - }, - { - "text": "Non-prescriptive routing [15, 20, 68] uses the responses from one or more underlying LLMs to determine which response \nto return to the user. For example, FrugalGPT [20] submits the query to a sequence of models (ordered by price) called a \ncascade, stopping when it obtains a response classified by the router as sufficient. \n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv1.pdf" - }, - { - "text": "an extra potentially expensive LLM invocation for each query processed by the router. Second, it may degrade the quality \nof responses from the destination LLMs, which are sensitive to the phrasing of queries and prompts. \n\nDetecting anomalous user workloads. Another possible defense requires the router to monitor individual user work- \nloads, and identify those users whose queries are routed to the strongest model with an abnormally high frequency. The \nrouter can then impose a user-specific threshold. Of course such workloads may have a benign explanation, e.g., the user’s \nqueries may be unusually complex. Even so, routers could potentially be designed to perform user-specific routing. For \nexample, one could imagine using per-user thresholds that are calibrated dynamically to attempt to maintain a consistent \nfraction of queries being routed to the strong model. \n\nSuch user-specific routing would complicate implementations, and would make inaccurate decisions for a user until there \nis sufficient data about their queries. The latter is relevant in adversarial settings, since such an approach would still be \ncircumventable should attackers be able to mount Sybil attacks in which the attacker creates a new user for, in the limit, \neach query. \n\n9 Related Work \n\nEvasion attacks against ML systems. A large body of work has investigated evasion attacks against ML systems [25, \n43, 60], also referred to as adversarial examples [32, 48, 49], and these attacks are now being explored in the context of \nmulti-modal LLMs [28] as well as text-only LLMs (for just one example, see [22]). We discussed in Section 3 how our \nresults compare: LLM control plane integrity is a distinct AI safety issue, but related in that: (1) control plane integrity \nattacks may use evasion-style techniques, and (2) control plane integrity attacks might be useful for performing evasion. \n\nPrompt injection against LLMs. Prompt injection is a class of attacks against LLMs in which the adversary manipulates \nthe prompt, i.e., the textual input fed directly to the LLM, causing the LLM to generate outputs that satisfy some adver- \nsarial objective [50, 64]. Evasion attacks as discussed above can use prompt injection, jailbreaking attacks being a widely \nexplored example in which the adversary aims to bypass some safety guardrail included in the LLM system, such as “do \nnot output expletives” [23, 42, 54, 66, 72, 73]. \n\nPrompt injection is also used for extraction attacks that aim to infer some information from or about the model, for \nexample, the system prompt [50, 54, 70], training data samples [46], or model parameters [18]. In indirect prompt injection \nattacks [33], the adversaries do not directly interact with the target LLM, and instead inject adversarial inputs into third- \nparty data, which is then added to the LLM prompt (intentionally or unintentionally) by the victim application and/or its \nusers. This relates to another category of attacks that target LLM-based applications, such as RAG systems, and invalidate \ntheir integrity by exploiting the weaknesses of the underlying LLM [19, 55]. \n\nOur attacks also modify queries, but with a different aim than the above types of attacks: undermining the integrity of the \ncontrol plane routing, rather than the LLM itself. Future work might investigate indirect control plane integrity attacks \nthat, analogously to indirect prompt injection, serve to somehow trick users of a routing system into forming control- \nplane-confounding queries.", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - }, - { - "text": "We have experimented with variations of this approach that don’t work quite as well, for example adding c as a suffix \ninstead of a prefix. See Appendix B for details. \n\n5 Open-Source Routers: Experimental Setup \n\nTo evaluate efficacy of confounder gadgets generated using the method from Section 4, we perform experiments with \nseveral LLM routers. This section explains our experimental setup for the open-source routers proposed in the research \nliterature [47]; results of this evaluation appear in Section 6. \nIn Section 7, we discuss experiments with proprietary, \ncommercial routers. Figure 3 shows the summary of our experimental setup. \n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv1.pdf" - }, - { - "text": "Attacks against MoE. Mixture-of-Experts (MoE) architectures enable using multiple expert modules for processing a \ngiven query with a lower computational cost by including an inner routing mechanism that in every layer routes different \ntokens to a small number of experts [29, 30, 52, 56]. This can be thought of as an internal router within a single LLM, \nrather than an external control plane that orchestrates multiple LLMs. MoE has increased in popularity as it allows to \nbuild larger models at a fixed compute budget—not all parameters are used at the same time. \n\nHayes et al. [34] identified a vulnerability in MoE that can be exploited for a denial-of-service attack against MoE. Thus \ncontrol plane integrity issues appear to extend to the context of single-LLM MoE systems, and future work could explore \nthis connection further. \n\nYona et al. [67] presented a side-channel attack on MoE that enables an attacker to reveal other users’ prompts. We expect \nthat side-channel attacks against LLM control planes exist as well, for example, to infer which models are used via timing \nof responses. Such attacks, which target confidentiality, are outside the scope of control plane integrity. \n\n10 Conclusion \n\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an \nexample of a broader, emerging class of systems we call “LLM control planes” that aim to achieve various quality, \nefficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query. \n\n17", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv1.pdf", - "query": "What is an LLM control plane ?", - "target_page": 3, - "target_passage": " An LLM control plane Rω is a potentially randomized algorithm.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]Avital Shafran The Hebrew University of Jerusalem\n
Roei Schuster Wild MooseThomas Ristenpart Cornell TechVitaly Shmatikov Cornell Tech
\n\n5 \n2 \n0 \n2 \n\nn \na \nJ \n\n3 \n\n] \n\nR \nC \n. \ns \nc \n[ \n\n1 \nv \n8 \n1 \n8 \n1 \n0 \n. \n1 \n0 \n5 \n2 \n: \nv \ni \nX \nr \na \n\nA natural solution to balancing performance and economic considerations is to take advantage of the availability of mul- \ntiple LLMs at different price-performance points. Recently proposed LLM routing systems [5, 12, 27, 47, 53] orchestrate \ntwo or more LLMs and adaptively route each query to the cheapest LLM they deem likely to generate a response of \nsufficient quality. In the two-LLM case, let Ms be an expensive, high-quality model and Mw a weaker, lower-grade one. \nGiven query q, the routing algorithm R(·) applies a classifier to q that outputs 0 if Mw is sufficient for answering q, or 1 \nif Ms is required. The system then routes q accordingly. \n\nLLM routing is an example of a general class of systems we call LLM control planes, which orchestrate the use of multiple \nLLMs to process inputs, as further described in Section 2. \n\nOur contributions. First, we introduce LLM control plane integrity as a novel problem in AI safety. Recently proposed \nLLM control-plane algorithms are learned, calibrated classifiers (see Section 2). Their inputs are queries from potentially \nadversarial users. Robustness of control-plane algorithms to adversarial queries is a new problem, distinct from adversarial \nrobustness of the underlying LLMs.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv1.pdf" - }, - { - "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of \nresponses [31, 45, 57, 58]. \n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes \ndo. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying \nmodels to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, \nbut route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference \ncosts by using fewer and/or less complex underlying models. \n\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several \ncommercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a \nfew lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The \nservice selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant \ncost savings: up to 98% in the case of Martian [5], and 10× in the case of NotDiamond [7]. \n\n3 LLM Control Plane Integrity \n\nIn this section, we define LLM control plane integrity. Informally, it means that decisions made about underlying LLM \nqueries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus \non one class of control plane: predictive LLM routing as used to manage cost. \n\nFormalizing control planes. An LLM control plane Rω is a potentially randomized algorithm. It is parameterized by \na string ω, called the parameters. It utilizes some number n of LLMs denoted by M. We will mostly focus on the \ncase of n = 2, and, for reasons that will be clear in a moment, use Ms (“strong”) and Mw (“weak”) to denote the two \nunderlying LLMs. Then inference on an input x ∈ X for some set X of allowed queries is performed by computing \na response via y ←$ RM \nω (x). Here we use ←$ to denote running R with fresh random coins; we use ← when R is \ndeterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control \nplanes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a \nfunction of a sequence of queries and responses. \n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying \nLLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive \ncontrol plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, \npredictive binary routers use relatively simple classifiers to determine which of Ms or Mw should be used to respond to a \nquery. \n\nInference flow. Given a set of LLMs M, a control plane Rω, and an input x, an LLM inference flow is the sequence of \nLLM invocations Mij (zj) for 1 ≤ j ≤ m and ij ∈ {w, s} made when executing RM \nω (x). Here m is the total number of \nLLM invocations, and z1, . . . , zm are the queries made to the underlying LLMs. Should R be randomized, the sequence \nand its length are random variables. An inference flow can be written as a transcript \n\nT = (i1, z1), (i2, z2), . . . , (im, zm) \nof pairs of model indexes ij ∈ {w, s} and model inputs zj. Note that for simplicity we ignore the potential for paral- \nlelization, assuming execution proceeds serially. For binary routers, we have m = 1 and T ∈ {(w, x), (s, x)}. We write \nsubmitting a sequence of inferences ⃗x = ⃗x1, . . . , ⃗xq to a control plane as \nω (⃗x1), . . . , RM \n\nRM \nω (⃗x) = (RM ω (⃗xq))", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "TANDEM ROTOR LONGITUDINAL CONTROL \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nTANDEM ROTOR DIRECTIONAL CONTROL \n\nAFT \nROTOR \n\n\n\n\n\n9 \n\n\n\nF”&%iD", - "page_start": 339, - "page_end": 339, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Control plane integrity. A control plane integrity adversary is a randomized algorithm A that seeks to maliciously guide \ninference flow. \n\nIn an unconstrained LLM control plane integrity attack, the adversary A seeks to generate inputs ⃗x = ⃗x1, . . . , ⃗xq such \nthat running RM \nω (⃗x) generates a transcript for which P((x1, i1), . . . , (xq, iq)) = 0. This attack could be launched by an \nadversary who wants to maximize inference costs for a victim application using an LLM router. \n\nA harder setting requires input adaptation, where the adversary is given inputs x1, . . . , xq and it must find new inputs \nˆx1, . . . , ˆxq for which the transcript resulting from P((ˆx1, i1), . . . , (ˆxq, iq)) = 0. There will be some competing constraint, \nsuch as that xj and ˆxj are very similar for each j, or that the outputs yj ←$ RM \nω (ˆxj) are close. In the \nrouting context, the adversary’s goal is to increase the fraction of queries that get routed to the strong model, in order to \nimprove the overall quality of responses, drive up the victim application’s inference costs, or both. \n\nω (xj) and ˆyj ←$ RM \n\nRelationship to evasion attacks. Evasion attacks [25, 43, 60] against an inference system (also called adversarial exam- \nples [32, 48, 49]) would, in our setting, seek to find a small modification ∆ to an input x such that RM \nω (x) \nwhere addition is appropriately defined based on input type (e.g., slight changes to text). \nω (x + ∆) ̸= RM \n\nOur attack setting is not the same. The control plane integrity adversary seeks to maliciously control the inference flow, not \nnecessarily the output of inference. In an unconstrained attack, the adversary does not care what outputs are generated. \nIn the input adaptation attack, the adversary seeks to craft inputs that modify the inference flow yet do not change the \nresponses of the strong underlying LLM to the extent possible. Looking ahead, we will use evasion techniques in our \nadaptation attacks against learned control plane routers, but, importantly, not the overall inference. \n\nIn the other direction, undermining LLM control plane integrity could be a stepping stone toward evasion attacks. For \nexample, if RM \nω is used to classify malicious content by combining LLMs each tuned to different types of harm categories, \nthen modifying inputs to force inference flows away from appropriate models could aid evasion. We leave evaluation of \nhow control-plane integrity attacks can enable evasion to future work. \n\nThreat models. Within the context of control plane integrity attacks against LLM routers, we identify several threat \nmodels that differ in terms of the adversary’s goals and their knowledge about the target control plane RM \nω . \n\nIn terms of goals, an adversary may seek to inflate the costs of a victim application that utilizes an LLM control plane. \nAs a kind of denial-of-service attack, such cost inflation would penalize the application developer who expects routing \nto control costs. Another adversarial goal could be arbitrage: consider an application that charges X dollars per query, \nwhereas directly using Ms costs Y > X. The application’s lower rate X makes economic sense assuming it uses a router \nto route the bulk of queries to a cheaper model Mw. An input adaptation attack in this setting can gain (indirect) access to \nMs, obtaining an arbitrage advantage of Y − X per query. To be effective, this arbitrage adversary would want to ensure \nthat adaptations do not lower response quality (i.e., it extracts all the value out of rerouting to Ms). As before, the victim \nin this case is the application that relies on routing to lower its costs (unsuccessfully, under this attack).", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv1.pdf" - }, - { - "text": "Attacks against MoE. Mixture-of-Experts (MoE) architectures enable using multiple expert modules for processing a \ngiven query with a lower computational cost by including an inner routing mechanism that in every layer routes different \ntokens to a small number of experts [29, 30, 52, 56]. This can be thought of as an internal router within a single LLM, \nrather than an external control plane that orchestrates multiple LLMs. MoE has increased in popularity as it allows to \nbuild larger models at a fixed compute budget—not all parameters are used at the same time. \n\nHayes et al. [34] identified a vulnerability in MoE that can be exploited for a denial-of-service attack against MoE. Thus \ncontrol plane integrity issues appear to extend to the context of single-LLM MoE systems, and future work could explore \nthis connection further. \n\nYona et al. [67] presented a side-channel attack on MoE that enables an attacker to reveal other users’ prompts. We expect \nthat side-channel attacks against LLM control planes exist as well, for example, to infer which models are used via timing \nof responses. Such attacks, which target confidentiality, are outside the scope of control plane integrity. \n\n10 Conclusion \n\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an \nexample of a broader, emerging class of systems we call “LLM control planes” that aim to achieve various quality, \nefficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query. \n\n17", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - }, - { - "text": "_\nCENTER OF \n..-.. ,.-.. \n\n\n\n\n\n\nVERTICAL AXIS \n\n1 \n2 \n\n\n\n\n\nFigure 4.4. Airplane Rekre&e Axes \n\n\n\nLONGITUDINAL \nCONTROL \n\nSTABILITY AND \n\nSTATIC LONGITUDINAL STABILITY \n\n\n\n\n\n\n\nforces. If the aircraft \n\n\n\nand magnitude. Neutral static longitudinal \nlimit of \nstability usually defines the lower \nthe boundary \nairplane stability since it ‘is \nbetween stability and instability. \nThe air- \nplane with neutral static stability’ may be \nexcessively responsive to controls and the \naircraft has no tendency to return to trim fol- \nlowing a disturbance. The airplane with \nnegative sradc longitudinal \nis in- \nfrom any intended trim \nherently divergent \ncondition. \nIf it is at all possible to fly the \naircraft, the aircraft. cannot be trimmed and \nillogical control forces and deflections are rc- \nquired to provide equilibrium with a change \nof attitude and airspeed. \n\nGENERAL CONSIDERATIONS. An air- \ncraft will exhibit positive static Iongitudinal \nstability \nif it tends to return to the trim angle \nof attack when displaced by a gust or control \nmovement. The aircraft which is unstable will \ncontinue to pitch \nin the disturbed direction \nuntil the displacement is resisted by opposing \ncontrol \nis neutrally \nstable, it tends to remain at any displacement \nIt is most necessary \nto which it is disturbed. \nto provide an airplane with positive staric \nlongitudinal stability. The stable airplane is \nsafe and easy to fly since the airplane seeks and \ntends to maintain a trimmed condition of \nflight. \nthat control deflec- \ntions and control “feel” are logical in direction \n\nstability \n\nSince static longitudinal stability depends \nupon the relationship of angle of attack and \npitching moments, it is necessary to study the \npitching moment contribution of each com- \nponent of the aircraft. \nIn a manner similar \nto all other aerodynamic forces, the pitching", - "page_start": 267, - "page_end": 267, - "source_file": "00-80T-80.pdf" - }, - { - "text": "[1] “Chatbot Arena LLM Leaderboard: Community-driven evaluation for best LLM and AI chatbots,” https:// \nhuggingface.co/spaces/lmarena-ai/chatbot-arena-leaderboard, accessed: 2024-11-14. \n\n[2] “Hello gpt-4o,” https://openai.com/index/hello-gpt-4o/, published: 2024-05-23. \n\n[3] “Introducing Llama 3.1: Our most capable models to date,” https://ai.meta.com/blog/meta-llama-3-1/, published: \n2024-07-23. \n\n[4] “Introducing Meta Llama 3: The most capable openly available LLM to date,” https://ai.meta.com/blog/ \nmeta-llama-3/, published: 2024-04-18. \n\n[5] “Martian LLM router,” https://withmartian.com/. \n\n[6] “New embedding models and API updates,” https://openai.com/index/new-embedding-models-and-api-updates, \npublished: 2024-01-25. \n\n[7] “Notdiamond LLM router,” https://www.notdiamond.ai/. \n\n[8] “OpenAI \nods \nopenai-rivals-seek-new-path-smarter-ai-current-methods-hit-limitations-2024-11-11, published: 2024-11-15. \n\nothers \nseek \nlimitations,” \nnew \n\n[9] “OpenAI, Google and Anthropic are struggling to build more advanced AI,” https://www.bloomberg.com/news/ \narticles/2024-11-13/openai-google-and-anthropic-are-struggling-to-build-more-advanced-ai?sref=CrGXSfHu, \npublished: 2024-11-13. \n\n[10] “OpenAI shifts strategy as rate of ‘GPT’ AI improvements slows,” https://www.theinformation.com/articles/ \nopenai-shifts-strategy-as-rate-of-gpt-ai-improvements-slows, published: 2024-11-9. \n\n[11] “Openrouter LLM router,” https://openrouter.ai/. \n\n[12] “Unify LLM router,” https://unify.ai/. \n\n[13] “What is a control plane?” https://www.ibm.com/think/topics/control-plane, published: 2024-10-31. \n\n[14] J. Achiam, S. Adler, S. Agarwal, L. Ahmad, I. Akkaya, F. L. Aleman, D. Almeida, J. Altenschmidt, S. Altman, \n\nS. Anadkat et al., “GPT-4 technical report,” arXiv preprint arXiv:2303.08774, 2023. \n\n[15] P. Aggarwal, A. Madaan, A. Anand, S. P. Potharaju, S. Mishra, P. Zhou, A. Gupta, D. Rajagopal, K. Kappaganthu, \nY. Yang et al., “Automix: Automatically mixing language models,” arXiv preprint arXiv:2310.12963, 2023. \n[16] G. Alon and M. Kamfonas, “Detecting language model attacks with perplexity,” arXiv preprint arXiv:2308.14132, \n2023. \n\n[17] R. A. Bradley and M. E. Terry, “Rank analysis of incomplete block designs: I. the method of paired comparisons,” \nBiometrika, vol. 39, no. 3/4, 1952. \n\n[18] N. Carlini, D. Paleka, K. D. Dvijotham, T. Steinke, J. Hayase, A. F. Cooper, K. Lee, M. Jagielski, M. Nasr, A. Conmy \n\net al., “Stealing part of a production language model,” arXiv preprint arXiv:2403.06634, 2024. \n\n[19] H. Chaudhari, G. Severi, J. Abascal, M. Jagielski, C. A. Choquette-Choo, M. Nasr, C. Nita-Rotaru, and A. Oprea, \n“Phantom: General trigger attacks on retrieval augmented language generation,” arXiv preprint arXiv:2405.20485, \n2024. \n\n[20] L. Chen, M. Zaharia, and J. Zou, “FrugalGPT: How to use large language models while reducing cost and improving \nperformance,” arXiv preprint arXiv:2305.05176, 2023. \n\n[21] W.-L. Chiang, L. Zheng, Y. Sheng, A. N. Angelopoulos, T. Li, D. Li, B. Zhu, H. Zhang, M. Jordan, J. E. Gon- \nzalez, and I. Stoica, “Chatbot arena: An open platform for evaluating LLMs by human preference,” in Forty-first \nInternational Conference on Machine Learning (ICML), 2024. \n\n[22] S. Cho, S. Jeong, J. Seo, T. Hwang, and J. C. Park, “Typos that broke the RAG’s back: Genetic attack on RAG \npipeline by simulating documents in the wild via low-level perturbations,” arXiv preprint arXiv:2404.13948, 2024. \n\n[23] J. Chu, Y. Liu, Z. Yang, X. Shen, M. Backes, and Y. Zhang, “Comprehensive assessment of jailbreak attacks against \nLLMs,” arXiv preprint arXiv:2402.05668, 2024. \n\n[24] K. Cobbe, V. Kosaraju, M. Bavarian, M. Chen, H. Jun, L. Kaiser, M. Plappert, J. Tworek, J. Hilton, R. Nakano et al., \n“Training verifiers to solve math word problems,” arXiv preprint arXiv:2110.14168, 2021. \n\n[25] N. Dalvi, P. Domingos, Mausam, S. Sanghai, and D. Verma, “Adversarial classification,” in Proceedings of the tenth", - "page_start": 18, - "page_end": 18, - "source_file": "arxiv1.pdf" - }, - { - "text": "IN THE NOR- \nMAL AND REVERSED REGIONS OF COM- \nMAND. The majority of all airplane flight is \nconducted in the region of normal command, \n\nFEATURES OF FLIGHT", - "page_start": 370, - "page_end": 370, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Figure 7.26. Airflow Separation (sheet 2 of 2)", - "page_start": 75, - "page_end": 75, - "source_file": "00-80T-80.pdf" - }, - { - "text": "We now discuss adversarial capabilities. We assume that our victim application’s prompt includes a substring that can be \ncontrolled by the adversary. This represents many real-world apps such as chatbots, coding assistants, writing assistants, \nand others, that insert user inputs into an LLM prompt. In crafting adversarial portions of prompts, an adversary may have \nvarious levels of knowledge about the victim application’s router. We consider the following knowledge settings: \n\n• White-box setting: The adversary knows the control plane algorithm and its parameters ω. \n\n• Black-box (transfer) setting: The adversary does not know the control plane algorithm R and ω for the target model, \nbut knows instead another control plane algorithm R′ \nω′ as the surrogate. For \nexample, this could arise if an adversary trains their own router using available data. In this setting our attacks are \nalso zero-shot in that they do not require any interaction with the target control plane before the query that is being \nrerouted. \n\nω′ and its parameters. We refer to R′ \n\n4 Confounding Control Planes with Gadgets \n\nWe now turn to our main contribution: a methodology for attacking LLM control plane integrity. The key insight is that \nan adversary can modify queries to mislead or “confound” the routing logic into routing these queries to an LLM of the \nadversary’s choosing. Furthermore, we will demonstrate that these attacks can be black-box and query-independent, i.e., \na single modification works for all queries and does not require advance knowledge of the specific router being attacked. \n\n4", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv1.pdf", - "query": "What is a confounder gadget ?", - "target_page": 5, - "target_passage": " Given a query xi, we prepend a confounder gadget ci, which is a short sequence of adversarially chosen tokens.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "[71] L. Zheng, W.-L. Chiang, Y. Sheng, S. Zhuang, Z. Wu, Y. Zhuang, Z. Lin, Z. Li, D. Li, E. Xing et al., “Judging LLM- \nas-a-judge with MT-Bench and chatbot arena,” Advances in Neural Information Processing Systems (NeurIPS), \n2023. \n\n[72] S. Zhu, R. Zhang, B. An, G. Wu, J. Barrow, Z. Wang, F. Huang, A. Nenkova, and T. Sun, “AutoDAN: Automatic \nand interpretable adversarial attacks on large language models,” arXiv preprint arXiv:2310.15140, 2023. \n\n[73] A. Zou, Z. Wang, J. Z. Kolter, and M. Fredrikson, “Universal and transferable adversarial attacks on aligned language \nmodels,” arXiv preprint arXiv:2307.15043, 2023. \n\nA Gadget Examples \n\nBelow are a few examples of the optimized confounder gadgets c we got, for the different routing algorithms: \n\nB Ablation Study \n\nIn this section, we evaluate the effect of different hyperparameters and design choices (in the white-box setting). \n\nPrefix vs. suffix. As described in Section 4, we prepend the confounder gadget to the query. An alternative is to append \nit. This is straightforward for MT-bench and GSM8K, but MMLU consists of multi-choice questions followed by a list \nof possible answers, and the term “Answer:”. We insert the gadget at the end of the question text and before the possible \nanswers. If we append it at the very end, after “Answer:”, the LLM assumes the query was answered and in many cases \ndoes not generate any output at all. \n\nTable 12 shows that average upgrade rates are similar regardless of whether the gadget was inserted as a prefix or a suffix. \nFor MMLU, prefix works better. The downgrade rate is 0% in all cases. \n\n22", - "page_start": 21, - "page_end": 21, - "source_file": "arxiv1.pdf" - }, - { - "text": "We introduced and defined a new safety property, LLM control plane integrity. \nInformally, this property holds if an \nadversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not \nsatisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating query- \nindependent “confounder gadgets.” When added to any query, the confounder gadget confuses the router into routing the \nquery to the adversary-chosen LLM. \n\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that \nthey successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against \nthese attacks and indicated directions for future research. \n\nAcknowledgments \n\nThis research was supported in part by the Google Cyber NYC Institutional Research Program, the Israel Science Founda- \ntion (Grant No. 1336/22), and the European Union (ERC, FTRC, 101043243). Views and opinions expressed are however \nthose of the author(s) only and do not necessarily reflect those of the European Union or the European Research Council. \nNeither the European Union nor the granting authority can be held responsible for them.", - "page_start": 17, - "page_end": 17, - "source_file": "arxiv1.pdf" - }, - { - "text": "We have experimented with variations of this approach that don’t work quite as well, for example adding c as a suffix \ninstead of a prefix. See Appendix B for details. \n\n5 Open-Source Routers: Experimental Setup \n\nTo evaluate efficacy of confounder gadgets generated using the method from Section 4, we perform experiments with \nseveral LLM routers. This section explains our experimental setup for the open-source routers proposed in the research \nliterature [47]; results of this evaluation appear in Section 6. \nIn Section 7, we discuss experiments with proprietary, \ncommercial routers. Figure 3 shows the summary of our experimental setup. \n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv1.pdf" - }, - { - "text": "As can be seen, the gadgets reroute almost all weak queries to the strong model. In most cases we see 100% success, or \nclose to it. The worst case still achieves 88% rerouting success, boosting the fraction of queries sent to the strong LLM by \n1.5x. Rerouting fails only for some queries that even after confounding are sent to the weak model: the fixed gadget did \nnot sufficiently increase the router’s estimate of those queries’ complexity. This is the only source of error for the attack: \nno queries in these experiments got “downgraded”, i.e., a query that would otherwise be sent to Ms ends up rerouted to \nMw. This also means that adding the confounder to every single query does not have negative impact on rerouting efficacy. \nWe report standard error values for both the upgrade rates and the total percentage of queries routed to the strong model. \nThe maximal standard error is in the low single digits, indicating similar success rates across gadgets. \n\nQuality of attack responses. We now turn to evaluating the quality of the responses generated by the attack. Note that \nbecause we have calibrated the routers to target ϵ = 0.5, our attacks can improve response quality by rerouting to the \nstronger model. In the other direction, our attacks add confounder gadgets which might degrade response quality. \n\n9", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv1.pdf" - }, - { - "text": "Let B = {˜c0, . . . , ˜cB}. \n\n(3) Find the candidate that maximizes the score: \n\nc(t+1) \ni ← arg max \nSθ(c∥xi) . (1) \nc∈B \n\nThe final confounder c(T ) \nis used with query xi. We early abort if, after 25 iterations, there is no update to the confounder \ngadget. Technically, we could abort early if we find a confounder whose score exceeds τ . Running further can be useful \nwhen an adversary does not know τ . \n\ni \n\nThe attack’s runtime is dominated by T · B times the cost of executing S. In practice, S are designed to be fast (otherwise \nrouters would significantly increase the latency of applications that use them). We report precise timings later; in summary, \nthe attack is fast because we can set T to be relatively small and still find high-scoring confounders. \n\nDue to the randomness in index and token selection, the method converges to different, yet similarly effective, confounder \ngadgets on each run. Our evaluation will thus measure average performance over multiple gadgets. \n\nQuery-independent confounders. One downside of the per-query approach is that the adversary must repeat, for each \nquery, the search for a good confounder. In practice, the adversary might prefer a query-independent attack. Our con- \nfounder gadget approach extends to this setting readily: perform the search routine above for an empty query. In other \nwords, just ignore xi in the query-dependent attack above, replacing Sθ(c∥xi) in Eq. 1 with Sθ(c). This finds a sin- \ngle query-independent confounder c that can be prefixed to all queries, i.e., ˆxi = c∥xi. We will show that this works \nsurprisingly well. \n\nIt is tempting to assume the reason a query-independent confounder works well is that a good scoring function should be \nroughly monotonic in query extensions, i.e., one might expect that Sθ(c∥x) ≥ Sθ(c) for almost any suffix x. This intuition \nis not correct. In our experiments, we found that Sθ(c∥x) < Sθ(c) for many x and some of the routers discussed below. \nNevertheless, by ensuring that Sθ(c) is pretty high (set the number of iterations T higher) the resulting query-independent \nconfounder works well. That is, we at least get that Sθ(c∥x) > Sθ(x). \n\nThe black-box setting: confounders that transfer. Finally, the attacks so far are in the white-box setting, where the \nattacker can optimize directly against Sθ. While in some cases routing control planes will be public knowledge, in others, \nincluding the proprietary control planes we explore in Section 7, they are hidden. This gives rise to the black-box setting. \nWhile an attacker might seek to perform model extraction attacks [43, 65] to learn θ, we instead explore attacks that \ntransfer from one router to another. \nIn more detail, we assume the adversary has access to a router R′ \nω′, called the surrogate, that is trained on data similar to \nthat used for the target router. Then the attack is the same as above, except that we use the surrogate’s scoring function \nS′ \nθ′ instead of the target’s Sθ. Again, we will see that this works surprisingly well: the query-independent confounders \nfound for the surrogate transfer to successfully reroute queries against the target router. \n\nPutting it all together. In summary, our methodology for input adaptation attacks is: \n\n(Preprocessing) Develop a single query-independent confounder gadget c, using either the target router or surrogate \nto score the confounder. \n(1) \n\n(Input adaptation) For each query xi, submit ˆxi = c∥xi instead to obtain a response ˆyi. (2) \n\nThe confounder is applied to all queries, i.e., the adversary does not need to guess whether the original query would \nhave been routed to the weak or strong model. In the rest of the paper, we demonstrate the confounders rarely result in \n“downgrades,” i.e., rerouting of queries from the strong to weak model. \n\nWe have experimented with variations of this approach that don’t work quite as well, for example adding c as a suffix \ninstead of a prefix. See Appendix B for details.", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv1.pdf" - }, - { - "text": "6 Rerouting Open-Source Routers \n\nWe now empirically evaluate our rerouting attack against the open-source routers described in the previous section. Unless \notherwise specified, our evaluation focuses on the query-independent attack setting where the attacker first finds a fixed \nset of gadgets and then uses them to attack arbitrarily many queries. This is the conservative setting, and query-specific \ngadgets — which carry a higher computational cost — generally work better. \n\nIn Appendix C we evaluate optimization-free alternatives for generating our confounding gadgets, and show they signifi- \ncantly underperform our optimization-based approach. \n\nWhite-box confounder gadget generation. Following our attack framework described in Section 4, we construct a \nquery-independent control-plane gadget designed to confuse each router. We start with the white-box setting, setting the \nbatch size to B = 32 and the number of iterations to T = 100, ignoring thresholds. We generate four sets of n = 10 \ngadgets, i.e., ten for each router. Examples of generated gadgets can be found in Appendix A. \n\nWhen reporting scores below, we therefore report the average over the n gadgets used with all 72 MT-bench queries, 100 \nrandomly selected MMLU queries, and 100 randomly selected GSM8K queries. None of these testing queries were used \nin the training of the routers or their calibration.", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv1.pdf" - }, - { - "text": "\n \n \n \n \n [html]MT - BenchMMLUGSM8K\n
gadgetRSWRMFRCLSRLLM
Init7383
Random97 ± 237 ± 862 ± 1038 ± 4
Init214013
Random49 ± 56 ± 314 ± 768 ± 5
Init212009
Random58 ± 834 ± 837 ± 941 ± 7
\n\n\n \n \n \n \n [html]intro typeUp.RSW Down.Up.ΔFDown.000\n
Up.*LS Down.Up. aLM Down.MT - BenchOurs - 11000
31338267Ours - 210000
60750355Gemini10000
501000550GPT10000
48462197MMLUOurs - 1280
57247042Ours - 23200
661926042Gemini3500
6010002121GPT5400
510662623GSM8KOurs - 1446
100077436Ours - 26630
1001643243Gemini4560
10098099GPT4770
100095625
\n\nC Optimization-Free Gadget Generation \n\nWe evaluate optimization-free alternatives to our black-box optimization method for generating confounder gadgets. \n\nFixed gadget. A simple way to create a gadget without resorting to optimization is to repeat n tokens. We use ! as the \ninitialization token, so the gadget in this case is !!!!!!!!!!. Another possibility is to select n tokens uniformly at random. \nTable 14 shows the upgrade rates for both options, were in the latter setting we repeat the process 10 times and report the \naverage result and the standard error. While they are non-negligible, especially for the randomly sampled gadgets, they \nsignificantly underperform the upgrade rates reported in Table 1 for optimized gadgets. \n\nInstruction injection. Prompt injection is a known attack on LLMs [50, 64], thus we consider a gadget consisting of a \ndirect instruction to the router to treat the query as a complex one and obtain a high-quality response.", - "page_start": 23, - "page_end": 23, - "source_file": "arxiv1.pdf" - }, - { - "text": "CENTRIFUGAL COMPRESSOR \n\n9A \n\nDWGLE ENTRY \nCENfRlFuGAL COMPRESSCR \n\nf-~&ARGE \n\n\n\n\n\n\n\n\n\n\n\nAXIAL FLOW COMPRESSOR \n\nSTA’VM BLADES7 \n\n\n\nUSCHARGE \n\n\n\n\n\nSHAFT7 \n\n\n\nCOMPRESSOR BLADING \n\n\nROTATING \nRows", - "page_start": 127, - "page_end": 127, - "source_file": "00-80T-80.pdf" - }, - { - "text": "During climbing", - "page_start": 167, - "page_end": 167, - "source_file": "00-80T-80.pdf" - }, - { - "text": "(2) Generate a set B of B + 1 candidates. First set ˜c0 = c(t) \ni \n\n, the current confounder. To generate B additional \nb=1. Replace the jth token in the \n\n\n \n \n \n \n [html]\n
TableCanadation ( s )
Table1,......................................................................................................................................................................................................
TableTable
", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2670.pdf", - "query": "What is called bad-cavity Ramsey laser ?", - "target_page": 1, - "target_passage": "We considerthe case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n*Introduction:*Since the invention of the separated-field \ntechnique [1], it has played an important role in the field of \nprecision spectroscopy due to its linewidth narrowing effect \nvia multiple coherent interaction. Atomic clocks based on \nthis technique have greatly extended our ability for frequency \nmeasurement, further, almost all the atom interferometers are \nbased on this technique [2]. \n\ncus on the stimulated emission spectrum via multiple coher- \nent interactions inside the cavity. We find this Ramsey laser \ncan provide a stimulated-emission spectrum with a linewidth \nmuch narrower than that of any conventional optical Ramsey \nseperated-field spectroscopy, which is commonly applied in \noptical atomic clock. Our results also show that a subnatural \nlinewidth spectroscopy, superior to any other available subnat- \nural spectroscopy technique at present [3–10], can be reached \nby this kind of laser, if a suitable atomic level structure is cho- \nsen. Thus, this method can provide an effective subnatural \nspectroscopy, and the possibilities for the new optical clock \nscheme [15] and atom interferometers [2]. \n\n] \nh \np \n- \nt \nn \na \nu \nq \n[ \n\n1 \nv \n0 \n7 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\n*Theoretical framework:*We consider the case of a two-level \natomic beam interacting with a single-mode Ramsey cavity \nof separated-oscillating-field resonators with the cavity mode \nlinewidth is much wider than the atomic gain linewidth. Thus \nwe call it bad-cavity Ramsey laser. All atoms are pumped \nonto the upper lasing state**a**before entering the first cavity \nof seperated field, and the lower lasing state is**b**. We assume \nall the atoms have the same velocities υ, that means what we \nconsider here is a homogeneous laser system. And for the \nsake of simplicity, we consider the two-standing waves linear \noptical Ramsey configuration with a grid as spatial selector \n[20, 21]. Our treatment can be extended to other configura- \ntions as in [22–24]. The length of each oscillating part is*l*, \nand the length of the free drift region is*L*. The corresponding \nHamiltonian is \n\n[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*\n\nThough, the natural linewidth of quantum transition was \nregarded as the ultimate limit to high-resolution laser spec- \ntroscopy [4], several methods of subnatural linewidth spec- \ntroscopy have been proposed to gain subnatural linewidth [3– \n10]. However, in all these efforts, including optical Ramsey \nspectroscopy, subnatural line is realized at the expense of a \nquick reduction in signal-to-noise (SNR) ratio due to the ex- \nponential decaying of signal, thus all these schemes can only \nget the linewidth several times narrower than the atomic nat- \nural linewidth. In the past three decades, this situation does \nnot change in the field of the precision laser spectroscopy. \nOn the other hand, the thermal noise of the cavity mirrors is \nthe main obstacle for further linewidth reduction of a laser \n[11, 12], and it is a challenge to substantially reduce this noise \nfurther[13]. Recently, a new scheme, called active optical \nclock [14–18], was proposed to substantially reduce the laser \nlinewidth. With lattice trapped atoms, it is possible to reach \nmHz linewidth laser based on the mechanism of active optical \nclock [14, 15, 19]. The principal mechanism of active optical \nclock is to directly extract light emitted from the ultranarrow \natomic transition with a cavity mode linewidth much wider \nthan that of lasing. This bad cavity ensures that any frequency \nshift due to cavity noise reduces to cavity-pulling effect [15– \n17], then the thermal noise is not the major obstacle again for \nreducing the linewidth. This means the bad cavity can play an \nindispensable role in new subnatural linewidth spectroscopy. \nIn this Letter, we propose a new scheme called Ramsey \nlaser with bad cavity. Distinct from any previous applications \nof conventional Ramsey separated oscillating fields method \n[1], which focuses on the absorption spectrum, we here fo- \n\nwhere ˆ*a*, ˆ*a*† are the annihilation and creation operators of the \nfield mode inside the cavity, with the frequency ω, σ*j*\n*a*= \n)*j*are the projection operators for the \n( \n*a*\n| \n| \njth atom corresponding to the upper and lower lasing levels, \n)*j*and σ*j*\n| \n*b*= ( \n*a*\ni h \n*b*\n*b*\ni h |", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "Lett.**48**, 871 (1982). \n[9] H. J. Carmichael, R. J. Brecha, M. G. Raizen, H. J. Kimble, and \nP. R. Rice, Phys. Rev. A**40**, 5516 (1989). \n[10] U. W. Rathe, M. O. Scully, Letters in Mathematical Physics**34**, \n297 (1995) \n[11] K. Numata, A. Kemery, J. Camp, Phys Rev Lett,**93**, 250602 \n(2004). \n\n[12] A. D. Ludlow*et al.*, Opt. Lett.**32**, 641 (2007). \n[13] H. J. Kimble, B. L. Lev, and J. Ye, Phys. Rev. Lett.**101**, 260602 \n(2008). \n\n[14] J. Chen, and X.Chen, In*Proceedings of the 2005 IEEE Inter-*\n*national Frequency Control Symposium and Exposition*, (IEEE, \n2005), p.608. \n[15] J. Chen, e-print arXiv:0512096 quant-ph; Chinese Science Bul- \n\nIn summary, we propose a new subnatural \nlinewidth spectroscopy technique, which is a laser by us- \ning Ramsey seperated-field cavity to realize the output of \nstimulated-emission radiation via multiple coherent interac- \ntion with atomic beam. We find the linewidth of Ramsey laser \nis subnatural if we choose an appropriate atomic level, and the \nbad-cavity laser mechanism will dramatically reduce cavity- \nrelated noise as discussed in active optical clock [15–19]. Our \nresults show that this new subnatural linewidth spectroscopy \nis superior to conventional optical Ramsey seperated-field \nspectroscopy and any other available subnatural spectroscopy \ntechnique at present [3–10]. Considering one have to ap- \nply the separated-field method in any phase detection as in \nRamsey-Bord*e*´interferometer [2], to investigate the effects of \nphase differences between the two oscillating fields [31] in \nthis stimulated separated-field method with such subnatural \nlinewidth will be our next research aim. \n\n*Conclusion:*\n\n[18] Y. Wang, Chinese Science Bulletin**54**, 347 (2009). \n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. \n\nletin**54**, 348 (2009). \n\n[16] D. Yu and J. Chen, Phys. Rev. A**78**, 013846 (2008). \n[17] J. Chen, In*Frequency Standards and Metrology: Proceedings*\n*of the 7th Symposium*, edited by Maleki Lute (World Scientific \nPublishing Company, 2009). \n\nWe acknowledge Yiqiu Wang and Deshui Yu for fruitful \ndiscussions. This work is supported by MOST of China \n(grant 2005CB724500, National Natural Science Foundation \nof China (grant 60837004, 10874009), National Hi-Tech Re- \nsearch and Development (863) Program. \n\nLett.**102**, 163601 (2009) \n\n[20] F. Strumia, Metrologia**8**, 85 (1972). \n[21] G. Kramer, J. Opt. Soc. Am.**68**, 1634 (1978). \n[22] V. S. Letokhov and B. D. Pavlik, Opt. Spectrosc. USSR**32**, 455 \n(1972). \n[23] Ye. V. Baklanov, B. Ya, Dubetsky, V. P. Chebotayev, Appl. \n\nPhys.**9**, 171 (1976). \n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett.**38**, \n159 (1977). \n\n∗ E-mail: jbchen@pku.edu.cn \n† E-mail: hongguo@pku.edu.cn. \n[25] L. Davidovich, Rev. Mod. Phys.**68**, 127 (1996). \n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, \n\n[1] N. F. Ramsey, Phys. Rev.**76**, 996 (1949). \n[2] B. Dubetsky and P. R. Berman, In*Atom Interferometry*, edited \nby P. R. Berman (Academic Press, Cambridge, MA, 1997). \n\nPhys. Rev. A**47**, 1431 (1993). \n[27] M. Sargent III, M. O. Scully, and W. E. Lamb,*Laser Physics*\n(Addition Wesley, Reading, MA, 1974). \n\n[3] M. M. Salour, Rev. Mod. Phys.**50**, 667 (1978). \n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett.**44**, 1254 (1980). \n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. \n\n[28] N. A. Abraham, P. Mandel, and L. M. Narducci,*Dynamic In-*\n*stabilities and Pulsations in Lasers*, Progress in Optics XXV, \nedited by E. Wolf (Elsevier, Amsterdam, 1988). \n**13**4345 (1980). \n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, \n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A**24**, 1914 \nJ. Phys. B**13**, 2231 (1980). \n(1981).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "Ω*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 − \n\nOur method of Ramsey laser is suitable for any atoms with \nmetastable energy level, as an example, we choose the tran- \nsition from the metastable state 4*s*4*p*3*P*1 to the ground state \n4*s*2 1*S*0 of 40Ca to check the striking feature of this laser: sub- \nnatural linewidth. As mentioned in [29], the corresponding \nnatural linewidth of the metastable state 4*s*4*p*3*P*1 is 320Hz. \nAs in the recently proposed active optical clock with atomic \nbeam [15], the velocity of the atoms in thermal atomic beam is \nabout 500m/s, and the length of the interaction region is about \n1mm, then the time for the atom to traverse each coherent- \ninteraction region is on the order of magnitude of 1 µs. \nIf \na bad cavity with κ is on the order of 107Hz, the relation \n1 is satisfied. Then when*g*is on the order of the \nκ/2 \nmagnitude of kHz, which can be easily achieved for current \ntechnique [30], from the linewidth expression of Eq.(16) the \norder of magnitude of linewidth is below 1 Hz. This means \nthe linewidth of a Ramsey laser can be more than two or- \nders of magnitude narrower than the atomic natural linewidth, \ntherefore our Ramsey method provides a new subnatural spec- \ntroscopy technique. And since it is stimulated-emission spec- \ntrum, it overcomes the difficulty in other subnatural linewidth \nspectroscopy schemes where the quick reduction of signal to \nnoise ratio is a formidable limit. We should point out that \nthis Ramsey laser does not escape the limitation of all active \noptical clock: in order to pump atoms to the excited state ef- \nfectively and to be stimulated emit photon during the lifetime \nof a metastable state, this new method will only be applicable \nto some special transitions [17]. \n\nτ− \n≫ \n\n*C*∗0)2 = 0, (*C*1 − \n*C*∗2)2 = \n\n*C*∗1)2 = \nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n− \n\nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n(*C*2 − − \n\nwe get \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { (κ/2 + γ*ab*)2 \nω2[(κ/2 + γ*ab*)2 + ω2)] \n(δϕ2)ω = *DS T*\n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] +*DRam*[2 \n, \n} \n(10) \n−", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "τ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*), \n\n*Steady-state solutions:*The steady-state solutions for the \nmean values of the field and atomic variables for laser op- \neration are obtained by dropping the noise terms of the c- \nnumber Langevin equations and setting the time derivatives \nequal to zero. The analytical solutions are very complex, and \none could numerically solve the steady-state equations. In this \npaper, we only care about the bad cavity limit γ*max*≪ \n≪ \nτ− \nκ/2. Since the atomic transit time is much shorter than \nthe damping times of atomic variables, one could ignore the \neffect of the spontaneous emission of the atom. By the stan- \ndard way [25], We get the following steady-state values: \n, \n\n, \n\n, \n\n, \n\nσ*j* σ*j* = \n\n*a*(*t j*+ τ) \n*q*\nE \n*a*(*t j*+ 2τ +*T*) \n\n= \n\n*a*(*t j*+ τ +*T*) \nD \n= \n*b*(*t j*+ τ) \nσ*j*\n*b*(*t j*+ 2τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ +*T*) \nD− \n− \n\nwith*A*0 ,*A*1 \n\n*q*\nE \n*q*\nE \n*q*\nE \n*q*\nE \n*C*2 = \n*R*is the mean pumping \n. \n*q*\nE \nrate, which is defined in [26]. It is very easy to check that the \naverage values of the above Langevin forces are all zero. \n\nD \nσ*j* σ*j* = \n*A*2 , *B*0 \n\n*q*\nE \n,*B*2 \n\nD \nσ*j*\n*b*(*t j*+ τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ) \nD− \n− \n*i*σ*j*\n(*t j*+ 2τ +*T*) \n− \n\nD \n= = \n*B*1 \n\n*q*\nE \n,*C*1 \n*q*\n= = \n*C*0 \nE \n\nD− \n\n*A*0 +*A*1 − \nκ *B*1 +*B*2) \nκ \n\n*R*(1 *A*2) \n*R*(*B*0 − \n\n2 = \n(cid:12)(cid:12)(cid:12) \n\n˜*Ass*\n= \n− \n\n(cid:12)(cid:12)(cid:12) \n\n*C*1 +*C*2 \n*g*τ *R*τ \n2 \" \n*R*(*B*0 − \nr", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" - }, - { - "text": "κ \n*B*1 +*B*2) # \n˜*Nbss*= . \n\n*R*(*B*0 − \n\nA detailed analysis about the stability of the steady-state can \nbe found such as in [28]. In this paper, we assume the steady- \nstate solution is stable. \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] *D*= *DS T*+*DRam*[2 \n− \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)]. *D* [2 (12) \n\nwhere Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − \n\nFrom the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*\n\n(δϕ2)ω \n\n(κ/2 + γ*ab*)2 \n*I*0ω2[(κ/2 + γ*ab*)2 + ω2] \n≈ \n+ 2*R*[(*A*0 +*B*0) + (*A*2 +*B*2)] \n+*Rp*[(*C*0 − *C*∗0)2 + (*C*1 − *C*∗1)2 + (*C*2 − \n*C*∗2)2] \n. \n} \n(9) \n\nSince the time τ and*T*is much shorter than the time scale \nof the atomic dampings, we can neglect the dampings when \ncalculate*Ai*,*Bi*,*Ci*. By using \n\nΩ*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 −", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "with frequency ω*j*\n)*j*is the “spin- \n| \nflip” operator for the jth atom, with its adjoint σ*j*\n)*j*. \n*a*\n| \n| \nThe coupling constant*g*is given by*g*= µ √ω/2~ǫ0*V*, where \nµ is the magnitude of the atomic dipole moment, and*V*is the \neffective volume of the cavity. \n\n*a*and ω*j*\n*b*, and σ*j*\n= ( *b*\n*a*\ni h | − \n+ = ( \n*b*\ni h \n\nIn order to denote the finite-time interaction between the \natoms and Ramsey separated field, we introduce the function \n\nΓ*j*(*t*) = Θ(*t* Θ(*t* τ)+Θ(*t* Θ(*t*\n\n*T*), \n(2) \nwhere Θ(*t*) is the Heaviside step function [Θ(*t*) = 1 for*t*> 0, \nΘ(*t*) = 1/2 for*t*= 0, and Θ(*t*) = 0 for*t*< 0].*T*is the free \ndrift time of the atoms, and τ is the interacting time between \nthe atom and one cavity. \n\nτ 2τ *t j*) \n*t j*− *t j*− \n*T*) \n*t j*− − − − − − − − − \n\n*Fk*(*t*)*Fl*(*t*′) \n(cid:11) \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*t*′) +*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) +*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) +*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) +*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n\nτ) *t*′ \n− \nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(7) \n− \n\nwhere*D*(*i*) \nfusion coefficients. \n\nBy the standard way [25], we can get the Heisenberg- \nLangevin equations of the motion for the single-atom and \nfiled operators. By introducing the macroscopic atomic oper- \nator,*M*(*t*) = \n*aa*(*t*),*Nb*(*t*) = \n*j*Γ*j*(*t*)σ*j*\n*bb*(*t*), the dynamic equations for the field and macro- \n\n*c-number correlation functions:*By choosing some partic- \nular ordering for products of atomic and field operators, one \ncould derive the c-number stochastic Langevin equations from \nthe quantum Langevin equations derived above, and all of the \ndynamic equations for c-number stochastic variables are the \nsame as in [26]. The differences are from the correlation func- \ntions. On the other hand, we convert the quantum noise oper- \nators into the c-number noise variables ˜*Fk*(*t*)(*k*=*a*,*b*,*M*,*M*†), \nwhose correlation functions are expressed as \n\n˙*a*(*t*) = *a*(*t*) +*gM*(*t*) +*F*κ(*t*), (3) \n\n*A*0 +*A*1 − \n(γ*a*+ γ′*a*)*Na*(*t*) \n\n*R*(1 \n*g*[*M*†(*t*)*a*(*t*) +*a*†(*t*)*M*(*t*)] +*Fa*(*t*), \n\n*A*2) \n− \n\n˜*Fk*(*t*) ˜*Fk*(*t*′) \nE \n\n(4) \n− \nτ) *t*′ \n− − \n˙*Nb*(*t*) = *B*1 +*B*2) \n*R*(*B*0 − \n\nγ*bNb*(*t*) + γ′*aNa*(*t*) \n\n− \n+*g*[*a*†(*t*)*M*(*t*) +*M*†(*t*)*a*(*t*)] +*Fb*(*t*), \n− \n(5) \n\n=*D*(0) \n(cid:10) \n+*D*(2) \n+*D*(4) \n+*D*(6) \n+*D*(8) \n\n− \n\n− \n\n− \n\n− \n\n*kl*(*k*,*l*=*a*,*b*,*M*,*M*†;*i*= 0, 1, 2) are the quantum dif- \n\n*j*Γ*j*(*t*)σ*j* *j*Γ*j*(*t*)σ*j* (*t*),*Na*(*t*) = *i*\n− − \nP P \n\nscopic atomic operators yield \nP \n\nκ \n2 − \n\n˙*Na*(*t*) = \n− \n\nD \n= ˜*D*(0) \n+ ˜*D*(2) \n+ ˜*D*(4) \n+ ˜*D*(6) \n+ ˜*D*(8) \n\n− \n\n− \n\n− \n˙*M*(*t*) = *C*1 +*C*2) γ*ab M*(*t*) \n\n*R*(*C*0 − \n− \n+*g*[*Na*(*t*) − \n*Nb*(*t*)]*a*(*t*) +*FM*(*t*), (6) \n− \n\nwhere the macroscopic noise operators are defined as \n\n*kl*are the c-number Langevin diffusion coefficients, \n*kl*as in \n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fa*(*t*) = \n*A*0 +*A*1 − \n*A*2) + *a*(*t*) \n*R*(1 \n− − \nX*j* X*j*\n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fb*(*t*) = \n*b*(*t*) +*R*(*B*0 − \n*B*1 +*B*2) + \n*b*(*t*), \nX*j* X*j*\n\n1 \n*T*− \n\n˙Γ*j*(*t*) ˜σ*j*\n− \nΓ*j*(*t*)*f j* *FM*(*t*) = \n(*t*) +*R*(*C*0 − \n*C*1 +*C*2) σ(*t*), \n*i* *i* 1 \n− − \n≪ X*j* X*j*\n\n*t*′) + ˜*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) + ˜*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) + ˜*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) + ˜*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n\nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*),", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" - }, - { - "text": "Incorrect word choice in an exam or assignment may cause you to lose \nmarks, while using the wrong word in a business letter may create a bad \nfirst impression. \n(www.oxbridgeacademy.co.za/find-a-course/business-administration-courses/)", - "page_start": 14, - "page_end": 14, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "1001.2670.pdf", - "query": "How the steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained ?", - "target_page": 2, - "target_passage": "The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the c-number Langevin equations and setting the time derivatives equal to zero.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "τ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*), \n\n*Steady-state solutions:*The steady-state solutions for the \nmean values of the field and atomic variables for laser op- \neration are obtained by dropping the noise terms of the c- \nnumber Langevin equations and setting the time derivatives \nequal to zero. The analytical solutions are very complex, and \none could numerically solve the steady-state equations. In this \npaper, we only care about the bad cavity limit γ*max*≪ \n≪ \nτ− \nκ/2. Since the atomic transit time is much shorter than \nthe damping times of atomic variables, one could ignore the \neffect of the spontaneous emission of the atom. By the stan- \ndard way [25], We get the following steady-state values: \n, \n\n, \n\n, \n\n, \n\nσ*j* σ*j* = \n\n*a*(*t j*+ τ) \n*q*\nE \n*a*(*t j*+ 2τ +*T*) \n\n= \n\n*a*(*t j*+ τ +*T*) \nD \n= \n*b*(*t j*+ τ) \nσ*j*\n*b*(*t j*+ 2τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ +*T*) \nD− \n− \n\nwith*A*0 ,*A*1 \n\n*q*\nE \n*q*\nE \n*q*\nE \n*q*\nE \n*C*2 = \n*R*is the mean pumping \n. \n*q*\nE \nrate, which is defined in [26]. It is very easy to check that the \naverage values of the above Langevin forces are all zero. \n\nD \nσ*j* σ*j* = \n*A*2 , *B*0 \n\n*q*\nE \n,*B*2 \n\nD \nσ*j*\n*b*(*t j*+ τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ) \nD− \n− \n*i*σ*j*\n(*t j*+ 2τ +*T*) \n− \n\nD \n= = \n*B*1 \n\n*q*\nE \n,*C*1 \n*q*\n= = \n*C*0 \nE \n\nD− \n\n*A*0 +*A*1 − \nκ *B*1 +*B*2) \nκ \n\n*R*(1 *A*2) \n*R*(*B*0 − \n\n2 = \n(cid:12)(cid:12)(cid:12) \n\n˜*Ass*\n= \n− \n\n(cid:12)(cid:12)(cid:12) \n\n*C*1 +*C*2 \n*g*τ *R*τ \n2 \" \n*R*(*B*0 − \nr", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" - }, - { - "text": "κ \n*B*1 +*B*2) # \n˜*Nbss*= . \n\n*R*(*B*0 − \n\nA detailed analysis about the stability of the steady-state can \nbe found such as in [28]. In this paper, we assume the steady- \nstate solution is stable. \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] *D*= *DS T*+*DRam*[2 \n− \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)]. *D* [2 (12) \n\nwhere Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − \n\nFrom the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*\n\n(δϕ2)ω \n\n(κ/2 + γ*ab*)2 \n*I*0ω2[(κ/2 + γ*ab*)2 + ω2] \n≈ \n+ 2*R*[(*A*0 +*B*0) + (*A*2 +*B*2)] \n+*Rp*[(*C*0 − *C*∗0)2 + (*C*1 − *C*∗1)2 + (*C*2 − \n*C*∗2)2] \n. \n} \n(9) \n\nSince the time τ and*T*is much shorter than the time scale \nof the atomic dampings, we can neglect the dampings when \ncalculate*Ai*,*Bi*,*Ci*. By using \n\nΩ*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 −", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "with frequency ω*j*\n)*j*is the “spin- \n| \nflip” operator for the jth atom, with its adjoint σ*j*\n)*j*. \n*a*\n| \n| \nThe coupling constant*g*is given by*g*= µ √ω/2~ǫ0*V*, where \nµ is the magnitude of the atomic dipole moment, and*V*is the \neffective volume of the cavity. \n\n*a*and ω*j*\n*b*, and σ*j*\n= ( *b*\n*a*\ni h | − \n+ = ( \n*b*\ni h \n\nIn order to denote the finite-time interaction between the \natoms and Ramsey separated field, we introduce the function \n\nΓ*j*(*t*) = Θ(*t* Θ(*t* τ)+Θ(*t* Θ(*t*\n\n*T*), \n(2) \nwhere Θ(*t*) is the Heaviside step function [Θ(*t*) = 1 for*t*> 0, \nΘ(*t*) = 1/2 for*t*= 0, and Θ(*t*) = 0 for*t*< 0].*T*is the free \ndrift time of the atoms, and τ is the interacting time between \nthe atom and one cavity. \n\nτ 2τ *t j*) \n*t j*− *t j*− \n*T*) \n*t j*− − − − − − − − − \n\n*Fk*(*t*)*Fl*(*t*′) \n(cid:11) \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*t*′) +*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) +*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) +*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) +*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n\nτ) *t*′ \n− \nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(7) \n− \n\nwhere*D*(*i*) \nfusion coefficients. \n\nBy the standard way [25], we can get the Heisenberg- \nLangevin equations of the motion for the single-atom and \nfiled operators. By introducing the macroscopic atomic oper- \nator,*M*(*t*) = \n*aa*(*t*),*Nb*(*t*) = \n*j*Γ*j*(*t*)σ*j*\n*bb*(*t*), the dynamic equations for the field and macro- \n\n*c-number correlation functions:*By choosing some partic- \nular ordering for products of atomic and field operators, one \ncould derive the c-number stochastic Langevin equations from \nthe quantum Langevin equations derived above, and all of the \ndynamic equations for c-number stochastic variables are the \nsame as in [26]. The differences are from the correlation func- \ntions. On the other hand, we convert the quantum noise oper- \nators into the c-number noise variables ˜*Fk*(*t*)(*k*=*a*,*b*,*M*,*M*†), \nwhose correlation functions are expressed as \n\n˙*a*(*t*) = *a*(*t*) +*gM*(*t*) +*F*κ(*t*), (3) \n\n*A*0 +*A*1 − \n(γ*a*+ γ′*a*)*Na*(*t*) \n\n*R*(1 \n*g*[*M*†(*t*)*a*(*t*) +*a*†(*t*)*M*(*t*)] +*Fa*(*t*), \n\n*A*2) \n− \n\n˜*Fk*(*t*) ˜*Fk*(*t*′) \nE \n\n(4) \n− \nτ) *t*′ \n− − \n˙*Nb*(*t*) = *B*1 +*B*2) \n*R*(*B*0 − \n\nγ*bNb*(*t*) + γ′*aNa*(*t*) \n\n− \n+*g*[*a*†(*t*)*M*(*t*) +*M*†(*t*)*a*(*t*)] +*Fb*(*t*), \n− \n(5) \n\n=*D*(0) \n(cid:10) \n+*D*(2) \n+*D*(4) \n+*D*(6) \n+*D*(8) \n\n− \n\n− \n\n− \n\n− \n\n*kl*(*k*,*l*=*a*,*b*,*M*,*M*†;*i*= 0, 1, 2) are the quantum dif- \n\n*j*Γ*j*(*t*)σ*j* *j*Γ*j*(*t*)σ*j* (*t*),*Na*(*t*) = *i*\n− − \nP P \n\nscopic atomic operators yield \nP \n\nκ \n2 − \n\n˙*Na*(*t*) = \n− \n\nD \n= ˜*D*(0) \n+ ˜*D*(2) \n+ ˜*D*(4) \n+ ˜*D*(6) \n+ ˜*D*(8) \n\n− \n\n− \n\n− \n˙*M*(*t*) = *C*1 +*C*2) γ*ab M*(*t*) \n\n*R*(*C*0 − \n− \n+*g*[*Na*(*t*) − \n*Nb*(*t*)]*a*(*t*) +*FM*(*t*), (6) \n− \n\nwhere the macroscopic noise operators are defined as \n\n*kl*are the c-number Langevin diffusion coefficients, \n*kl*as in \n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fa*(*t*) = \n*A*0 +*A*1 − \n*A*2) + *a*(*t*) \n*R*(1 \n− − \nX*j* X*j*\n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fb*(*t*) = \n*b*(*t*) +*R*(*B*0 − \n*B*1 +*B*2) + \n*b*(*t*), \nX*j* X*j*\n\n1 \n*T*− \n\n˙Γ*j*(*t*) ˜σ*j*\n− \nΓ*j*(*t*)*f j* *FM*(*t*) = \n(*t*) +*R*(*C*0 − \n*C*1 +*C*2) σ(*t*), \n*i* *i* 1 \n− − \n≪ X*j* X*j*\n\n*t*′) + ˜*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) + ˜*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) + ˜*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) + ˜*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n\nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*),", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" - }, - { - "text": "Ω*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 − \n\nOur method of Ramsey laser is suitable for any atoms with \nmetastable energy level, as an example, we choose the tran- \nsition from the metastable state 4*s*4*p*3*P*1 to the ground state \n4*s*2 1*S*0 of 40Ca to check the striking feature of this laser: sub- \nnatural linewidth. As mentioned in [29], the corresponding \nnatural linewidth of the metastable state 4*s*4*p*3*P*1 is 320Hz. \nAs in the recently proposed active optical clock with atomic \nbeam [15], the velocity of the atoms in thermal atomic beam is \nabout 500m/s, and the length of the interaction region is about \n1mm, then the time for the atom to traverse each coherent- \ninteraction region is on the order of magnitude of 1 µs. \nIf \na bad cavity with κ is on the order of 107Hz, the relation \n1 is satisfied. Then when*g*is on the order of the \nκ/2 \nmagnitude of kHz, which can be easily achieved for current \ntechnique [30], from the linewidth expression of Eq.(16) the \norder of magnitude of linewidth is below 1 Hz. This means \nthe linewidth of a Ramsey laser can be more than two or- \nders of magnitude narrower than the atomic natural linewidth, \ntherefore our Ramsey method provides a new subnatural spec- \ntroscopy technique. And since it is stimulated-emission spec- \ntrum, it overcomes the difficulty in other subnatural linewidth \nspectroscopy schemes where the quick reduction of signal to \nnoise ratio is a formidable limit. We should point out that \nthis Ramsey laser does not escape the limitation of all active \noptical clock: in order to pump atoms to the excited state ef- \nfectively and to be stimulated emit photon during the lifetime \nof a metastable state, this new method will only be applicable \nto some special transitions [17]. \n\nτ− \n≫ \n\n*C*∗0)2 = 0, (*C*1 − \n*C*∗2)2 = \n\n*C*∗1)2 = \nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n− \n\nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n(*C*2 − − \n\nwe get \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { (κ/2 + γ*ab*)2 \nω2[(κ/2 + γ*ab*)2 + ω2)] \n(δϕ2)ω = *DS T*\n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] +*DRam*[2 \n, \n} \n(10) \n−", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "Lett.**48**, 871 (1982). \n[9] H. J. Carmichael, R. J. Brecha, M. G. Raizen, H. J. Kimble, and \nP. R. Rice, Phys. Rev. A**40**, 5516 (1989). \n[10] U. W. Rathe, M. O. Scully, Letters in Mathematical Physics**34**, \n297 (1995) \n[11] K. Numata, A. Kemery, J. Camp, Phys Rev Lett,**93**, 250602 \n(2004). \n\n[12] A. D. Ludlow*et al.*, Opt. Lett.**32**, 641 (2007). \n[13] H. J. Kimble, B. L. Lev, and J. Ye, Phys. Rev. Lett.**101**, 260602 \n(2008). \n\n[14] J. Chen, and X.Chen, In*Proceedings of the 2005 IEEE Inter-*\n*national Frequency Control Symposium and Exposition*, (IEEE, \n2005), p.608. \n[15] J. Chen, e-print arXiv:0512096 quant-ph; Chinese Science Bul- \n\nIn summary, we propose a new subnatural \nlinewidth spectroscopy technique, which is a laser by us- \ning Ramsey seperated-field cavity to realize the output of \nstimulated-emission radiation via multiple coherent interac- \ntion with atomic beam. We find the linewidth of Ramsey laser \nis subnatural if we choose an appropriate atomic level, and the \nbad-cavity laser mechanism will dramatically reduce cavity- \nrelated noise as discussed in active optical clock [15–19]. Our \nresults show that this new subnatural linewidth spectroscopy \nis superior to conventional optical Ramsey seperated-field \nspectroscopy and any other available subnatural spectroscopy \ntechnique at present [3–10]. Considering one have to ap- \nply the separated-field method in any phase detection as in \nRamsey-Bord*e*´interferometer [2], to investigate the effects of \nphase differences between the two oscillating fields [31] in \nthis stimulated separated-field method with such subnatural \nlinewidth will be our next research aim. \n\n*Conclusion:*\n\n[18] Y. Wang, Chinese Science Bulletin**54**, 347 (2009). \n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. \n\nletin**54**, 348 (2009). \n\n[16] D. Yu and J. Chen, Phys. Rev. A**78**, 013846 (2008). \n[17] J. Chen, In*Frequency Standards and Metrology: Proceedings*\n*of the 7th Symposium*, edited by Maleki Lute (World Scientific \nPublishing Company, 2009). \n\nWe acknowledge Yiqiu Wang and Deshui Yu for fruitful \ndiscussions. This work is supported by MOST of China \n(grant 2005CB724500, National Natural Science Foundation \nof China (grant 60837004, 10874009), National Hi-Tech Re- \nsearch and Development (863) Program. \n\nLett.**102**, 163601 (2009) \n\n[20] F. Strumia, Metrologia**8**, 85 (1972). \n[21] G. Kramer, J. Opt. Soc. Am.**68**, 1634 (1978). \n[22] V. S. Letokhov and B. D. Pavlik, Opt. Spectrosc. USSR**32**, 455 \n(1972). \n[23] Ye. V. Baklanov, B. Ya, Dubetsky, V. P. Chebotayev, Appl. \n\nPhys.**9**, 171 (1976). \n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett.**38**, \n159 (1977). \n\n∗ E-mail: jbchen@pku.edu.cn \n† E-mail: hongguo@pku.edu.cn. \n[25] L. Davidovich, Rev. Mod. Phys.**68**, 127 (1996). \n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, \n\n[1] N. F. Ramsey, Phys. Rev.**76**, 996 (1949). \n[2] B. Dubetsky and P. R. Berman, In*Atom Interferometry*, edited \nby P. R. Berman (Academic Press, Cambridge, MA, 1997). \n\nPhys. Rev. A**47**, 1431 (1993). \n[27] M. Sargent III, M. O. Scully, and W. E. Lamb,*Laser Physics*\n(Addition Wesley, Reading, MA, 1974). \n\n[3] M. M. Salour, Rev. Mod. Phys.**50**, 667 (1978). \n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett.**44**, 1254 (1980). \n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. \n\n[28] N. A. Abraham, P. Mandel, and L. M. Narducci,*Dynamic In-*\n*stabilities and Pulsations in Lasers*, Progress in Optics XXV, \nedited by E. Wolf (Elsevier, Amsterdam, 1988). \n**13**4345 (1980). \n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, \n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A**24**, 1914 \nJ. Phys. B**13**, 2231 (1980). \n(1981).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0764.pdf" - }, - { - "text": "canonical ensemble. The free energy functional is first defined on the original KMC lattice. How- \n\never, after re-writing the interaction terms employing gradient operators [78] one finally obtains \n\nthe free energy functional for a continuous system \n\n(cid:90) \n(cid:104) \ndr \n(cid:105) \n\nεll \n2 εnn \n2 \n(∇ρl)2 + (∇ρn)2 + εnl(∇ρn) · (∇ρl) − µρl F [ρl, ρn] = f (ρl, ρn) + \n, (4) \n\nwhere \n\nf (ρl, ρn) = kT [ρl ln ρl + (1 − ρl) ln(1 − ρl)] \n\n+ kT [ρn ln ρn + (1 − ρn) ln(1 − ρn)] \n\n− 2εllρ2 \nl − 2εnnρ2 n − 4εnlρnρl. \n(5) \n\nSince the liquid may evaporate from the surface into the vapour above the surface, µ is the (true) \n\nchemical potential of this reservoir and determines the rate of evaporation [condensation] from \n\n[to] the surface. Note that normally a free energy of the form in Eq. (4) is obtained by making a \n\ngradient expansion of the free energy functional of a continuous system [84]. However, here we \n\nhave made the mapping from the free energy of the lattice KMC system. \n\nThe chemical potential for the nanoparticles may be determined from the functional derivative \n\nµn = δF [ρn, ρl]/δρn(r). In equilibrium it is constant throughout the system, but it may vary \n\nspatially in a non-equilibrium system, i.e., µn = µn(r, t). We assume that the dynamics of the \n\nnanoparticles is governed by the thermodynamic force ∇µn – i.e. that the nanoparticle current \n\nis j = −Mnρn∇µn, where Mn(ρl) is a mobility coefficient that depends on the local density of \n\nthe liquid. Combining this expression for the current with the continuity equation, we obtain the \n\nfollowing evolution equation for the nanoparticle density profile \n\n(cid:20) \nMnρn∇ \n\n(cid:21) \n\n∂ρn \n∂t \nδF [ρn, ρl] \nδρn \n= ∇ · . (6) \n\nNote that this equation of motion may also be obtained by assuming that the nanoparticles have \n\nover-damped stochastic equations of motion [80–83]. Here, we assume that Mn(ρl) = αΘs(ρl − \n\n0.5), where Θs(x) is a continuous function that switches smoothly from the value 0 to the value \n\n1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that \n\nthe nanoparticles are immobile when the local liquid density is small (dry substrate) and have a \n\n\n \n \n \n \n [html]\n
ComparisonFor the evolution of the liquid density distribution we assume that the liquid is able to evaporatefrom the surface into the vapour ( reservoir ) above the surface ( non - conserved dynamics ) and may
\n\n15", - "page_start": 14, - "page_end": 14, - "source_file": "1001.2669.pdf" - }, - { - "text": "4 \n\nan energy of interband transitions, which is roughly 2eV . \nThis would be consistent with Refs. 8,9. \njust list the formulas that we used in our computations. \nThe conductivity σ(Ω) and the optical integral W (ωc) \nare given by (see for example Ref. 35). \n\nWe begin with formulating our calculational basis in \nthe next section. Then we take up the four cases and \nconsider in each case the extent to which the Kubo sum is \nsatisfied up to the order of bandwidth and the functional \nform and the sign of ∆W (ωc). The last section presents \nour conclusions. \n\nΠ′′(Ω) \nΩ \n= − \n\nωc ωc \n\nΠ′′(Ω) \nΩ π \n2 \nW (ωc) = σ′(Ω) dΩ = − dΩ + Π′(0) \n\n0 \nZ \n0+ \nZ \nII. OPTICAL INTEGRAL IN NORMAL AND \nSUPERCONDUCTING STATES \n(7b) \n\nThe generic formalism of the computation of the op- \ntical conductivity and the optical integral has been dis- \ncussed several times in the literature21–23,26,29 and we where ‘X ′’ and ‘X ′′’ stand for real and imaginary parts \nof X. We will restrict with T = 0. The polarization \noperator Π(Ω) is (see Ref. 36) \n\nG(iω, ~k)G(iω + iΩ, ~k) + F (iω, ~k)F (iω + iΩ, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ(iΩ) = T \n\nω \nX \n1 \nπ \n\nX~k \n(cid:16) \n0 \n\nG′′(ω, ~k)G′′(ω + Ω, ~k) + F ′′(ω, ~k)F ′′(ω + Ω, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′′(Ω) = − dω \nΩ \nZ \nX~k \n(cid:16) \n− \n\n1 \nπ2 nF (y) − nF (x) \ny − x \n\n′ ′ \n\nG′′(x, ~k)G′′(y, ~k) + F ′′(x, ~k)F ′′(y, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′(Ω) = dx dy \n\nZ Z \nX~k \n(cid:16) \n\n′ denotes the principal value of the integral, \n~k,(N is the number of lat- \ntice sites), nF (x) is the Fermi function which is a step \nP \nP \nfunction at zero temperature, G and F are the normal \nand anomalous Greens functions. given by37 \n\nwhere \n~k is understood to be 1 \nThe 2 is due to the trace over spin indices. We show the \ndistribution functions in the NS and SCS under different \ncircumstances in Fig 2. \nN \nR \n\nThe ~k-summation is done over first Brillouin zone for a \n2-D lattice with a 62x62 grid. The frequency integrals are \ndone analytically wherever possible, otherwise performed \nusing Simpson’s rule for all regular parts. Contributions \nfrom the poles are computed separately using Cauchy’s \ntheorem. For comparison, in all four cases we also calcu- \nd2k = dΩkdǫkνǫk,Ωk \nlated FGT sum rule by replacing \nand keeping ν constant. We remind that the FGT is \nthe result when one assumes that the integral in W (ωc) \npredominantly comes from a narrow region around the \nFermi surface. \n\n1 \nω − Σ(k, ω) − ε~k + iδ \nZk,ωω + ε~k \nk,ω) − ε2 \n~k \n+ iδsgn(ω) \n(9b) \n\nZk,ω∆k,ω \nk,ω) − ε2 \n~k \n\nF (ω, ~k) = \nZ 2 \nk,ω(ω2 − ∆2 \n\n+ iδsgn(ω) \n(9c) \n\nWe will first use Eq 3 and compute WK in NS and SCS. \nThis will tell us about the magnitude of ∆W (ωc = ∞). \nWe next compute the conductivity σ(ω) using the equa- \ntions listed above, find W (ωc) and ∆W (ωc) and compare \n∆f (ωc) and ∆WK. \n\nwhere Zk,ω = 1 − Σ(k,ω) \n, and ∆k,ω, is the SC gap. Fol- \nlowing earlier works31,33, we assume that the fermionic \nself-energy Σ(k, ω) predominantly depends on frequency \nand approximate Σ(k, ω) ≈ Σ(ω) and also neglect the \nfrequency dependence of the gap, i.e., approximate ∆k,ω \nby a d−wave ∆k. The lattice dispersion ε~k is taken from \nRef. 38. To calculate WK , one has to evaluate the Kubo \nterm in Eq.3 wherein the distribution function n~k, is cal- \nculated from \n\nFor simplicity and also for comparisons with earlier \nstudies, for BCSI, EB, and MFLI models we assumed \nthat the gap is just a constant along the FS. For CB \nmodel, we used a d−wave gap and included into consid- \neration the fact that, if a CB is a spin fluctuation, its \npropagator develops a resonance when the pairing gap is \nd−wave. \n(10)", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0764.pdf" - }, - { - "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n*Introduction:*Since the invention of the separated-field \ntechnique [1], it has played an important role in the field of \nprecision spectroscopy due to its linewidth narrowing effect \nvia multiple coherent interaction. Atomic clocks based on \nthis technique have greatly extended our ability for frequency \nmeasurement, further, almost all the atom interferometers are \nbased on this technique [2]. \n\ncus on the stimulated emission spectrum via multiple coher- \nent interactions inside the cavity. We find this Ramsey laser \ncan provide a stimulated-emission spectrum with a linewidth \nmuch narrower than that of any conventional optical Ramsey \nseperated-field spectroscopy, which is commonly applied in \noptical atomic clock. Our results also show that a subnatural \nlinewidth spectroscopy, superior to any other available subnat- \nural spectroscopy technique at present [3–10], can be reached \nby this kind of laser, if a suitable atomic level structure is cho- \nsen. Thus, this method can provide an effective subnatural \nspectroscopy, and the possibilities for the new optical clock \nscheme [15] and atom interferometers [2]. \n\n] \nh \np \n- \nt \nn \na \nu \nq \n[ \n\n1 \nv \n0 \n7 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\n*Theoretical framework:*We consider the case of a two-level \natomic beam interacting with a single-mode Ramsey cavity \nof separated-oscillating-field resonators with the cavity mode \nlinewidth is much wider than the atomic gain linewidth. Thus \nwe call it bad-cavity Ramsey laser. All atoms are pumped \nonto the upper lasing state**a**before entering the first cavity \nof seperated field, and the lower lasing state is**b**. We assume \nall the atoms have the same velocities υ, that means what we \nconsider here is a homogeneous laser system. And for the \nsake of simplicity, we consider the two-standing waves linear \noptical Ramsey configuration with a grid as spatial selector \n[20, 21]. Our treatment can be extended to other configura- \ntions as in [22–24]. The length of each oscillating part is*l*, \nand the length of the free drift region is*L*. The corresponding \nHamiltonian is \n\n[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2670.pdf", - "query": "What are the consequences on the linewidth for regular and Poissonian injections ?", - "target_page": 3, - "target_passage": " For regular injection (p = 1), the linewidth is the narrowest, while for Poissonian injection (p = 0), the linewidth is the broadest.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "κ \n*B*1 +*B*2) # \n˜*Nbss*= . \n\n*R*(*B*0 − \n\nA detailed analysis about the stability of the steady-state can \nbe found such as in [28]. In this paper, we assume the steady- \nstate solution is stable. \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] *D*= *DS T*+*DRam*[2 \n− \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)]. *D* [2 (12) \n\nwhere Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − \n\nFrom the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*\n\n(δϕ2)ω \n\n(κ/2 + γ*ab*)2 \n*I*0ω2[(κ/2 + γ*ab*)2 + ω2] \n≈ \n+ 2*R*[(*A*0 +*B*0) + (*A*2 +*B*2)] \n+*Rp*[(*C*0 − *C*∗0)2 + (*C*1 − *C*∗1)2 + (*C*2 − \n*C*∗2)2] \n. \n} \n(9) \n\nSince the time τ and*T*is much shorter than the time scale \nof the atomic dampings, we can neglect the dampings when \ncalculate*Ai*,*Bi*,*Ci*. By using \n\nΩ*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 −", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "associated with approximately twice the odds of receiv- \ning injection (OR = 2.14, p < .01). The pseudo-R2 value \nfor these models was lowest of all specific healthcare injection utilization, however the only significant indi- \nvidual predictor was baseline disability. In both models, \neach 1-standard deviation increase in disability was", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed5.pdf" - }, - { - "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n*Introduction:*Since the invention of the separated-field \ntechnique [1], it has played an important role in the field of \nprecision spectroscopy due to its linewidth narrowing effect \nvia multiple coherent interaction. Atomic clocks based on \nthis technique have greatly extended our ability for frequency \nmeasurement, further, almost all the atom interferometers are \nbased on this technique [2]. \n\ncus on the stimulated emission spectrum via multiple coher- \nent interactions inside the cavity. We find this Ramsey laser \ncan provide a stimulated-emission spectrum with a linewidth \nmuch narrower than that of any conventional optical Ramsey \nseperated-field spectroscopy, which is commonly applied in \noptical atomic clock. Our results also show that a subnatural \nlinewidth spectroscopy, superior to any other available subnat- \nural spectroscopy technique at present [3–10], can be reached \nby this kind of laser, if a suitable atomic level structure is cho- \nsen. Thus, this method can provide an effective subnatural \nspectroscopy, and the possibilities for the new optical clock \nscheme [15] and atom interferometers [2]. \n\n] \nh \np \n- \nt \nn \na \nu \nq \n[ \n\n1 \nv \n0 \n7 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\n*Theoretical framework:*We consider the case of a two-level \natomic beam interacting with a single-mode Ramsey cavity \nof separated-oscillating-field resonators with the cavity mode \nlinewidth is much wider than the atomic gain linewidth. Thus \nwe call it bad-cavity Ramsey laser. All atoms are pumped \nonto the upper lasing state**a**before entering the first cavity \nof seperated field, and the lower lasing state is**b**. We assume \nall the atoms have the same velocities υ, that means what we \nconsider here is a homogeneous laser system. And for the \nsake of simplicity, we consider the two-standing waves linear \noptical Ramsey configuration with a grid as spatial selector \n[20, 21]. Our treatment can be extended to other configura- \ntions as in [22–24]. The length of each oscillating part is*l*, \nand the length of the free drift region is*L*. The corresponding \nHamiltonian is \n\n[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "p < 0.001), CCI \n\nInjection \nA combination of race, chronicity and baseline disability \nexplained slightly more than 20% of the variance in \n\n\n \n \n \n \n [html]Dependent variable\n
Any careOpioidsInjectionSurgeryDiagnostic tests or imagingEmergency roomComplete Case
Block 1Demographic, Clinical and Comorbidity
. 258 **. 274 **. 292 **. 226 *. 250 *. 400 **Block 2OSPRO - YF ( 10 items ) OSPRO - ROS ( 10 items )
. 267. 294. 293. 234. 253. 404Block 3OSPRO - YF (+ 7 items ) OSPRO - ROS (+ 13 items )
. 275. 296. 315. 259. 271. 457Block 44 - week change ( Pain, Disability, OSPRO - YF )
. 337 *. 424 **. 353. 426 **. 340 *. 560 *Inverse Probability of Attrition Weighted
Block 1Demographic, Clinical and Comorbidity
. 306 **. 294 **. 313 **. 236. 304 **. 430 **Block 2OSPRO - YF ( 10 items ) OSPRO - ROS ( 10 items )
. 314. 317. 317. 250. 305. 435Block 3OSPRO - YF (+ 7 items ) OSPRO - ROS (+ 13 items )
. 321. 321. 334. 284. 321. 473Block 44 - week change ( Pain, Disability, OSPRO - YF )
. 382 *. 448 **. 373. 464 **. 389 *. 611 *
", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed5.pdf" - }, - { - "text": "INDUCED FLOW \nFROM PROPELLER \nSLIPSTREAM \n\n\n\nn \nc; \n\nr \n\n n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nfigure 1.20. Power Effects", - "page_start": 63, - "page_end": 63, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0764.pdf" - }, - { - "text": "In the expression of annihilation cross section, we used the following notations : \n\n∂Φ \n∂h \n∂Φ \n∂H \n∂Ψ \n∂h \n∂Ψ \n∂H \n1 \n√2 \n1 \n√2 \n1 \n√2 \n− \n1 \n√2 \n\n= \n\n= \n\n= \n\n= \n\n2 \n\ns \n4 − 3 \n8 \n1 \n2 (cid:16) \n\n4m2 \nm2 \nf \ncos2 θ (s s \nN ) \n(cid:18) (cid:19) − − \n(cid:17) \n2 \ni \n\n∂Ψ \n∂h ∂Φ \n∂H \n\n∂Ψ \n∂H (cid:19)(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\n+ \nM 2 s \nH + iMH ΓH \n− \n\n2 = \n|M| \n\ng2 \nB \n− \nM 2 \nZ ′ + iMZ ′ΓZ ′ (cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \nM 2 \nh + iMhΓh \n\nLqf qN \n32 \n\n(cid:12) \n(cid:12) \n− \n(cid:12) \n(cid:12) \n+16λ2 \n\ns \n\n∂Φ \n∂h \ns \n4 − \nyf (cid:18) \nN (cid:12) \n(cid:12) \n(cid:12) \n4m2 \nN ) \n(cid:12) \n\ns \n\n− \nm2 \nf \n(s . \n− \n(cid:16) (cid:17) \n\n2 = \n|M| \n\ng2 \nB \n− \nM 2 \nZ ′ + iMZ ′ΓZ ′ (cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\nLqf qN \n32 \n\n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\ns \n−", - "page_start": 9, - "page_end": 9, - "source_file": "1002.2525.pdf" - }, - { - "text": "an extra potentially expensive LLM invocation for each query processed by the router. Second, it may degrade the quality \nof responses from the destination LLMs, which are sensitive to the phrasing of queries and prompts. \n\nDetecting anomalous user workloads. Another possible defense requires the router to monitor individual user work- \nloads, and identify those users whose queries are routed to the strongest model with an abnormally high frequency. The \nrouter can then impose a user-specific threshold. Of course such workloads may have a benign explanation, e.g., the user’s \nqueries may be unusually complex. Even so, routers could potentially be designed to perform user-specific routing. For \nexample, one could imagine using per-user thresholds that are calibrated dynamically to attempt to maintain a consistent \nfraction of queries being routed to the strong model. \n\nSuch user-specific routing would complicate implementations, and would make inaccurate decisions for a user until there \nis sufficient data about their queries. The latter is relevant in adversarial settings, since such an approach would still be \ncircumventable should attackers be able to mount Sybil attacks in which the attacker creates a new user for, in the limit, \neach query. \n\n9 Related Work \n\nEvasion attacks against ML systems. A large body of work has investigated evasion attacks against ML systems [25, \n43, 60], also referred to as adversarial examples [32, 48, 49], and these attacks are now being explored in the context of \nmulti-modal LLMs [28] as well as text-only LLMs (for just one example, see [22]). We discussed in Section 3 how our \nresults compare: LLM control plane integrity is a distinct AI safety issue, but related in that: (1) control plane integrity \nattacks may use evasion-style techniques, and (2) control plane integrity attacks might be useful for performing evasion. \n\nPrompt injection against LLMs. Prompt injection is a class of attacks against LLMs in which the adversary manipulates \nthe prompt, i.e., the textual input fed directly to the LLM, causing the LLM to generate outputs that satisfy some adver- \nsarial objective [50, 64]. Evasion attacks as discussed above can use prompt injection, jailbreaking attacks being a widely \nexplored example in which the adversary aims to bypass some safety guardrail included in the LLM system, such as “do \nnot output expletives” [23, 42, 54, 66, 72, 73]. \n\nPrompt injection is also used for extraction attacks that aim to infer some information from or about the model, for \nexample, the system prompt [50, 54, 70], training data samples [46], or model parameters [18]. In indirect prompt injection \nattacks [33], the adversaries do not directly interact with the target LLM, and instead inject adversarial inputs into third- \nparty data, which is then added to the LLM prompt (intentionally or unintentionally) by the victim application and/or its \nusers. This relates to another category of attacks that target LLM-based applications, such as RAG systems, and invalidate \ntheir integrity by exploiting the weaknesses of the underlying LLM [19, 55]. \n\nOur attacks also modify queries, but with a different aim than the above types of attacks: undermining the integrity of the \ncontrol plane routing, rather than the LLM itself. Future work might investigate indirect control plane integrity attacks \nthat, analogously to indirect prompt injection, serve to somehow trick users of a routing system into forming control- \nplane-confounding queries.", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - }, - { - "text": "**Table A1: Projected prison population (end of June figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
Scenario 1CentralScenario 2
Jun - 1587.10087.70088.900
Jun - 1686.80089.10092.000
Jun - 1785.20089.30093.600
Jun - 1883.90089.70095.800
Jun - 1982.60090.10097.600
Jun - 2081.40090.20098.900
\n\n**Table A2: Average projected prison population (financial year figures)**\n\n\n \n \n \n \n [html]Scenario 1\n
CentralScenario 22015 / 16
87.00088.20089.7002016 / 17
86.20089.10092.4002017 / 18
84.70089.30094.1002018 / 19
83.40089.80096.3002019 / 20
82.20090.10097.900
\n\n**Table A3: Comparison of 2013 based Scenario 2 and 2014 Central Scenario**\n**projections (end of June figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
20132014Difference
Jun - 1483.400----
Jun - 1582.10087.7006.8 %
Jun - 1682.00089.1008.6 %
Jun - 1781.60089.3009.4 %
Jun - 1881.50089.70010.1 %
Jun - 1981.80090.10010.2 %
Jun - 20--90.200--
", - "page_start": 16, - "page_end": 16, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "ports 61, 129 (2006). \n\n13 E. Weschke, et al., Phys. Rev. Lett. 93, 157204 (2004). \n14 F. Cinti, A. Cuccoli, and A. Rettori, Phys. Rev. B 78, \n020402(R) (2008). \n15 F. Cinti, A. Cuccoli, and A. Rettori, Phys. Rev. B 79,", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2449.pdf", - "query": "Give me the advantages of Ferromagnetic semiconductors", - "target_page": 1, - "target_passage": "Ferromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material.", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "***Kingsgate is a highly successful gold***\n***mining, development and exploration***\n***company with two operating gold mines***\n***and two advanced development projects.***\n***Shareholders can look forward to the***\n***benefits of this strong operating and***\n***development platform, where Kingsgate***\n***aims to build value though operating,***\n***earnings and dividend growth for***\n***the benefit of all stakeholders.***", - "page_start": 1, - "page_end": 1, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "Serverless \n\n**Next steps**\n\n• See What is EDA? for advantages of a decoupled architecture. \n\n• Learn more about the advantages of modernizing monolithic applications in the AWS \n\nPrescriptive Guidance enabling data persistence in microservices reference document.", - "page_start": 32, - "page_end": 32, - "source_file": "serverless-core.pdf" - }, - { - "text": "the magnitude of difference, \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed12.pdf" - }, - { - "text": "1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nThe development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, \n\nThe Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "The benefits of using mind maps include the following: \n\n• They help you to see how the different bits of information fit into the \n\nbigger picture. \n\n• They help you to understand the relationships between concepts. \n\n• They help you to memorise information more quickly (by engaging \n\nboth hemispheres of your brain). \n\nTips for making mind maps: \n\n• Use different colours to distinguish between concepts. \n\n• Use key words and phrases, instead of writing in full sentences. \n\n• Include images/drawings that are relevant to the topic(s). \n\n• Use arrows to show how different concepts are related. \n\n**HR Manager’s Duties**\n\nContracts Training \n\n• Establish staff training \n• Pay salaries on time • Draft employment \n\nneeds \n• Make necessary contracts \n\n• Establish skills gaps \ndeductions • Ensure safekeeping of \n\n• Take responsibility for \n• Calculate overtime employment contracts \n\nsuccession planning", - "page_start": 29, - "page_end": 29, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. \n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, \n“Nanotube molecular wires as \nScience 287(5453), 622 (Jan. 2000), \nK. Cho, and H. Dai, \nchemical sensors”, \ndoi:10.1126/science.287.5453.622. \n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “Ab \ninitio study of spin-dependent transport in carbon nanotubes \nwith iron and vanadium adatoms”, Phys. Rev. B 78(19), 195405 \n(Nov. 2008), doi:10.1103/PhysRevB.78.195405. \n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, \n\n“Ex- \ntreme oxygen sensitivity of electronic properties of car- \nScience 287(5459), 1801 (Mar. 2000), \nbon nanotubes”, \ndoi:10.1126/science.287.5459.1801. \n\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. \n\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, \n“Real-space grid implementation of the projector augmented \nPhys. Rev. B 71(3), 035109 (Jan. 2005), \nwave method”, \ndoi:10.1103/PhysRevB.71.035109. [7] A. R. Rocha, M. Rossi, A. Fazzio, \n\nJ. R. \n“Designing real nanotube-based gas \nsen- \nPhys. Rev. Lett. 100(17), 176803 (May 2008), \n\nand A. \n\n[23] J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized gradi- \nent approximation made simple”, Phys. Rev. Lett. 77(18), 3865 \n(Oct. 1996), doi:10.1103/PhysRevLett.77.3865. da Silva, \nsors”, \ndoi:10.1103/PhysRevLett.100.176803. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "K. Olejnik,1, 2 P. Wadley,3 J. Haigh,3 K. W. Edmonds,3 R. P. Campion,3 A. W. Rushforth,3 B. L. Gallagher,3 \nC. T. Foxon,3 T. Jungwirth,2, 3 J. Wunderlich,1, 2 S. S. Dhesi,4 S. Cavill,4 G. van der Laan,4 and E. Arenholz5 \n1Hitachi Cambridge Laboratory, Cambridge CB3 0HE, United Kingdom \n2Institute of Physics ASCR, v.v.i., Cukrovarnicka 10, 16253 Praha 6, Czech Republic \n3School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD, United Kingdom \n4Diamond Light Source, Harwell Science and Innovation Campus, \nDidcot, Oxfordshire, OX11 0DE, United Kingdom \n5Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, California 94720, USA \n(Dated: August 24, 2018) \n\nWe demonstrate an exchange bias in (Ga,Mn)As induced by antiferromagnetic coupling to a thin \noverlayer of Fe. Bias fields of up to 240 Oe are observed. Using element-specific x-ray magnetic \ncircular dichroism measurements, we distinguish a strongly exchange coupled (Ga,Mn)As interface \nlayer in addition to the biassed bulk of the (Ga,Mn)As film. The interface layer remains polarized \nat room temperature. \n\nwhich may further disrupt the interface order. The ori- \ngin of the interface magnetism then had to be inferred by \ncomparison to a series of reference samples7. Demonstra- \ntion of coupling between the bulk of the layers, i.e., an \nexchange bias effect, would provide direct evidence of the \ninterface magnetic order. Moreover, such coupling would \noffer new means of manipulating the FM semiconductor \nspin state and utilizing the proximity polarization effect \nin a spintronic device. \n\n] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2449.pdf", - "query": "I do not remember on wich samples SQUID magnetometry measurements were first performed", - "target_page": 2, - "target_passage": "SQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "SQUID \n\nFigure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. \n\nSimilar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. \n\nClear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": ") \ns \nt \ni \nn \nu \n. \n\nb \nr \na \n( \n\nn \no \ni \nt \n\np \nr \no \ns \nb \na \ny \na \nr \n- \nX \n\nFIG. 3. (color online) (a) Polarization-averaged Mn L2,3 spec- \ntrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured \nin remanence at 2 K; (c) XMCD spectra measured under a \n1000 Oe applied field at 2 K; (d) XMCD spectrum measured \nunder a 2000 Oe applied field at 300 K. XMCD spectra are \nobtained using TEY (thick red lines) and FY (thin blue lines) \ndetection.", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2449.pdf" - }, - { - "text": "**Note 15. Quarterly Results (unaudited)**", - "page_start": 39, - "page_end": 39, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "the magnitude of difference, \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed12.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "2.6 Data collection \n\nThe interview guide (Table 4) was developed based on literature \nreviews, clinical experience and discussions within the research \ngroup and with user representatives. Two test interviews were", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "**References**\n\nJ. G. Mangum, and M. S. Yun (2007), vol. 375 \nof Astronomical Society of the Pacific Conference \nSeries, p. 234. \n\n[6] S. E. Healey, R. W. Romani, G. Cotter, P. F. \nMichelson, E. F. Schlafly, A. C. S. Readhead, \nP. Giommi, S. Chaty, I. A. Grenier, and L. C. \nWeintraub, ApJS 175, 97 (2008). \n\n[7] A. A. Abdo, M. Ackermann, M. Ajello, W. B. At- \nwood, M. Axelsson, L. Baldini, J. Ballet, G. Bar- \nbiellini, D. Bastieri, B. M. Baughman, et al., ApJ \n700, 597 (2009). \n\n[8] T. Hovatta, E. Nieppola, M. Tornikoski, E. Val- \ntaoja, M. F. Aller, and H. D. Aller, A&A 485, 51 \n(2008). \n\n[1] M. Sikora and G. Madejski, in American Insti- \ntute of Physics Conference Series, edited by F. A. \nAharonian and H. J. V¨olk (2001), vol. 558 of \nAmerican Institute of Physics Conference Series, \npp. 275–288. \n\n[2] M. Sikora, in Blazar Demographics and Physics, \nedited by P. Padovani and C. M. Urry (2001), vol. \n227 of Astronomical Society of the Pacific Con- \nference Series, pp. 95–104. \n\n[3] J. A. Stevens, S. J. Litchfield, E. I. Robson, D. H. \nHughes, W. K. Gear, H. Terasranta, E. Valtaoja, \nand M. Tornikoski, ApJ 437, 91 (1994). \n[4] P. T. P. Ho, J. M. Moran, and K. Y. Lo, ApJl [9] B. C. Kelly, J. Bechtold, and A. Siemiginowska, \n616, L1 (2004). ApJ 698, 895 (2009). \n[10] M. Sikora, R. Moderski, and G. M. Madejski, ApJ \n675, 71 (2008). \n\n[5] M. A. Gurwell, A. B. Peck, S. R. Hostler, M. R. \nDarrah, and C. A. Katz, in From Z-Machines to \nALMA: (Sub)Millimeter Spectroscopy of Galax- \nies, edited by A. J. Baker, J. Glenn, A. I. Harris,", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" - }, - { - "text": "**ITEM 6. SELECTED FINANCIAL DATA (in millions, except per share data)**", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2449.pdf", - "query": "What are the differences observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes ?", - "target_page": 2, - "target_passage": "For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high mag netic fields, whereas for TEY at remanence it is approx imately a factor of two larger than at 1000 Oe.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "-0.1 \n\n(a) Fe TEY \n-0.2 \n\ny \nr \nt \ne \nm \nm \ny \ns \na \nD \nC \nM \nX \n\n0.004 \n\n0.000 \n\n(b) Mn TEY \n-0.004 \n\nFIG. 2. (color online) XMCD asymmetry versus applied field \nalong the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As \n(a) Fe L3, total electron yield; (b) Mn L3, \n(10 nm) film. \ntotal electron yield; (c) Mn L3, fluorescent yield. Black and \nred points are data for increasing and decreasing fields respec- \ntively; lines are to guide the eye.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2449.pdf" - }, - { - "text": "SQUID \n\nFigure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. \n\nSimilar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. \n\nClear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": ") \ns \nt \ni \nn \nu \n. \n\nb \nr \na \n( \n\nn \no \ni \nt \n\np \nr \no \ns \nb \na \ny \na \nr \n- \nX \n\nFIG. 3. (color online) (a) Polarization-averaged Mn L2,3 spec- \ntrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured \nin remanence at 2 K; (c) XMCD spectra measured under a \n1000 Oe applied field at 2 K; (d) XMCD spectrum measured \nunder a 2000 Oe applied field at 300 K. XMCD spectra are \nobtained using TEY (thick red lines) and FY (thin blue lines) \ndetection.", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2449.pdf" - }, - { - "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. \n\nmeasurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. \n\nThe interfacial Mn moments are ascribed to the prox- \nimity polarization of the (Ga,Mn)As interface by the Fe \nlayer, such as was shown previously by XMCD as well as \nab initio theory7. Evidence for this can be observed from \nmeasurement of the Mn L2,3 XMCD signal at tempera- \ntures above the (Ga,Mn)As TC . Similar to the previous \nstudy7, we observe a small but not negligible signal at \nroom temperature (Fig. 3), with opposite sign to the Fe \nL2,3 XMCD. Its spectral shape is characteristic of a local- \nized electronic configuration close to d5, similar to bulk \n(Ga,Mn)As7,9,15 but in contrast to Mn in more metallic \n7 or MnAs16. A slight \nenvironments such as MnxFe1−x \nbroadening is observed on the low energy side of the Mn \nL3 peak, which may be due to the different screening in- \nduced by proximity to the Fe layer. Since the measured \nintensity is attenuated with distance z from the surface \nas I = I0 exp(−z/λT EY ), the thickness of the strongly \ncoupled interface layer is estimated to be ∼0.7 nm or 2-3 \n\nIn summary, we have demonstrated antiferromagnetic \ncoupling between Fe and (Ga,Mn)As layers in bilayer \nstructures. A markedly different coupling is observed for \nthe bulk of the (Ga,Mn)As layer and for Mn moments \nin the near-interface region. A thickness-dependent ex- \nchange bias field is observed to affect the whole of the \nbulk (Ga,Mn)As layer, which aligns antiparallel to the \nFe layer at low fields, and switches to parallel when the \nexternal field is large enough to overcome the bias field \nand the magnetocrystalline anisotropy fields. In contrast, \nthe interfacial Mn moments remain aligned antiparallel \nto the Fe layer even at 20 kOe, the largest field studied, \nand are polarized at temperatures well above the TC of \nthe bulk (Ga,Mn)As layer. The latter observation con- \nfirms the recently reported result of Ref. 7, in which \nthe Fe/(Ga,Mn)As bilayers were produced by a different \nmethod but showed qualitatively similar behavior of the \ninterfacial moments. Our results shed new light on the \nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which \nare of potential interest for room temperature spintron- \nics, and also offer a means of controlling the spin orien- \ntation in a FM semiconductor. \nfrom EU grants \nacknowledge \nand \nSemiSpinNet-215368 \nSTFC studentship grant CMPC07100. The Advanced \nLight Source is supported by the U.S. Department of \nEnergy under Contract No. \nDE-AC02-05CH11231. \nWe thank Leigh Shelford for help during the Diamond \nbeamtime. \n\nWe \n\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. Mac- \nDonald, Phys. Rev. B 59, 9818 (1999); P. Sankowski and \nP. Kacman, Phys. Rev. B 71, 201303(R) (2005); A. D. \nGiddings, T. Jungwirth, and B. L. Gallagher, Phys. Rev. \nB 78, 165312 (2008); K. Szalowski and T. Balcerzak, Phys. \nRev. B 79, 214430 (2009).", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "4 \n\nM. Sawicki, M. Polini, J. Sinova, A. H. MacDonald, R. P. \nCampion, L. X. Zhao, N. R. S. Farley, T. K. Johal, G. van \nder Laan, C. T. Foxon, and B. L. Gallagher, Phys. Rev. B \n73, 165205 (2006). \n\n16 K. W. Edmonds, A. A. Freeman, N. R. S. Farley, K. Y. \nWang, R. P. Campion, B. L. Gallagher, C. T. Foxon, G. \nvan der Laan, and E. Arenholz, J. Appl. Phys. 102, 023902 \n(2007). \n\n4 \n\n) \nu \nm \ne \n\nH = 0 \n2 \n4 \n5 \n- 0 \n\n0 \n1 \n( \nT (K) \n0 \nt \n\nn \ne \nm \no \nM \n\n300 \n\n) \ne \nO \n200 \n( \nE \nH \n100 \n\n0 \n0 20 40 \nd (nm) \n\n1000 \n\n Applied field (Oe) \n\nFIG. 1. \n(color) Main figure: Major (red/black) and minor \n(green) hysteresis loops along the [110] axis at 5 K, for a \nFe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop \nfor a control (Ga,Mn)As (20 nm) film along the same axis \n(blue). Left inset: Magnetization versus temperature for the \nFe/(Ga,Mn)As film at remanence (black) and under a 500 Oe \napplied field (red). Right inset: Exchange bias field versus \nthickness d of the (Ga,Mn)As film (points) and fit showing \n1/d dependence (dashed line).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2449.pdf" - }, - { - "text": "1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nThe development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, \n\nThe Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "K. Olejnik,1, 2 P. Wadley,3 J. Haigh,3 K. W. Edmonds,3 R. P. Campion,3 A. W. Rushforth,3 B. L. Gallagher,3 \nC. T. Foxon,3 T. Jungwirth,2, 3 J. Wunderlich,1, 2 S. S. Dhesi,4 S. Cavill,4 G. van der Laan,4 and E. Arenholz5 \n1Hitachi Cambridge Laboratory, Cambridge CB3 0HE, United Kingdom \n2Institute of Physics ASCR, v.v.i., Cukrovarnicka 10, 16253 Praha 6, Czech Republic \n3School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD, United Kingdom \n4Diamond Light Source, Harwell Science and Innovation Campus, \nDidcot, Oxfordshire, OX11 0DE, United Kingdom \n5Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, California 94720, USA \n(Dated: August 24, 2018) \n\nWe demonstrate an exchange bias in (Ga,Mn)As induced by antiferromagnetic coupling to a thin \noverlayer of Fe. Bias fields of up to 240 Oe are observed. Using element-specific x-ray magnetic \ncircular dichroism measurements, we distinguish a strongly exchange coupled (Ga,Mn)As interface \nlayer in addition to the biassed bulk of the (Ga,Mn)As film. The interface layer remains polarized \nat room temperature. \n\nwhich may further disrupt the interface order. The ori- \ngin of the interface magnetism then had to be inferred by \ncomparison to a series of reference samples7. Demonstra- \ntion of coupling between the bulk of the layers, i.e., an \nexchange bias effect, would provide direct evidence of the \ninterface magnetic order. Moreover, such coupling would \noffer new means of manipulating the FM semiconductor \nspin state and utilizing the proximity polarization effect \nin a spintronic device. \n\n] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n12-25 keV band, where the flux initially rose to about \n240 mCrab (2009 Oct 25-28), suddenly dropped to \nnon-detectable on 2009 October 29-30, then rose again \nduring the period 2009 October 31 to November 2. As \nof mid December 2009, the source remains in a high \nintensity state. The light curve is shown for the pe- \nriod MJD 54700-55200, again with 1-day resolution, \nin Fig. 8. The fluxes for XTE J1752-223 in Table 1 \nare given are for the interval of flaring activity, TJD \n55130-55180. \n\n\n\nThis work is supported by the NASA Fermi Guest \nInvestigator program. At LSU, additional support is \nprovided by NASA/Louisiana Board of Regents Co- \noperative Agreement NNX07AT62A. \nFIG. 8: XTEJ1752-223 light curve. Horizontal scale is in \nmodified Julian days. \n\n[1] C. Meegan et al., Ap. J. 702, 791 (2009). \n[2] C. Wilson-Hodge et al. (2010), these proceedings. \n[3] B. A. Harmon et al., Ap. J. Suppl. 138, 149 (2002). \n[4] B. A. Harmon et al., Ap. J. Suppl. 154, 585 (2004). \n[5] G. L. Case et al., in The First GLAST Symposium, \nedited by S. Ritz, P. Michelson, and C. Meegan \n(2007), vol. 921 of AIP Conf. Proceedings, p. 538. \n[6] J. Tueller et al. (2010), ap. J. Suppl., (to be pub- \n\n(1998). \n\n[10] M. McConnell et al., Ap. J. 523, 928 (2000). \n[11] J. C. Ling and W. A. Wheaton, Chinese J. Astron. \nAstrophys. Suppl. 5, 80 (2005). \n[12] G. L. Case et al., Chinese J. Astron. Astrophys. Suppl. \n5, 341 (2005). \n\n[13] L. Bouchet et al., Ap. J. 693, 1871 (2009). \n[14] M. C. Bell et al., Ap. J. 659, 549 (2007). \n[15] G. L. Case et al. (2010), to be submitted. \n[16] C. Wilson-Hodge et al., Astron. Telegram 2280 \nlished), astro-ph/0903.3037. \n[7] J. C. Ling and W. A. Wheaton, Ap. J. 598, 334 \n(2003). (2009). \n\n[8] E. Jourdain and J. P. Roques, Ap. J. 704, 17 (2009). \n[9] H. Steinle et al., Astron. and Astrophys. 330, 97", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0955.pdf" - }, - { - "text": "The scenario just outlined for n = 8 results to be cor- \nrect in the thickness range 6 ≤ n . 15, where a clear \nseparation between TN (n) and TC(n) can be easily fig- \nured out. In such temperature window, the strong sur- \nface effects produce a quasi-FM set-up of the magnetic \nfilm structure along the z-direction. While leaving to the \nnext Section a more detailed discussion of this regime, we \nreport in Fig. 5 a plot of TN (n) and TC(n) vs. n for all \nthe simulated thicknesses. The separation between the \ntwo critical temperatures is maximum for n = 6, where \nTN (6) = 38(4), that is TN (6) ∼ 1 \n3 TC(6). For films with \nless than six layers no fan order is observed, i.e. for n = 5 \nand below the chirality does not display any typical fea- \nture of fan ordering at any temperature below TC(n). As \na representative quantity we finally look at the rotation \n\nThe observed behaviour in region iii) can be reason- \nably attributed to the decreasing relevance of the con- \ntribution to the total energy of the system coming from \nthe competitive interactions among NNN planes as the \nfilm thickness decreases; moreover, the thinness of the", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0510.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_KCN_2013.pdf", - "query": "What is Kingsgate ?", - "target_page": 2, - "target_passage": "Kingsgate is a highly successful gold mining, development and exploration company with two operating gold mines and two advanced development projects.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "***Kingsgate is a highly successful gold***\n***mining, development and exploration***\n***company with two operating gold mines***\n***and two advanced development projects.***\n***Shareholders can look forward to the***\n***benefits of this strong operating and***\n***development platform, where Kingsgate***\n***aims to build value though operating,***\n***earnings and dividend growth for***\n***the benefit of all stakeholders.***", - "page_start": 1, - "page_end": 1, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Killam properties inc \n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "the \n\n\n\nway.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**Investment in LandÑlls**", - "page_start": 47, - "page_end": 47, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "[html]The Financial Report of Kingsgate Consolidated Limited ( Kingsgate or the “ Company ”) for the year ended 30 June 2013 was authorised forin Australian dollars, which is the Company ' s functional currency and presentation currency.amounts related to the settlement of a pre - existing relationship. Such amounts are generally recognised in profit or loss.issue in accordance with a resolution of Directors on 23 September 2013.Rounding of amountsCosts related to the acquisition, other than those associated with the issue of debt or equity securities, that the Group incurs in connection with a business combination are expensed as incurred. Any contingent consideration payabledKingsgate is a Company limited by shares incorporated in Australia whose shares are publicly traded on the Australian Securities ExchangeThe Company is of a lind referred to in ASIIC Class Order 98 ( 100 dated 10 ) ( uly 3998 and in accordance with that Class Order, all financial information presented in Australian dollars has been rounded to the nearest thousand, or in certain cOritical accounting estimatesAcquisitions of non - controlling interests are their care their capacity as owners and theneficiency gross - will is recognised as a nesult of ouch transactions. The non - controlling interact in the adjust mental health in the controlleto as the “ Group ” and individually as “ Group entities ”). A description of the nature of theThe preparation of financial statements requires to preventions. The preparations to preparations that informations that impaired to exercise the judgement in the process of applying the Group ' s accounting policies. The areas invol1. BASIS OF PREPARATIONThe general purpose financial statements have been prepared in accordance with Australian Accounting Standards, other authoritative pronouncements of the Australian Accounting Standards Board and the Corjoretties Act 20032. SIGNIFICANT ACCOUNTINGThe acquisition of an asset or group of assets that is not a business is accounted for by allocating the cost of the transaction to the net identifiable assets and liabilities acquired based on their fair values.purpose of preparing : the financial statements.The principal accounting policies adopted in the preparation of the financial statements are set out below. These policies have been consistently applied to all the years presented.( II ) SubsidiariesThe financial statements comply with International Financial Reporting StandardsSubsidiaries are entities controlled by the first - infantements of subsidiaries are included in the consolidated financial state - ments from the date that control commences until the date that control ceases.Standards Board ( IASB ).TTTTCTCTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTHistorical cost convention( i ) Business combinationsThe financial statements have been prepared under the historical cost : convention, as modified by the revaluation of available - for - sale financial assets and financial instruments ( including denviative instruments ) at fair value tBusiness combinations are accounted for using the acquisition method as at the acquisition to activities and the acquisition to activities. The activities and their transferred to the Group. Control is the prewer to govern the financinThe accounting policies of subsidiaries have been changed when necessary to align them with the policies adopted by the Group. Losses applicable to the non - controlling interests in a subsidiary are", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": " ", - "page_start": 41, - "page_end": 41, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_KCN_2013.pdf", - "query": "What does demonstatre the feasibility study on the Nueva Esperanza Project ?", - "target_page": 6, - "target_passage": "The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible, although high capital and power costs negatively impacted project economic returns. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Nueva Esperanza \nThe Nueva Esperanza Project was advanced \nduring the year with the completion of a draft \nfeasibility study. This study included a decision \nto mine the Arqueros and Teterita portions of \nNueva Esperanza. The study demonstrated that \nopen pit mining at two million tonnes per year \nand processing by milling and agitation leaching \nin cyanide was technically feasible, although \nhigh capital and power costs negatively \nimpacted project economic returns. \n\nBowdens \nThe Bowdens Project continued to advance \nduring the year with field programs supporting \nthe ongoing feasibility and environmental \nstudies. Sterilisation drilling and additional \nmetallurgical sampling were undertaken with \nthe resource evaluation drilling completed in \nOctober 2012. \n\nDuring 2013, the process design and engineering \nwork for the Definitive Feasibility Study (“DFS”) \nprogressed to a point where the draft study was \nclose to completion as at 30 June 2013. The study \nencompassed detailed process design based on \nusing the most recent metallurgical test results, \ncapital and operating cost estimates, project \nwater and power supply, infrastructure require- \nments and mine optimisation. \n\nAs a consequence, feasibility work has tran- \nsitioned to assess a lower capital cost and lower \npower requirement options, namely the poten- \ntial for heap leach processing. Metallurgical \ntestwork recently completed demonstrated \nthat processing of mineralisation from all three \ndeposits by heap leaching has the potential to \nbe technically and economically feasible and as \na consequence may become the preferred \nalternative for development. \n\nEnvironmental approval for the original Arqueros \nProject was granted in July 2013. \n\nThe preparation for lodgement of an Environ- \nmental Impact Statement (“EIS”) to the NSW \nDepartment of Planning continues. It is envis- \naged that the EIS will be completed and lodged \nin 2014. Data for flora and fauna, surface water, \ngroundwater, meteorology, ambient noise and \ndust levels are collected routinely. Further inves- \ntigations of cultural heritage, social-economic \nimpact, traffic impact, soil type and agricultural \nsuitability have also been undertaken. \nFinancials \n\nKingsgate made an after tax loss of $323.7 \nmillion for the full year to 30 June 2013 compared \nto an after tax profit of $75.0 million for the \nprevious corresponding year. The result for the \nyear reflected an impairment of $311.9 million \npre-tax ($291.3 million post-tax) against the \nChallenger Mine and associated assets and an \nimpairment of $20.4 million against greenfield \nexploration projects in Australia and Thailand. \n\nWith the fall in metal prices in late 2013, work \nand expenditure on the DFS and EIS have been \nphased to coordinate and synchronise the \ntiming of the two programs with completion \nand lodgement now not expected before \nmid-2014. \n\n\n \n \n \n \n [html]\n
Financial Summary2013 SOOO2012 $ 000
Total sales revenue329.282357.372
EBITDA before significant items115.845168.583
( Loss ) / profit before tax( 339.615 )91.277
Income tax benefit / ( expense )15.889( 16.271 )
( Loss ) / profit after income after tax( 323.726 )75.006
Dividend declared ( c / share )520
", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "CHATREE CHATREE \n\nKhon Kaen KhKh \n\nT H A I L A N D \n\nBangkok \n\nA MC A M B O D I A C A M B O D I A \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nChiang \nMai \n\n10° 10° \n\n\n\n\n\nN SW \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSummary \n\nThe Nueva Esperanza Project is 100% owned \nby Kingsgate since February 2012. Nueva \nEsperanza is located in the Maricunga Gold Belt \nnear Copiapó, a regional mining centre in \nNorthern Chile. The silver-rich mineralisation is \nhosted by the Esperanza high-sulphidation \nepithermal alteration system associated with \nthe Cerros Bravos volcanic complex. \n\nThe project consists of three well-defined miner- \nalised deposits and a number of undeveloped \nexploration targets. The main deposits are \nArqueros, Chimberos and Teterita. Arqueros was \npreviously mined on a limited scale by under- \nground methods and Chimberos was exploited \nas an open pit mine, delivering about 40 million \nounces of silver in 1998/99. All three deposits \ncurrently have a combined Mineral Resources of \nabout 93 million ounces of silver equivalent or \n1.6 million ounces of gold equivalent (EQ60)1. \n\nA feasibility study for a decision to mine the \nArqueros portion of Nueva Esperanza was \ncompleted in late 2012, demonstrating that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible. Work remained \nto integrate the Teterita and Chimberos deposits \ninto the project, as well as to test lower cost \noptions for processing. Continued metallurgical \ntestwork has shown that mineralisation from all \nthree deposits by heap leaching is technically and \neconomically feasible and the preferred alterna- \ntive for development. \n\n\n\n\n\n\n\n\n\n\n\n\n\nEnvironmental approvals to commence \nconstruction and mining at Nueva Esperanza \nwere granted in July 2013 for the original \nArqueros project. Work is underway to modify \nand update the environmental assessment to \nincorporate the heap leach process. \n\n\n\n\n\n\n\n1 \n\n Equivalence is based on gold/silver price ratio \nof 60. Gold equivalence = gold content plus \n(silver content*divided*by 60), whereas Silver \nequivalent silver content plus (gold content \nmultiplied by 60).", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Nueva Esperanza Silver / Gold Project \nThe Nueva Esperanza Silver / Gold Project \nadvanced during the year with an initial scoping \nstudy for a decision to mine the Arqueros and \nTeterita portions of Nueva Esperanza completed \nin late 2012. The study demonstrated that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible although high \ncapital and power costs negatively impacted \nproject economic returns. \nExploration \nThe Group has a portfolio of exploration tene- \nments and applications in Thailand, Chile and \nLao PDR. Following the sale of exploration \ntenements to Caravel (refer below), exploration \nin Australia is currently only conducted in the \nvicinity of the Challenger Mine in South Australia \nand the Bowdens Silver Project in New South \nWales. \n\nTotal mill throughput for the year was 5.7 million \ntonnes, 11.4% higher than 2012, despite the \nimpact of the 63 day delay during which Plant #2 \nwas not operating. The overall plant availability \nof 98.1% was slightly lower than the previous \nyear’s 98.4%. The expanded plant is operating \naround 24% above the annual “nameplate” \nthroughput rate at 6.2 million tonnes per annum \nand this is expected to continue. \n\nAs a consequence, feasibility work has transi- \ntioned to assess a lower capital cost and lower \npower requirement option, namely the potential \nfor heap leach processing. Recently completed \nmetallurgical testwork demonstrated that \nprocessing of mineralisation from all three \ndeposits by heap leaching has the potential to \nbe technically and economically feasible and, as \na consequence, may become the preferred \nalternative for development. \n\nSale of Exploration Assets \nOn 28 March 2013, the Group sold its explora- \ntion assets in Western Australia and Queensland \nthrough the sale of shares in its subsidiary \ncompany, Quadrio Resources Limited, to Caravel \nMinerals Limited (“Caravel”), an Australian \ncompany listed on the ASX. \n\nKingsgate received 135,000,000 fully paid \nordinary shares in the issued capital of Caravel \nand 20,000,000 unlisted options to acquire \nCaravel shares exercisable at 10 cents on or \nbefore three years from the date of issue. \nSubsequent to the sale, Kingsgate became the \nlargest shareholder in Caravel with 35.54% held \nat 30 June 2013. Kingsgate’s holding in Caravel \nreduced to 27.04% post 30 June 2013 following \na rights issue by Caravel that Kingsgate did not \nparticipate in. \n\nEnvironmental approval for the original Arqueros \nProject was granted in July 2013. \n\nTotal cash costs for the year were US$767 per \nounce (US$620 per ounce exclusive of Thai \nroyalties). The average royalty paid to the Thai \nGovernment was $US147 per ounce of gold. \nTotal production costs after depreciation and \namortisation were US$952 per ounce of gold \nproduced. \n\nAt year end, 9.7 million tonnes of ore was stock- \npiled with an average contained gold grade of \n0.57 g/t representing 178,086 ounces of gold. \n\nBowdens Silver Project \nThe Bowdens Project continued to advance \nduring the year with field programs supporting \nthe feasibility and environmental studies \nongoing. Sterilisation drilling and additional \nmetallurgical sampling were undertaken with \nthe resource evaluation drilling completed in \nOctober 2012. \n\nChallenger \nThe Challenger Mine produced 66,216 ounces of \ngold for the year with an average milled grade of \n3.91 g/t and a total cash cost of US$1,135/oz. \nThe grade was lower than expected due to a \nshortfall in ore supply from the mine that was \nsupplemented by low grade ore from stockpiles. \nHigher dilution in stopes at the base of the mine", - "page_start": 43, - "page_end": 43, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "〉〉 Silver equivalent ounces (AgEQ60): 93.5 \n\n\n\nThese project parameters are based on prelimi- \nnary results only and are insufficient to provide \nassurance as to the economic development of \nthe project at this stage and these parameters \nmay also change following completion of the \nDefinitive Feasibility Study. \n\nWith the technical and economical feasibility of \nheap leaching being established, the project will \nnow move into the final feasibility and design \nstage with results expected to be available \nduring the March quarter 2014.", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]eBowders $( Ω )\n
Nueva Esperanza $° C (°)$— 000$— 000
$— 000External sales revenue Other revenue226.75.166102.52.513− 1
329.28.730Total segment revenue226.925103.036-51
330.012Segment EBITDAImpairmentDepreciation and amortisation93.593 – ( 26.962 )16.656 ( 311.850 ) ( 58.474 )( 234 )−( 18 )( 3.070 )−( 32 )( 298 )( 20.421 )( 11.637 )( 537 )( 109 )
95.010 ( 332.808 ) ( 85.595 )Profit / ( loss ) before finance cost and income tax66.631( 353.668 )( 252 )( 3.102 )( 20.719 )( 12.283 )
( 323.393 )Finance income Finance costs2.103 ( 10.716 )153 ( 141 )6 ( 6 )−( 1.258 )10 −315 ( 6.688 )
2.587 ( 18.809 )Net finance costs( 8.613 )12( 1.258 )10( 6.373 )
( 16.222 )Profit / ( loss ) before tax58.018( 353.656 )( 252 )( 4.360 )( 20.709 )( 18.656 )
( 339.615 )Other segment informationSegment assetsSegment liabilitiesSegment intercompany assets / ( labilities )540.422 ( 205.089 ) 46.58842.892 ( 29.077 ) ( 61.501 )106.564 ( 1.346 ) ( 21.909 )63.378 ( 5.734 ) ( 42.533 )4.618 ( 1.331 )( 14.775 )12.114 ( 53.451 ) 94.130
769.988 ( 296.028 )
", - "page_start": 78, - "page_end": 78, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**Regulatory approval to develop or expand our landÑlls and transfer stations may be delayed or denied.**\n\nOur plans include developing new landÑlls and transfer stations, as well as expanding the disposal and \ntransfer capacities of certain of our landÑlls and transfer stations, respectively. Various parties, including \ncitizens' groups and local politicians, sometimes challenge these projects. Responding to these challenges has, \nat times, increased our costs and extended the time associated with establishing new facilities and expanding \nexisting facilities. In addition, failure to receive regulatory and zoning approval may prohibit us from \nestablishing new facilities and expanding existing facilities. \n\n\n \n \n \n \n [html]\n
16
", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**RETAIL We will create a**\n**neighborhood where shopping**\n**and living become one, like**\n**the great cities of San**\n**Francisco and Paris.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nProject CityCenter has \nalready captured the \nimagination of architects \nand designers around \nthe world as the concept \nhas been widely praised \nfor its vision. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\nB U I L D I N G C O N T I N U O U S V E L O C I T Y", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]GradeContained MetalSourceCategoryNueva Esperanza182\n
Tonnes ( Million )Gold ( g / t )Silver ( g / t )Lead (%)Zinc (%)Au Equiv ( g / t )Ag Equiv ( g / l )Gold ( M αz )Silver ( M αz )Au Equiv ( M αz )Ag Equiv ( M oz )
Measured Indicated Inferred1.521.36.10.010.280.310188681.691.751.43102105860.000.190.064.960.313.30.081.200.284.971.816.9
Total28.90.27841.681010.2578.51.5693.5
BowdensMeasured Indicated Inferred23.628.436.056.648.041.00.310.270.300.410.360.401.641.401.2774.563.658.043.043.847.51.251.281.47
57.058.068.0Total88.047.40.290.391.4164.4134.14.00
Total Mineral Resources116.90.07571.48730.252135.56276
Group Total Mineral Resources307.45.0224610.64774
", - "page_start": 33, - "page_end": 33, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Geology \n\nThe silver and gold mineralisation is hosted \nwithin tertiary-aged volcanic units at Arqueros \nand Teterita, and in Paleozoic sediments at \nChimberos. The alteration and mineralisation \nare all Miocene in age and associated with the \nCerros Bravos paleovolcano. \n\nMineralisation comprises two main compo- \nnents. Silver-rich horizontal units termed \n‘mantos’ (Spanish for blanket) and a series of \nnear-vertical, cross-cutting gold-rich structures. \nThe mantos silver mineralisation is hosted by \nvuggy silica within dacitic lapilli tuff. Mantos \noccurs at Arqueros and Teterita where the \nmineralising process has replaced horizontal \nporous tuffs. At Chimberos, silver mineralisation \nis hosted in vuggy silica hydrothermal breccia \nsuperimposed on folded Paleozoic sediments. \nFeasibility Study \n\nThe vertical gold-rich mineralisation, also charac- \nterised by vuggy silica, is well-developed at \nArqueros. It has been interpreted as feeders for \nmineralising fluids. Nonetheless, this style of \nmineralisation has not yet been observed at \nTeterita and is poorly preserved at Chimberos. \n\n\n\nA Definitive Feasibility Study commenced on the \nproject at the end of May 2011 with the focus \non Arqueros, and open pit mining of that deposit \nwith processing by traditional mill and agiitation \nleaching in cyanide. Subsequent acquisition of \nthe Teterita and Chimberos deposits resulted in \nan expansion of the feasibility study to incorpo- \nrate their resources. \nThe environmental permitting process for the \noriginal Arqueros project has been completed, \nwith approval to commence construction and \nmining granted by the Chilean authorities. \nA modification of the environmental assessment \nis being prepared to have the approvals modified \nfor heap leaching and on-site power generation. \n\nExtensive community consultation has been \nundertaken with positive outcomes, and rela- \ntionships with indigenous rural and urban \ncommunities remain a priority. \n\nIn late 2012, a decision was taken to examine \nlower cost options for processing using heap \nleaching. With major engineering already done, \ntechnical studies focussed on metallurgical \ntestwork and heap leach design. It has been \nestablished that the mineralisation from the \nthree deposits can be processed by HPGR (High \nPressure Grinding Rolls) crushing and heap \nleaching with silver and gold recoveries of the \norder of 70% to 75% for silver and 65% to 70% \nfor gold. The project development plan is now \nfocussed on a 3 million tonne per annum heap \nleach operation with an initial mine life of over 6 \nyears. Annualised production levels (post ramp- \nup) are estimated at 6.0–8.0 million ounces of \nsilver and 18,000–22,000 ounces of gold, at an \nindicative start-up capital cost between \nUS$130–150 million (inclusive of 25% \ncontingency). \n\nResource \n\nKingsgate has updated the project resource \nbase to incorporate the recent drilling on the \nChimberos project and using the current gold/ \nsilver ratio of 60 (previously 45) for its gold \nequivalent (AuEq60) and silver equivalent \n(AgEq60) calculations.The combined Measured, \nIndicated and Inferred mineral resource for the \nNueva Esperanza Project is based on resource \nblock modelling of Arqueros, Chimberos and \nTeterita, and has been estimated at a cut-off \ngrade of 0.5 grams per tonne (g/t), gold equiva- \nlent (AuEq60) to be 28.9 million tonnes at \n0.27 g/t gold and 84 g/t silver. \n\nThis represents about 250,000 ounces of gold \nand 78.5 million ounces of silver. \n\nThe Measured, Indicated and Inferred resource \nmay be expressed in gold or silver equivalent \nounces as: \n〉〉 Gold equivalent ounces (AuEQ60): 1.6 \nmillion ounces at 1.7 g/t gold equivalent; and \n\n〉〉 Silver equivalent ounces (AgEQ60): 93.5", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**Investment in LandÑlls**", - "page_start": 47, - "page_end": 47, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_KCN_2013.pdf", - "query": "What is the Kingsgate net cash outflows from finiancing activities in 2013 ?", - "target_page": 11, - "target_passage": " Net cash outflows from financing activities was $1.7 million", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Summary \n\nKingsgate has recorded the following financial \nperformance for the year to 30 June 2013: \n\n〉〉 Revenue of $329.3 million. \n〉〉 \nEBITDA (before significant items) of $115.8 \nmillion. \n\n〉〉 Profit before tax and significant items of \n$17.2 million. \n\n〉〉 \n\nLoss after tax and significant items of $323.7 \nmillion. This includes a net tax benefit of \n$20.6 million, relating to the Challenger Gold \nOperations (“Challenger”) impairment. \n〉〉 Non-cash asset impairments and other \n\nsignificant items of $356.8 million pre-tax, \nwith $311.9 million principally relating to \nChallenger ($291.3 million post-tax). \n〉〉 No final dividend has been declared. An \n\ninterim dividend of 5 cents per share was \ndeclared for the half year to 31 December \n2012. \n\n\n\n\n \n \n \n \n [html]\n
ce of US $ 1.588 per ounce ), lower goldb012 : 204.145 ounces )Depreciation and amortisation
The increase in depreciation and amortisation to $ 85.6 million ( 2012 : 567.6 million ) reflects amortisation of the higher capitalised developmenthanges to mine opena major impairment sumber of Group allenger Mine. The
of Plant # 2 at Chatree and commencement of amortising the capital cost of the Chatree Tailings Storage Facility # 2.or contributor to the llion for the year.
Impairment and write - downsted a 24 % decrease in compared to the prior ad volume of ore
Following a strategic review of Challenger, a new mine plan focusing mainly on the Challenger West orebody was implemented effective 1 July 2013.on at Challenger wasn gold production at hatree *), reflecting : n the expandedand higher grade ore
Based on the revised plan Challenger is expected to generate positive cash flows though, as a there was and therefore therapy. If therefore the supported the full the full the full the full the full the full the full that are cash flows no longciation increased by spared to last year and hroughput and due to the first full
tax ) related to the carrying value of the prop - erty, plant and equipment and mine properties at Challenger so that the carrying value reflects recoverable value.# 2. The total unit cash ear were US $ 767 / 62 were US $ 700 mg quality to the uS $ 1.135 / or re US $ 1.135 / or ( 2012 ; ease mainly due to the total unit cost basis, total vere US $ 8888 / or, up
A review of the carrying value of all regional greenfield exploration projects was also conducted which resulted in the write down of bic. I missin, primarily against the starton week to the started with any the started the started with antThe impairment and write - downs are non - cash items and therefore have no impact on the Company ’ s cash position. The written down asset values do not create any concern with regard to conditions around the Company ’ s debt facilities.
", - "page_start": 9, - "page_end": 9, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "2013 \n$’000 \n\n 329,282 \n\n(280,452) \n\n 48,830 \n\n(675) \n\n(21,152) \n\n(15,490) \n\n(745) \n\n – \n\n(1,353) \n\n(311,850) \n\n(20,421) \n\n(537) \n\n(323,393) \n\n 2,587 \n\n(18,809) \n\n(16,222) \n\n(339,615) \n\n 15,889 \n\n(323,726) \n\n2012 \n$’000 \n\n 357,372 \n\n(238,825) \n\n 118,547 \n\n(1,933) \n\n(19,304) \n\n 1,565 \n\n 1,268 \n\n(964) \n\n – \n\n – \n\n – \n\n – \n\n 99,179 \n\n 1,469 \n\n(9,371) \n\n(7,902) \n\n 91,277 \n\n(16,271) \n\n 75,006 \n\nSales revenue \n\nCost of sales \n\nGross profit \n\nExploration expenses \n\nCorporate and administration expenses \n\nOther income and expenses \n\nForeign exchange (loss) / gain \n\nBusiness acquisition costs \n\nShare of loss in associate \n\nImpairment losses – Challenger Gold Project \n\nImpairment losses – exploration assets \n\nImpairment of investment in associate \n\n(Loss) / profit before finance costs and income tax \n\nFinance income \n\nFinance costs \n\nNet finance costs \n\n(Loss) / profit before income tax \n\nIncome tax benefit / (expense) \n\n(Loss) / profit after income tax \n\nOther comprehensive income: \n\nItems that may be reclassified to profit and loss \n\nExchange differences on translation of foreign operations (net of tax) \n\nChange in fair value of available-for-sale financial assets (net of tax) \n\nTotal other comprehensive income for the year, net of tax \n\nTotal comprehensive (loss) / income for the year \n\n(Loss) / profit attributable to: \n\nOwners of Kingsgate Consolidated Limited \n\nNon-controlling interests \n\n(Loss) / profit after tax for the year \n\nTotal comprehensive (loss) / income attributable to: \n\nOwners of Kingsgate Consolidated Limited \n\nNon-controlling interests \n\nTotal comprehensive (loss) / income for the year", - "page_start": 64, - "page_end": 64, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
FITIaTICIaI POSICIOITas at 30 June 201320132012
Note$ 70004900ASSETS
Current assetsCash and cash equivalents732.987
90.623Receivables89.431
12.226Inventories962.032
56.079Other assets1038.112
35.128Total current assets142.562194.056
Non - current assetsRestricted cash75.474
Inventories944.731
30.314Available - for - sale financial assets11767
1.751Investment in associate141.485
Property, plant and equipment12190.231
239.237Exploration, evaluation and development13336.546
545.032Other assets1037.797
27.858Deferred tax assets6g10.395
10.211Total non - current assets627.426854.403
TOTAL ASSETS769.9881.048.459LIABILITIES
Current liabilitiesPayables1541.185
42.597Borrowings1684.101
35.697Derivatives held for trading2712.685
Current tax liabilities27211.655Provisions
173.7972.993Total current liabilities
130.62695.627Non - current liabilitiesPayables
155.9216.681Borrowings
16115.657121.847Deferred tax liabilities
6g10.22829.110Provisions
1733.59619.381Total non - current liabilities
165.402177.019TOTAL LIABILITIES296.028
272.646NET ASSETS473.960775.813
EQUITYContributed equity18605.504
599.618Reserves19a18.319
( 20.407 )( Accumulated losses ) / Retained profits19b( 149.863 )
196.602Capital and reserves attributable to equity holders of Kingspate Consolidated Limited Non - controlling interests473.960775.813
TOTAL EQUITY473.960775.813
", - "page_start": 66, - "page_end": 66, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "[html]The Financial Report of Kingsgate Consolidated Limited ( Kingsgate or the “ Company ”) for the year ended 30 June 2013 was authorised forin Australian dollars, which is the Company ' s functional currency and presentation currency.amounts related to the settlement of a pre - existing relationship. Such amounts are generally recognised in profit or loss.issue in accordance with a resolution of Directors on 23 September 2013.Rounding of amountsCosts related to the acquisition, other than those associated with the issue of debt or equity securities, that the Group incurs in connection with a business combination are expensed as incurred. Any contingent consideration payabledKingsgate is a Company limited by shares incorporated in Australia whose shares are publicly traded on the Australian Securities ExchangeThe Company is of a lind referred to in ASIIC Class Order 98 ( 100 dated 10 ) ( uly 3998 and in accordance with that Class Order, all financial information presented in Australian dollars has been rounded to the nearest thousand, or in certain cOritical accounting estimatesAcquisitions of non - controlling interests are their care their capacity as owners and theneficiency gross - will is recognised as a nesult of ouch transactions. The non - controlling interact in the adjust mental health in the controlleto as the “ Group ” and individually as “ Group entities ”). A description of the nature of theThe preparation of financial statements requires to preventions. The preparations to preparations that informations that impaired to exercise the judgement in the process of applying the Group ' s accounting policies. The areas invol1. BASIS OF PREPARATIONThe general purpose financial statements have been prepared in accordance with Australian Accounting Standards, other authoritative pronouncements of the Australian Accounting Standards Board and the Corjoretties Act 20032. SIGNIFICANT ACCOUNTINGThe acquisition of an asset or group of assets that is not a business is accounted for by allocating the cost of the transaction to the net identifiable assets and liabilities acquired based on their fair values.purpose of preparing : the financial statements.The principal accounting policies adopted in the preparation of the financial statements are set out below. These policies have been consistently applied to all the years presented.( II ) SubsidiariesThe financial statements comply with International Financial Reporting StandardsSubsidiaries are entities controlled by the first - infantements of subsidiaries are included in the consolidated financial state - ments from the date that control commences until the date that control ceases.Standards Board ( IASB ).TTTTCTCTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTHistorical cost convention( i ) Business combinationsThe financial statements have been prepared under the historical cost : convention, as modified by the revaluation of available - for - sale financial assets and financial instruments ( including denviative instruments ) at fair value tBusiness combinations are accounted for using the acquisition method as at the acquisition to activities and the acquisition to activities. The activities and their transferred to the Group. Control is the prewer to govern the financinThe accounting policies of subsidiaries have been changed when necessary to align them with the policies adopted by the Group. Losses applicable to the non - controlling interests in a subsidiary are", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "2013 \n\nAIFRS \n\n 2,709 \n 3,521 \n 1.3 \n 7,051 \n 5,699 \n 0.9 \n 11.9 \n79.9% \n 133,681 \n 1,000,569 \n\n2012 \n\nAIFRS \n\n 1,947 \n 6,259 \n 3.2 \n 4,986 \n 5,116 \n 0.9 \n 11.6 \n84.4% \n 121,372 \n 918,314 \n\n2010 \n\nAIFRS \n\n 2,699 \n 6,432 \n 2.4 \n 6,583 \n 2,705 \n 1.7 \n 14.9 \n90.4% \n 132,628 \n 549,522 \n\n2009 \n\nAIFRS \n\n 1,674 \n 4,069 \n 2.4 \n 3,874 \n 1,878 \n 1.7 \n 15.8 \n91.2% \n 93,002 \n 293,472 \n\n2008 \n\nAIFRS \n\n 375 \n 2,507 \n 6.7 \n 977 \n 2,474 \n 1.1 \n 6.8 \n88.4% \n 74,137 \n 232,039 \n\n2007 \n\nAIFRS \n\n 546 \n 4,390 \n 8.0 \n 1,523 \n 2,405 \n 1.2 \n 9.2 \n90.0% \n 85,994 \n 290,897 \n\n2006 \n\nAIFRS \n\n 734 \n 5,121 \n 7.0 \n 1,951 \n 2,000 \n 2.4 \n 14.5 \n90.1% \n 140,071 \n 459,702 \n\n2005 \n\nAIFRS \n\n 588 \n 4,915 \n 8.4 \n 1,521 \n 1,829 \n 2.4 \n 13.0 \n90.8% \n 126,550 \n 353,275 \n\n2004 \n\nAGAAP \n\n 801 \n 4,444 \n 5.5 \n 1,946 \n 1,671 \n 3.1 \n 15.0 \n91.2% \n 149,979 \n 395,346 \n\n2011 \n\nAIFRS \n\n 2,352 \n 6,128 \n 2.6 \n 5,301 \n 2,533 \n 1.1 \n 15.7 \n87.2% \n 76,248 \n 549,699 \n\n(5 months) \n\n 232 \n 289 \n 4.3 \n92.2% \n 36,886 \n 2,581 \n\n 357,372 \n (171,505) \n (12,737) \n (6,398) \n 166,732 \n – \n (67,553) \n 99,179 \n (7,902) \n 91,277 \n (16,271) \n 75,006 \n 153 \n 75,159 \n\n 172,356 \n (86,147) \n (11,304) \n (28,424) \n 46,481 \n – \n (27,772) \n 18,709 \n (922) \n 17,787 \n 3,092 \n 20,879 \n 269 \n 21,148 \n\n 175,480 \n (74,305) \n (3,615) \n 618 \n 98,178 \n – \n (14,004) \n 84,174 \n (1,823) \n 82,351 \n (9,285) \n 73,066 \n – \n 73,066 \n\n 113,015 \n (65,599) \n (4,595) \n 3,509 \n 46,330 \n – \n (11,575) \n 34,755 \n (1,698) \n 33,057 \n (535) \n 32,522 \n – \n 32,522 \n\n 74,285 \n (55,743) \n (4,065) \n 46,653 \n 61,130 \n – \n (9,284) \n 51,846 \n (3,974) \n 47,872 \n (11,675) \n 36,197 \n – \n 36,197 \n\n 52,044 \n (64,908) \n (2,264) \n 10,413 \n (4,715) \n – \n (8,446) \n (13,161) \n (2,544) \n (15,705) \n 3,115 \n (12,590) \n – \n (12,590) \n\n 72,782 \n (47,761) \n (1,158) \n 1,361 \n 25,224 \n – \n (7,805) \n 17,419 \n (757) \n 16,662 \n – \n 16,662 \n – \n 16,662 \n\n 64,299 \n (47,366) \n (1,404) \n 2,471 \n 18,000 \n – \n (8,720) \n 9,280 \n (889) \n 8,391 \n – \n 8,391 \n – \n 8,391 \n\n 84,410 \n (34,343) \n (1,019) \n 2,370 \n 51,418 \n – \n (11,323) \n 40,095 \n (2,416) \n 37,679 \n – \n 37,679 \n – \n 37,679 \n\n 329,282 \n (195,064) \n (15,515) \n (23,693) \n 95,010 \n (332,808) \n (85,595) \n (323,393) \n (16,222) \n (339,615) \n 15,889 \n (323,726) \n – \n (323,726) \n\nPRODUCTION – Chatree \n\nOre mined (‘000 bank cubic metres) \nWaste mined (‘000 bank cubic metres) \nWaste to ore ratio \nOre mined (‘000 tonnes) \nOre treated (‘000 tonnes) \nHead grade – Gold grams / tonne \nHead grade – Silver grams / tonne \nGold recovery (%) \nGold poured (ounces) \nSilver poured (ounces) \n\nPRODUCTION – Challenger \n\nOre mined (‘000 tonnes) \nOre treated (‘000 tonnes) \nHead grade – Gold grams / tonne \nGold recovery (%) \nGold poured (ounces) \nSilver poured (ounces) \n\nPROFIT & LOSS (A$’000) \n\nSales revenue \nOperating expenses \nAdministration expenses \nOther (expenses) / income \nEBITDA \nImpairment losses \nDepreciation & amortisation \nEBIT \nNet finance (costs) / income \nProfit / (loss) before income tax \nIncome tax (expense) / benefit \nNet profit / (loss) after income tax \nNon–controlling interests \nNet profit attributable to owners of Kingsgate Consolidated Limited \n\nBALANCE SHEET (A$’000) \n\nCurrent assets – cash \nCurrent assets – other \nNon–current assets \nTotal assets \nTotal borrowings \nOther liabilities \nTotal liabilities \nShareholders’ equity \nNon–controlling interests \nEquity attributable to equity holders of Kingsgate Consolidated Limited \n\n 32,987 90,623 \n 109,575 103,433 \n 627,426 854,403 \n 769,988 1,048,459 \n 199,758 157,544 \n 96,270 115,102 \n 296,028 272,646 \n 473,960 775,813 \n – – \n 473,960 775,813 \n\nOTHER INFORMATION \n\nAverage realised gold price on physical deliveries (US$ / ounce) \nCash cost (US$ / ounce) \nTotal cost (US$ / ounce) \nOperating cash flow (A$’000) \nDividends paid (Cash & DRP) (A$’000) \nNumber of issued shares (‘000) – Ordinary \nBasic earnings per share (A$ Cents) \nDividends per share (A$ Cents)", - "page_start": 8, - "page_end": 8, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n\n \n \n \n \n [html]− CASH FLOW INFORMATION\n
Year ended 31 December2014 US $ 70002013 US $ 7000
a )Reconcillation of cash flows from operations with income from ordinary activities after income tax
Profit from ordinary activities after income tax15.32115.942
Adjustments to reconcile net profit to net operating cash flows :
Depreciation and amortisation expense85.58436.225
Share options expensed1.9151.590
Unrealised ( gains ) losses on derivatives( 9.642 )837
Net gain on sale of properties( 48.604 )( 7.335 )
Impairment of development and production assets71.212-
Unsuccessful exploration and evaluation expense10.934-
Amortisation of deferred financing fees316140
Add : Interest expense ( disclosed in investing and financing activities )383-
Recognition of DTA on items directly within equity879665
Other126( 153 )
Changes in assets and liabilities :- ( Decrease ) increase in current and deferred income tax( 14.606 )
5.147
- Decrease in other assets282.155
- Decrease ( increase ) in trade and other receivables8.679( 3.541 )
- Increase in trade and other payables5.552__10.974
Net cash provided by operating activities__128.087__52.646
\n\n- During the year ended 31 December 2014 the net gain on sale of properties for the disposition of the \nCompany’s remaining Williston assets included the relief of a net payable due to the buyer of $4.0 million \n($17.1 million payable and $13.1 million receivable). \n- During the year ended 31 December 2013 $132.1 million in shares were issued in connection with the \nTexon acquisition. \n\n- 94 -", - "page_start": 95, - "page_end": 95, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**2012** 2011-- 2010-- \n\n**$ 108,779**$ 96,759 $ 65,903 \n\n**11,236** 11,234 11,465 \n\n**11,465** 11,382 10,151 \n\n**2,058** 2,473 3,020 \n\n**8,641** 4,784 2,408 \n\n**3,915** 2,029 2,508 \n\n**1,298** — (4 ) \n\n**4,592** 3,379 2,361 \n\n**(627 )** (765 ) (198 ) \n\n**(22,748 )** (36,271 ) (48,578 ) \n\n83,497 **(28,511 )** (21,197 ) \n\n17,408 **(14,735 )** (11,185 ) \n\n**14,157** 12,926 13,566 \n\n1,294 20,817 **(9,098 )**\n\n**90,422** 76,842 184,324 \n\n**(26,021 )** (20,431 ) (7,216 ) \n\n**1,258** 1,326 532 \n\n**(14,671 )** (30,504 ) (100 ) \n\n**—** 1,722 — \n\n**(39,434 )** (47,887 ) (6,784 ) \n\nYear Ended June 30, \n**Cash Flows from Operating Activities**\n\nNet income \n\nAdjustments to reconcile net income to net cash provided by operating activities: \n\nDepreciation and amortization of property \n\nAmortization of intangibles \n\nAmortization of stock appreciation rights and options \n\nDeferred income taxes \n\nProvision for losses on accounts receivable \n\nUnrealized foreign exchange transaction losses (gains) \n\nOther share-based compensation expense \n\nGain on sale of property \n\nChanges in assets and liabilities, net of acquisitions: \n\nAccounts receivable \n\nInventories \n\nOther operating assets \n\nAccounts payable \n\nOther operating liabilities \n\n**Net Cash provided by Operating Activities**\n\n**Cash Flows from Investing Activities**\n\nProperty purchases \n\nProceeds from property sales \n\nNet cash paid for acquisition of businesses, net of cash acquired of $38 and $168 in 2012 and \n2011, respectively \n\nOther \n\n**Net Cash used in Investing Activities**\n\n**Cash Flows from Financing Activities**\n\nRepayments under revolving credit facility \n\nLong-term debt repayment \n\nSettlements of cross-currency swap agreements \n\nPurchases of treasury shares \n\nDividends paid \n\nExcess tax benefits from share-based compensation \n\nExercise of stock appreciation rights and options \n\n**Net Cash used in Financing Activities**\n\n**—** (50,000 ) (5,000 ) \n\n**—** — (25,000 ) \n\n**—** — (12,752 ) \n\n**(31,032 )** (6,085 ) (3,929 ) \n\n**(33,800 )** (29,751 ) (25,416 ) \n\n**3,695** 6,404 2,492 \n\n**321** 661 1,339 \n\n**(60,816 )** (116,523 ) (30,514 ) \n\n2,883 1,109 **(2,822 )**\n\n148,135 **(12,650 )** (84,685 ) \n\n**91,092** 175,777 27,642 \n\n**$ 78,442**$ 91,092 $ 175,777", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Your Directors present their report on the Group consisting of Kingsgate Consolidated Limited and the entities it controlled at the end of, \nor during, the year ended 30 June 2013. \n\nDirectors \n\nReview of operations \nand results \n\nThe following persons were Directors of \nKingsgate Consolidated Limited during the \nwhole of the financial year and up to the date of \nthis report. \n\nOperational performance \nKingsgate is a gold mining, development and \nexploration company based in Sydney, Australia. \nKingsgate owns and operates two gold mines, \nthe world class Chatree Mine in Thailand and the \nunderground Challenger Mine in South Australia. \nIn addition, the Company has two advanced \ndevelopment projects, the Nueva Esperanza \nSilver / Gold Project, in the highly prospective \nMaricunga Gold / Silver Belt in Chile, and the \nBowdens Silver Project in New South Wales, \nAustralia. From this operating and development \nplatform, Kingsgate aims to build value for all \nshareholders. \n\n〉〉 Ross Smyth-Kirk Chairman \n〉〉 Peter Alexander Non-Executive Director \n〉〉 Craig Carracher Non-Executive Director \n〉〉 Peter McAleer Non-Executive Director \n〉〉 Gavin Thomas Executive Director \n\nThe principal activities of Kingsgate \nConsolidated Limited are mining and mineral \nexploration in Australia, South East Asia and \nSouth America. \n\nGroup gold production was 199,897 ounces, a \ndecrease of 4% on the previous corresponding \nyear. The contribution from Chatree was \n133,681 ounces with 66,216 ounces from \nChallenger. \nDividends \n\nDividends paid to members during the financial \nyear were as follows: \n\nChatree gold production was 10% higher than \nthe previous corresponding period as a result of \nan increase in throughput from the expanded \nChatree process plant and access to higher \ngrade oxide ore from Q Prospect. \n\nChallenger gold production was 24% lower than \nthe previous corresponding year given additional \ndilution and depletion at Challenger Deeps and a \nshortfall in planned development. This resulted \nin lower ore tonnes from the mine that was \nsupplemented by low grade stockpiled ore. \nFollowing the fall in the gold price a strategic \nreview of Challenger was implemented that has \nresulted in a new mine plan to focus primarily on \nthe higher grade Challenger West orebody. The \nnew mine plan will be implemented during the \nfirst three months of the 2014 financial year. \n\nA lower gold price and industry wide cost pres- \nsures had a negative impact on the underlying \nearnings of the Group which contributed to a \nmajor impairment to the carrying value of a \nnumber of Group assets, particularly assets \nrelating to the Challenger Gold Operations. \nImpairments totalling $332,808,000 were the \nmajor contributor to the after tax loss of \n$323,726,000 for the year. \n\nFinal dividend declared for the year ended 30 June 2012 of \n10 cents per fully paid share paid on 1 October 2012 \n\nInterim dividend declared for the year ended 30 June 2013 of \n5 cents per fully paid share paid on 12 April 2013 \n\nTotal dividends \n\nThe development projects continued to advance \nduring the year. At Nueva Esperanza, the feasi- \nbility work shifted to focus on identifying the \nlowest cost and lowest power consumption \ndevelopment alternatives. This included \nreviewing a heap leach process option with \non-site power generation. Further work is \nexpected to be completed in the December \nquarter 2013. At Bowdens, the feasibility work \nhas confirmed the optimum process route. \nCompletion of the technical feasibility study \nincluding mine planning, infrastructure and \nmetallurgy, and lodging of the Environmental \nImpact Statement (“EIS”) are scheduled for \n2014.", - "page_start": 42, - "page_end": 42, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Financial Position \n\nShareholders’ equity at 30 June 2013 was $474 \nmillion (2012: $776 million). The decrease of \n$302 million reflects the year’s loss together \nwith dividends paid. \n\nDividends \n\nNo final dividend has been declared for the year \nended 30 June 2013. \n\nAn interim dividend declared for the half-year \nended 31 December 2012 of 5 cents per fully \npaid share was paid on 12 April 2013. \n\nA final dividend declared for the year ended 30 \nJune 2012 of 10 cents per fully paid share was \npaid on 1 October 2012. \n\n\n \n \n \n \n [html]Financing ArrangementsCorporate loan facility\n
Convertible revolving creeKingsgate has a three year secured loan facility with Investec which was amended during the year. The amended facility has a lent of β40 million ( 90 June 2012 : $ 50 million ), of which S20 million has been drawn down as at 30 ( 40 ) ( 30 ) ( une 2012 :
The Elong allochas a Shear area of their linear area of their linear are and their lines. There is and their lines are and their lines are and their lines. There is and their lines that their lines are and their limited to their limited to the in tConvertible loan facility
Kingogate has a five year AB35 million convert : ible ban facility with linvestec entered into in a prior period to provide funding for the Blowdens acquisition. Kingogate has the option to make a preparyment against the facility with an inHestructure of corporate loan and
convertible loan facilitiesAs indicated previously in the the breathinary final associated with the provide therapy. There with their their their their their their their that their their their that their their their that their their their that the potential for cou
Multi - currency and syndrome for the forested to for the foresteronal to the for the foresteronal to the forest to the for the formats to the formats to the formats to the formats to the formats to the formats to the formation formation to thesSubsequent to the end of the financial year, the provided by the provided by the provided by the provided by the approved technical support support to their consumption. Increased to the nexts shorts under to formal discuss mentalizing fo
>Tranche one will be a 525 million Abara Pre IPO 80nd with a maturity date of 31, luly 2015. The current intention is for this tranche to be repaid as part of the Abara IPO, although at Kingspate ’ s election repayment can be made by either cash ori
>Tranche two is an amortising facility with $ 5 million to be repaid during the 2014 financial year and the balance of $ 10 million repaid during the 2015 financial year.
", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Cash Flows from Operating Activities
Net income
Adjustments to reconcile net income to net cash provided by operating activitie Depreciation, amortization and impairment
Stock - based compensation
Inventory and purchase commitments write - downs
Foreign currency transaction net unrealized loss ( gain )
Deferred income taxes
Non - cash interest and other operating activities
Changes in operating assets and liabilities :
Accounts receivable
Inventory
Operating lease vehicles
Prepaid expenses and other assets
Accounts payable, accrued and other liabilities
Deferred revenue
Net cash provided by operating activities
Cash Flows from Investing Activities
Purchases of property and equipment excluding finance leases, net of sales
Purchases of solar energy systems, net of sales
Purchases of investments
Proceeds from maturities of investments
Proceeds from sales of investments
Business combinations, net of cash acquired
Net cash used in investing activities
Cash Flows from Financing Activities
Proceeds from issuances of debt
Repayments of debt
Proceeds from exercises of stock options and other stock issuances
Principal payments on finance leases
Debt issuance costs
Distributions paid to noncontrolling interests in subsidiaries
Payments for buy - outs of noncontrolling interests in subsidiaries
Net cash provided by financing activities
Effect of exchange rate changes on cash and cash equivalents and restricted cas
Net increase ( decrease ) in cash and cash equivalents and restricted cash
Cash and cash equivalents and restricted cash, beginning of period
Cash and cash equivalents and restricted cash, end of period
Supplemental Non - Cash Investing and Financing Activities
Acquisitions of property and equipment included in liabilities
Leased assets obtained in exchange for finance lease liabilities
Leased assets obtained in exchange for operating lease liabilities
The accompanying notes are an integral part of the
", - "page_start": 11, - "page_end": 11, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210538_en.pdf", - "query": "To which countries extend the marriage regulations ?", - "target_page": 1, - "target_passage": "These Regulations extend to England and Wales. ", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. \n\n**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. \n\n**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. \n\n\n \n \n \n \n [html]\n
Given under my hand on 29th April 2021Abi Tierney Registrar GeneralAbi Tremey Registrat GeneralTable
", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. \n\n\n \n \n \n \n [html]\n
Regulators ∗∗ migrets ’ equivalents than 10 min ks / μg / ml ; total vial status ; wivece provided under regulation 2A full impact assessment has not been produced for this instrument because no, or no significant,
Employees virus granus, patients vs. voluntary Accord in roluncoccines.
\n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— \n\n(**a**) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by \nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently \nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic \nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act \n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also \ninserted subsection (1A). \n(**b**) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to \nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15). \n(**c**) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "**35. Australian Equivalents to International Financial Reporting Standards (continued)**", - "page_start": 88, - "page_end": 88, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Middle East, Africa, Latin America and the Caribbean**\n\n**Growing with Profit, not at Its Expense**", - "page_start": 68, - "page_end": 68, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]2019TotalFemalesGEO ( Labels )20.218.3bep\n
TIME
SEX ( Labels )Males
European Union - 27 countries ( from 2020 )bep
21.8bepBelgium20.618.922.1Bulgaria16.3
14.218.1Czechia18.416.420.1Denmark19.8
18.421Germany19.918.321.4Estonia19
15.821.1Ireland20.8e19.4e22.1
eGreece20.41921.7Spain2219.8
23.9France22p19.8p23.9p
Croatia17.915.919.5Italy21.4b19.7
b22.9bCyprus20.318.921.5Latvia
17.414.419.4Lithuania17.914.820Luxembourg
20.919.222.4Hungary16.914.818.6Malta
21.119.422.5Netherlands20.31921.4Austria
20.318.721.7Poland18.516.120.4Portugal
20.618.522.3Romania16.9e14.9e
18.6eSlovenia20.118.121.8Slovakia17.9
15.719.7Finland20.618.822.3Sweden20.9
19.622.1
\n\nThe development of life expectancy and causes of lower mortality in the EU are summarised each year \nby the OECD/EU in their joint overview ‘Health at a glance’.190 \n\n*‘Steady and substantial reductions in mortality rates from IHD (Ischaemic heart diseases), strokes and*\n*other circulatory diseases were the main driver of increases in life expectancy in previous decades, but*\n*these reductions have slowed down over the past five to ten years in several Western European*\n*countries (e.g. France, Germany and the United Kingdom). This has contributed to the slowdown in life*\n*expectancy improvements.’*(OECD/The King’s Fund, 2020) 191 \n\nThe overview includes the**life expectancy of persons at birth and being 65 years old**, in the EU plus \nneighbouring countries that report to the EU. The geographical disparities of the life expectancy repeats; \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n78", - "page_start": 77, - "page_end": 77, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Promotion of the wellbeing of the people and communities that these technologies affect requires \nconsideration of the social and ethical implications at all stages of AI system design, development and \nimplementation, and collaboration between job roles such as data scientists, product managers, data \nengineers, domain experts, and delivery managers.[300] \n\nThe UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations \navailable under a MIT open-source licence which is freely available on GitHub and can be improved with \nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge, \nability to reason, and autonomous capabilities.[301] \n\n\n\n**Regulation**\n\nThe regulation of artificial intelligence is the development \nof public sector policies and laws for promoting and \nregulating AI; it is therefore related to the broader regulation \nof algorithms.[302] The regulatory and policy landscape for \nAI is an emerging issue in jurisdictions globally.[303] \nAccording to AI Index at Stanford, the annual number of \nAI-related laws passed in the 127 survey countries jumped \nfrom one passed \nin 2022 \nalone.[304][305] Between 2016 and 2020, more than 30 \ncountries adopted dedicated strategies for AI.[306] Most EU \nmember states had released national AI strategies, as had \nCanada, China, India, Japan, Mauritius, \nthe Russian \nFederation, Saudi Arabia, United Arab Emirates, U.S., and \nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia \nand Tunisia.[306] The Global Partnership on Artificial Intelligence was launched in June 2020, stating a \nneed for AI to be developed in accordance with human rights and democratic values, to ensure public \nconfidence and trust in the technology.[306] Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher \npublished a joint statement in November 2021 calling for a government commission to regulate AI.[307] \nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they \nbelieve may happen in less than 10 years.[308] In 2023, the United Nations also launched an advisory \nbody to provide recommendations on AI governance; the body comprises technology company \nexecutives, governments officials and academics.[309] In 2024, the Council of Europe created the first \ninternational legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence \nand Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United \nStates, the United Kingdom, and other signatories.[310] \n\nin 2016 to 37 passed \n\nIn a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only \n35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\".[304] \nA 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to \nhumanity.[311] In a 2023 Fox News poll, 35% of Americans thought it \"very important\", and an additional \n41% thought it \"somewhat important\", for the federal government to regulate AI, versus 13% responding \n\"not very important\" and 8% responding \"not at all important\".[312][313]", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - }, - { - "text": "\n \n \n \n \n [html]SCHEDULESPortugal, including the Azores and MadeiraSaint Helena, Ascension and Tristan da CunhaSingaporeCategory 2 countries and territories\n
SCHEDULE 1Regulation 2 ( 1 )
Category 1 countries and territories
Australia
Brunei
Falkland Islands
Faroe Islands
Gibraltar
Iceland
Israel
New Zealand
South Georgia and the South Sandwich IslandsSCHEDULE 2
Regulation 2 ( 1 )
Any country or territory outside the common travel area not listed in Schedule 1 or Schedule 3.SCHEDULE 3
Regulation 2 ( 1 )
Category 3 countries and territories
Angola
Argentina
Bangladesh
Bolivia
Botswana
Brazil
Burundi
Cape Verde
", - "page_start": 31, - "page_end": 31, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "PART 6 \n\nFinal provisions \n\n**Review of need for requirements**\n\n**24.**The Secretary of State must review the need for the requirements imposed by these \n\nRegulations by 14th June 2021 and at least once every 28 days thereafter. \n\n**Expiry of Regulations**\n\n**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210538_en.pdf", - "query": "What the parochial church council must provide to make marriage records ?", - "target_page": 1, - "target_passage": " The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England(c) in that parish in which banns of matrimony may be published.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. \n\n**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. \n\n**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. \n\n\n \n \n \n \n [html]\n
Given under my hand on 29th April 2021Abi Tierney Registrar GeneralAbi Tremey Registrat GeneralTable
", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. \n\n\n \n \n \n \n [html]\n
Regulators ∗∗ migrets ’ equivalents than 10 min ks / μg / ml ; total vial status ; wivece provided under regulation 2A full impact assessment has not been produced for this instrument because no, or no significant,
Employees virus granus, patients vs. voluntary Accord in roluncoccines.
\n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— \n\n(**a**) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by \nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently \nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic \nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act \n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also \ninserted subsection (1A). \n(**b**) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to \nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15). \n(**c**) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "(e) in relation to a point of care test, they meet the relevant requirements for accreditation to \nISO Standard 15189 and ISO standard 22870; \n\n(f) \n\nthey receive the information required by paragraph 10(3) or (4) (as appropriate), and if \nthey administer the test to P, they do so no earlier than the end of the seventh day after the \nday on which P arrived in England;", - "page_start": 62, - "page_end": 62, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**i) Provisions**\nProvisions are recognised when the group has a legal or constructive obligation, as a result of past events, for which \nit is probable that an outflow of economic benefits will result and that outflow can be reliably measured.", - "page_start": 67, - "page_end": 67, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Contractor (or leader in the case of a joint tender): \n\n[*Full name*] \n[*Function*] \n[*Company name*] \n[*Full official address*] \nE-mail: [*complete*] \n\nBy derogation from this Article, different contact details for the contracting authority or the \ncontractor may be provided in specific contracts.", - "page_start": 7, - "page_end": 7, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "*creators*or from any third parties and all the necessary*pre-existing rights*have been \nobtained or licensed. \n\nTo that effect, the contractor must establish a list of all*pre-existing rights*to the*results*of \nthis FWC or parts thereof, including identification of the rights’ owners. If there are no*pre-*\n*existing rights*to the*results*, the contractor must provide a declaration to that effect. The \ncontractor must provide this list or declaration to the contracting authority together with \nthe invoice for payment of the balance at the latest. \n\n**II.13.5. Evidence of granting of pre-existing rights**\n\nUpon request by the contracting authority, the contractor must, in addition to the list \nmentioned under Article II.13.4., provide evidence that it has the ownership or the right \nto use all the listed*pre-existing rights*, except for the rights owned or licensed by the \ncontracting authority. The contracting authority may request this evidence even after the \nend of this FWC. \n\nThis provision also applies to image rights and sound recordings. \n\nThis evidence may refer, for example, to rights to: parts of other documents, images, \ngraphs, sounds, music, tables, data, software, technical inventions, know-how, IT \ndevelopment tools, routines, subroutines or other programs (‘background technology’), \nconcepts, designs, installations or pieces of art, data, source or background materials or \nany other parts of external origin. \n\nThis evidence must include, as appropriate: \n\n(a) the name and version number of a software product; \n(b) the full identification of the work and its author, developer,*creator*, translator, \n\ndata entry person, graphic designer, publisher, editor, photographer, producer; \n(c) a copy of the licence to use the product or of the agreement granting the relevant \n\nrights to the contractor or a reference to this licence; \n\n(d) a copy of the agreement or extract from the employment contract granting the \nrelevant rights to the contractor where parts of the*results*were created by its \n*personnel*; \n\n(e) the text of the disclaimer notice if any. \n\nProvision of evidence does not release the contractor from its responsibilities if it is found \nthat it does not hold the necessary rights, regardless of when and by whom this fact is \nrevealed. \n\nThe contractor also warrants that it possesses the relevant rights or powers to execute the \ntransfer and that it has paid or has verified payment of all due fees including fees due to \ncollecting societies, related to the final*results*. \n\n**II.13.6. Quotation of works in the result**\n\nIn the*result*, the contractor must clearly point out all quotations of existing works. The \ncomplete reference should include as appropriate, the following: name of the author, title \nof the work, date and place of publication, date of creation, address of publication on the \ninternet, number, volume and other information that allows the origin to be easily \nidentified. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 25, - "page_end": 25, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Figure 8-3 Open the host window \n\n2. To create a host, click**Add Host**. If you want to create a Fibre Channel host, continue with \n“Creating Fibre Channel hosts” on page 329. To create an iSCSI host, go to “Creating \niSCSI hosts” on page 331.", - "page_start": 349, - "page_end": 349, - "source_file": "sg247938.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "legal4_opengouvernementlicense.pdf", - "query": "What is the prison population grew in average by year between 1993 and 2008 ?", - "target_page": 8, - "target_passage": "The prison population grew rapidly between 1993 to 2008, at an average of 4% a year.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**2. Recent trends in the population**\n\nThe ‘Story of the Prison Population 1993 to 2012’ is an in-depth look at what \nhappened to the prison population between 1993 and 2012 and the major \nfactors contributing to the changes.4 \n\nThe prison population grew rapidly between 1993 to 2008, at an average of \n4% a year. This rapid rise was driven by: \n\n \n\nincreased numbers of people sentenced to immediate custody from \n1993 to 2002; \n\n \n\nincreases in the average custodial sentence length and increased use \nof indeterminate sentences; and \n\n an increase in numbers recalled to prison following breaches of the \nconditions of licence and these offenders spending longer in prison \nonce recalled. \n\nThe rise in the prison population slowed considerably from the summer of \n2008, in part due to the introduction of the Criminal Justice and Immigration \nAct (CJIA) 20085 which changed sentencing and offender management in \nways which helped to reduce growth in the prison population. \n\nThis flatter trend continued until the public disorder seen in UK cities from 6 to \n9 August 2011 which had an immediate but temporary impact on the prison \npopulation. \n\nDuring 2012 and into 2013, the prison population began to fall due to a falling \nremand population and a continued decline in the number of under 18s in \ncustody. The falling remand population during 2012 reflected falling volumes \ngoing through the courts plus the introduction, in December 2012, of \nmeasures restricting the use of remand for all offenders who would be unlikely \nto receive a custodial sentence.6 \n\nFrom the end of August 2013 to the end of October 2013, the remand \npopulation rose sharply, driving an overall increase in the prison population. \nThis was being driven by an increase in demand in the Crown Courts, \nespecially among more serious tri-able either way cases. The total population \nhas continued to rise since the beginning of 2014 and reached 85,9257 on the \n\n4 Story of the Prison Population: www.gov.uk/government/publications/story-of-the-prison- \npopulation-1993-2012 \n5 services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html \n6 http://services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html \n7 www.gov.uk/government/statistics/prison-population-figures-2014 \n\n6", - "page_start": 7, - "page_end": 7, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]Males 21 years and overTotal PopulationDeterminatesScenarioIndeterminatesRemand_Recall\n
Scenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun - 1576.50077.10078.70047.40048.20049.800
Jun ‐ 1675.80078.30082.00046.80049.50053.300
Jun ‐ 1774.40078.50083.70045.90050.40055.700
Jun ‐ 1873.20078.90085.80045.20051.30058.200
Jun ‐ 1972.20079.30087.50044.60052.00060.300
Jun - 2071.10079.40088.70044.00052.60062.000
ScenarioScenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun ‐ 1511.70011.70011.70010.80010.2009.600
Jun - 1611.20011.20011.20010.80010.2009.600
Jun ‐ 1710.50010.50010.50010.80010.2009.500
Jun ‐ 1810.10010.10010.10010.80010.2009.600
Jun ‐ 199.6009.6009.60010.90010.2009.600
Jun - 209.2009.2009.20010.80010.2009.600
Non CriminalScenarioScenario 1CentralScenario 2Scenario 1Central
Scenario 2Jun - 154.9005.2005.8001.7001.700
1.700Jun - 165.2005.5006.1001.7001.700
1.700Jun ‐ 175.3005.6006.1001.7001.700
1.700Jun ‐ 185.3005.6006.1001.7001.700
1.700Jun ‐ 195.3005.6006.1001.7001.700
1.700Jun - 205.3005.6006.1001.7001.700
\n\n**Table A11: Projected male 18-20 years old prison population (end of June**\n**figures)**", - "page_start": 19, - "page_end": 19, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Table A1: Projected prison population (end of June figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
Scenario 1CentralScenario 2
Jun - 1587.10087.70088.900
Jun - 1686.80089.10092.000
Jun - 1785.20089.30093.600
Jun - 1883.90089.70095.800
Jun - 1982.60090.10097.600
Jun - 2081.40090.20098.900
\n\n**Table A2: Average projected prison population (financial year figures)**\n\n\n \n \n \n \n [html]Scenario 1\n
CentralScenario 22015 / 16
87.00088.20089.7002016 / 17
86.20089.10092.4002017 / 18
84.70089.30094.1002018 / 19
83.40089.80096.3002019 / 20
82.20090.10097.900
\n\n**Table A3: Comparison of 2013 based Scenario 2 and 2014 Central Scenario**\n**projections (end of June figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
20132014Difference
Jun - 1483.400----
Jun - 1582.10087.7006.8 %
Jun - 1682.00089.1008.6 %
Jun - 1781.60089.3009.4 %
Jun - 1881.50089.70010.1 %
Jun - 1981.80090.10010.2 %
Jun - 20--90.200--
", - "page_start": 16, - "page_end": 16, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**4. Results**\n\nThe Central Scenario estimates that the prison population will rise to 87,700 \nby the end of June 2015 and to 90,200 by the end of June 2020. \n\nChart 2 presents Prison population projections from November 2014 to \nDecember 2020. \n\n**Chart 2: Projected monthly prison population (all scenarios)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**l**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n**i**\n**r**\n**P**\n\n90,000 \n\n85,000 \n\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\nScenario 1 Central Scenario \n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 \nby the end of June 2015 and then fall to 81,400 by the end of June 2020. \n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 \nby the end of June 2015 and to 98,900 by the end of June 2020. \n\nThe projected trends reflect the cumulative impacts of the various sentencing, \nlegislative and procedural assumptions that are used to generate the \nprojections. The seasonal pattern reflects the dip in the prison population \nwhich is always seen around the Christmas period. \n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by \nJune 2020. The projected population increase is largely due to the recent \ntrends in case mix where we have seen more serious cases come before the \ncourts. This results in offenders receiving longer custodial sentence lengths, \nwhich in turn places an upward pressure on the prison population. The growth \nin this scenario is largely driven by the rise in the determinate population \nwhich is projected to grow to 60,200 by June 2020. This is partially due to the", - "page_start": 12, - "page_end": 12, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Table 1: Population in custody changes from 2006 to 2014**\n\n\n \n \n \n \n [html]Olfender Management StatisticsYear on year % difference\n
Start of YearEnd of Year
June 2006 to June 200777.98279.7342.2 %
June 2007 to June 200879.73483.1944.3 %
June 2008 to June 200983.19483.4540.3 %
June 2009 to June 201083.45485.0021.9 %
June 2010 to June 201185.00285.3740.4 %
June 2011 to June 201285.37486.0480.8 %
June 2012 to June 201386.04883.842- 2.6 %
June 2013 to June 201483.84285.5092.0 %
\n\nFurther statistics and commentary on the changes seen in prison population \nover the last year, is presented in the Offender Management Statistics \nQuarterly publication. This is available online on GOV.UK at: \nwww.gov.uk/government/collections/offender-management-statistics-quarterly", - "page_start": 8, - "page_end": 8, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**5. Previous Projections**\n\nAt the end of September 2014 the published prison population was within 1.8 \n% of the 2013 Scenario 2 (central) projection, and within 3.4 % of the 2013 \nScenario 1 projection and 0.2 % of the 2013 Scenario 3 projection. This does \nnot indicate which scenario the actual prison population will track going \nforward. \n\nDifferences between the 2013 projections and the actual population could be \nexplained by changes, different to those projected, in overall demand, offence \nmix, age and gender of defendants, court routes, custody rates or sentence \nlengths. \n\nChart 3 plots the 2014 Central Scenario projection against the three 2013 \nprison population projections. The 2014-2020 Central Scenario projection is \nabove all three scenarios from last year. The higher level of the new \nprojections can be attributed to a more serious case mix coming into the \ncourts with a resulting increase in average custodial sentence lengths. The \nprojection for June 2019 in the Central Scenario this year is 10.2 % above the \nequivalent scenario (Scenario 2) last year. \n\n**Chart 3: Comparing 2013 and 2014 projections (November 2014 – December**\n**2020)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**l**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n**i**\n**r**\n**P**\n\n85,000 \n\n80,000 \n\nM \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\n2013 Scenario 1 2013 Scenario 2", - "page_start": 14, - "page_end": 14, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Key points**\n\nThis bulletin presents projections of the prison population in England and \nWales from November 2014 to December 2020. The prison population \nprojections are based on assumptions about future custodial convictions and \nincorporate the anticipated impacts of agreed policy and procedural initiatives. \n\nThe “Central Scenario” estimates that the prison population will increase from \nthe current position 85,9251 to 87,700 by June 2015. By the end of June 2020 \nthe prison population is projected to be 90,200. This Central Scenario is our \nbest estimate based on the available information. The projected prison \npopulation under our Central Scenario is shown in Chart 1. \n\nThe prison population projections are produced using a model of flows of \noffenders into and out of prison which counts the resulting prison population \neach month. \n\n**Chart 1: Projected prison population (Central Scenario)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n\n90,000 \n**l**\n\n85,000 \n\n**i**\n**r**\n**P**\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\nCentral Scenario \n\nThe Central Scenario has been modelled assuming custodial convictions are \nbroadly in line with recent trends and average length of sentence to be flat \nbased on recent trends. \n\nThe projections do not attempt to estimate the impact of any future \nGovernment policy that is yet to achieve Royal Assent, and therefore become \nless certain over time.", - "page_start": 3, - "page_end": 3, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections 2014 – 2020**\n\nAt the core of the method is a model of flows of offenders into and out of \nprison which counts the resulting prison population each month for sentenced, \nrecall and remand prisoners. \n\n\n \n \n \n \n [html]\n
are generated from time series projections of numbers of erring the criminal counts and take into account the age, gender defendants entering the system, the flow of cases through the sentences which concluded cases attract.jections model monitors the sizes of the sentenced, recall and populations. These populations depend on the inflows defined cuttbows. These outfows are defined by observed distributions renterior lengths, and the proportion of custh
model is based on data up to June 2014 from various sources proceedings and performance data, sentencing data and no and population data.he prison projections model are supplemented with an estimate criminal and fine defaulter populations, which is based on the data to September 2014.
have been modelled. These scenarios track the impact of incremental changes in sentencing behaviour :Scenario assumes custodial convictions are broadly in line ont trends. The average length of sentence is assumed to be ed on recent trends in sentence lengths. This broadly reflectsumptions for Scenario 2 in the Novmber 2013 projections
nsider two illustrative scenarios1 assumes that custodial convictions will fall against recentThe average length of sentence is assumed to be lower than been observed in recent trends in sentence lengths.
2 assumes a rise in custodial convictions when compared to
", - "page_start": 10, - "page_end": 10, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections**\n**2014 – 2020**\n**England and Wales**\n\nMinistry of Justice \nStatistics Bulletin", - "page_start": 0, - "page_end": 0, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections 2014 – 2020**\n\nThe assumptions used are based on consultation with policy and operational \nexperts at the Ministry of Justice and the National Offender Management \nService. They also take into account observed data trends: \n\n These projections represent a change from last year where the 2013 \nScenario 2 (central) saw the population gradually falling over the six \nyear lifetime of the projection. The Central Scenario in the projections \nthis year shows the population rising over the next six years. This \nchange arises from the fact that the latest projections capture a recent \nupward trend in prosecutions of more serious offences. \n\n Despite the fact that overall crime is falling there has been an increase \n\nin recorded crime for certain offence types: \n\no Prosecutions for sexual offences are the highest in the decade \nand increased by 19% in the 12 months ending June 2014, in \nline with a 21% increase in recorded crime. Offenders \nsentenced for sexual offences had an Average Custodial \nSentence Length (ASCL) of 59.7 months, a rise of 2.4 months, \ncompared with year ending June 2013. \n\no Violence against the person proceedings for indictable offences \nhave increased by 7% in the 12 months ending June 2014. This \nis in line with an 11% increase in recorded crime. \n\nFurther statistics and commentary on the changes seen in Court proceedings \nand sentencing over the last year is presented in the Criminal Justice System \nStatistics Quarterly publication. This is available online on GOV.UK at: \nwww.gov.uk/government/collections/criminal-justice-statistics-quarterly", - "page_start": 4, - "page_end": 4, - "source_file": "legal4_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal4_opengouvernementlicense.pdf", - "query": "Do you know the prison population estimation for the and of June 2020 ?", - "target_page": 13, - "target_passage": "The Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]Males 21 years and overTotal PopulationDeterminatesScenarioIndeterminatesRemand_Recall\n
Scenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun - 1576.50077.10078.70047.40048.20049.800
Jun ‐ 1675.80078.30082.00046.80049.50053.300
Jun ‐ 1774.40078.50083.70045.90050.40055.700
Jun ‐ 1873.20078.90085.80045.20051.30058.200
Jun ‐ 1972.20079.30087.50044.60052.00060.300
Jun - 2071.10079.40088.70044.00052.60062.000
ScenarioScenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun ‐ 1511.70011.70011.70010.80010.2009.600
Jun - 1611.20011.20011.20010.80010.2009.600
Jun ‐ 1710.50010.50010.50010.80010.2009.500
Jun ‐ 1810.10010.10010.10010.80010.2009.600
Jun ‐ 199.6009.6009.60010.90010.2009.600
Jun - 209.2009.2009.20010.80010.2009.600
Non CriminalScenarioScenario 1CentralScenario 2Scenario 1Central
Scenario 2Jun - 154.9005.2005.8001.7001.700
1.700Jun - 165.2005.5006.1001.7001.700
1.700Jun ‐ 175.3005.6006.1001.7001.700
1.700Jun ‐ 185.3005.6006.1001.7001.700
1.700Jun ‐ 195.3005.6006.1001.7001.700
1.700Jun - 205.3005.6006.1001.7001.700
\n\n**Table A11: Projected male 18-20 years old prison population (end of June**\n**figures)**", - "page_start": 19, - "page_end": 19, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**4. Results**\n\nThe Central Scenario estimates that the prison population will rise to 87,700 \nby the end of June 2015 and to 90,200 by the end of June 2020. \n\nChart 2 presents Prison population projections from November 2014 to \nDecember 2020. \n\n**Chart 2: Projected monthly prison population (all scenarios)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**l**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n**i**\n**r**\n**P**\n\n90,000 \n\n85,000 \n\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\nScenario 1 Central Scenario \n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 \nby the end of June 2015 and then fall to 81,400 by the end of June 2020. \n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 \nby the end of June 2015 and to 98,900 by the end of June 2020. \n\nThe projected trends reflect the cumulative impacts of the various sentencing, \nlegislative and procedural assumptions that are used to generate the \nprojections. The seasonal pattern reflects the dip in the prison population \nwhich is always seen around the Christmas period. \n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by \nJune 2020. The projected population increase is largely due to the recent \ntrends in case mix where we have seen more serious cases come before the \ncourts. This results in offenders receiving longer custodial sentence lengths, \nwhich in turn places an upward pressure on the prison population. The growth \nin this scenario is largely driven by the rise in the determinate population \nwhich is projected to grow to 60,200 by June 2020. This is partially due to the", - "page_start": 12, - "page_end": 12, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections**\n**2014 – 2020**\n**England and Wales**\n\nMinistry of Justice \nStatistics Bulletin", - "page_start": 0, - "page_end": 0, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Table A1: Projected prison population (end of June figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
Scenario 1CentralScenario 2
Jun - 1587.10087.70088.900
Jun - 1686.80089.10092.000
Jun - 1785.20089.30093.600
Jun - 1883.90089.70095.800
Jun - 1982.60090.10097.600
Jun - 2081.40090.20098.900
\n\n**Table A2: Average projected prison population (financial year figures)**\n\n\n \n \n \n \n [html]Scenario 1\n
CentralScenario 22015 / 16
87.00088.20089.7002016 / 17
86.20089.10092.4002017 / 18
84.70089.30094.1002018 / 19
83.40089.80096.3002019 / 20
82.20090.10097.900
\n\n**Table A3: Comparison of 2013 based Scenario 2 and 2014 Central Scenario**\n**projections (end of June figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
20132014Difference
Jun - 1483.400----
Jun - 1582.10087.7006.8 %
Jun - 1682.00089.1008.6 %
Jun - 1781.60089.3009.4 %
Jun - 1881.50089.70010.1 %
Jun - 1981.80090.10010.2 %
Jun - 20--90.200--
", - "page_start": 16, - "page_end": 16, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Key points**\n\nThis bulletin presents projections of the prison population in England and \nWales from November 2014 to December 2020. The prison population \nprojections are based on assumptions about future custodial convictions and \nincorporate the anticipated impacts of agreed policy and procedural initiatives. \n\nThe “Central Scenario” estimates that the prison population will increase from \nthe current position 85,9251 to 87,700 by June 2015. By the end of June 2020 \nthe prison population is projected to be 90,200. This Central Scenario is our \nbest estimate based on the available information. The projected prison \npopulation under our Central Scenario is shown in Chart 1. \n\nThe prison population projections are produced using a model of flows of \noffenders into and out of prison which counts the resulting prison population \neach month. \n\n**Chart 1: Projected prison population (Central Scenario)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n\n90,000 \n**l**\n\n85,000 \n\n**i**\n**r**\n**P**\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\nCentral Scenario \n\nThe Central Scenario has been modelled assuming custodial convictions are \nbroadly in line with recent trends and average length of sentence to be flat \nbased on recent trends. \n\nThe projections do not attempt to estimate the impact of any future \nGovernment policy that is yet to achieve Royal Assent, and therefore become \nless certain over time.", - "page_start": 3, - "page_end": 3, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
Contents
Key points2
1.Central Scenario
42.
Recent trends in the population6
3.Modelling methodology and projection scenarios
84.
Results11
5.Previous Projections
136.
Caveats on prison population projections14
", - "page_start": 2, - "page_end": 2, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
ListodiavictionTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 6, - "page_end": 6, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
. Caveats on prison population projectionshe projections presented reflect the impact of three possible trinds in the placebo of contentions, coordinated with trends in the age, gender and othercoors of elevated and onthering the eystem and in the fibe of delendants through thel
he projections do not reflect the impact of legislative, policy, operational orcosedural change or guidance for which there is no definite time / table for employeration. The projections therefore provide a set of “ baseline ”verselfous these possible changes, the actual future prior population may not mainting of the projected somanosis. Changes to criminal judgestion may not may be computers, and the project and therapy. The project and therapy. The posin
sourplisons for modelling and socionaris development were captured through onsultation with policy and operational experts at the Ministry of Justice and le National Offender Management Samplicat. The assumptions are based on malys
", - "page_start": 15, - "page_end": 15, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**5. Previous Projections**\n\nAt the end of September 2014 the published prison population was within 1.8 \n% of the 2013 Scenario 2 (central) projection, and within 3.4 % of the 2013 \nScenario 1 projection and 0.2 % of the 2013 Scenario 3 projection. This does \nnot indicate which scenario the actual prison population will track going \nforward. \n\nDifferences between the 2013 projections and the actual population could be \nexplained by changes, different to those projected, in overall demand, offence \nmix, age and gender of defendants, court routes, custody rates or sentence \nlengths. \n\nChart 3 plots the 2014 Central Scenario projection against the three 2013 \nprison population projections. The 2014-2020 Central Scenario projection is \nabove all three scenarios from last year. The higher level of the new \nprojections can be attributed to a more serious case mix coming into the \ncourts with a resulting increase in average custodial sentence lengths. The \nprojection for June 2019 in the Central Scenario this year is 10.2 % above the \nequivalent scenario (Scenario 2) last year. \n\n**Chart 3: Comparing 2013 and 2014 projections (November 2014 – December**\n**2020)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**l**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n**i**\n**r**\n**P**\n\n85,000 \n\n80,000 \n\nM \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\n2013 Scenario 1 2013 Scenario 2", - "page_start": 14, - "page_end": 14, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]No scenarios modelled are not predictions of what will happen to the prison quation, but rather indications of what the prison population would look likescenario conditions were to be fullillied.Scenario 1 and Scenario 2 do not represent bounds on our central projection the prison population, not do they represent the likelihood of changes above below our central projection.\n
assumptions regarding future parole hearing frequency and expected outcomes for indeterminate sentences ;
the Home Office gaining access to all 580 places at the Verne IRC by January 2015 ;
the impacts of the Crifender Rehabilitation Act 2014, whereby offereders with custodial sentences of less than 12 months will be released subject to licence and a new post - sentence supervision period following licence for offenders re
the impacts of the ROTL review deciding that all offenders who have privously absociated will no bronger be allowed to return to the open estate or be released on temporary licence except in exceptional circumstances ;
", - "page_start": 11, - "page_end": 11, - "source_file": "legal4_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal4_opengouvernementlicense.pdf", - "query": "What is the phone number of the Ministry of Justice press office ?", - "target_page": 30, - "target_passage": "Press enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536 ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Contact Points for further information**\n\nCurrent and previous editions of this publication are available for download \nfrom www.justice.gov.uk/publications/statistics-and-data/index.htm \n\nPress enquiries should be directed to the Ministry of Justice press office, \ntelephone: 020 3334 3536 \n\nOther enquiries about these statistics should be directed to: \n\nJustice Statistics Analytical Services \nMinistry of Justice \n7th Floor \n102 Petty France \nLondon \nSW1H 9AJ \n\nGeneral enquiries about the statistical work of the Ministry of Justice can be e- \nmailed to: statistics.enquiries@justice.gsi.gov.uk \n\nGeneral information about the official statistics system of the UK is available \nfrom www.statistics.gov.uk", - "page_start": 29, - "page_end": 29, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**Prison Population Projections**\n**2014 – 2020**\n**England and Wales**\n\nMinistry of Justice \nStatistics Bulletin", - "page_start": 0, - "page_end": 0, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**FOR FURTHER INFORMATION,**\n**PLEASE CONTACT**\n\n**Investor Relations**\n**Nissan Motor Co., Ltd.**\nGlobal Communications, CSR and IR Division \n17-1, Ginza 6-chome, Chuo-ku \nTokyo 104-8023, Japan \nphone: +81(0)3-5565-2334 \nfax: +81(0)3-3546-2669 \ne-mail: nissan-ir@mail.nissan.co.jp", - "page_start": 111, - "page_end": 111, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**3.5 Help Desk**\n\n**3.5.1 How to contact the Portal’s Help Desk**\n\nThe European Data Portal Help Desk can be contacted: \n\n•**By email**: help@europeandataportal.eu \n\n•**By phone**: the Portal’s Help Desk is staffed by a multilingual team of experts, who can be \n\ncontacted from Monday to Friday from 09:30 to 17:30 (CET). \n\no EN: (+352) 31 44 01-448 \n\no FR: (+352) 31 44 01-449 \n\n• By providing comments and suggestions via the**online contact/feedback form**available from \n\nthe Portal’s home page. \n\nFrom the header:", - "page_start": 47, - "page_end": 47, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**GETTING IN TOUCH WITH THE EU**\n\n**In person**\n\nAll over the European Union there are hundreds of Europe Direct centres. You can find the address of the centre nearest you online \n(european-union.europa.eu/contact-eu/meet-us_en). \n\nOn the phone or in writing \n\nEurope Direct is a service that answers your questions about the European Union. You can contact this service: \n\n• by freephone: 00 800 6 7 8 9 10 11 (certain operators may charge for these calls), \n\n• at the following standard number: +32 22999696, \n\n• via the following form: european-union.europa.eu/contact-eu/write-us_en. \n\n**FINDING INFORMATION ABOUT THE EU**\n\n**Online**\n\nInformation about the European Union in all the official languages of the EU is available on the Europa website \n(european-union.europa.eu). \n\n**EU publications**\n\nYou can view or order EU publications at op.europa.eu/en/publications. Multiple copies of free publications can be obtained by \ncontacting Europe Direct or your local documentation centre (european-union.europa.eu/contact-eu/meet-us_en). \n\n**EU law and related documents**\n\nFor access to legal information from the EU, including all EU law since 1951 in all the official language versions, go to EUR-Lex \n(eur-lex.europa.eu). \n\n**EU open data**\n\nThe portal data.europa.eu provides access to open datasets from the EU institutions, bodies and agencies. These can be downloaded \nand reused for free, for both commercial and non-commercial purposes. The portal also provides access to a wealth of datasets from \nEuropean countries.", - "page_start": 162, - "page_end": 162, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Santos is a major Australian oil and gas exploration and production company with interests \nand operations in every major Australian petroleum province and in the United States, \nIndonesia, Papua New Guinea and Egypt. \n\nSantos is one of Australia's largest onshore gas producers, supplying sales gas and ethane \nto all mainland Australian states and territories, and selling oil and liquids to domestic and \ninternational customers. \n\nIn Australia, Santos has one of the largest exploration portfolios by area of any company \nand has assembled an expanding, well-situated acreage position in Indonesia and the \nUnited States. The Company is also pursuing new venture opportunities in North Africa and \nthe Middle East. \n\nSantos is positioning itself to perform alongside the top quartile of the world's oil and gas \ncompanies – rapidly expanding its exploration interests and delivering an exciting suite of \ngrowth projects. \n\n\n\n**Perth**\nLevel 28, Forrest Centre \n221 St Georges Terrace \nPerth, Western Australia 6000 \nTelephone 08 9460 8900 \nFacsimile 08 9460 8971 \n\n**Melbourne Project Office**\nLevel 7, 34 Queen Street \nMelbourne, Victoria 3000 \nTelephone: 03 8614 8500 \nFacsimile: 03 8614 8511 \n\n**Port Bonython**\nPO Box 344 \nWhyalla, South Australia 5600 \nTelephone 08 8640 3100 \nFacsimile 08 8640 3200 \n\n**United States of America**\nSantos USA Corp. \n10111 Richmond Avenue, Suite 500 \nHouston, Texas 77042 USA \nTelephone 1-713 986 1700 \nFacsimile 1-713 986 4200 \n\n**REGISTERED AND HEAD OFFICE**\nGround Floor, Santos House \n91 King William Street \nAdelaide, South Australia 5000 \nGPO Box 2455 \nAdelaide, South Australia 5001 \nTelephone 08 8218 5111 \nFacsimile 08 8218 5274 \n\n**SHARE REGISTER**\nGround Floor, Santos House \n91 King William Street \nAdelaide, South Australia 5000 \nGPO Box 2455 \nAdelaide, South Australia 5001 \nTelephone 08 8218 5111 \nFacsimile 08 8218 5950 \n\n**OFFICES**\n**Brisbane**\nLevel 14, Santos House \n60 Edward Street \nBrisbane, Queensland 4000 \nTelephone 07 3228 6666 \nFacsimile 07 3228 6920 \n\n**Papua New Guinea**\nBarracuda Limited \nLevel 8, Pacific Place \nCnr Champion Parade \nand Musgrave Street \nPort Moresby, PNG \nTelephone 675 321 2633 \nFacsimile 675 321 2847 \n\n**Representative office of Santos**\n**Asia Pacific Pty Ltd in Jakarta**\nLevel 9, Ratu Plaza Office Tower \nJalan Jendral Sudirman Kav 9 \nJakarta 10270 Indonesia \nPO Box 6621, JKS GN \nJakarta 12060 Indonesia \nTelephone 62-21 270 0410 \nFacsimile 62-21 720 4503 \n\n**USEFUL E-MAIL CONTACTS**\nShare register enquiries: \nshare.register@santos.com \n\nInvestor enquiries: \ninvestor.relations@santos.com \n\nEmployment enquiries: \nrecruitment@santos.com \n\n**WEBSITE**\nwww.santos.com", - "page_start": 95, - "page_end": 95, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "SEND YOUR REGISTRATION FORM \n\nSend your registration form to the \nregistrations office at Oxbridge Academy via \none of the following channels: \n\nFax: \nPost: \nE-mail: registrar@oxbridgeacademy.co.za \n086 262 5550 \nPO Box 12723, Die Boord, 7613", - "page_start": 26, - "page_end": 26, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Santos is a major Australian oil and gas exploration and production company with interests \nand operations in every major Australian petroleum province and in the United States, \nIndonesia, Papua New Guinea and Egypt. \n\nSantos is one of Australia's largest onshore gas producers, supplying sales gas and ethane \nto all mainland Australian states and territories, and selling oil and liquids to domestic and \ninternational customers. \n\nIn Australia, Santos has one of the largest exploration portfolios by area of any company \nand has assembled an expanding, well-situated acreage position in Indonesia and the \nUnited States. The Company is also pursuing new venture opportunities in North Africa and \nthe Middle East. \n\nSantos is positioning itself to perform alongside the top quartile of the world's oil and gas \ncompanies – rapidly expanding its exploration interests and delivering an exciting suite of \ngrowth projects. \n\n\n\n**Perth**\nLevel 28, Forrest Centre \n221 St Georges Terrace \nPerth, Western Australia 6000 \nTelephone 08 9460 8900 \nFacsimile 08 9460 8971 \n\n**Melbourne Project Office**\nLevel 7, 34 Queen Street \nMelbourne, Victoria 3000 \nTelephone: 03 8614 8500 \nFacsimile: 03 8614 8511 \n\n**Port Bonython**\nPO Box 344 \nWhyalla, South Australia 5600 \nTelephone 08 8640 3100 \nFacsimile 08 8640 3200 \n\n**United States of America**\nSantos USA Corp. \n10111 Richmond Avenue, Suite 500 \nHouston, Texas 77042 USA \nTelephone 1-713 986 1700 \nFacsimile 1-713 986 4200 \n\n**REGISTERED AND HEAD OFFICE**\nGround Floor, Santos House \n91 King William Street \nAdelaide, South Australia 5000 \nGPO Box 2455 \nAdelaide, South Australia 5001 \nTelephone 08 8218 5111 \nFacsimile 08 8218 5274 \n\n**SHARE REGISTER**\nGround Floor, Santos House \n91 King William Street \nAdelaide, South Australia 5000 \nGPO Box 2455 \nAdelaide, South Australia 5001 \nTelephone 08 8218 5111 \nFacsimile 08 8218 5950 \n\n**OFFICES**\n**Brisbane**\nLevel 14, Santos House \n60 Edward Street \nBrisbane, Queensland 4000 \nTelephone 07 3228 6666 \nFacsimile 07 3228 6920 \n\n**Papua New Guinea**\nBarracuda Limited \nLevel 8, Pacific Place \nCnr Champion Parade \nand Musgrave Street \nPort Moresby, PNG \nTelephone 675 321 2633 \nFacsimile 675 321 2847 \n\n**Representative office of Santos**\n**Asia Pacific Pty Ltd in Jakarta**\nLevel 9, Ratu Plaza Office Tower \nJalan Jendral Sudirman Kav 9 \nJakarta 10270 Indonesia \nPO Box 6621, JKS GN \nJakarta 12060 Indonesia \nTelephone 62-21 270 0410 \nFacsimile 62-21 720 4503 \n\n**USEFUL E-MAIL CONTACTS**\nShare register enquiries: \nshare.register@santos.com \n\nInvestor enquiries: \ninvestor.relations@santos.com \n\nEmployment enquiries: \nrecruitment@santos.com \n\n\n \n \n \n \n [html]\n
TableTable
TableTableTable
TableTable
", - "page_start": 0, - "page_end": 0, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", - "query": "What is SOLR ?", - "target_page": 4, - "target_passage": "Search engine used for portal content search and dataset search ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": " ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": " ", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", - "query": "What is the function of the Graphical Data Visualisation Tool module ?", - "target_page": 6, - "target_passage": "How to visualize graphical data from a dataset resource ", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "**3.4 Graphical Data Visualisation Tool**\n\nThis section describes the features of the graphical visualisation tool for numeric data. The features \nare currently available for XLS (Excel) and CSV files, except for the selection of the sheet name which \nis applicable only for Excel files. \n\nMost GUI elements from the “Graph” tab (records selection, search box, filters and fields buttons) \nare also available on the “Grid” tab and work in the same way. \n\n**3.4.1 How to visualize graphical data from a dataset resource**\n\nAs a result of a dataset search, the system displays on the “Dataset” tab all distributions \n(resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset \ncan be further explored by clicking on “Open Visualization” under the “Options” button – if available.", - "page_start": 42, - "page_end": 42, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**3.3 Visualization of Geo-Spatial Data (map.apps)**\n\nThe visualization of geo-spatial data within the European Data Portal provides previewing \nfunctionality for spatial open data. The aim is to allow the user to assess if a dataset meets specific \nrequirements in terms of spatial and thematic coverage. The functionality that is provided in the \nheader (links to disclaimers and language switching) is consistent in the entire portal. \n\n**3.3.1 How to visualize geo-spatial data from a dataset resource**\n\nAccessing the geo-spatial visualization is achieved via the Data Platform interface. A user searches for \nspecific data, enters the dataset view of reasonable results and displays the available distributions \n(see Section 3.2.5). If a dataset distribution is supported by the geo-spatial visualization, a globe \nbutton is displayed (see Figure 3). This is the entry point into the map viewer application. Supported \nformats are OGC Web Map Service (WMS) and GeoJSON. If the user visits the geo-spatial \nvisualization for the first time, an interactive user tutorial is provided to guide the use through \nspecific functions of the user interface, similar to this written user manual.", - "page_start": 37, - "page_end": 37, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**4.1 Data Entry**\n\nThe data entry tab provides the function to**input data**into the system through the use of**grids**. To display the grid, a \nnode has to be selected from the**navigation tree**. (Figure 23) \n\n**4.2 Navigation tree**\n\nTo expand or collapse the tree, click on the \nor collapse the entire tree by clicking the plus and minus signs at the bottom of the tree. \n or signs in front of the nodes, respectively. You can also expand", - "page_start": 16, - "page_end": 16, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**3.2 Datasets (Data Platform)**\n\nThe**datasets section is the main access point for browsing, filtering and searching the datasets**. It \noffers a faceted search, a full text search and a geographical search. The dataset view provides access \nand information to the distributions of the dataset. \n\nThe home page of this section appears like this:", - "page_start": 25, - "page_end": 25, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "•**Data modeling**- build new data models, or design models based on existing data models. \n\n•**Data visualization**- map queries and visualize the access patterns (facets) of the application \n\nwithout writing code. Every facet corresponds to a different access pattern in DynamoDB. You \n\ncan manually add data to your data model. \n\n•**Operation builder**- use the*operation builder*to develop and test queries, and query live \n\ndatasets. You can also build and perform data plane operations, including creating projection \n\nand condition expressions, and generating sample code in multiple languages.", - "page_start": 83, - "page_end": 83, - "source_file": "serverless-core.pdf" - }, - { - "text": "**2 Approach**\n\nThe approach used for this User Manual was based on the identification of the main user functions of \nthe Portal and the description of each function from the user’s perspective in terms of “*How to*…”. \n\nEach main function documentation consists of a screen snapshot, the steps required to execute the \nfunction and optionally a screenshot with the results. \n\n**3 Main User Functions of the Portal**\n\nThis section describes all of the main user functions supported by the Portal Version 3.0. \n\nThe table 1-3 below lists the described functions by module. \n\n**Module Name** **Function**\n\n- How to browse through the Editorial Content \n\n(how to access Resources on Open Data: eLearning \nmodules, Training Companion, Reports about Open \nData) \n\n- How to view / search for “Latest News” \n- How to view / search for “Open Data Events” \n- How to subscribe to the EDP Newsletter \n- How to view “Tweets” on the EDP \n- How to switch to another User Language \n- How to search for EDP Site Content \n- How to search for Datasets by Data Category \n- How to search for Datasets by Keyword \nEntering the Datasets-View \n\n1 Portal HomePage \n\n2 \n\nHow to filter datasets by using “Faceted Search” \n\nHow to store personal queries \n\nHow to filter datasets by geographical area \n\nHow to download dataset distributions \n\nHow to view licensing information \n\nHow to switch to another user language \n\nHow to browse by data catalogues \n\n3 \n\nVisualization of Geo-Spatial \nData (map.apps) \n\nHow to visualize geo-spatial data from a dataset resource \n\n4 \n\nGraphical Data Visualisation \nTool \n\nHelp Desk \n\nMetadata Quality Assurance \n(MQA) \n\nMonitoring tool for the metadata quality: \nThe Global Dashboard View \nThe Catalogue details view \nHow to run SPARQL Queries using: \n\n- SPARQL Search \n\nEuropean Data Portal Version 4.3 – User Manual", - "page_start": 5, - "page_end": 5, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**7 Data Export/Import**\n\nThis function enables users to export data from the system in either Excel or XML format. \n\n**7.1 Excel Export – Data Entry**\n\nClick on the “Data Export / Import” tab and the navigation tree will appear on the left-hand side (figure 33). \n\n***Figure 33: Data Export / Import initial navigation tree***\n\nThere are**three options**available to export files: \n\n1.**Export selected single grid**– only the data of the current selected grid will be exported. (figure 34, d) \n2.**Export selected sector / subsector**– all data of the current selected grid and the sub sectors will be \nexported. (figure 34, e) \n3.**Export all data entry grids**– all data entry grids will be exported. (figure 34, f) \n\nClicking on one of the Sector’s or sub sectors’ (figure 34, a) or c)) on the left-hand side navigation tree, three Export \nbuttons will appear on the middle of the screen. (figure 34, b) \n\nClick on one of the “Export” button. The system will then generate an excel export file. \nThe file that has been exported can be seen under “My Data Export” (figure 35). \n\n***Figure 34: Excel export***\n\n*NAIIS-User-Manual.Docx* Page 26 10/02/2013", - "page_start": 25, - "page_end": 25, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "***Figure 41. My Data Export screen***\n\n\n\n**7.4 XML Export**\n\nThis XML export function allows the user to export files in XML format. \n\nClicking on the “XML Export – Data Entry” button triggers the system to generate an XML file (figure 42) and the \nfollowing message appears on the screen: \n‘*We have received your request for xml file export. Please be patient, this may take a few minutes. You can check*\n*progress of export in ‘My Data Export’*. (figure 43, a) \n\n***Figure 42. Export/Import navigation bar – XML Export – Data Entry***\n\n\n\n***Figure 43. XML file export – message XML export file request***\n\n\n\nOn the left-hand side navigation tree, click on ‘My Data Export’ (figure 44, a) which opens a list of export data (figure \n44, b), \nThe user should be able to download the file by clicking on the “File” link (figure 44, c).", - "page_start": 28, - "page_end": 28, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence.", - "page_start": 33, - "page_end": 33, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "***Figure 38. Download file screen***\n\n\n\n**7.3 Export reporting tables**\n\nThis Export report tables function allows the user to export reporting tables in excel format. \n\nClicking on the “Export report tables” button triggers the system to generate an excel file (figure 39, c) and the \nfollowing message appears on the screen: \n‘*We have received your request for reporting tables export. Please be patient, this may take a few minutes. You can*\n*check progress of export in ‘My Data Export’*. (figure 40, a) \n\n***Figure 39. Export reporting tables screen***\n\n\n\n***Figure 40. Export reporting tables screen***\n\n\n\nOn the left-hand side navigation tree, click on ‘My Data Import’ which opens a list of imported data. \nThe status of the import process can be seen under “My Data import” (figure 41,b). \n\nClick on the “File” at column FileLink (figure 41, c) to open or save the file exported. \n\n\n \n \n \n \n [html]\n
TableTableTableTableParametersTable
", - "page_start": 27, - "page_end": 27, - "source_file": "maiis-user-manual.pdf" - } - ] - }, - { - "references": { - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", - "query": "How to view “Tweets” on the EDP ?", - "target_page": 20, - "target_passage": "The Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the right hand side. ‐ ‐ Click on any of the tweets to display the complete tweet on twitter. Scroll vertically to see previous tweets. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**3.1.5 How to view “Tweets” on the EDP**\n\nThe Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the \nright hand side. \n\n‐**Click on any of the tweets to display the complete tweet on twitter.**\n\n‐ **Scroll vertically to see previous tweets.**\n\n\n\n\n \n \n \n \n [html]\n
TableTable
European Data Portal Version 4.3 – User ManualPage 20 of 57
", - "page_start": 19, - "page_end": 19, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**3.1.4 How to subscribe to the EDP Newsletter**\n\nOn the Portal Home Page: \n\n‐ **Either Click on the “Newsletter” item in the page header:**\n\nThen, on the “Newsletter subscriptions” page: \n\n•**Enter your E-Mail address**\n\n•**Click on the button “Subscribe”**\n\nThe system will display a notification message after successful subscription.", - "page_start": 18, - "page_end": 18, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**3.1.7 How to search for EDP Site Content**\n\nIn order to search within the Portal’s site content (i.e. editorial content, articles, events, reports etc.), \n\n**enter any keyword in the “Search site content” text box and click on the** **button**.", - "page_start": 21, - "page_end": 21, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "\n \n \n \n \n [html]Portal Version 43 – User ManualV1.0October 2019Table of Contents10.000Purpose of the Document1.20.000Terminology20.000Main User Functions of the Portal3.10.000How to browse through the Editorial Content of the Portal.3.1. 217How to view / search for \" Open Data Events \"3.1. 419How to view “ Tweets ” on the EDP3.1. 621How to search for EDP Site Content3.1. 823How to Search for Datasets by Keyword3.226Entering the Datasets - View3.2. 227How to store personal queries3.2. 4\n
Introduction
1.1
0.000
Reference Documents
1.3
0.000
Approach
3
0.000
Portal Home Page
3.1. 1
10
How to view / search for “ Latest News ”
3.1. 3
18
How to subscribe to the EDP Newsletter
3.1. 5
20
How to switch to another User Language
3.1. 7
22
How to Search for Datasets by Data Category
3.1. 9
25
Datasets ( Data Platform )
3.2. 1
27
How to filter datasets by using “ Faceted Search ”
3.2. 3
29
How to filter datasets by geographical area
", - "page_start": 1, - "page_end": 1, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "3.5 Help Desk ............................................................................................................................... 48 \n\n3.5.1 How to contact the Portal’s Help Desk .......................................................................... 48 \n\n3.6 Metadata Quality Assurance (MQA) ..................................................................................... 50 \n\n3.6.1 The Global Dashboard View .......................................................................................... 50 \n\n3.6.2 The Catalogue details view ............................................................................................ 51 \n\n3.7 SPARQL Manager ................................................................................................................... 54 \n\n3.7.1 SPARQL Search .............................................................................................................. 54 \n\n3.7.2 SPARQL Assistant ........................................................................................................... 55 \n\n3.7.3 SPARQL Saving/Modifying a Query ............................................................................... 56 \n\n3.7.4 SPARQL Queries ............................................................................................................. 57 \n\n**List of Figures**\n\nFigure 1: EDP Home Page (upper part) ................................................................................................... 8 \n\nFigure 2: EDP Home Page (lower part) .................................................................................................... 9 \n\nFigure 3 – Dataset Resource Page with Link to Geo-Spatial Visualisation. ........................................... 38 \n\nFigure 4 – Selection of layers................................................................................................................. 39 \n\nFigure 5 – Feature Info tool. .................................................................................................................. 40 \n\nFigure 6 – Legend tool. .......................................................................................................................... 40 \n\nFigure 7 – Disclaimer and tutorial buttons. ........................................................................................... 41 \n\nFigure 8 – Error message dialog. ........................................................................................................... 42", - "page_start": 2, - "page_end": 2, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**3.1.6 How to switch to another User Language**\n\n\n\n**Select another language from the language selection box located on the upper right corner of the**\n**home page.**\n\nThe User Interface as well as the main editorial content is displayed in the selected language. \n\nThe EDP currently supports all 24 official EU languages + Norwegian: \n\n**English (en), Bulgarian (bg), Spanish (es), Czech (cs), Danish (da), German (de), Estonian**\n**(et), Greek (el), French (fr), Irish (ga), Croatian (hr), Italian (it), Latvian (lv), Lithuanian (lt),**\n**Hungarian (hu), Maltese (mt), Dutch (nl), Polish (pl), Portuguese (pt), Romanian (ro), Slovak**\n**(sk), Slovenian (sl), Finnish (fi), Swedish (sv), Norwegian (no).**\n\n**Note:**\n\nThe following detailed editorial content – apart from the landing pages - is only available in English / \nFrench and some additional languages: \n\n\n \n \n \n \n [html]\n
-Training Companion : ( en )
-More Training Material : ( en )
-Reports about Open Data : ( en )
-Use Cases ( en )
", - "page_start": 20, - "page_end": 20, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**3.1.3 How to view / search for “Open Data Events”**\n\nThe Home Page displays the latest 4 Open Data events in the “**Open Data Events in Europe**” panel on \nthe right hand side. \n\n‐**Click on any of the 4 events to display the event article (here: item#1).**\n\n‐**Or click on “View calendar” in order to find current and future events on the events**\n\n**calendar.**", - "page_start": 17, - "page_end": 17, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**2 Approach**\n\nThe approach used for this User Manual was based on the identification of the main user functions of \nthe Portal and the description of each function from the user’s perspective in terms of “*How to*…”. \n\nEach main function documentation consists of a screen snapshot, the steps required to execute the \nfunction and optionally a screenshot with the results. \n\n**3 Main User Functions of the Portal**\n\nThis section describes all of the main user functions supported by the Portal Version 3.0. \n\nThe table 1-3 below lists the described functions by module. \n\n**Module Name** **Function**\n\n- How to browse through the Editorial Content \n\n(how to access Resources on Open Data: eLearning \nmodules, Training Companion, Reports about Open \nData) \n\n- How to view / search for “Latest News” \n- How to view / search for “Open Data Events” \n- How to subscribe to the EDP Newsletter \n- How to view “Tweets” on the EDP \n- How to switch to another User Language \n- How to search for EDP Site Content \n- How to search for Datasets by Data Category \n- How to search for Datasets by Keyword \nEntering the Datasets-View \n\n1 Portal HomePage \n\n2 \n\nHow to filter datasets by using “Faceted Search” \n\nHow to store personal queries \n\nHow to filter datasets by geographical area \n\nHow to download dataset distributions \n\nHow to view licensing information \n\nHow to switch to another user language \n\nHow to browse by data catalogues \n\n3 \n\nVisualization of Geo-Spatial \nData (map.apps) \n\nHow to visualize geo-spatial data from a dataset resource \n\n4 \n\nGraphical Data Visualisation \nTool \n\nHelp Desk \n\nMetadata Quality Assurance \n(MQA) \n\nMonitoring tool for the metadata quality: \nThe Global Dashboard View \nThe Catalogue details view \nHow to run SPARQL Queries using: \n\n- SPARQL Search \n\nEuropean Data Portal Version 4.3 – User Manual", - "page_start": 5, - "page_end": 5, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "http://www.facebook.com/IBMRedbooks \n\n(cid:2) Follow us on Twitter: \n\nhttp://www.twitter.com/ibmredbooks \n\n(cid:2) Look for us on LinkedIn: \n\nhttp://www.linkedin.com/groups?home=&gid=2130806 \n\n(cid:2) Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks \nweekly newsletter: \n\nhttps://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm \n\n(cid:2) Stay current on recent Redbooks publications with RSS Feeds: \n\nhttp://www.redbooks.ibm.com/rss.html", - "page_start": 20, - "page_end": 20, - "source_file": "sg246915.pdf" - }, - { - "text": "**7.5.2 Listing volume throttles**\n\nTo view volume throttles, from the**Volumes**→**Volumes**menu, click the**Actions**menu and \nselect**View All Throttles**, as shown in Figure 7-29. \n\n\n \n \n \n \n [html]Other : Name\n
Et al. ( 1066 )Volune Thrombo • ↓PitterTotal
Throtitia TypeBarridwidth A3rest30PS LiestII?Itso - mirrored00...✓ Online
Volume10000Riso - third1 - Pool2✓ 0nline
Totalurner122.00 PHI
", - "page_start": 296, - "page_end": 296, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "welcome_to_word_template.pdf", - "query": "Where can we open a document saved on OneDrive ?", - "target_page": 2, - "target_passage": "When you save this document in OneDrive, you’ll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now.", - "page_start": 1, - "page_end": 1, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. \n\nFind recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. \n\n\n\n\n\nAccess files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. \n\n\n\nWord works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "You are prompted to insert the file to be imported, as shown in Figure 7-8. Browse for the file, \nselect it, and click**Import**. This scenario uses file type CSV because this format is the \ndownloaded format.", - "page_start": 194, - "page_end": 194, - "source_file": "sg248459.pdf" - }, - { - "text": "Get writing suggestions \n\nWith**Editor**, bring out your best writing. Editor helps you bring out your best \nwriting by giving you intelligent writing suggestions. It also calculates an Editor \nScore based on the number and types of suggestions you have yet to address. \nSelect an underlined word or phrase to accept or ignore a suggestion. \n\nView who else is typing \n\nCo-authoring Word documents that are shared on OneDrive or on a \nSharePoint site happens in real-time, which means you can easily view where \nother authors are making changes in the same document that you’re currently \nworking in. \n\n\n\nReview and track changes \n\nWhether you just want to check spelling, keep your word count in check, or fully \ncollaborate with other people, the**Review**tab has essential commands to track, \ndiscuss, and manage all of the changes made to your documents. \n\nFormat with styles \n\n**Styles**lets you create, apply, and review the formatting styles in your current \ndocument. To open it, select the**Home**tab, and then select the small arrow in the \nlower right corner of the Styles gallery.", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" - }, - { - "text": "Export the data by using the CSV format to import it on MongoDB compass. The first time you \nopen MongoDB, you see three databases. Click**Create Database**(as shown in Figure 7-4) to \ninsert the downloaded data set as a new collection.", - "page_start": 191, - "page_end": 191, - "source_file": "sg248459.pdf" - }, - { - "text": "Microsoft 365 Apps for Windows including Word, Excel, and PowerPoint allow users to \n\nexport documents in PDF format. Furthermore, add-ins can use the object model to \n\nautomate PDF export using either the exporter built in to each app or their own exporter \n\nthat implements the IMsoDocExporter COM interface. \n\nAn important part of exporting to PDF is writing PDF/UA tags that provide the \n\nsemantic information to preserve the accessibility of the content. This allows people with \n\ndisabilities to consume the PDF using assistive technologies such as screen readers. This \n\ndocumentation provides details about the PDF/UA tags written by the exporter built in \n\nto Word, Excel, and PowerPoint as well as the APIs that add-ins need to implement to \n\nprovide their own exporter.", - "page_start": 0, - "page_end": 0, - "source_file": "office-pdf.pdf" - }, - { - "text": "**4c. Reports about Open Data**\n\nBy clicking on the “**Reports about Open Data**” sub-menu item, the system provides a list of \navailable reports on open data. The list can be filtered by keyword, year of publication, country of \norigin and type of report.", - "page_start": 15, - "page_end": 15, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "As you notice, the migration steps are just two lines and can be automated in many ways. \nOpen the database and on the Aggregation tab, look for the document that was inserted in \nthe cluster on-premises. The result is shown in Figure 7-15. \n\n\n\nFigure 7-15 Data inserted on-premises seen at the public cloud MongoDB \n\nFor a seamless experience, a network solution that knows where the application is running \nmust be in place. For more information, see Appendix C, “Seamless application movement \nacross multicloud environments” on page 241.", - "page_start": 204, - "page_end": 204, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "welcome_to_word_template.pdf", - "query": "What is the bold keyboard shortcut on word ?", - "target_page": 4, - "target_passage": "Bold (keyboard shortcut: Ctrl+B)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "To format text, select it, and then select a button in the Font or Paragraph area on the Home \ntab. \n\nTry it: Select text in the lines below and choose formatting options so that the text is an \nexample of the formatting it’s describing: \n\n\n\n\n\n\n\n\n\n\n\n\n\nPro tip: If you selected whole words for this exercise, did you notice that Word popped up a \nlittle toolbar, with the font formatting options? \n\nBetween that and keyboard shortcuts like Ctrl+B \nand Ctrl+I, you save time by not having to go up to \nthe Home tab all the time.", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Unlike old-school user guides, this doc is yours to tailor exactly for your needs. Reading it will \nteach you some basics about Word, but this document isn’t just for reading. It’s for editing too, \nso you can learn by doing. \n\nFor practice using Word features, watch for Try it text in red throughout this document. \n\nTime saver: If you’ve only got a minute \nand you want to see how this works, \nwatch this Video: Welcome to Word. \n\n\n\nWrite eloquently, with a little help \n\nWord automatically checks spelling and grammar, and marks misspelled words with a red \nsquiggly underline. Grammatical glitches get a blue double underline. \n\nTry it: Put your cursor at the end of this paragraph, and hit Enter to start a new paragraph. Write \na sentence with some spelling or grammatical mistakes, and press Enter to finish the paragraph. \n\nRight-click the text that’s marked with underlines, or Press F7. Choose a suggestion to correct \nthe mistakes.", - "page_start": 0, - "page_end": 0, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "**SELECTING COLUMNS**\n\nIf you want to make changes to an***entire***\n***column***, such as bolding all of the headings in a \ncolumn or changing the font of all the cell entries, \nyou must first select the column. This is done by \n\n\n\n\nclicking on the column header directly above the \ncolumn. Remember that any changes you make \nwill apply to every cell in the column all the way \ndown to row 1,048,576! \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\ncolumn***B***to select it \n\n\n and click on the \n**6**\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous*\n***e***\n\n***e***\n***m***\n***a***\n***S***\n*file with this exercise, or open*\n*the file E705 Ranges_1.xlsx...*\n\n***l***\n***i***\n***F***\n\n Press \n Move the mouse pointer to the \n\n + \n to make \ncell***A1***the active cell \n\ncolumn heading for column***B***\n\n*Notice that the mouse pointer*\n*changes to a black arrow*\n*pointing down the column…*\n\n Click once to select the column \n\n*This time the row headers*\n*change to orange to indicate*\n*that at least one cell (but not*\n*all) in each row is selected…*\n\n Click in cell***D6***and press \n+ \n\n*This key combination also*\n*selects an entire column…*\n\n Click on the column header for \n Hold down column header for column***D***\n\n*This time, columns B, C, and D*\n*are all selected…*\n\n Click in the column header for \n\ncolumn***A***, then hold down the \nleft mouse button and drag the \nmouse pointer across the \ncolumn headings to column***E***\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n Make sure that you check your worksheet \n\ncarefully after you’ve made changes to entire \ncolumns. Remember that all of the cells in \nthat column are affected – even those in \nrows below the visible area.", - "page_start": 18, - "page_end": 18, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "The Tell me search box takes you straight to commands and Help in Word. \n\nTry it: Get help: \n\n1. Go to Tell me what you want to do at the top of the window. \n\n2. Type what you want to do. \n\nFor example, type: \n\n Add watermark to quickly get to the watermark command. \n\n Help to go to Word help. \n\n Training to see the list of Word training courses. \n\n What’s new for a list of the most recent updates to Word", - "page_start": 7, - "page_end": 7, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": " ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": " ", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 77, - "page_end": 77, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": " ", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "welcome_to_word_template.pdf", - "query": "What is the advise to make the style sets and themes work well ? ", - "target_page": 6, - "target_passage": "They work best when your document is formatted with styles", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Style sets and themes let you completely change the look of your document in an instant. They \nwork best when your document is formatted with styles (so it’s good that we fixed that Heading \nstyle, above). \n\nTry it: Explore style sets and themes: \n\n1. On the Design tab, select Themes, and choose a theme from the drop-down. \nNotice that the gallery of style sets updates to reflect the theme you picked. \n\n2. Select any theme you like from the drop-down and click to apply.", - "page_start": 5, - "page_end": 5, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "\n \n \n \n ", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "\n \n \n \n
", - "page_start": 119, - "page_end": 119, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "\n \n \n \n
", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "\n \n \n \n
", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "\n \n \n \n
", - "page_start": 39, - "page_end": 39, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "\n \n \n \n
", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "\n \n \n \n
", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "\n \n \n \n
", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "\n \n \n \n
", - "page_start": 44, - "page_end": 44, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0770.pdf", - "query": "Where are the peaks of the VHE blazars ?", - "target_page": 1, - "target_passage": " VHE blazars have double-humped spectral energy distributions (SEDs), with one peak at UV/X-ray energies and another at GeV/TeV energies.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "VERITAS, a stereoscopic array of \n\nVHE blazars have double-humped spectral energy \ndistributions (SEDs), with one peak at UV/X-ray en- \nergies and another at GeV/TeV energies. The ori- \ngin of the lower-energy peak is commonly explained \nas synchrotron emission from the relativistic electrons \nin the blazar jets. The origin of the higher-energy \npeak is controversial, but is widely believed to be the \nresult of inverse-Compton scattering of seed photons \noff the same relativistic electrons. The origin of the \nseed photons in these leptonic scenarios could be the \nsynchrotron photons themselves, or photons from an \nexternal source. Hadronic scenarios are also plausible \nexplanations for the VHE emission, but generally are \nnot favored. \n\n1A VERITAS telescope was relocated during Summer 2009, \nincreasing the array’s sensitivity by a factor ∼1.3. Contemporaneous multi-wavelength (MWL) obser- \n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. \n\n**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n
\n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n(z = 0.341) detected in the VHE band. In addition, \nVER J0521+211, likely associated with the radio-loud \nAGN RGB J0521.8+2112, was detected by VERTAS \nin ∼4 h of observations in October 2009 [23]. These \nobservations were motivated by its identification as a \n>30 GeV γ-ray source in the public Fermi-LAT data. \nIts VHE flux is 5% of the Crab Nebula flux, placing it \namong the brightest VHE blazars detected in recent \nyears. VERITAS later observed even brighter VHE \nflaring from VER J0521+211 in November 2009 [24], \nleading to deeper VHE observations. \n\n\n \n \n \n \n [html]\n
ObjectClass | RedshiftM 87
FR I0.004Mkn 421
HBL0.030Mkn 501
HBL0.0341ES 2344 + 514
HBL0.0441ES 1959 + 650
HBL0.047W Comae †
IBL0.102RGB J0710 + 591 †
HBL0.125H 1426 + 428
HBL0.1291ES 0806 + 524 †
HBL0.1381ES 0229 + 200
HBL0.1391ES 1218 + 304
HBL0.182RBS 0413 †
HBL0.1901ES 0502 + 675 †
HBL0.3413.66A †
IBL0.444?PKS 1424 + 240 †
IBL?VER J0521 + 211 †
??
\n\n**6. Blazars Upper Limits**\n\n(∼5.5σ; 3% Crab flux above 300 GeV; ΓVHE ∼ 2.7) \nduring VERITAS observations from December 2008 \nto March 2009. The initial announcement of the VHE \ndiscovery [19] led to its discovery above 1 GeV in the \nFermi-LAT data using a special analysis. RBS 0413, \na relatively distant HBL (z=0.19), was observed for \n16 h good-quality live time in 2008-092. These data \nresulted in the discovery of VHE gamma-rays (>270γ, \n∼6σ) at a flux (>200 GeV) of ∼2% of the Crab Neb- \nula flux. The discovery [20] was announced simultane- \nously with the LAT MeV-GeV detection. The VHE \nand other MWL observations, including Fermi-LAT \ndata, for each of these three sources will be the sub- \nject of a joint publication involving both the VERI- \nTAS and LAT collaborations.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nFor the synchrotron component of blazar spectra, \nthe low-frequency spectral break due to synchrotron \nself-absorption moves to higher frequencies as one \nmeasures closer to the base of the jet [2]. This of- \nten places the peak of the spectrum in the millime- \nter and submillimeter bands, where the emission is \noptically-thin and originates on parsec and sub-parsec \nscales [3], allowing direct observation of the most com- \npact regions near the central engine. The high en- \nergy γ-ray emission originates as a Compton process, \ntypically a combination of synchrotron-self-Compton \n(SSC) and external-radiation-Compton (ERC). De- \npending on the source properties, the synchrotron \nphotons or external photons are upscattered by the \nsame population of electrons that emit the millimeter \nand submillimeter spectra. Therefore the submillime- \nter and γ-ray emission are closely linked and give the \nfull information about the source emission. \n\nA systematic study of the submillimeter properties \nof the entire sample of Fermi blazars has yet to be con- \nducted and is one of the primary goals of our work. We \npresent here preliminary analysis of the submillimeter \nproperties of Fermi blazars detected by the Submil- \n1The Submillimeter Array is a joint project between the \nSmithsonian Astrophysical Observatory and the Academia \nSinica Institute of Astronomy and Astrophysics and is funded \nby the Smithsonian Institution and the Academia Sinica. \n2http://sma1.sma.hawaii.edu/callist/callist.html \n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0770.pdf", - "query": "What are the blazars observed in the discovery program ?", - "target_page": 2, - "target_passage": "The blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. How ever, the program also includes IBLs (intermediate peaked) and LBLs (low-peaked), as well as flat spec trum radio quasars (FSRQs), in an attempt to in crease the types of blazars known to emit VHE γ-rays.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nFor the synchrotron component of blazar spectra, \nthe low-frequency spectral break due to synchrotron \nself-absorption moves to higher frequencies as one \nmeasures closer to the base of the jet [2]. This of- \nten places the peak of the spectrum in the millime- \nter and submillimeter bands, where the emission is \noptically-thin and originates on parsec and sub-parsec \nscales [3], allowing direct observation of the most com- \npact regions near the central engine. The high en- \nergy γ-ray emission originates as a Compton process, \ntypically a combination of synchrotron-self-Compton \n(SSC) and external-radiation-Compton (ERC). De- \npending on the source properties, the synchrotron \nphotons or external photons are upscattered by the \nsame population of electrons that emit the millimeter \nand submillimeter spectra. Therefore the submillime- \nter and γ-ray emission are closely linked and give the \nfull information about the source emission. \n\nA systematic study of the submillimeter properties \nof the entire sample of Fermi blazars has yet to be con- \nducted and is one of the primary goals of our work. We \npresent here preliminary analysis of the submillimeter \nproperties of Fermi blazars detected by the Submil- \n1The Submillimeter Array is a joint project between the \nSmithsonian Astrophysical Observatory and the Academia \nSinica Institute of Astronomy and Astrophysics and is funded \nby the Smithsonian Institution and the Academia Sinica. \n2http://sma1.sma.hawaii.edu/callist/callist.html \n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. \n\n**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. \n\nflux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. \n\n**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0770.pdf", - "query": "How many VHE blazar candidates were observed by VERITAS between September 2007 andJune 2009 ?", - "target_page": 3, - "target_passage": "More than 50 VHE blazar candidates were observed by VERITAS betweenSeptember 2007 andJune 2009.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. \n\n**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "VERITAS, a stereoscopic array of \n\nVHE blazars have double-humped spectral energy \ndistributions (SEDs), with one peak at UV/X-ray en- \nergies and another at GeV/TeV energies. The ori- \ngin of the lower-energy peak is commonly explained \nas synchrotron emission from the relativistic electrons \nin the blazar jets. The origin of the higher-energy \npeak is controversial, but is widely believed to be the \nresult of inverse-Compton scattering of seed photons \noff the same relativistic electrons. The origin of the \nseed photons in these leptonic scenarios could be the \nsynchrotron photons themselves, or photons from an \nexternal source. Hadronic scenarios are also plausible \nexplanations for the VHE emission, but generally are \nnot favored. \n\n1A VERITAS telescope was relocated during Summer 2009, \nincreasing the array’s sensitivity by a factor ∼1.3. Contemporaneous multi-wavelength (MWL) obser- \n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n(z = 0.341) detected in the VHE band. In addition, \nVER J0521+211, likely associated with the radio-loud \nAGN RGB J0521.8+2112, was detected by VERTAS \nin ∼4 h of observations in October 2009 [23]. These \nobservations were motivated by its identification as a \n>30 GeV γ-ray source in the public Fermi-LAT data. \nIts VHE flux is 5% of the Crab Nebula flux, placing it \namong the brightest VHE blazars detected in recent \nyears. VERITAS later observed even brighter VHE \nflaring from VER J0521+211 in November 2009 [24], \nleading to deeper VHE observations. \n\n\n \n \n \n \n [html]\n
ObjectClass | RedshiftM 87
FR I0.004Mkn 421
HBL0.030Mkn 501
HBL0.0341ES 2344 + 514
HBL0.0441ES 1959 + 650
HBL0.047W Comae †
IBL0.102RGB J0710 + 591 †
HBL0.125H 1426 + 428
HBL0.1291ES 0806 + 524 †
HBL0.1381ES 0229 + 200
HBL0.1391ES 1218 + 304
HBL0.182RBS 0413 †
HBL0.1901ES 0502 + 675 †
HBL0.3413.66A †
IBL0.444?PKS 1424 + 240 †
IBL?VER J0521 + 211 †
??
\n\n**6. Blazars Upper Limits**\n\n(∼5.5σ; 3% Crab flux above 300 GeV; ΓVHE ∼ 2.7) \nduring VERITAS observations from December 2008 \nto March 2009. The initial announcement of the VHE \ndiscovery [19] led to its discovery above 1 GeV in the \nFermi-LAT data using a special analysis. RBS 0413, \na relatively distant HBL (z=0.19), was observed for \n16 h good-quality live time in 2008-092. These data \nresulted in the discovery of VHE gamma-rays (>270γ, \n∼6σ) at a flux (>200 GeV) of ∼2% of the Crab Neb- \nula flux. The discovery [20] was announced simultane- \nously with the LAT MeV-GeV detection. The VHE \nand other MWL observations, including Fermi-LAT \ndata, for each of these three sources will be the sub- \nject of a joint publication involving both the VERI- \nTAS and LAT collaborations.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. \n\nflux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. \n\n**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed7_cc4.pdf", - "query": "For which language have been introduced the ActiveInference.jl library ?", - "target_page": 1, - "target_passage": " We introduce a new software package for the Julia programming language, the library ActiveInference.jl.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Article \n**Introducing ActiveInference.jl: A Julia Library for Simulation**\n**and Parameter Estimation with Active Inference Models**\n\n**Samuel William Nehrer 1,†**\n**Christoph Mathys 5**\n\n**, Jonathan Ehrenreich Laursen 1,†** **, Conor Heins 2,3,*** **, Karl Friston 3,4** **,**\n\n**and Peter Thestrup Waade 5**\n\n1 \n\nSchool of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; \n202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.) \n\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany \n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk \n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK \n5 \n\nInteracting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); \nptw@cas.au.dk (P.T.W.) \n\n** ***Correspondence: cheins@ab.mpg.de \n† \nThese authors contributed equally to this work. \n\n**Abstract:**We introduce a new software package for the Julia programming language, \nthe library ActiveInference.jl. To make active inference agents with Partially Ob- \nservable Markov Decision Process (POMDP) generative models available to the grow- \ning research community using Julia, we re-implemented the pymdp library for Python. \nActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive \nand behavioural modelling, as it is used in computational psychiatry, cognitive science \nand neuroscience. This means that POMDP active inference models can now be easily \nfit to empirically observed behaviour using sampling, as well as variational methods. In \nthis article, we show how ActiveInference.jl makes building POMDP active inference \nmodels straightforward, and how it enables researchers to use them for simulation, as well \nas fitting them to data or performing a model comparison. \n\n**Keywords:**active inference; free energy principle; predictive processing; Markov decision \nprocess; cognitive modelling; Julia \nAcademic Editor: Astero Provata \n\n**PACS:**87.15.Aa Received: 25 October 2024 \nRevised: 2 January 2025 \nAccepted: 7 January 2025 \n\n**MSC:**91-08 \n\n\n \n \n \n \n [html]\n
Citation : Nehrer, S. W.; EhrenreichTable
Laursen, J,; Heins, C.; Friston, K ;Mathys, C.; Thestrup Waade, P.
Introducing Active Inference. j1 : AJulia Library for Simulation and
Parameter Estimation with ActiveInference Models. Entropy 2025.27.62.
https :// doi. org / 10.3390 / e27010062Copyright : © 2025 by the authors.
Licensee MDPI, Basel, Switzerland.This article is an open access article
distributed under the terms andconditions of the Creative Commons
Attribution ( CC BY ) license( https :// creativecommons. org /
licenses / by / 4.0 /).
", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Julia uses its “just-in-time” (JIT) compilations via the LLVM framework to approach the \nspeed of languages like C without relying on external compilers [36]. Julia is also natively \nauto-differentiable, which means it can solve what is called the two-language problem \n(i.e., that high-level languages often have to rely on lower-level languages, either for \nperformance or for auto-differentiability; this is the case with standard tools for cognitive \nmodelling, where languages like R [37] must rely on external languages like STAN [38] for \nBayesian model fitting). This means that ActiveInference, in conjunction with Turing [39], \nJulia’s powerful library for Bayesian model fitting, and its newly developed extension for \nbehavioural modelling, ActionModels, makes it possible to use cutting-edge Markov Chain \nMonte Carlo [40] methods, as well as variational methods [35], for Bayesian model fitting \nwith AIF. Crucially, this allows researchers to not only simulate AIF in a fast programming \nlanguage, but to also fit them to empirical behaviour, as is performed in cognitive modelling \nand computational psychiatry. Importantly, this also places AIF models in an ecosystem \nof other models for computational psychiatry so that it can easily be compared with \nmodels, like Hierarchical Gaussian Filters [41], and reinforcement learning models, like the \nclassic Rescorla–Wagner model [42]. As part of making ActiveInference.jl available to the \nscientific community, and to the larger software ecosystem within computational psychiatry, \nit is implemented as part of the Translational Algorithms for Psychiatry-Advancing Science \n(TAPAS) ecosystem [43]. \n\nIn the next section, we provide a conceptual and formal introduction to AIF, particu- \nlarly in the context of using POMDP generative models. In Section 3, we demonstrate how \nto use the package in practice, both for simulation and parameter estimation. In Section 4, \nwe give a fully worked example of how ActiveInference can be used with a concrete \nsimulated dataset. Finally, we discuss potential applications and future directions for \ndeveloping the package.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Tools for simulating POMDP-AIF models were originally developed as part of the \nDEM [20] library for MATLAB [21] (part of the larger SPM library [22]). Since then, a \nmodal and flexible software package pymdp [23] was created for Python [24], as well as a \nperformance-oriented package cpp-AIF [25] for C++ [26] that can be used across platforms. \nFinally, the factor graph library RxInfer [27] for Julia [28] has also been used to implement \nsome AIF models on an efficient factor graph back-end [29–31]. The important tools \nthat these packages provide make AIF available for researchers to perform simulation \nstudies and for use in engineering contexts. They do not, however, usually allow for \nfitting models to empirically observed data, which is a fundamental method used in \ncognitive modelling [32], often in the context of computational psychiatry [13], to infer the \nmechanisms underlying variations in behaviour or to investigate the differences between \n(for example, clinical) populations. Smith and colleagues [33] provided a guide for manually \ndoing variational Bayesian parameter estimation based on empirical data, but only in \nMATLAB and restricted to a particular class of variational parameter estimation methods \n(variational Laplace), instead of the sampling-based methods that currently predominate in \nthe field of cognitive modelling [34,35]. \n\nIn this paper, we introduce ActiveInference.jl, a new software library for Julia [28] \nthat aims to provide easy-to-use tools for model fitting with AIF models and to introduce \nAIF to the growing community of researchers using Julia for computational psychiatry and \ncognitive modelling. Julia is a free and open-source high-level programming language that \nretains an easy user interface reminiscent of that in MATLAB and Python. Simultaneously,", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Θ is then described by a Dirichlet distribution parametrised by a set of concentration \nparameters*θ*: \n\np(Θ) = Dir(Θ|*θ*) (19) \n\nThe concentration parameter of a Dirichlet distribution is essentially a non-negative count \nof how many times the given category (be it a type of observation or state transition) has \noccurred. The distribution of concentration parameter counts will determine the shape \nof the estimated categorical probability distribution, while the scale of the concentration \nparameters will determine the certainty per precision of the belief. Updating beliefs about \nΘ (the parameters in the matrices) then corresponds to updating these concentration \nparameters*θ*with the following update equation: \n\n*θ*t+1 =*ω*∗*θ*t +*η*∗*χ*t \n(20) \n\nThe updated value for the concentration parameter (*θ*t+1) is found by adding the previous \nconcentration parameter*θ*t multiplied by a forgetting rate*ω*to the observed data count \n*χ*(either the observation in the case of**A**learning, or the inferred state or state transition \nfor other matrices) multiplied by a learning rate*η*. With this relatively simple update \nequation—which, in essence, amounts to just counting the occurrences of categories—an \nAIF agent can update its beliefs about the various matrices it uses to make inferences about \nenvironmental states. For more details on parameter learning with POMDPs, see [23,33,52]. \n\n**3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to \noperate ActiveInference. This includes functionalities for creating POMDP agents, for sim- \nulating behaviour and for fitting the models to data. In the next section, we demonstrate \nhow to use the package on a concrete worked example. ActiveInference is under continual \ndevelopment, and the newest version of the package, including documentation for how to \nuse it, can be found at github.com/ilabcode/ActiveInference.jl. \n\n3.1. Creating and Using a POMDP \n\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [23], \na Python library for implementing simulations of AIF in discrete state spaces. Those \nalready acquainted with pymdp should find the syntax here familiar. ActiveInference \ncan be installed as normal from the official Julia General Registry using the Julia’s native \npackage manager Pkg: \n(cid:7) (cid:4) \n\n**using**Pkg \nPkg . add ( ActiveInference ) \n(cid:6) (cid:5) \n\n\n \n \n \n \n [html]\n
It can then be loaded into the current project environment :
vsing ActiveInference
\n\n(cid:4) \n\n(cid:5) \n\nCentral to the package is the AIF object. This is a structure containing all the components of \nthe generative model, as well as the dynamic belief states and the various settings needed to \nperform AIF, and is used in conjunction with most of the high-level functions of the package. \nAn AIF object can be created with the init_aif function, which takes as arguments the \ncomponents of the generative model and a dictionary of various settings and parameters:", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Schwartenbeck, P.; Friston, K. Computational Phenotyping in Psychiatry: A Worked Example. eNeuro**2016**, 3, ENEURO.0049- \n16.2016. [CrossRef] \n\n14. \n\n15. Albarracin, M.; Demekas, D.; Ramstead, M.J.D.; Heins, C. Epistemic Communities under Active Inference. Entropy**2022**, 24, 476. \n\n[CrossRef] [PubMed] \n\n16. Lanillos, P.; Meo, C.; Pezzato, C.; Meera, A.A.; Baioumy, M.; Ohata, W.; Tschantz, A.; Millidge, B.; Wisse, M.; Buckley, C.L.; et al. \n\nActive Inference in Robotics and Artificial Agents: Survey and Challenges. arXiv**2021**, arXiv:2112.01871. [CrossRef] \nFriston, K.; Stephan, K.; Li, B.; Daunizeau, J. Generalised Filtering. Math. Probl. Eng.**2010**, 2010, 621670. [CrossRef] \n\n17. \n18. Waade, P.T.; Mikus, N.; Mathys, C. Inferring in Circles: Active Inference in Continuous State Space Using Hierarchical Gaussian \nFiltering of Sufficient Statistics. In Machine Learning and Principles and Practice of Knowledge Discovery in Databases; Kamp, M., \nKoprinska, I., Bibal, A.; Bouadi, T., Frénay, B., Galárraga, L., Oramas, J., Adilova, L., Krishnamurthy, Y., Kang, B., et al., Eds.; \nCommunications in Computer and Information Science; Springer: Cham, Switzerland, 2021; pp. 810–818. [CrossRef] \n\n19. Weber, L.A.; Waade, P.T.; Legrand, N.; Møller, A.H.; Stephan, K.E.; Mathys, C. The generalized Hierarchical Gaussian Filter. arXiv \n\n**2023**, arXiv:2305.10937. [CrossRef] \nFriston, K.J.; Trujillo-Barreto, N.; Daunizeau, J. DEM: A variational treatment of dynamic systems. NeuroImage**2008**, 41, 849–885. \n[CrossRef] \n\n20. \n\n21. MATLAB, Inc. MATLAB, version: 9.13.0 (R2022b); MATLAB, Inc.: Natick, MA, USA, 2022. \n22. Penny, W.D.; Friston, K.J.; Ashburner, J.T.; Kiebel, S.J.; Nichols, T.E. Statistical Parametric Mapping: The Analysis of Functional Brain \n\nImages; Elsevier: Amsterdam, The Netherlands, 2011; Google-Books-ID: G_qdEsDlkp0C. \n\n23. Heins, C.; Millidge, B.; Demekas, D.; Klein, B.; Friston, K.; Couzin, I.D.; Tschantz, A. pymdp: A Python library for active inference \n\nin discrete state spaces. J. Open Source Softw.**2022**, 7, 4098. [CrossRef] \n\n24. Rossum, G.v.; Drake, F.L. The Python Language Reference, Release 3.0.1 [repr.] ed.; Number Pt. 2 in Python Documentation Manual; \n\nvan Rossum, G., Drake, F.L., Eds.; Python Software Foundation: Hampton, NH, USA, 2010. \n\n25. Gregoretti, F.; Pezzulo, G.; Maisto, D. cpp-AIF: A multi-core C++ implementation of Active Inference for Partially Observable \n\nMarkov Decision Processes. Neurocomputing**2024**, 568, 127065. [CrossRef] \nJosuttis, N.M. The C++ Standard Library: A Tutorial and Reference; Addison-Wesley: Boston, MA, USA, 2012; Google-Books-ID: \n9DEJKhasp7gC. \n\n26. \n\n27. Bagaev, D.; Podusenko, A.; Vries, B.d. RxInfer: A Julia package for reactive real-time Bayesian inference. J. Open Source Softw. \n\n**2023**, 8, 5161. [CrossRef] \n\n28. Bezanson, J.; Karpinski, S.; Shah, V.; Edelman, A. Julia Language Documentation. 2016. Available online: https://readthedocs. \n\norg/projects/julia-wf/downloads/pdf/stable/ (accessed on 26 May 2024). \nvan de Laar, T.W.; de Vries, B. Simulating Active Inference Processes by Message Passing. Front. Robot. AI**2019**, 6, 20. [CrossRef] \n29. \n30. Vanderbroeck, M.; Baioumy, M.; Lans, D.v.d.; Rooij, R.d.; Werf, T.v.d. Active inference for Robot control: A Factor Graph \n\nApproach. Stud. Undergrad. Res. E-J.**2019**, 5, 1–5. [CrossRef] \n\n31. van de Laar, T.; ¸Senöz, ˙I.; Özçelikkale, A.; Wymeersch, H. Chance-Constrained Active Inference. Neural Comput.**2021**, \n\n33, 2710–2735. [CrossRef] \n\n32. Busemeyer, J.R.; Diederich, A. Cognitive Modeling; SAGE: Thousand Oaks, CA, USA, 2010; Google-Books-ID: R7KDF35g5LQC. \nSmith, R.; Friston, K.J.; Whyte, C.J. A step-by-step tutorial on active inference and its application to empirical data. J. Math. \n33. \nPsychol.**2022**, 107, 102632. [CrossRef] [PubMed] \n\n34. Lee, M.D.; Wagenmakers, E.J. Bayesian Cognitive Modeling: A Practical Course, 1st ed.; Cambridge University Press: Cambridge, \n\nUK, 2014. [CrossRef]", - "page_start": 30, - "page_end": 30, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "34. Lee, M.D.; Wagenmakers, E.J. Bayesian Cognitive Modeling: A Practical Course, 1st ed.; Cambridge University Press: Cambridge, \n\nUK, 2014. [CrossRef] \n\n35. Blei, D.M.; Kucukelbir, A.; McAuliffe, J.D. Variational Inference: A Review for Statisticians. J. Am. Stat. Assoc.**2017**, 112, 859–877. \n\n[CrossRef] \n\n36. Lattner, C.; Adve, V. LLVM: A compilation framework for lifelong program analysis & transformation. \n\nIn Proceedings of \nthe International Symposium on Code Generation and Optimization, 2004, CGO 2004, Palo Alto, CA, USA, 20–24 March 2004; \npp. 75–86. [CrossRef] \n\n37. R Core Team. R: A Language and Environment for Statistical Computing; R Foundation for Statistical Computing: Vienna, Austria, \n\n2021. \n\n38. Carpenter, B.; Gelman, A.; Hoffman, M.D.; Lee, D.; Goodrich, B.; Betancourt, M.; Brubaker, M.; Guo, J.; Li, P.; Riddell, A. Stan: A \n\nProbabilistic Programming Language. J. Stat. Softw.**2017**, 76, 1–32. [CrossRef] [PubMed] \n\n39. Ge, H.; Xu, K.; Ghahramani, Z. Turing: A Language for Flexible Probabilistic Inference. In Proceedings of the Twenty-First \nInternational Conference on Artificial Intelligence and Statistics (PMLR), Playa Blanca, Lanzarote, 9–11 April 2018; pp. 1682–1690. \nISSN: 2640-3498. \n\n40. Hoffman, M.D.; Gelman, A. The No-U-Turn Sampler: Adaptively Setting Path Lengths in Hamiltonian Monte Carlo. \n2014. Available online: https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://jmlr.org/ \npapers/volume15/hoffman14a/hoffman14a.pdf&ved=2ahUKEwjPzP32seCKAxXLENAFHRziJ-0QFnoECBcQAQ&usg= \nAOvVaw3adSH1tmvDJ1-6CEuitKet (accessed on 17 May 2024). \n\n41. Mathys, C.; Weber, L. Hierarchical Gaussian Filtering of Sufficient Statistic Time Series for Active Inference. In Active Inference; \nVerbelen, T., Lanillos, P., Buckley, C.L., De Boom, C., Eds.; Communications in Computer and Information Science; Springer: \nCham, Switzerland, 2020; pp. 52–58. [CrossRef] \n\n42. Rescorla, R.A. A theory of Pavlovian conditioning: Variations in the effectiveness of reinforcement and non-reinforcement. Class.", - "page_start": 30, - "page_end": 30, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "ing the temporal dynamics of belief changes in experimental participants. Dynamic belief \ntrajectories can then be related to other (for example, physiological) measures, as is usual \nin model-based neuroscience [65]. This method can also, in principle, be used for fitting \nmodels to other types of experimentally observable systems, like animals, organoids [66], \nand simulated or emergent systems [67]. The package can also be used for agent-based \nmodelling in general, for repeating earlier analyses with sampling based model-fitting \nand for comparing POMDP-based AIF models directly to other types of models. \n\nSince they implement full approximate Bayesian inferences, AIF models are compu- \ntationally more demanding than many approaches traditionally used in cognitive and \nagent-based modelling, in particular when the dimensionality of the generative model is \nlarge. This means that models with highly multidimensional or complex behaviour and \nlarge numbers of agents can be computationally infeasible to implement, especially given \nthe additional computational demands introduced by fitting these models to empirical \ndata. Avenues for addressing this implicit scaling problem were proposed in the context of \nmachine learning applications [68,69], and with the use of simplifying assumptions—the \nuse of which are ubiquitous in computational modelling—AIF has been used to model \nmulti-agent phenomena, such as opinion dynamics [15,70], coordinated foraging [71] and \nfish school movements [12]. It remains to be explored how AIF models can be applied to \nhighly complex natural phenomena, such as a concrete election, which underscores the \nneed for efficient but flexible and accessible software tools in the field. \n\nThere are many ways in which ActiveInference can be improved. It would be useful \nto extend the set of dynamic belief states to include prediction errors since they are often \nused for model-based neuroscience. This would entail departing from discrete state-space \n(i.e., POMDP) models to consider continuous state-space models apt for Bayesian filtering \nor predictive coding (see below). An alternative would be to generate prediction errors \nfrom belief updating under discrete models, where prediction errors can be read as the \n(KL) divergence between posterior and prior beliefs (i.e., complexity or information gain). \nA simple interface could be added for creating custom parametrisations of the requisite \nparameters that could be parametrised with Boltzmann or Gibbs distributions, as opposed \nto Dirichlet distributions. Parameter learning could be extended to all generative model \nparameters, as well as in parametrised forms (e.g., so that the Boltzmann parameter or \ntemperature of the parameters that are learned); similarly for the precision over expected \nfree energies*γ*. Preference priors should also be implementable for environmental states, \nin addition to observations, and**A**can be made action dependent.", - "page_start": 28, - "page_end": 28, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "the behaviour (Figure 8). We saw that the estimation successfully captured the difference \nbetween the two groups, and that the*α*parameter recovered fairly well. Note that the \nability to recover parameters depends on the specific model and task, as well as on the \nspecific values of the parameters (when*α*is very high, for example, the behaviour becomes \nessentially deterministic; further increases in*α*would then not have any effect on the \nbehaviour, and therefore, not be estimable). A subtle issue here is that the parameters \nthat best explain some data are not necessarily the parameters used to generate those \ndata. This is because the best parameters are those that maximise the marginal likelihood \nof the data (also known as the model evidence); because the model evidence includes \na complexity term, the parameter recovery will often recover parameters that provide a \nsimpler explanation for the data relative to the parameters used to generate these data. \n(cid:7) (cid:4) \n\n# Extract quantities from the fitted model \nagent_parameters = extract_quantities ( model , renamed_posterior_chains ) \n# Extract posterior estimates \nposterior_estimates = get_estimates ( agent_parameters ) \n(cid:6) (cid:5) \n\n**Figure 8.**Results of the parameter recovery study. (**A**) Estimated parameter values plotted against \nthe values used to generate the data. (**B**) Parameter estimates split by the two groups from which the \nparameter values of synthetic subjects were sampled. \n\nFinally, there are various metrics for model comparison that might be calculated, as \nimplemented by various software packages. Here for demonstration, we calculated the \nPareto-Smoothed Importance Sampling approximation to Leave One Out cross-validation \n(PSIS-LOO) [59], as implemented by ParetoSmooth.jl [64]: \n(cid:7) (cid:4) \n\n**using**ParetoSmooth : psis_loo \n# Calculate the PSIS LOO \nPSIS_loo = psis_loo ( model , results . chains ) \n(cid:6) (cid:5) \n\n**5. Discussion**\n\nWe introduce ActiveInference.jl, a novel Julia software package for creating and \nusing POMDP-based AIF models for simulation and fitting to empirical data, demonstrat- \ning its ease of use on a small parameter study with simulated agents. ActiveInference.jl \nmakes AIF modelling available in a fast language, equipped with an interface and situated \nin an ecosystem oriented specifically towards cognitive and behavioural modelling. \n\nImportantly, the ability to fit models to empirical data with sampling-based methods \nprovides value to researchers within cognitive modelling and computational psychiatry: it \nallows for comparing estimated parameter values between population groups or investigat-", - "page_start": 27, - "page_end": 27, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "generative models, or even (deep learning-based) amortised inference models. These vari- \nous extensions could provide valuable tools for using AIF models in both theoretical and \napplied research. \n\n**Author Contributions:**Conceptualisation, S.W.N., J.E.L. and P.T.W.; methodology, S.W.N., J.E.L. and \nP.T.W.; software, S.W.N., J.E.L. and P.T.W.; formal analysis, S.W.N. and J.E.L.; writing—original draft \npreparation, S.W.N. and J.E.L.; writing—review and editing, C.H., K.F., C.M. and P.T.W.; visualisation, \nS.W.N. and J.E.L.; supervision, C.M. and P.T.W.; project administration, P.T.W. All authors read and \nagreed to the published version of this manuscript. \n\n**Funding:**C.M. acknowledges funding from Aarhus Universitets Forskningsfonds (grant no. AUFF- \nE-2019-7-10) and from the Carlsberg Foundation (grant no. CF21-0439). \n\n**Institutional Review Board Statement:**Not applicable. \n\n**Informed Consent Statement:**Not applicable. \n\n**Data Availability Statement:**The original data presented in this study are openly available in \nActiveInferenceJuliaPaper at URL: https://osf.io/j3k5q/. \n\n**Conflicts of Interest:**The authors declare no conflicts of interest. The funders had no role in the design \nof this study; in the collection, analyses or interpretation of data; in the writing of this manuscript; or \nin the decision to publish the results. \n\n**Abbreviations**\n\nThe following abbreviations are used in this manuscript: \n\n\n \n \n \n \n [html]\n
AIFActive inference
FEPFree energy principle
VFEVariational free energy
EFEExpected free energy
MCMCMarkov Chain Monte Carlo
POMDPPartially Observed Markov Decision Proces
\n\nParr, T.; Pezzulo, G.; Friston, K.J. Active Inference: The Free Energy Principle in Mind, Brain, and Behavior; The MIT Press: Cambridge, \nMA, USA, 2022. [CrossRef] \nFriston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; O’Doherty, J.; Pezzulo, G. Active inference and learning. Neurosci. \nBiobehav. Rev.**2016**, 68, 862–879. [CrossRef] \nFriston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; Pezzulo, G. Active inference: A process theory. Neural Comput.**2017**, \n29, 1–49. [CrossRef] \nFriston, K.J.; Stephan, K.E. Free-energy and the brain. Synthese**2007**, 159, 417–458. [CrossRef] [PubMed] \nFriston, K. The free-energy principle: A unified brain theory? Nat. Rev. Neurosci.**2010**, 11, 127–138. [CrossRef] [PubMed] \nFriston, K. The free-energy principle: A rough guide to the brain? Trends Cogn. Sci.**2009**, 13, 293–301. [CrossRef] [PubMed] \nFriston, K. A free energy principle for a particular physics. arXiv**2019**, arXiv:1906.10184. [CrossRef] \nFriston, K.; Da Costa, L.; Sajid, N.; Heins, C.; Ueltzhöffer, K.; Pavliotis, G.A.; Parr, T. The free energy principle made simpler but \nnot too simple. Phys. Rep.**2023**, 1024, 1–29. [CrossRef] \nFriston, K.; Kiebel, S. Predictive coding under the free-energy principle. Philos. Trans. R. Soc. B Biol. Sci.**2009**, 364, 1211–1221. \n[CrossRef] [PubMed] \n\n**References**\n\n1. \n\n2. \n\n3. \n\n4. \n5. \n6. \n7. \n8. \n\n9. \n\n10. Karl, F. A Free Energy Principle for Biological Systems. Entropy**2012**, 14, 2100–2121. [CrossRef] \n11. Corcoran, A.W.; Pezzulo, G.; Hohwy, J. From allostatic agents to counterfactual cognisers: Active inference, biological regulation, \n\nand the origins of cognition. Biol. Philos.**2020**, 35, 32. [CrossRef] \n\n12. Heins, C.; Millidge, B.; Da Costa, L.; Mann, R.P.; Friston, K.J.; Couzin, I.D. Collective behavior from surprise minimization. Proc.", - "page_start": 29, - "page_end": 29, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "**Core Concepts**\n\n\n \n \n \n \n [html]\n
AIFActive inference is a formal framework for modelling behaviour and cognition. Perception and action are cast as minimising free energy — the V / E and EFE, respectively — given a generative model of the environment.
VFEThe watational free energy. 7 quantities how well a generative model explains incoming sensery observation. It can be revertites as the regative lag model evidence ( culted surprise ) opper - bounded by the divergence from the optimal pom
FW ( s ),+)EFE
The expoted from energy. C quantifies the expected future free menty under an action policy ±. It consists of an information gain term and a prognativ value term that provide a natural balance between explinatory and goal - seeking behavioGS = − Rq ( 0.8 ) n1 [ ln4 ( 5 ) i, τ ) − ln4 ( s ) m ] − Rq ( 0 ( r )] h p ( d ( c )]
Information gainPragmatic value
Generative modelThe generative model is an agent ’ s formal assumptions about the structure and dynamics of its environment, hased on which perceptual and active inferences are carried out. Many types of generative models exist that are suitable for dife
\n\n**2. Active Inference with POMDPs**\n\nIn this section, we briefly describe the core concepts of AIF and POMDPs. This \nshould familiarise the reader with the vernacular used in the later sections regarding \nthe functionalities of the package. While various extensions, such as structure learning, \nwhich enables an agent to learn the structure or shape of its environment through model \ncomparison [44–47], or hierarchical and temporally deep POMDPs [48,49], are relevant for \nfuture work, describing these in detail is beyond the scope of this foundational paper. \n\nAt the core of AIF lies the minimisation of a variational free energy upper bound on \nsurprise for perception, as well as action. This is motivated by the free energy principle [4–8], \nwhich states that self-organising systems can be described as minimising the variational \nfree energy of their sensory states. The minimisation of free energy generally takes two", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed7_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed7_cc4.pdf", - "query": "To which system does the AIF apply ?", - "target_page": 2, - "target_passage": "AIF was argued to be applicable to any self organising system that actively maintains a stable boundary that defines its integrity [10], a broad category that includes cells and plants [11], as well as humans [2] and even collectives [12].", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "**35. Australian Equivalents to International Financial Reporting Standards (continued)**", - "page_start": 88, - "page_end": 88, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "2008 \n\nAIFRS \n\n 375 \n 2,507 \n 6.7 \n 977 \n 2,474 \n 1.1 \n 6.8 \n88.4% \n 74,137 \n 232,039 \n\n2007 \n\nAIFRS \n\n 546 \n 4,390 \n 8.0 \n 1,523 \n 2,405 \n 1.2 \n 9.2 \n90.0% \n 85,994 \n 290,897 \n\n2006 \n\nAIFRS \n\n 734 \n 5,121 \n 7.0 \n 1,951 \n 2,000 \n 2.4 \n 14.5 \n90.1% \n 140,071 \n 459,702 \n\n2005 \n\nAIFRS \n\n 588 \n 4,915 \n 8.4 \n 1,521 \n 1,829 \n 2.4 \n 13.0 \n90.8% \n 126,550 \n 353,275 \n\n2004 \n\nAGAAP \n\n 801 \n 4,444 \n 5.5 \n 1,946 \n 1,671 \n 3.1 \n 15.0 \n91.2% \n 149,979 \n 395,346 \n\n 74,285 \n (55,743) \n (4,065) \n 46,653 \n 61,130 \n – \n (9,284) \n 51,846 \n (3,974) \n 47,872 \n (11,675) \n 36,197 \n – \n 36,197 \n\n 52,044 \n (64,908) \n (2,264) \n 10,413 \n (4,715) \n – \n (8,446) \n (13,161) \n (2,544) \n (15,705) \n 3,115 \n (12,590) \n – \n (12,590) \n\n 72,782 \n (47,761) \n (1,158) \n 1,361 \n 25,224 \n – \n (7,805) \n 17,419 \n (757) \n 16,662 \n – \n 16,662 \n – \n 16,662 \n\n 64,299 \n (47,366) \n (1,404) \n 2,471 \n 18,000 \n – \n (8,720) \n 9,280 \n (889) \n 8,391 \n – \n 8,391 \n – \n 8,391 \n\n 84,410 \n (34,343) \n (1,019) \n 2,370 \n 51,418 \n – \n (11,323) \n 40,095 \n (2,416) \n 37,679 \n – \n 37,679 \n – \n 37,679", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Figure 7.26. Airflow Separation (sheet 2 of 2)", - "page_start": 75, - "page_end": 75, - "source_file": "00-80T-80.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**32. Additional Financial Instruments Disclosure (continued)**\n\n**(b) Interest rate risk exposure**", - "page_start": 86, - "page_end": 86, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "minimisation [9]. Choosing actions that minimise the expected free energy (EFE) of their \nconsequences provides a natural balance between exploratory and exploitative behaviour; \ngeneralises descriptive approaches to behavioural modelling, like reinforcement learning \nand expected utility maximisation; and provides a singular approach to adaptive behaviour \nthat can be used across different environments. AIF was argued to be applicable to any self- \norganising system that actively maintains a stable boundary that defines its integrity [10], \na broad category that includes cells and plants [11], as well as humans [2] and even \ncollectives [12]. Owing to its generality, AIF has seen a rise in popularity across multiple \nfields. It is used for theoretical simulations of the mechanisms underlying various types of \nbehaviour [2], computational phenotyping in computational psychiatry [13,14], and agent- \nbased simulations of population dynamics [15], as well as in engineering and robotics [16]. \nIn AIF, perception and concurrent action are based on performing a variational Bayesian \ninversion of a generative model of the environment (i.e., a model of how the environment \nchanges and brings about sensory observations). This belief updating includes inferring \n(hidden) states of the environment, learning parameters of the generative model and \nlearning the structure of the generative model. Since the requisite inference schemes come \npre-specified, the main task in AIF modelling becomes specifying an appropriate generative \nmodel. This includes specifying priors over environmental states, as well as what might \nbe called prior preferences, preference priors or goal priors: immutable prior expectations that \nmake up an agents’ preferences by furnishing a set of predictions over future states or \nobservations; in fulfilling these predictions, free energy is minimised. The space of possible \ngenerative models is vast, and they often have to be handcrafted for a given environment. \nHowever, there are some families of generative models that can be considered “universal” \nin the sense that they can be used for most environments. Currently, the most popular of \nthese is the discrete state-space Partially Observable Markov Decision Process (POMDP)- \nbased generative models. Since they are ubiquitous in the literature, we focus here on \nmaking these types of generative models available to researchers. There are, however, other \ntypes of universal generative models, like generalised filtering models [17] or Hierarchical \nGaussian Filtering-based models [18,19], that will be implemented in the future.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "**Table 2 — Average Balances and Average Yields and Rates (in thousands, except percentages):**", - "page_start": 45, - "page_end": 45, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "**22. Investments in Controlled Entities**", - "page_start": 71, - "page_end": 71, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed7_cc4.pdf", - "query": "What is the definition of POMDP ?", - "target_page": 4, - "target_passage": " The Partially Observable Markov Decision Process is a type of flexible generative model that is widely used in the AIF literature. In discrete time and usually a discrete state space, this model type is parametrised to fit a given task by a set matrices containing probability distributions.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "A library of pre-made canonical POMDP models could be created so that users can eas- \nily implement them directly. Alternatives to the fixed-point iteration method for updating \nposteriors over environmental states could be included, like the marginal message passing \nalgorithm. There are various ways in which the package can be made more computationally \nefficient, and it could be compared with other software implementations. There are plenty \nof utility and plotting functions that could be added to the package to make it easier to \nuse and to facilitate integration with the model-fitting packages it relies on; for example, \nto allow for combining the models with linear regressions to compare parameters values \nof different populations in a single model. More complex types of POMDP models can \nalso be added, like hierarchical and temporally deep POMDPs. Model structure learning \ncould be considered, where different model structures are compared and chosen between \nby evaluating their free energies. Sophisticated inference, where predictions are also made \nabout changes in one’s own beliefs—depending on expected action-dependent observations \nin the future—could also be implemented [58]. Finally, the package could be extended to \nother types of generative models than POMDPs, including other universal models, like \ngeneralised filtering [17] and Hierarchical Gaussian Filter models [41], as well as custom", - "page_start": 28, - "page_end": 28, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "quantities as its target: the variational free energy (VFE) in the case of perception and the \nexpected free energy (EFE) in the case of action. The VFE is the free energy associated with \na given sensory observation and is resolved perceptually by updating beliefs about the \nenvironment. The EFE is the free energy that is expected in the future, contingent on a \ngiven policy or course of action. Choosing action policies associated with a low EFE lead \nto reducing uncertainty about the environment, as well as making preferred observations \nmore likely. \n\n2.1. POMDPs in Active Inference \n\nIn AIF, the POMDP is one of the most common families of generative models used \nto make inferences about the environment. It is a Markovian discrete state-space model, \nwhere employing it means representing the environment and observations as inhabiting \none among a set of possible (possibly multidimensional) states, and that the changes \nin these states can only depend on the system’s previous state and the agent’s actions. \nEnvironmental states are not directly observable, so they have to be inferred based on \nincoming sensory observations. In AIF for POMDPs and other generative models in general, \nboth perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3), as well \nas the learning of parameters of the generative model (see Section 2.4). Crucially, an agent’s \ngenerative model does not a priori have to be isomorphic to the true environment (i.e., \nthe data-generating process), although this will generally lead to a successful inference, \nand that the generative model will therefore often come to resemble the environment \nthrough learning. \n\nA discrete state-space POMDP in AIF is conventionally defined by five main sets of \nparameters:**A**,**B**,**C**,**D**and**E**[1,33], see Figure 1. Together, these parametrise the agent’s \nprior beliefs about the prior probability of different states in the environment, how states \nof the environment change and how they generate observations. Typically, they will be \nvectors, matrices or tensors; however, henceforth we denote them by their corresponding \nletter in bold. These make up the components needed for the agent to perform AIF.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "O \nU \nR \n\nW \nO \nR \nL \nD", - "page_start": 60, - "page_end": 60, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "O \nU \nR \n\nW \nO \nR \nK", - "page_start": 34, - "page_end": 34, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Θ is then described by a Dirichlet distribution parametrised by a set of concentration \nparameters*θ*: \n\np(Θ) = Dir(Θ|*θ*) (19) \n\nThe concentration parameter of a Dirichlet distribution is essentially a non-negative count \nof how many times the given category (be it a type of observation or state transition) has \noccurred. The distribution of concentration parameter counts will determine the shape \nof the estimated categorical probability distribution, while the scale of the concentration \nparameters will determine the certainty per precision of the belief. Updating beliefs about \nΘ (the parameters in the matrices) then corresponds to updating these concentration \nparameters*θ*with the following update equation: \n\n*θ*t+1 =*ω*∗*θ*t +*η*∗*χ*t \n(20) \n\nThe updated value for the concentration parameter (*θ*t+1) is found by adding the previous \nconcentration parameter*θ*t multiplied by a forgetting rate*ω*to the observed data count \n*χ*(either the observation in the case of**A**learning, or the inferred state or state transition \nfor other matrices) multiplied by a learning rate*η*. With this relatively simple update \nequation—which, in essence, amounts to just counting the occurrences of categories—an \nAIF agent can update its beliefs about the various matrices it uses to make inferences about \nenvironmental states. For more details on parameter learning with POMDPs, see [23,33,52]. \n\n**3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to \noperate ActiveInference. This includes functionalities for creating POMDP agents, for sim- \nulating behaviour and for fitting the models to data. In the next section, we demonstrate \nhow to use the package on a concrete worked example. ActiveInference is under continual \ndevelopment, and the newest version of the package, including documentation for how to \nuse it, can be found at github.com/ilabcode/ActiveInference.jl. \n\n3.1. Creating and Using a POMDP \n\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [23], \na Python library for implementing simulations of AIF in discrete state spaces. Those \nalready acquainted with pymdp should find the syntax here familiar. ActiveInference \ncan be installed as normal from the official Julia General Registry using the Julia’s native \npackage manager Pkg: \n(cid:7) (cid:4) \n\n**using**Pkg \nPkg . add ( ActiveInference ) \n(cid:6) (cid:5) \n\n\n \n \n \n \n [html]\n
It can then be loaded into the current project environment :
vsing ActiveInference
\n\n(cid:4) \n\n(cid:5) \n\nCentral to the package is the AIF object. This is a structure containing all the components of \nthe generative model, as well as the dynamic belief states and the various settings needed to \nperform AIF, and is used in conjunction with most of the high-level functions of the package. \nAn AIF object can be created with the init_aif function, which takes as arguments the \ncomponents of the generative model and a dictionary of various settings and parameters:", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "**Figure 1.**Depiction of a POMDP generative model. This encodes the agent’s expectations about how \nthe state s of the environment changes over time t, and how it generates observation o at each time step. \n**A**, also called the observation model, describes how environmental states give rise to observations.**B**, \nalso called the transition model, describes how environmental states change over time, depending on \naction u (called policy*π*when structured into sequences).**C**is the preference prior, which encodes \nthe agent’s preferences for observations. This shapes the expected free energy G associated with each \npolicy, which is used for policy selection.**D**encodes the agent’s prior belief over environmental states \nbefore making any observations, and**E**is the prior over policies that determines the agent’s preferences \nfor policies in the absence of other motivation. \n\n2.2. Perception in Active Inference \n\nIn AIF, perception is conceptualised as the result of variational (i.e., approximate) \nBayesian inference, performed by minimising the VFE to optimise parameters of poste- \nrior beliefs about the environment. In exact Bayesian inference, we use a parametrised \ngenerative model m to make an optimal inference about state s of the environment based \non observation o. This is performed by combining a prior belief over states p(s|m); a like- \nlihood model p(o|s, m); and the model evidence p(o|m), a normalisation term encoding \nthe likelihood of receiving the given observations across all possible environmental states, \nas follows [1]: \n\np(o|s, m)p(s|m) \np(o|m) \np(s|o, m) = (1) \n\nThe posterior distribution over states given observations p(s|o, m) here represent the agent’s \nbeliefs about the environment. Forming beliefs in this way is thought to be the process that \nenables conscious, as well as unconscious, perception. The product of the likelihood model \nand prior is also called the joint likelihood p(o, s|m), which fully defines the generative \nmodel, and which we use henceforth. In the following, for notational simplicity, we also \nomit denoting the dependency on the generative model m. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "E \nR \nA \n\nE \nW \n\nO \nH \nW", - "page_start": 25, - "page_end": 25, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "t \nn \ne \nm \ne \nt \na \nt \nS \ne \nc \nn \na \nn \nr \ne \nv \no \nG \ne \nt \na \nr \no \np \nr \no \nC", - "page_start": 37, - "page_end": 37, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**SHAREHOLDER**I N F O R M A T I O N", - "page_start": 90, - "page_end": 90, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed6_cc4.pdf", - "query": "What is dyspnea ?", - "target_page": 2, - "target_passage": "Dyspnea refers to a subjective sensation of breathing discomfort.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "[html]5. Nishino T. Dyspnoea : underlying mechanisms and treatment. Br J. Anaesth. 2011 ; 106 : 463 – 474.16Jones PW. St George ' s Respiratory Questionnaire : MCID. J Chronic Obstr Pulm Dis 2005 ; 2 : 75 - 79.assessed through inspiratory resistive loading. 1 Bras Pneumol. 2015 ; 41 ( 2 ): 143 - 150.6. Neder J, Berton D, Miller P, et al. Ventilatory inefficiency and exertional dyspnea in early chronic obstructive pulmonary disease. Am Thorac Snc. 2017.141 suppl_1322 - 529.17.Global Initiative for Asthma. Global strategy for asthma management and prevention. Global Initiative for Asthma website. Accessed July 30.2023. https :// ginasthma. org / wp - content / upkoads / 2023 / 07 / GJNA - 2023 - Full - report - 21825Elatrim X, Bornefalk H, Skidid M, et al. Validation of the Swedish Multidimensional Dyspnea Profile ( MDP ) in outpatients with cardiorespiratory disease. BNJ Upen Respor Kes. 2019 / 8 : e00038.7. Groenberger [ 8, Vetri I, Keininger DL, Malker DA, Greater dyspnea is associated with lower bealth - related quality of life umong European patients with COPD. Int J Ornor Obstruct Psomon Dn. 2617.12.937.544,18.Global Initiative for Chronic Obstructive Ling Disease, Gender, Global intrahigh for the Controlled Chronic obstructive pulmonary disease. Global Initiative for Chronic Obstructive Lung Disease website. Accessed July 30, Lung Din26Yorke J, Russell AM, Swigris I, et al. Assessment of dyspnea in asthma : validation of Tbe Dyspnea - 12. J Aribma : 2011 ; 48 ( 6 ): 602 - 608.8. Pretensti M, Whitnore GA, Vandembeen KL, et al. Population - based case - finding to identify subjects with undiagnosed asthma or COPD. Eae Ropir J. 2020 : 55 : 2000024.Table2023. https :// goldcopd. org / wp - content / uploods / 2023 / 03 / GOLD - 2023 - ver - 1.5 - 17Feb2023_WMV gdfTablehyperresponsiveness in subjects with respiratory symptoms and normal spirometry. Eur Respir 1.20123 ; 61 ( 3 ): 2201194.19.Magner KMA, Cherian M, Whitmore GA, et al. Assessment of preserved ratio impaired spirometry ( PRISm ) vsing pre and post bronchodilator spirometry in a randomly - sempled symptomatic cohort, Ass J Rusp Crii Case Med. 20220810 ): 1125 - 11328Gentein E, Bierbrier 1, Whitmore GA, et al. Impact of undiagnosed chronic obstructive pulmonary disease and asthma on symptoms, quality of life, healthcare use, and work productivity. And J Respir Crit Care Mair 2023.200012 ; 1271 - 1282validation of the UCAP - Q case - trnding questionnaire to detect undiagnosed asthma and COPD. Esr Respir J.20.Hanania NA, O ' Donnell DE. Activity - related dyspnea in chronic obstructive29Asron SD, Vandembeen K, Whitmore GA, et al. Early diagnosis and treatment of COPD and asthma : a randomized, controlled trial. N Engl. J Med. 2024.390 ( 22 ): 2061 – 2073.0. Shin B, Cole SL, Park SJ, et al. A new symptom - based questionnaire for predicting the presence of asthma.Tablerelated dyspnea in chronic obstructive pulmonary disease : physical and poychological consequences, unmet needs, and foture directions. Int II Glion Obstruct Pabnor Dis. 2019.14 : 1127 - 113RTableJ Investig Allergol Clin Immunol. 2010 ; 20 : 27 - 34. briva. nto. timbalwas TV : Norbdom B111. Price DB, Tinkelman DG, Nordyke RJ, et al. Scoring system and clinicalReilly Associates. WPAI scoring. Reilly Associates website. Accessed May 1.2024. http :// www. reillyassociates. net / wpai_scoring. htmlTablepersons with symptoms and preserved lung function. N Engl J Med. 2022 ; 387 ( 13 ): 1173 - 1184.application of COPD diagnostic questionnaires. Chest. 2006 ; 129 : 1531 -", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 \n\nTake-home Points \n\nStudy Question: How profoundly are adults with \nundiagnosed respiratory symptoms \naffected by \ndyspnea? \nResults: In community-based adults with undiag- \nnosed respiratory symptoms, those identified with \npreserved ratio impaired spirometry experienced the \ngreatest impact of dyspnea, followed by those with \nundiagnosed asthma or COPD. Greater dyspnea \nimpact was associated with increased health care \nutilization, lower quality of life, and reduced work \nproductivity. \nInterpretation: Dyspnea imposes burdens on the \nhealth care system and is associated with impaired \nquality of life and work productivity. \n\nDyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. \n\nDyspnea not only affects individuals with diagnosed \nrespiratory conditions but also poses a significant \nburden on those with undiagnosed conditions. In a \nsystematic review by Müller et al,4 the combined \n\nStudy Design and Methods \nRecruitment of Undiagnosed Cases and Healthy \nControl Patients \nBetween June 2017 and January 2023, adults aged $ 18 \nyears were recruited through a two-step process into the \nUndiagnosed COPD and Asthma Population (UCAP) \nstudy, a multicenter case finding study. Approval for \n\nthe study was obtained from the research ethics boards \nof \nthe 17 participating study sites across Canada. \nInformed, written consent was provided by all study \nparticipants. \n\nBoth landlines and cellphones within a 90-minute radius \nof any of the 17 study sites were dialed randomly. A", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "TABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36) \n\n\n \n \n \n \n [html]MeasureUnadjustedAdjusted\n
Dyspnea Coefficient ( 95 % CI )P ValueDyspnea Coefficient ( 95 % CI )P Value
Physical functioning− 0.693 (− 0.718 to − 0.668 )<. 001− 0.655 (− 0.680 to − 0.630 )<. 001
Physical health limitations− 0.634 (− 0.666 to − 0.603 )<. 001− 0.628 (− 0.661 to − 0.595 )<. 001
Emotional problems− 0.403 (− 0.438 to − 0.369 )<. 001− 0.407 (− 0.443 to − 0.370 )<. 001
Energy / fatigue− 0.454 (− 0.479 to − 0.428 )<. 001− 0.452 (− 0.479 to − 0.425 )<. 001
Emotional well - being− 0.230 (− 0.256 to − 0.204 )<. 001− 0.239 (− 0.266 to − 0.213 )<. 001
Social functioning− 0.433 (− 0.466 to − 0.399 )<. 001− 0.434 (− 0.469 to − 0.399 )<. 001
Pain− 0.410 (− 0.444 to − 0.377 )<. 001− 0.387 (− 0.423 to − 0.352 )<. 001
General health− 0.390 (− 0.416 to − 0.364 )<. 001− 0.382 (− 0.409 to − 0.355 )<. 001
Total score− 0.485 (− 0.504 to − 0.467 )<. 001− 0.473 (− 0.493 to − 0.454 )<. 001
", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "\n \n \n \n \n [html]MeasureUnadjustedAdjusted\n
Dyspnea OR ( 95 % CI )P ValueDyspnea OR ( 95 % CI )P Value
In the past 12 mo, did you visit your general practitioner or a nurse practitioner or another physician at a walk - in clinic for any breathing problems?1.011 ( 1.007 - 1.014 )<. 0011.011 ( 1.007 - 1.014 )<. 001
In the past 12 mo, did you visit an emergency department for any breathing problems?1.015 ( 1.009 - 1.021 )<. 0011.015 ( 1.009 – 1.022 )<. 001
In the past 12 mo, were you hospitalized for any breathing problems or respiratory illness?1.021 ( 1.006 - 1.037 ). 0061.023 ( 1.007 - 1.039 ). 005
\n\noutpatients with cardiorespiratory disease25 and the \nDyspnea-12 in patients with asthma26 and found that \nthe affective aspect of dyspnea can significantly influence \nthe impact of dyspnea on health status, irrespective of \nthe intensity of breathlessness. \n\nand validated respiratory health questionnaires, and \nour dyspnea assessment measure is a weighted average \nof responses to these validated questions. \nConsequently, the measure has an immediate \ninterpretation in terms of the lived day-to-day \nexperience of individuals. \n\nIn those with PRISm, there was a strong, positive \nassociation between higher values for the FEV1/FVC \nratio and dyspnea. For the PRISm group, a higher \nFEV1/FVC ratio may reflect diminished lung \ncompliance due to interstitial lung disease and/or \nrespiratory system restriction due to obesity, which \ncould contribute to worse dyspnea. Conversely, the \nassociation of dyspnea with the FEV1/FVC ratio was in \nthe opposite direction for those with asthma or COPD, \nand a lower FEV1/FVC ratio correlated with worse \ndyspnea, as expected. \n\nOur study has limitations. We did not undertake \nreliability/reproducibility testing of our questionnaire. \nThe dyspnea impact assessment score was statistically \nassociated with increased health care utilization, lower \nquality of life, and reduced work productivity; therefore, \nby virtue of this analysis, our questionnaire has \nconstruct validity. However, further attempts at external \nvalidation of the questionnaire using an independent \ndata set would be important. Health care utilization \nduring the preceding 12 months was assessed on entry \ninto the study, and there is potential for impaired recall \nof events. Our study may have missed asthma in some \nparticipants because bronchial challenge testing was not \nconducted on those who tested negative for airflow \nobstruction or BD responsiveness. A previous study \nshowed that an additional diagnostic step incorporating Our study complements the literature by focusing on \nadults with undiagnosed respiratory symptoms who \nwere randomly selected and recruited through active \ncase finding in the community. This increases the \ngeneralizability of our results to a broader population. \nOur dyspnea questions were derived from widely used \n\nTABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI)", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Impact of Dyspnea on Adults With \nRespiratory Symptoms Without a Defined \nDiagnosis \n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD; \n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD; \n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD; \n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD; \n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD \n\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health \ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory \nsymptoms. \n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory \nsymptoms? \n\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were \nexperiencing respiratory symptoms. These individuals had not been previously diagnosed \nwith any lung conditions and were recruited from 17 Canadian centers using random digit \ndialing. Each participant underwent spirometry testing both before and after using a bron- \nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved \nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age- \nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A \ndyspnea impact assessment score from 0 to 100 was produced using questions from the \nCOPD Assessment Test and St. George’s Respiratory questionnaire. \nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, \n63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; \n95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All \ngroups reported significantly more impactful dyspnea than the control group (mean score, \n13.8; 95% CI, 11.8-15.7). Patient-specific risk factors including age, sex, BMI, smoking, and \ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the \nvariation was explained by disease classification and another 1.7% by the severity of lung \nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater \ndyspnea impact was associated with increased health care utilization, lower quality of life, and \nreduced work productivity. \nINTERPRETATION: Our findings showed that in community-based adults with undiagnosed \nrespiratory symptoms, those identified with PRISm experienced the greatest impact of dys- \npnea. Dyspnea imposes burdens on the health care system and is associated with impaired \nquality of life and work productivity. \nCHEST 2024; 166(6):1296-1308", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "\n \n \n \n \n [html]Pairwise Comparison\n
Mean Dyspnea Score ( 95 % CI )Mean Difference ( 95 % CI )P ValueControl
13.8 ( 11.8 - 15.7 )− 38.0 (− 41.1 to − 34.9 )<. 001Normal spirometry
51.8 ( 50.7 - 52.8 )Control
13.8 ( 11.8 - 15.7 )− 43.7 (− 47.6 to − 39.8 )<. 001COPD
57.5 ( 55.1 - 59.9 )Control
13.8 ( 11.8 - 15.7 )− 42.8 (− 46.9 to − 38.7 )<. 001Asthma
56.6 ( 53.9 - 59.3 )Control
13.8 ( 11.8 - 15.7 )− 49.2 (− 53.7 to − 44.6 )<. 001PRISm
63.0 ( 59.5 - 66.4 )Normal spirometry
51.8 ( 50.7 - 52.8 )5.7 ( 3.0 to 8.4 )<. 001COPD
57.5 ( 55.1 - 59.9 )Normal spirometry
51.8 ( 50.7 - 52.8 )4.8 ( 1.8, 7.8 ). 002Asthma
56.6 ( 53.9 - 59.3 )Normal spirometry
51.8 ( 50.7 - 52.8 )11.2 ( 7.5 to 14.8 )<. 001PRISm
63.0 ( 59.5 - 66.4 )PRISm
63.0 ( 59.5 - 66.4 )5.5 ( 1.1 to 9.8 ). 014COPD
57.5 ( 55.1 - 59.9 )PRISm
63.0 ( 59.5 - 66.4 )6.4 ( 1.9 to 10.9 ). 005Asthma
56.6 ( 53.9 - 59.3 )Asthma
56.6 ( 53.9 - 59.3 )0.9 (− 2.8 to 4.7 ). 63COPD
57.5 ( 55.1 - 59.9 )
\n\nclassification accounted for 12% of the total variability \nof dyspnea. \n\nexposure in an array of risky occupations. These risk \nfactors, taken as a whole, accounted for 21% of the \nvariability in dyspnea. \n\nTable 6 presents the contribution of lung function \nmeasures of physiologic impairment after accounting for \npatient-related risk factors and disease classification. For \nthe PRISm disease group, a higher post-BD FEV1/FVC \nratio and a lower post-BD FEV1 % predicted value were \nassociated with greater dyspnea impact. For the COPD \ndisease group, a lower post-BD FEV1/FVC ratio was \nassociated with greater dyspnea impact. Reversibility of \nFEV1 was associated with higher dyspnea impact only in \npatients with asthma or COPD. Lung function measures \nof disease severity accounted for 2% of the variability in \ndyspnea. \n\nAfter adjustment for patient-specific risk factors in the \nfirst stage analysis, we adjusted for spirometry-defined \ndisease (PRISm, asthma, COPD, or normal \nspirometry) in Table 5. Adjustment for disease \n\nt \nn \ne \nm \ns \ns \ne \ns \ns \na \na \ne \nn \np \ns \ny \nD \n\nAfter adjusting for age, sex, and BMI, dyspnea was \nnegatively associated with all domains of quality of life, \nincluding physical functioning (coefficient, (cid:3)0.655; \nP < .001), role limitations due to physical health \n(coefficient, (cid:3)0.628; P < .001), general health \n(coefficient, (cid:3)0.382; P < .001), and total score \n(coefficient, (cid:3)0.473; P < .001) (Table 7). \n\n100 \n\n80 \n\n60 \n\n40 \n\n20 \n\n0 \n\nNormal \nspirometry \nAsthma COPD PRISm \n\nHealthy \ncontrol \nparticipants", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Individuals with undiagnosed respiratory symptoms, \ndetermined to have asthma or COPD through \nspirometry, experience poor health status.28 Therefore, \nthe implementation of known treatment approaches for \nasthma or COPD is important to improve their \nconditions.29 In contrast, those with normal spirometry \nor PRISm face unclear treatment approaches. Long- \nacting BD therapy in symptomatic individuals with \ntobacco exposure with normal spirometry is not \neffective.30 Weight management programs may be useful \nfor individuals who are obese with PRISm-related \ndyspnea; however, this awaits definitive clinical trials.31 In conclusion, our study measured dyspnea impact in \nindividuals with no preexisting diagnosis of lung disease \nwho reported respiratory symptoms as part of a \npurposeful case finding strategy. Individuals with PRISm \nexhibited the greatest impact of dyspnea, even higher \nthan those newly diagnosed with asthma or COPD. \nAfter adjusting for patient factors, comorbidities, \npulmonary diseases, and severity of lung physiologic \nimpairment, most of the variability in dyspnea remained \nunexplained. We also showed that dyspnea was \nassociated with increased health care utilization, \nimpaired quality of life, and work productivity. \n\nDyspnea was severe and prevalent within our study \ngroup; however, it remained undiagnosed. A study \nconducted by Stefan et al32 revealed that physicians \nunderestimated their patients’ dyspnea 37.9% of the \ntime, whereas nurses underestimated it 3.5% of the time. \nMoreover, many patients limit their physical activities, \nwhich lead them to downplay the extent of their \ndyspnea.19 Patient underreporting of symptoms, coupled \n\nFunding/Support \nThis study is supported by the Canadian Institutes of \nHealth Research [FDN Grant 154322]. \n\nFinancial/Nonfinancial Disclosures \nNone declared.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "table, th, td {\n border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]TABLE 2 | Mean Responses to Individual Dyspnea Questions2.93 ( 1.18 )37", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "\n \n \n \n
Questions About Dyspnea From CAT and SGRQControl Group ( n = 231 )Normal Spirometry Group ( n = 2.090 )Asthma Group ( n = 265 )COPD Group ( n = 330 )
PRISm Group ( n = 172 )Q1 ( weight = 0.514 )When I wak up a hill or one flight of stairs, I am breathless. The scale for this question ranges from 0 ( when I walk up a hill or 1. flight of stairs, I am not breathless ) to 5 ( when I wak up a hill or one fight of itam, I am very breathless ).0.90 ( 1.04 )2.85 ( 1.46 )3.03 ( 1.37 )3.21 ( 1.30 )
3.56 ( 1.37 )Q2 ( weight – 0.436 )Over the past 3 mo, I have had shortness of breath... The scale for this question ranges from 0 ( over the past 3 mo, I have had shortness of breath... not at all ) to 4 ( over the past 3 mo,. I have had shortness of breath... most days a week ).0.45 ( 0.89 )2.50 ( 1.30 )2.71 ( 1.18 )2.83 ( 1.21 )
Q3 : I feel breathless these daysSitting or lying still, %3162314
19Getting washed or dressed, %2172120
28Walking around at home, %2202123
27Walking outside on the level, %4364238
49Climbing up a flight of stairs, %20758183
87Climbing hills, %35838990
89Playing sports or games, %34788381
82Q3 ( total ) ( weight = 0.648 )The scale for this question ranges from 0 to 7, based on the number of positive answers for the 7 items.1.00 ( 1.25 )3.23 ( 1.72 )3.55 ( 1.63 )3.45 ( 1.61 )
3.76 ( 1.75 )Q4 ( weight – 0.091 )I am breathless when I talk, %2354337
39Q5 ( weight = 0.095 )I am breathless when I bend over, %5374537
56Q6 ( weight – 0.060 )I get afraid or panic when I cannot get my breath, %4303331
Because of my breathing...Q7 ( weight = 0.037 )I take a long time to get washed or dressed, %18910
17Q8 ( weight – 0.023 )I cannot take a bath or shower, or I take a long time, %0577
8Q9 ( weight = 0.116 )I walk slower than other people, or I have to stop for rests, %5404656
66Q10 ( weight – 0.113 )Jobs such as housework take a long time, or I have to stop for rests, %3384048
59Q11 ( weight = 0.124 )If I climb up one flight of stairs, I have to go slowly or stop, %5474457
67Q12 ( weight = 0.127 )If I hurry or walk fast, I have to stop or slow down10596270
\n [html]\n
Disease GroupReversibility of FEV1, %Post - BO FEV1 / FVC RatioPost - BD FEV1 % predictedOverall P Value
Control− 0.163 ( P =. 47 )− 0.274 ( P =. 05 )− 0.090 ( P =. 17 ). 096
Normal spirometry0.186 ( P =. 16 )0.240 ( P =. 005 )− 0.131 ( P <. 001 )<. 001
Asthma0.545 ( P =. 01 )0.107 ( P =. 58 )− 0.158 ( P =. 08 ). 009
COPD0.392 ( P =. 002 )− 0.307 ( P =. 05 )− 0.075 ( P =. 37 )<. 001
PRISm− 0.290 ( P =. 39 )0.854 ( p =. 002 )− 0.650 ( P =. 004 )<. 001
\n\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-specific factors and spirometry \ndisease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical significance. BD ¼ bronchodilator; PRISm ¼ preserved ratio \nimpaired spirometry. \n\n(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. \n\nThere were significant but modest differences in mean \ndyspnea levels across the 17 study sites (data not \nshown), which are not explained by the risk factors we \naccounted for in our study. This finding is not surprising \nbecause some of the potential contributing factors \npreviously mentioned and other site-specific factors \nThe affective dimension of dyspnea can be captured \nusing additional questionnaires (eg, Multidimensional \nDyspnea Profile, Dyspnea-12). Studies have explored the \nuse of the Multidimensional Dyspnea Profile in \n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Although neither the CAT nor the SGRQ are dyspnea- \nspecific tools, both are recommended by the Global Initia- \ntive for Chronic Obstructive Lung Disease to evaluate \nsymptoms, including dyspnea,20 and both yield a richer \nassessment of dyspnea than the modified Medical \nResearch Council breathlessness scale.20 Fifteen questions \nwere taken from the CAT and SGRQ questionnaires that \nreferred to individuals’ experiences with dyspnea, and a \ncomposite measure of dyspnea impact using a weighted \nsum of the responses to the 15 questions was constructed. \nQuestions were coded so that larger values indicate more \nimpactful dyspnea. Weights used for question responses \nin calculating the dyspnea impact assessment measure \nwere those of the first component of a principal compo- \nnent analysis (PCA) based on the covariance matrix of \nquestion responses. Questions with multiple responses \nand ordinal structure are individually more informative \nand thus were accorded higher weight than individual \ntrue-false questions. No additional PCA component was \nanticipated a priori to be material for our investigation, \nand an eigenvalue analysis of the PCA was conducted to \nverify this assumption. \n\nAll participants filled out the COPD Assessment Test \n(CAT) questionnaire. Elevated CAT scores indicate a \ngreater burden of respiratory symptoms impacting \ndaily activities and health status.13 The St. George’s \nRespiratory Questionnaire (SGRQ)14-16 was used to \nassess respiratory disease-related quality of life. Higher \nSGRQ scores indicate poorer health status. Both the \nCAT and SGRQ questionnaires were completed prior The composite dyspnea impact measure was scaled so its \nminimum value was 0 if the response to each of the 15 \nquestions was 0, and the maximum value was scaled to \n100 if the individual responses for all 15 questions rep- \nresented the most severe dyspnea response.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed6_cc4.pdf", - "query": "What are the criterion to be control patient in the dyspnea study ?", - "target_page": 3, - "target_passage": "Control patients reported no respiratory symptoms in the preceding 6 months and obtained a score of 0 on the ASQ.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]Pairwise Comparison\n
Mean Dyspnea Score ( 95 % CI )Mean Difference ( 95 % CI )P ValueControl
13.8 ( 11.8 - 15.7 )− 38.0 (− 41.1 to − 34.9 )<. 001Normal spirometry
51.8 ( 50.7 - 52.8 )Control
13.8 ( 11.8 - 15.7 )− 43.7 (− 47.6 to − 39.8 )<. 001COPD
57.5 ( 55.1 - 59.9 )Control
13.8 ( 11.8 - 15.7 )− 42.8 (− 46.9 to − 38.7 )<. 001Asthma
56.6 ( 53.9 - 59.3 )Control
13.8 ( 11.8 - 15.7 )− 49.2 (− 53.7 to − 44.6 )<. 001PRISm
63.0 ( 59.5 - 66.4 )Normal spirometry
51.8 ( 50.7 - 52.8 )5.7 ( 3.0 to 8.4 )<. 001COPD
57.5 ( 55.1 - 59.9 )Normal spirometry
51.8 ( 50.7 - 52.8 )4.8 ( 1.8, 7.8 ). 002Asthma
56.6 ( 53.9 - 59.3 )Normal spirometry
51.8 ( 50.7 - 52.8 )11.2 ( 7.5 to 14.8 )<. 001PRISm
63.0 ( 59.5 - 66.4 )PRISm
63.0 ( 59.5 - 66.4 )5.5 ( 1.1 to 9.8 ). 014COPD
57.5 ( 55.1 - 59.9 )PRISm
63.0 ( 59.5 - 66.4 )6.4 ( 1.9 to 10.9 ). 005Asthma
56.6 ( 53.9 - 59.3 )Asthma
56.6 ( 53.9 - 59.3 )0.9 (− 2.8 to 4.7 ). 63COPD
57.5 ( 55.1 - 59.9 )
\n\nclassification accounted for 12% of the total variability \nof dyspnea. \n\nexposure in an array of risky occupations. These risk \nfactors, taken as a whole, accounted for 21% of the \nvariability in dyspnea. \n\nTable 6 presents the contribution of lung function \nmeasures of physiologic impairment after accounting for \npatient-related risk factors and disease classification. For \nthe PRISm disease group, a higher post-BD FEV1/FVC \nratio and a lower post-BD FEV1 % predicted value were \nassociated with greater dyspnea impact. For the COPD \ndisease group, a lower post-BD FEV1/FVC ratio was \nassociated with greater dyspnea impact. Reversibility of \nFEV1 was associated with higher dyspnea impact only in \npatients with asthma or COPD. Lung function measures \nof disease severity accounted for 2% of the variability in \ndyspnea. \n\nAfter adjustment for patient-specific risk factors in the \nfirst stage analysis, we adjusted for spirometry-defined \ndisease (PRISm, asthma, COPD, or normal \nspirometry) in Table 5. Adjustment for disease \n\nt \nn \ne \nm \ns \ns \ne \ns \ns \na \na \ne \nn \np \ns \ny \nD \n\nAfter adjusting for age, sex, and BMI, dyspnea was \nnegatively associated with all domains of quality of life, \nincluding physical functioning (coefficient, (cid:3)0.655; \nP < .001), role limitations due to physical health \n(coefficient, (cid:3)0.628; P < .001), general health \n(coefficient, (cid:3)0.382; P < .001), and total score \n(coefficient, (cid:3)0.473; P < .001) (Table 7). \n\n100 \n\n80 \n\n60 \n\n40 \n\n20 \n\n0 \n\nNormal \nspirometry \nAsthma COPD PRISm \n\nHealthy \ncontrol \nparticipants", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Risk Factors Associated With Dyspnea \nPatient-related risk factors were considered first, and re- \nsults of spirometry considered afterward. The spirom- \netry risk factors chosen for the second stage analysis \nincluded the spirometry-based diagnosis of the patient \n(asthma, COPD, PRISm, or normal) and lung function \nresults indicative of the severity of physiologic impair- \nment. Severity was gauged by assessing three principal \nlung function measures: (1) post-BD FEV1 % predicted, \n(2) post-BD FEV1/FVC ratio, and (3) percentage \nreversal of FEV1 with BD. \n\nindicate greater impairment in work productivity and \ndaily activities. \n\nStatistical Analysis \n\nBox plots were used to compare distribution patterns of \ndyspnea impact assessments among the disease groups. \nPairwise comparison tests were conducted to evaluate \nmean dyspnea differences between groups. Multiple \nlinear regression analysis was used to measure contribu- \ntions to variability of dyspnea by selected patient-specific \nrisk factors, spirometry disease classification, and key \nlung function measures. The selected sets of risk factors \nwere evaluated using successive regression analyses. \nAnalysis of variance sums of squares from the successive \nregression analyses provided the cumulative percentage \ncontributions to variability of dyspnea. Simple, multiple, \nand logistic regression analyses were used to study asso- \nciations between dyspnea and health care utilization, \nquality of life, and work productivity outcomes. All sta- \ntistical analyses were done using STATA 16 statistical \nsoftware (StataCorp). \n\nDyspnea Impact and Health Care Use, Quality of \nLife, and Work Productivity \n\nThe impact of dyspnea and its associations with health \ncare use, quality of life, and work productivity were exam- \nined. Health care utilization was assessed through self- \nreported data. Quality of life was assessed using the 36- \nItem Short Form Health Survey questionnaire, where \nhigher scores indicate better health status. Work produc- \ntivity was assessed using the Work Productivity and Activ- \nscores \nity Impairment questionnaire, where higher \n\nResults \nFigure 1 illustrates the results of the case finding \napproach, including the enrollment of the control group. \nAmong 5,631 potentially eligible participants, 1,359 participants (24%) did not meet the threshold of $ 6 \npoints on the ASQ or $ 20 points on the COPD- \nDiagnostic Questionnaire and were thus excluded, \nleaving 4,272 individuals deemed eligible for spirometry. \n\n21,274 excluded \n8,273 Previous diagnosis of asthma \n5,363 Previous diagnosis of COPD \n190 Age < 18 years \n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary \nfibrosis, or lung cancer \n1,331 History of MI, heart problems, stroke, aortic or cerebral \naneurysm, eye surgery, or detached retina in past 3 mos. \n19 Pregnant, in the third trimester \n3,715 Under care of respirologist or using an inhaled respiratory \n\n2,090 (73.2%) had normal \nspirometry \n172 (6.0%) had PRISM \n\nFigure 1 – Study flow diagram demonstrating the case finding and control group recruitment and allocation. ASQ ¼ Asthma Screening Questionnaire; \nCOPD-DQ¼ COPD Diagnostic Questionnaire; CF ¼ cystic fibrosis; MI ¼ myocardial infarction; PRISM ¼ preserved ratio impaired spirometry.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "[html]5. Nishino T. Dyspnoea : underlying mechanisms and treatment. Br J. Anaesth. 2011 ; 106 : 463 – 474.16Jones PW. St George ' s Respiratory Questionnaire : MCID. J Chronic Obstr Pulm Dis 2005 ; 2 : 75 - 79.assessed through inspiratory resistive loading. 1 Bras Pneumol. 2015 ; 41 ( 2 ): 143 - 150.6. Neder J, Berton D, Miller P, et al. Ventilatory inefficiency and exertional dyspnea in early chronic obstructive pulmonary disease. Am Thorac Snc. 2017.141 suppl_1322 - 529.17.Global Initiative for Asthma. Global strategy for asthma management and prevention. Global Initiative for Asthma website. Accessed July 30.2023. https :// ginasthma. org / wp - content / upkoads / 2023 / 07 / GJNA - 2023 - Full - report - 21825Elatrim X, Bornefalk H, Skidid M, et al. Validation of the Swedish Multidimensional Dyspnea Profile ( MDP ) in outpatients with cardiorespiratory disease. BNJ Upen Respor Kes. 2019 / 8 : e00038.7. Groenberger [ 8, Vetri I, Keininger DL, Malker DA, Greater dyspnea is associated with lower bealth - related quality of life umong European patients with COPD. Int J Ornor Obstruct Psomon Dn. 2617.12.937.544,18.Global Initiative for Chronic Obstructive Ling Disease, Gender, Global intrahigh for the Controlled Chronic obstructive pulmonary disease. Global Initiative for Chronic Obstructive Lung Disease website. Accessed July 30, Lung Din26Yorke J, Russell AM, Swigris I, et al. Assessment of dyspnea in asthma : validation of Tbe Dyspnea - 12. J Aribma : 2011 ; 48 ( 6 ): 602 - 608.8. Pretensti M, Whitnore GA, Vandembeen KL, et al. Population - based case - finding to identify subjects with undiagnosed asthma or COPD. Eae Ropir J. 2020 : 55 : 2000024.Table2023. https :// goldcopd. org / wp - content / uploods / 2023 / 03 / GOLD - 2023 - ver - 1.5 - 17Feb2023_WMV gdfTablehyperresponsiveness in subjects with respiratory symptoms and normal spirometry. Eur Respir 1.20123 ; 61 ( 3 ): 2201194.19.Magner KMA, Cherian M, Whitmore GA, et al. Assessment of preserved ratio impaired spirometry ( PRISm ) vsing pre and post bronchodilator spirometry in a randomly - sempled symptomatic cohort, Ass J Rusp Crii Case Med. 20220810 ): 1125 - 11328Gentein E, Bierbrier 1, Whitmore GA, et al. Impact of undiagnosed chronic obstructive pulmonary disease and asthma on symptoms, quality of life, healthcare use, and work productivity. And J Respir Crit Care Mair 2023.200012 ; 1271 - 1282validation of the UCAP - Q case - trnding questionnaire to detect undiagnosed asthma and COPD. Esr Respir J.20.Hanania NA, O ' Donnell DE. Activity - related dyspnea in chronic obstructive29Asron SD, Vandembeen K, Whitmore GA, et al. Early diagnosis and treatment of COPD and asthma : a randomized, controlled trial. N Engl. J Med. 2024.390 ( 22 ): 2061 – 2073.0. Shin B, Cole SL, Park SJ, et al. A new symptom - based questionnaire for predicting the presence of asthma.Tablerelated dyspnea in chronic obstructive pulmonary disease : physical and poychological consequences, unmet needs, and foture directions. Int II Glion Obstruct Pabnor Dis. 2019.14 : 1127 - 113RTableJ Investig Allergol Clin Immunol. 2010 ; 20 : 27 - 34. briva. nto. timbalwas TV : Norbdom B111. Price DB, Tinkelman DG, Nordyke RJ, et al. Scoring system and clinicalReilly Associates. WPAI scoring. Reilly Associates website. Accessed May 1.2024. http :// www. reillyassociates. net / wpai_scoring. htmlTablepersons with symptoms and preserved lung function. N Engl J Med. 2022 ; 387 ( 13 ): 1173 - 1184.application of COPD diagnostic questionnaires. Chest. 2006 ; 129 : 1531 -", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "\n \n \n \n \n [html]MeasureUnadjustedAdjusted\n
Dyspnea OR ( 95 % CI )P ValueDyspnea OR ( 95 % CI )P Value
In the past 12 mo, did you visit your general practitioner or a nurse practitioner or another physician at a walk - in clinic for any breathing problems?1.011 ( 1.007 - 1.014 )<. 0011.011 ( 1.007 - 1.014 )<. 001
In the past 12 mo, did you visit an emergency department for any breathing problems?1.015 ( 1.009 - 1.021 )<. 0011.015 ( 1.009 – 1.022 )<. 001
In the past 12 mo, were you hospitalized for any breathing problems or respiratory illness?1.021 ( 1.006 - 1.037 ). 0061.023 ( 1.007 - 1.039 ). 005
\n\noutpatients with cardiorespiratory disease25 and the \nDyspnea-12 in patients with asthma26 and found that \nthe affective aspect of dyspnea can significantly influence \nthe impact of dyspnea on health status, irrespective of \nthe intensity of breathlessness. \n\nand validated respiratory health questionnaires, and \nour dyspnea assessment measure is a weighted average \nof responses to these validated questions. \nConsequently, the measure has an immediate \ninterpretation in terms of the lived day-to-day \nexperience of individuals. \n\nIn those with PRISm, there was a strong, positive \nassociation between higher values for the FEV1/FVC \nratio and dyspnea. For the PRISm group, a higher \nFEV1/FVC ratio may reflect diminished lung \ncompliance due to interstitial lung disease and/or \nrespiratory system restriction due to obesity, which \ncould contribute to worse dyspnea. Conversely, the \nassociation of dyspnea with the FEV1/FVC ratio was in \nthe opposite direction for those with asthma or COPD, \nand a lower FEV1/FVC ratio correlated with worse \ndyspnea, as expected. \n\nOur study has limitations. We did not undertake \nreliability/reproducibility testing of our questionnaire. \nThe dyspnea impact assessment score was statistically \nassociated with increased health care utilization, lower \nquality of life, and reduced work productivity; therefore, \nby virtue of this analysis, our questionnaire has \nconstruct validity. However, further attempts at external \nvalidation of the questionnaire using an independent \ndata set would be important. Health care utilization \nduring the preceding 12 months was assessed on entry \ninto the study, and there is potential for impaired recall \nof events. Our study may have missed asthma in some \nparticipants because bronchial challenge testing was not \nconducted on those who tested negative for airflow \nobstruction or BD responsiveness. A previous study \nshowed that an additional diagnostic step incorporating Our study complements the literature by focusing on \nadults with undiagnosed respiratory symptoms who \nwere randomly selected and recruited through active \ncase finding in the community. This increases the \ngeneralizability of our results to a broader population. \nOur dyspnea questions were derived from widely used \n\nTABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI)", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "to spirometry to avoid influencing patients’ perceptions \nof their dyspnea. \n\nprerecorded message then inquired whether any house- \nhold member was $ 18 years of age and had experi- \nenced respiratory symptoms (eg, shortness of breath, \nwheezing, \nsputum, prolonged \ncough) within the past 6 months. Households with affir- \nmative responses were subsequently contacted by the \nlocal study coordinator for a follow-up call. The house- \nhold member \nreporting respiratory symptoms was \nverbally consented and screened for eligibility to partic- \nipate in the study over the telephone.8,9 \n\nincreased mucus or \n\nExclusion criteria included the following: (1) a history of \ndiagnosis of lung or airway disease, (2) use of respiratory \ninhalers aside from as-needed salbutamol, (3) contrain- \ndications for spirometry (eg, occurrences of myocardial \ninfarction, stroke, aortic or cerebral aneurysm, eye sur- \ngery, detached retina within the last 3 months), (4) \ninability or refusal to provide informed consent, (5) be- \ning in the third trimester of pregnancy, and (6) being < \n18 years of age. \n\nClassification of Undiagnosed Cases \nCertified study personnel administered spirometry tests \nbefore and after BD use. Participants showing an in- \ncrease of at least 12% and 200 mL in their FEV1 after \nreceiving 400 mg of salbutamol were classified as having \nspirometry indicative of asthma.17 Those whose post-BD \nratio of FEV1/FVC fell below the lower 95% confidence \nlimit (ie, FEV1/FVC < lower limit of normal) were clas- \nsified as having spirometry indicative of COPD.18 Partic- \nipants meeting the criteria for both conditions were \nlabeled as having COPD. Those with a post-BD \n< 80% of the predicted normal and a post-BD \nFEV1 \nFEV1/FVC ratio > 0.70 were classified as having \nspirometry indicative of preserved ratio impaired \nspirometry (PRISm). PRISm was defined based on \npost-BD spirometry values for a more specific classifica- \ntion.19 Participants not meeting criteria for asthma, \nCOPD, or PRISm were labeled as having normal \nspirometry. \n\nEach participant completed the Asthma Screening Ques- \ntionnaire (ASQ)10 via telephone. Individuals aged $ 60 \nyears, and those aged < 60 years who scored < 6 points \non the ASQ, also completed the COPD-Diagnostic \nQuestionnaire.11,12 Participants scoring $ 6 points on \nthe ASQ or $ 20 points on the COPD-Diagnostic Ques- \ntionnaire were invited to the study site for pre- and post- \nbronchodilator (BD) spirometry. \n\nAssessment of the Impact of Participants’ Dyspnea \n\nA control group without respiratory symptoms was \nselected randomly using identical random digit dialing \nreported no respiratory \nmethods. Control patients \nsymptoms in the preceding 6 months and obtained a \nscore of 0 on the ASQ. Participants were recruited as \ncontrol patients if they could be matched with an indi- \nvidual from the undiagnosed group based on age ((cid:2) 5 \nyears) and sex. This matching process aimed to have \nsimilar demographic profiles between the control group \nand the newly found cases. This matching was imple- \nmented solely to ensure demographic comparability \nacross the study groups and not for pairing patients \nfor statistical analysis purposes.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 \n\nTake-home Points \n\nStudy Question: How profoundly are adults with \nundiagnosed respiratory symptoms \naffected by \ndyspnea? \nResults: In community-based adults with undiag- \nnosed respiratory symptoms, those identified with \npreserved ratio impaired spirometry experienced the \ngreatest impact of dyspnea, followed by those with \nundiagnosed asthma or COPD. Greater dyspnea \nimpact was associated with increased health care \nutilization, lower quality of life, and reduced work \nproductivity. \nInterpretation: Dyspnea imposes burdens on the \nhealth care system and is associated with impaired \nquality of life and work productivity. \n\nDyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. \n\nDyspnea not only affects individuals with diagnosed \nrespiratory conditions but also poses a significant \nburden on those with undiagnosed conditions. In a \nsystematic review by Müller et al,4 the combined \n\nStudy Design and Methods \nRecruitment of Undiagnosed Cases and Healthy \nControl Patients \nBetween June 2017 and January 2023, adults aged $ 18 \nyears were recruited through a two-step process into the \nUndiagnosed COPD and Asthma Population (UCAP) \nstudy, a multicenter case finding study. Approval for \n\nthe study was obtained from the research ethics boards \nof \nthe 17 participating study sites across Canada. \nInformed, written consent was provided by all study \nparticipants. \n\nBoth landlines and cellphones within a 90-minute radius \nof any of the 17 study sites were dialed randomly. A", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Individuals with undiagnosed respiratory symptoms, \ndetermined to have asthma or COPD through \nspirometry, experience poor health status.28 Therefore, \nthe implementation of known treatment approaches for \nasthma or COPD is important to improve their \nconditions.29 In contrast, those with normal spirometry \nor PRISm face unclear treatment approaches. Long- \nacting BD therapy in symptomatic individuals with \ntobacco exposure with normal spirometry is not \neffective.30 Weight management programs may be useful \nfor individuals who are obese with PRISm-related \ndyspnea; however, this awaits definitive clinical trials.31 In conclusion, our study measured dyspnea impact in \nindividuals with no preexisting diagnosis of lung disease \nwho reported respiratory symptoms as part of a \npurposeful case finding strategy. Individuals with PRISm \nexhibited the greatest impact of dyspnea, even higher \nthan those newly diagnosed with asthma or COPD. \nAfter adjusting for patient factors, comorbidities, \npulmonary diseases, and severity of lung physiologic \nimpairment, most of the variability in dyspnea remained \nunexplained. We also showed that dyspnea was \nassociated with increased health care utilization, \nimpaired quality of life, and work productivity. \n\nDyspnea was severe and prevalent within our study \ngroup; however, it remained undiagnosed. A study \nconducted by Stefan et al32 revealed that physicians \nunderestimated their patients’ dyspnea 37.9% of the \ntime, whereas nurses underestimated it 3.5% of the time. \nMoreover, many patients limit their physical activities, \nwhich lead them to downplay the extent of their \ndyspnea.19 Patient underreporting of symptoms, coupled \n\nFunding/Support \nThis study is supported by the Canadian Institutes of \nHealth Research [FDN Grant 154322]. \n\nFinancial/Nonfinancial Disclosures \nNone declared.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Disease GroupReversibility of FEV1, %Post - BO FEV1 / FVC RatioPost - BD FEV1 % predictedOverall P Value
Control− 0.163 ( P =. 47 )− 0.274 ( P =. 05 )− 0.090 ( P =. 17 ). 096
Normal spirometry0.186 ( P =. 16 )0.240 ( P =. 005 )− 0.131 ( P <. 001 )<. 001
Asthma0.545 ( P =. 01 )0.107 ( P =. 58 )− 0.158 ( P =. 08 ). 009
COPD0.392 ( P =. 002 )− 0.307 ( P =. 05 )− 0.075 ( P =. 37 )<. 001
PRISm− 0.290 ( P =. 39 )0.854 ( p =. 002 )− 0.650 ( P =. 004 )<. 001
\n\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-specific factors and spirometry \ndisease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical significance. BD ¼ bronchodilator; PRISm ¼ preserved ratio \nimpaired spirometry. \n\n(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. \n\nThere were significant but modest differences in mean \ndyspnea levels across the 17 study sites (data not \nshown), which are not explained by the risk factors we \naccounted for in our study. This finding is not surprising \nbecause some of the potential contributing factors \npreviously mentioned and other site-specific factors \nThe affective dimension of dyspnea can be captured \nusing additional questionnaires (eg, Multidimensional \nDyspnea Profile, Dyspnea-12). Studies have explored the \nuse of the Multidimensional Dyspnea Profile in \n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "The prevalence of individuals who were obese and \nmorbidly obese in the PRISm group partially explains \nthe between-group difference in dyspnea. The excess \ndyspnea seen in the PRISm group when compared with \nthe normal spirometry group is partly explained by \npatient-specific risk factors, including BMI, which \nshrink the mean dyspnea differential between the groups \nfrom 11.2 to 5.5 points (Tables 3-6). The remaining 5.5- \npoint difference indicates that PRISm patients have \nexcess dyspnea relative to symptomatic individuals with \nnormal spirometry for additional reasons other than \nobesity.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Although neither the CAT nor the SGRQ are dyspnea- \nspecific tools, both are recommended by the Global Initia- \ntive for Chronic Obstructive Lung Disease to evaluate \nsymptoms, including dyspnea,20 and both yield a richer \nassessment of dyspnea than the modified Medical \nResearch Council breathlessness scale.20 Fifteen questions \nwere taken from the CAT and SGRQ questionnaires that \nreferred to individuals’ experiences with dyspnea, and a \ncomposite measure of dyspnea impact using a weighted \nsum of the responses to the 15 questions was constructed. \nQuestions were coded so that larger values indicate more \nimpactful dyspnea. Weights used for question responses \nin calculating the dyspnea impact assessment measure \nwere those of the first component of a principal compo- \nnent analysis (PCA) based on the covariance matrix of \nquestion responses. Questions with multiple responses \nand ordinal structure are individually more informative \nand thus were accorded higher weight than individual \ntrue-false questions. No additional PCA component was \nanticipated a priori to be material for our investigation, \nand an eigenvalue analysis of the PCA was conducted to \nverify this assumption. \n\nAll participants filled out the COPD Assessment Test \n(CAT) questionnaire. Elevated CAT scores indicate a \ngreater burden of respiratory symptoms impacting \ndaily activities and health status.13 The St. George’s \nRespiratory Questionnaire (SGRQ)14-16 was used to \nassess respiratory disease-related quality of life. Higher \nSGRQ scores indicate poorer health status. Both the \nCAT and SGRQ questionnaires were completed prior The composite dyspnea impact measure was scaled so its \nminimum value was 0 if the response to each of the 15 \nquestions was 0, and the maximum value was scaled to \n100 if the individual responses for all 15 questions rep- \nresented the most severe dyspnea response.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RSG_2004.pdf", - "query": "What is the revenue of Republic Services in 2002 ?", - "target_page": 2, - "target_passage": " $ 2,365.1", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Our decentralized structure is an advantage. It gives us flexibility and speed in reacting to local \nconditions. Our division leaders are well-positioned to respond immediately to the needs, changes \nand developments among their customers. We in the corporate office set the goals, establish the \ndiscipline, provide financial resources, management and operational support, but it is in our local \ndivisions where customer relationships are established and the work is done. Our community-based \nfocus forges strong local relationships and ensures that, at the customer level, the highest expectations \nare exceeded. \n\nUltimately, all the things we do as a Company are aimed at increasing value for our shareholders. We \nknow the importance of strong and predictable cash flow in meeting our shareholders’ expectations. \nOver time, our cash flow has proven to be a strong indicator of the quality of our earnings. Last year’s \nrecord free cash flow enabled us to reinvest in our business, acquire new companies, repurchase $266 \nmillion of our common stock and double the quarterly dividend to $0.12 per share. The plan this year \nis similar. We will continue to use our strong free cash flow to grow and strengthen the Company by \nbuilding our customer base through internal growth and strategic acquisitions. Additionally, we plan \nto repurchase Republic stock worth up to $275 million and pay a regular quarterly cash dividend to \nour shareholders. We believe these steps will increase shareholder value. \n\n*Dear Fellow Shareholders:*\n\nI am pleased to report that 2004 was a very good year for \nRepublic Services, Inc. Our team met and exceeded the \nimportant financial and management goals we told you \nabout here a year ago, and we plan to work just as hard and \naccomplish just as much in the coming year. \n\nRepublic is strengthening its competitive position among \nthe leading waste services providers every day. As always, \nwe are doing so by offering our customers cost-effective \nand safe waste collection, reliable recycling, and \nenvironmentally protective disposal options. \n\nI am proud of our team and what they accomplished. The \nresults tell you just how well they did. \n\nRevenue in 2004 grew 7.6 percent to $2.7 billion, a record. The increases came largely from new \nmunicipal contracts and improved pricing. At the same time, we benefited from our presence in high- \ngrowth markets, especially those in the rapidly expanding Sunbelt states. \n\nWe met last year’s guidance. Net income per diluted share rose 15 percent to $1.53. Our revenue \nenhancement and cost reduction efforts produced results. We generated a record level of free cash \nflow - $388 million to be exact. Republic continues to generate strong and predictable levels of cash \nflow. As in the past year, we will concentrate on free cash flow and use it for acquisitions, \nreinvestment, repurchases of our stock and regular quarterly cash dividends. \n\nThe Year Ahead \n\nWe are focused on improving our service and strengthening relationships with our customers. \nExceptional service allows us to build loyalty and create lasting bonds with those we serve. We will \ncontinue to train and develop our people, too, so they may grow as we grow as a Company. And we \nwill continue to focus on improving the safety of our operations, an important commitment we have \nmade to our people and service communities. \n\nThe last year was indeed an outstanding one for Republic. Our goal is to continue to deliver \nimpressive results in 2005. \n\nI am both privileged and grateful to have the opportunity to lead a team of such exceptional people. \nEveryday, I grow more impressed with the experience, knowledge, loyalty and hard work they \ncontribute. Republic truly has one of the best management and operations teams in America.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Our decentralized structure is an advantage. It gives us flexibility and speed in reacting to local \nconditions. Our division leaders are well-positioned to respond immediately to the needs, changes \nand developments among their customers. We in the corporate office set the goals, establish the \ndiscipline, provide financial resources, management and operational support, but it is in our local \ndivisions where customer relationships are established and the work is done. Our community-based \nfocus forges strong local relationships and ensures that, at the customer level, the highest expectations \nare exceeded. \n\nUltimately, all the things we do as a Company are aimed at increasing value for our shareholders. We \nknow the importance of strong and predictable cash flow in meeting our shareholders’ expectations. \nOver time, our cash flow has proven to be a strong indicator of the quality of our earnings. Last year’s \nrecord free cash flow enabled us to reinvest in our business, acquire new companies, repurchase $266 \nmillion of our common stock and double the quarterly dividend to $0.12 per share. The plan this year \nis similar. We will continue to use our strong free cash flow to grow and strengthen the Company by \nbuilding our customer base through internal growth and strategic acquisitions. Additionally, we plan \nto repurchase Republic stock worth up to $275 million and pay a regular quarterly cash dividend to \nour shareholders. We believe these steps will increase shareholder value. \n\n*Dear Fellow Shareholders:*\n\nI am pleased to report that 2004 was a very good year for \n\nRepublic Services, Inc. Our team met and exceeded the \n\nimportant financial and management goals we told you \n\nabout here a year ago, and we plan to work just as hard and \n\naccomplish just as much in the coming year. \n\nRepublic is strengthening its competitive position among \n\nthe leading waste services providers every day. As always, \n\nwe are doing so by offering our customers cost-effective \n\nand safe waste collection, reliable recycling, and \n\nenvironmentally protective disposal options. \n\nI am proud of our team and what they accomplished. The \n\nresults tell you just how well they did. \n\nRevenue in 2004 grew 7.6 percent to $2.7 billion, a record. The increases came largely from new \n\nmunicipal contracts and improved pricing. At the same time, we benefited from our presence in high- \n\ngrowth markets, especially those in the rapidly expanding Sunbelt states. \n\nWe met last year’s guidance. Net income per diluted share rose 15 percent to $1.53. Our revenue \n\nenhancement and cost reduction efforts produced results. We generated a record level of free cash \n\nflow - $388 million to be exact. Republic continues to generate strong and predictable levels of cash \n\nflow. As in the past year, we will concentrate on free cash flow and use it for acquisitions, \n\nreinvestment, repurchases of our stock and regular quarterly cash dividends. \n\nThe Year Ahead \n\nWe are focused on improving our service and strengthening relationships with our customers. \nExceptional service allows us to build loyalty and create lasting bonds with those we serve. We will \ncontinue to train and develop our people, too, so they may grow as we grow as a Company. And we \nwill continue to focus on improving the safety of our operations, an important commitment we have \nmade to our people and service communities. \n\nThe last year was indeed an outstanding one for Republic. Our goal is to continue to deliver \nimpressive results in 2005. \n\nI am both privileged and grateful to have the opportunity to lead a team of such exceptional people. \nEveryday, I grow more impressed with the experience, knowledge, loyalty and hard work they \ncontribute. Republic truly has one of the best management and operations teams in America.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "made to our people and service communities. \n\nThe last year was indeed an outstanding one for Republic. Our goal is to continue to deliver \n\nimpressive results in 2005. \n\nI am both privileged and grateful to have the opportunity to lead a team of such exceptional people. \n\nEveryday, I grow more impressed with the experience, knowledge, loyalty and hard work they \n\ncontribute. Republic truly has one of the best management and operations teams in America. \n\nOn behalf of all of us at Republic, I want to thank our shareholders for the trust they have placed in \n\nus. We are a Company that cares about you, and we pledge to continue working hard to serve you in \n\n2005 and beyond. \n\nSincerely, \n\n\n\nAs I thought about these achievements, I realized they result from the environment that we work to \n\ncreate for both our customers and our people. We care about our customers and the communities we \n\nserve. About our people. About the environment. And, of course, we care about you -- our \n\nshareholders. Every year we adopt a theme that captures our Company and our values. Our theme \n\nfor 2005 is “Republic Services…A Company that cares”. \n\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we \n\ndeliver our services, increasing our efficiency in routing our collection trucks. We improved the way \n\nwe construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to \n\ncontrol prices. And, we communicated to our customers the value of the services we offer. This year \n\nwill be no different. We will continue to concentrate on these fundamentals. \n\nRepublic’s future is bright. We are mindful of our mission. We know our business exists to ease the \n\nburden of managing society’s waste. It’s not a glamorous business, but it is an essential one, and we \n\ntake this responsibility very seriously. \n\nAt the end of the year, Republic had 140 collection companies, 58 landfills, 96 transfer stations and 35 \n\nrecycling facilities in 22 states. These resources give us many opportunities to listen to our customers, \n\nanticipate their needs and quickly respond to them. Each customer faces challenges unique to his or \n\nher business and community. Our goal is to remain flexible and to tailor our services to each \n\ncustomer.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Our decentralized structure is an advantage. It gives us flexibility and speed in reacting to local \n\nconditions. Our division leaders are well-positioned to respond immediately to the needs, changes \n\nand developments among their customers. We in the corporate office set the goals, establish the \n\ndiscipline, provide financial resources, management and operational support, but it is in our local \n\ndivisions where customer relationships are established and the work is done. Our community-based \n\nfocus forges strong local relationships and ensures that, at the customer level, the highest expectations \n\nare exceeded. \n\nUltimately, all the things we do as a Company are aimed at increasing value for our shareholders. We \n\nknow the importance of strong and predictable cash flow in meeting our shareholders’ expectations. \n\nOver time, our cash flow has proven to be a strong indicator of the quality of our earnings. Last year’s \n\nrecord free cash flow enabled us to reinvest in our business, acquire new companies, repurchase $266 \n\nmillion of our common stock and double the quarterly dividend to $0.12 per share. The plan this year \n\nis similar. We will continue to use our strong free cash flow to grow and strengthen the Company by \n\nbuilding our customer base through internal growth and strategic acquisitions. Additionally, we plan \n\nto repurchase Republic stock worth up to $275 million and pay a regular quarterly cash dividend to \n\nour shareholders. We believe these steps will increase shareholder value. \n\n*Dear Fellow Shareholders:*\n\nI am pleased to report that 2004 was a very good year for \n\nRepublic Services, Inc. Our team met and exceeded the \n\nimportant financial and management goals we told you \n\nabout here a year ago, and we plan to work just as hard and \n\naccomplish just as much in the coming year. \n\nRepublic is strengthening its competitive position among \n\nthe leading waste services providers every day. As always, \n\nwe are doing so by offering our customers cost-effective \n\nand safe waste collection, reliable recycling, and \n\nenvironmentally protective disposal options. \n\nI am proud of our team and what they accomplished. The \n\nresults tell you just how well they did. \n\nRevenue in 2004 grew 7.6 percent to $2.7 billion, a record. The increases came largely from new \n\nmunicipal contracts and improved pricing. At the same time, we benefited from our presence in high- \n\ngrowth markets, especially those in the rapidly expanding Sunbelt states. \n\nWe met last year’s guidance. Net income per diluted share rose 15 percent to $1.53. Our revenue \n\nenhancement and cost reduction efforts produced results. We generated a record level of free cash \n\nflow - $388 million to be exact. Republic continues to generate strong and predictable levels of cash \n\nflow. As in the past year, we will concentrate on free cash flow and use it for acquisitions, \n\nreinvestment, repurchases of our stock and regular quarterly cash dividends. \n\nW. Lee Nutter 2, 3, 4 \n*Chairman, Compensation*\n*Committee*\n*Chairman, President &*\n*Chief Executive Officer*\n*Rayonier, Inc.*\n*(a forest products company)*\n\nMichael W. Wickham 2, 3, 4 \n*Retired Chairman, President*\n*& Chief Executive Officer,*\n*Roadway Corporation*\n\n1*Member, Executive Committee*• 2*Member, Audit Committee*• 3*Member, Compensation Committee*• 4*Member, Nominating and Corporate Governance Committee*\n\nOfficers \n\nThe Year Ahead \n\nWe are focused on improving our service and strengthening relationships with our customers. \n\nExceptional service allows us to build loyalty and create lasting bonds with those we serve. We will \n\ncontinue to train and develop our people, too, so they may grow as we grow as a Company. And we \n\nwill continue to focus on improving the safety of our operations, an important commitment we have \n\nmade to our people and service communities. \n\nThe last year was indeed an outstanding one for Republic. Our goal is to continue to deliver \n\nimpressive results in 2005.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Risk-free interest ratesÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nExpected livesÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nExpected volatility ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nDividend yieldÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n\n**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n**Years Ended December 31,**\n**2003** **2004** **2002**\n\nWeighted-average fair value of the Company's stock options, \nrestricted stock and stock units granted during the period ÏÏÏ $ 9.33 $ 7.64 $ 7.47 \n\nAssumptions Ì \n\n3.6% 3.2% 2.7% \n\n5 years 5 years 5 years \n\n30.0% \n.9% 40.0% \nÌ 40.0% \nÌ \n\n**Revenue Recognition and Deferred Revenue**\n\nThe Company generally provides services under contracts with municipalities or individual customers. \nRevenue consists primarily of collection fees from commercial, industrial, residential and municipal customers \nand transfer and landÑll disposal fees charged to third parties. Advance billings are recorded as deferred \nrevenue, and the revenue is then recognized over the period services are provided. Collection, transfer and \ndisposal, and other services accounted for approximately 74.3%, 18.9% and 6.8%, respectively, of consolidated \nrevenue for the year ended December 31, 2004. No one customer has individually accounted for more than \n10% of the Company's consolidated revenues or of the Company's reportable segment revenue in any of the \npast three years. \n\nThe Company recognizes revenue when all four of the following criteria are met: \n\n‚ Persuasive evidence of an arrangement exists such as a service agreement with a municipality, a \nhauling customer or a disposal customer, \n\n‚ Services have been performed such as the collection and hauling of waste or the disposal of waste at a \nCompany-owned disposal facility, \n\n‚ The price of the services provided to the customer are Ñxed or determinable, and \n\n‚ Collectability is reasonably assured. \n\n**Other Charges**\n\nDuring the fourth quarter of 2002, the Company recorded a $5.6 million gain on the sale of certain assets \nfor amounts exceeding estimates originally made and recorded as other charges during the fourth quarter of \n2001. \n\n**Income Taxes**\n\nThe Company accounts for income taxes in accordance with Statement of Financial Accounting \nStandards No. 109, \"\"Accounting for Income Taxes.'' Accordingly, deferred income taxes have been provided \nto show the eÅect of temporary diÅerences between the recognition of revenue and expenses for Ñnancial and \nincome tax reporting purposes and between the tax basis of assets and liabilities and their reported amounts in \nthe Ñnancial statements. \n\n**Comprehensive Income**\n\nDuring the year ended December 31, 2002, the Company recorded an unrealized gain of $2.8 million \n($1.7 million, net of tax) relating to the change in fair value of its fuel hedge option agreements in accordance \nwith Statement of Financial Accounting Standards No. 133, \"\"Accounting for Derivative Instruments and", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
2003Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, Depletion and Accretion ( c )Operating IncomeCapital Expenditures ( d )Total AssetsEastern Region........
$ 600.2$ ( 93.0 )$ 50$ 36.4$ 71.3$ 40.7$ 826.9Central Region..........671.7
( 151.6 )520.174.0106.675.7960.5Southern Region......680.3( 76.9 )
603.462.8107.569.9865.6Southwestern Region...332.6( 31.2 )301.4
28.750.228.9409.4Western Region.......729.4( 143.9 )585.546.2
148.851.4813.2Corporate Entities ( a ). 2. 23.7( 71.7 )
6.6678.5Total..........................$ 3.014.4$( 496.6 )$ 2.517.8$ 251.8$ 412.7$ 273.2
$ 4.554.12002Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, and Depletion ( c )Other Charges ( Income )Operating IncomeCapital Expenditures ( d )
Total AssetsEastern Region..........564.1$ ( 79.7 )$484.4$ 32.0$( 4.1 )$ 87.0
$ 39.2$ 822.2Central Region.......589.6( 120.2 )469.453.6( 1.5 )105.3
77.1950.9Southern Region.....643.1( 65.5 )577.652.7118.3
58.0830.7Southwestern Region...311.8( 29.1 )282.722.841.9
30.6374.6Western Region......690.0( 139.1 )550.941.3145.5
47.3826.7Corporate Entities ( a ).... 2(. 1 ). 1( 2.8 )( 38.5 )
6.4404.0Total..........................$ 2.798.8$ ( 433.7 )$ 2.365.1$ 199.6$( 5.6 )$ 459.5
$ 258.6$ 4.209.1
\n\n(b) Intercompany operating revenue reÖects transactions within and between segments and are generally \nmade on a basis intended to reÖect the market value of such services. \n(c) EÅective January 1, 2003, the Company adopted SFAS 143. (See Note 1, Basis of Presentation, for \nfurther information.) \n\n(d) Capital expenditures for 2002 exclude $72.6 million used to purchase equipment consisting primarily of \nrevenue-producing vehicles originally placed into service pursuant to an operating lease. \n\nGoodwill is the cost of acquired businesses in excess of the fair value of net assets acquired. The activity \nin goodwill, net of accumulated amortization, during 2004 and 2003 is as follows:", - "page_start": 88, - "page_end": 88, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n**Cumulative EÅect**\n**of Changes in**\n**Accounting**\n**Principles** **Balance as of**\n**December 31,**\n**2002** **Balance as of**\n**December 31,**\n**2003** **Acquisitions** **Divestitures**\n\nEastern Region ÏÏÏÏÏÏÏÏ \nCentral Region ÏÏÏÏÏÏÏÏ \nSouthern Region ÏÏÏÏÏÏÏ \nSouthwestern Region ÏÏÏ \nWestern RegionÏÏÏÏÏÏÏÏ $ 429.0 \n343.0 \n323.2 \n134.7 \n314.3 $ 7.2 \n7.5 \n2.6 \n.3 \n3.6 $(.3) \nÌ \nÌ \nÌ \nÌ $ Ì \nÌ \nÌ \nÌ \n(7.0) $ 435.9 \n350.5 \n325.8 \n135.0 \n310.9 \n\nTotal ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $1,544.2 $21.2 $(.3) $(7.0) $1,558.1 \n\nRevenue of the Company by revenue source for the years ended December 31, 2004, 2003 and 2002 is as \nfollows: \n\n\n \n \n \n \n [html]\n
200420032002
$ 655.2$601.2
$530.7737.9
706.0696.7558.1
523.0501.662.2
50.950.8...
2.013.4_1.881.11.779.8
1.031.0967.5854.1
...( 519.8 )( 493.7 )
( 428.5 )...511.2
473.8425.6183.5
\n\n**11. FUEL HEDGE**\n\nDuring June 2001, the Company entered into option agreements for approximately 14.3 million gallons of \nheating oil. Under SFAS 133, the options qualiÑed for and were designated as eÅective hedges of changes in \nthe prices of forecasted diesel fuel purchases. These option agreements settled each month in equal notional \namounts through December 2002. The option agreements were structured as zero-cost collars indexed to the \nprice of heating oil. These option agreements expired in December 2002. In accordance with SFAS 133, \n$1.6 million representing the eÅective portion of the change in fair value for the year ended December 31, \n2002, net of tax, has been recorded in stockholders' equity as a component of accumulated other comprehen- \nsive income. The ineÅective portion of the change in fair value was a gain of approximately $.1 million for the \nyear ended December 31, 2002, and has been included in other income (expense), net in the accompanying \nConsolidated Statements of Income. Realized losses of $.8 million related to these option agreements are \nincluded in cost of operations in the Company's Consolidated Statements of Income for the year ended \nDecember 31, 2002.", - "page_start": 89, - "page_end": 89, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data)**\n\n**1. BASIS OF PRESENTATION**\n\nThe accompanying Consolidated Financial Statements include the accounts of Republic Services, Inc. (a \nDelaware corporation) and its subsidiaries (the \"\"Company''). The Company provides non-hazardous solid \nwaste collection and disposal services in the United States. All intercompany transactions have been \neliminated in consolidation. \n\nAs of January 1, 2003, the Company adopted Statement of Financial Accounting Standards No. 143, \n\"\"Accounting for Asset Retirement Obligations'' (\"\"SFAS 143''). SFAS 143 required the Company to change \nthe methodology it used to record Ñnal capping, closure and post-closure costs relating to its landÑlls. As of \nJanuary 1, 2003, the Company recorded an after-tax expense of $20.8 million, or $33.6 million on a pre-tax \nbasis, as a cumulative eÅect of a change in accounting principle resulting from the adoption of SFAS 143. In \naddition, the Company also recorded an after-tax expense of $17.0 million, or $27.4 million on a pre-tax basis, \nas a cumulative eÅect of a change in accounting principle for its methane gas collection systems. This change \nin accounting for methane gas collection systems was prompted by a thorough evaluation of the Company's \nlandÑll accounting policies in connection with the adoption of SFAS 143 and is consistent with the \nmethodology used by other participants in the waste industry. \n\nThe following table summarizes the adjustments to net income and earnings per share for the year ended \nDecember 31, 2002 as if SFAS 143 and the Company's change in accounting principle relating to its methane \ngas collection systems were eÅective January 1, 2002: \n\n\n \n \n \n \n [html]December 31.2002\n
Net IncomeDiluted Earnings Per Share
Patients$ 239.6$ 1.44
Patients16.2. 10
Table. 8
Patients( 6.5 )(. 04 )
.....( 10.9 )− 07 )
Patients(. 4 )− 01 )
Patients. 3
.....( 2.3 )− 0.01 )
Patients( 2.0 )− 01 )
.....$ 237.2$ 1.42
", - "page_start": 64, - "page_end": 64, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n**ON INTERNAL CONTROL OVER FINANCIAL REPORTING**\n\nThe Board of Directors and Stockholders of Republic Services, Inc.: \n\nWe have audited management's assessment, included in the accompanying Report of Management on \nRepublic Services, Inc.'s Internal Control Over Financial Reporting, that Republic Services, Inc. and \nsubsidiaries maintained eÅective internal control over Ñnancial reporting as of December 31, 2004, based on \ncriteria established in Internal Control Ì Integrated Framework issued by the Committee of Sponsoring \nOrganizations of the Treadway Commission (the COSO criteria). Republic Services, Inc.'s management is \nresponsible for maintaining eÅective internal control over Ñnancial reporting and for its assessment of the \neÅectiveness of internal control over Ñnancial reporting. Our responsibility is to express an opinion on \nmanagement's assessment and an opinion on the eÅectiveness of the company's internal control over Ñnancial \nreporting based on our audit. \n\nWe conducted our audit in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States). Those standards require that we plan and perform the audit to obtain reasonable \nassurance about whether eÅective internal control over Ñnancial reporting was maintained in all material \nrespects. Our audit included obtaining an understanding of internal control over Ñnancial reporting, evaluating \nmanagement's assessment, testing and evaluating the design and operating eÅectiveness of internal control, \nand performing such other procedures as we considered necessary in the circumstances. We believe that our \naudits provide a reasonable basis for our opinion. \n\nA company's internal control over Ñnancial reporting is a process designed to provide reasonable \nassurance regarding the reliability of Ñnancial reporting and the preparation of Ñnancial statements for external \npurposes in accordance with generally accepted accounting principles. A company's internal control over \nÑnancial reporting includes those policies and procedures that (1) pertain to the maintenance of records that, \nin reasonable detail, accurately and fairly reÖect the transactions and dispositions of the assets of the company; \n(2) provide reasonable assurance that transactions are recorded as necessary to permit preparation of Ñnancial \nstatements in accordance with generally accepted accounting principles, and that receipts and expenditures of \nthe company are being made only in accordance with authorizations of management and directors of the \ncompany; and (3) provide reasonable assurance regarding prevention or timely detection of unauthorized \nacquisition, use, or disposition of the company's assets that could have a material eÅect on the Ñnancial \nstatements. \n\nBecause of its inherent limitations, internal control over Ñnancial reporting may not prevent or detect \nmisstatements. Also, projections of any evaluation of eÅectiveness to future periods are subject to the risk that \ncontrols may become inadequate because of changes in conditions, or that the degree of compliance with the \npolicies and procedures may deteriorate. \n\nIn our opinion, management's assessment that Republic Services, Inc. maintained eÅective internal \ncontrol over Ñnancial reporting as of December 31, 2004, is fairly stated, in all material respects, based on the \nCOSO criteria. Also, in our opinion, the Company maintained, in all material respects, eÅective internal \ncontrol over Ñnancial reporting as of December 31, 2004, based on the COSO criteria.", - "page_start": 59, - "page_end": 59, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RSG_2004.pdf", - "query": "Who is the Vice Chairmain of the Board of Republic Services ?", - "target_page": 5, - "target_passage": " Harris W. Hudson1 Vice Chairman of the Board", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "On behalf of all of us at Republic, I want to thank our shareholders for the trust they have placed in \nus. We are a Company that cares about you, and we pledge to continue working hard to serve you in \n2005 and beyond. \n\nSincerely, \n\n\n\nAs I thought about these achievements, I realized they result from the environment that we work to \ncreate for both our customers and our people. We care about our customers and the communities we \nserve. About our people. About the environment. And, of course, we care about you -- our \nshareholders. Every year we adopt a theme that captures our Company and our values. Our theme \nfor 2005 is “Republic Services…A Company that cares”. \n\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we \ndeliver our services, increasing our efficiency in routing our collection trucks. We improved the way \nwe construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to \ncontrol prices. And, we communicated to our customers the value of the services we offer. This year \nwill be no different. We will continue to concentrate on these fundamentals. \n\nRepublic’s future is bright. We are mindful of our mission. We know our business exists to ease the \nburden of managing society’s waste. It’s not a glamorous business, but it is an essential one, and we \ntake this responsibility very seriously. \n\nAt the end of the year, Republic had 140 collection companies, 58 landfills, 96 transfer stations and 35 \nrecycling facilities in 22 states. These resources give us many opportunities to listen to our customers, \nanticipate their needs and quickly respond to them. Each customer faces challenges unique to his or \nher business and community. Our goal is to remain flexible and to tailor our services to each \ncustomer. \n\nW. Lee Nutter 2, 3, 4 \n*Chairman, Compensation*\n*Committee*\n*Chairman, President &*\n*Chief Executive Officer*\n*Rayonier, Inc.*\n*(a forest products company)*\n\nMichael W. Wickham 2, 3, 4 \n*Retired Chairman, President*\n*& Chief Executive Officer,*\n*Roadway Corporation*\n\n1*Member, Executive Committee*• 2*Member, Audit Committee*• 3*Member, Compensation Committee*• 4*Member, Nominating and Corporate Governance Committee*\n\nOfficers \n\nJames E. O’Connor \n*Chairman & Chief Executive Officer*\nMichael J. Cordesman \n*President & Chief Operating Officer*\nDavid A. Barclay \n*Senior Vice President & General Counsel*\nTod C. Holmes \n*Senior Vice President & Chief Financial Officer*\nLee V. Twyford \n*Senior Vice President & Chief Information Officer*\nBrian A. Bales \n*Vice President, Corporate Development*\nKenneth M. Baylor \n*Vice President, Employee & Labor Relations*\n\nWilliam C. Flower \n*Vice President, Communications*\nMatthew D. Katz \n*Vice President & Associate General Counsel*\nRonald R. Krall \n*Regional Vice President - Eastern Region*\nEdward A. Lang III \n*Vice President, Finance & Treasurer*\nThomas E. Miller \n*Regional Vice President - Southwest Region*\nCraig J. Nichols \n*Vice President, Human Resources*\nCharles F. Serianni \n*Vice President & Chief Accounting Officer*\nRobert N. Shepard \n*Regional Vice President - Southern Region*\nGary L. Sova \n*Vice President, Marketing & Sales*\nKevin C. Walbridge \n*Regional Vice President - Central Region*\nGerard W. Wickett \n*Vice President, Purchasing & Maintenance*\n\nTim M. Benter \n*Vice President & Associate General Counsel*\n\nJerry S. Clark \n*Vice President & Controller*\nPaul J. Connealy \n*Vice President, Tax*\nMatthew E. Davies \n*Vice President, Environmental Engineering & Compliance*\nArthur J. Dudzinski \n*Regional Vice President - Western Region*", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "On behalf of all of us at Republic, I want to thank our shareholders for the trust they have placed in \nus. We are a Company that cares about you, and we pledge to continue working hard to serve you in \n2005 and beyond. \n\nSincerely, \n\n\n\nAs I thought about these achievements, I realized they result from the environment that we work to \n\ncreate for both our customers and our people. We care about our customers and the communities we \n\nserve. About our people. About the environment. And, of course, we care about you -- our \n\nshareholders. Every year we adopt a theme that captures our Company and our values. Our theme \n\nfor 2005 is “Republic Services…A Company that cares”. \n\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we \n\ndeliver our services, increasing our efficiency in routing our collection trucks. We improved the way \n\nwe construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to \n\ncontrol prices. And, we communicated to our customers the value of the services we offer. This year \n\nwill be no different. We will continue to concentrate on these fundamentals. \n\nRepublic’s future is bright. We are mindful of our mission. We know our business exists to ease the \n\nburden of managing society’s waste. It’s not a glamorous business, but it is an essential one, and we \n\ntake this responsibility very seriously. \n\nAt the end of the year, Republic had 140 collection companies, 58 landfills, 96 transfer stations and 35 \n\nrecycling facilities in 22 states. These resources give us many opportunities to listen to our customers, \n\nanticipate their needs and quickly respond to them. Each customer faces challenges unique to his or \n\nher business and community. Our goal is to remain flexible and to tailor our services to each \n\ncustomer. \n\nW. Lee Nutter 2, 3, 4 \n*Chairman, Compensation*\n*Committee*\n*Chairman, President &*\n*Chief Executive Officer*\n*Rayonier, Inc.*\n*(a forest products company)*\n\nMichael W. Wickham 2, 3, 4 \n*Retired Chairman, President*\n*& Chief Executive Officer,*\n*Roadway Corporation*\n\n1*Member, Executive Committee*• 2*Member, Audit Committee*• 3*Member, Compensation Committee*• 4*Member, Nominating and Corporate Governance Committee*\n\nOfficers \n\nJames E. O’Connor \n*Chairman & Chief Executive Officer*\nMichael J. Cordesman \n*President & Chief Operating Officer*\nDavid A. Barclay \n*Senior Vice President & General Counsel*\nTod C. Holmes \n*Senior Vice President & Chief Financial Officer*\nLee V. Twyford \n*Senior Vice President & Chief Information Officer*\nBrian A. Bales \n*Vice President, Corporate Development*\nKenneth M. Baylor \n*Vice President, Employee & Labor Relations*\n\nWilliam C. Flower \n*Vice President, Communications*\nMatthew D. Katz \n*Vice President & Associate General Counsel*\nRonald R. Krall \n*Regional Vice President - Eastern Region*\nEdward A. Lang III \n*Vice President, Finance & Treasurer*\nThomas E. Miller \n*Regional Vice President - Southwest Region*\nCraig J. Nichols \n*Vice President, Human Resources*\nCharles F. Serianni \n*Vice President & Chief Accounting Officer*\nRobert N. Shepard \n*Regional Vice President - Southern Region*\nGary L. Sova \n*Vice President, Marketing & Sales*\nKevin C. Walbridge \n*Regional Vice President - Central Region*\nGerard W. Wickett \n*Vice President, Purchasing & Maintenance*\n\nTim M. Benter \n*Vice President & Associate General Counsel*\n\nJerry S. Clark \n*Vice President & Controller*\nPaul J. Connealy \n*Vice President, Tax*\nMatthew E. Davies \n*Vice President, Environmental Engineering & Compliance*\nArthur J. Dudzinski \n*Regional Vice President - Western Region*", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "or her functions.( 5 ) Where the Vice - President is performing the functions of the office of Presidentin accordance with section 35 or 36 of this Constitution he or she may appoint a person.", - "page_start": 20, - "page_end": 20, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**Dale noseworthy**\nVice president \ninvestor relations and \ncorporate planning \n**Jeremy Jackson**\nVice president \nmarketing **robert richardson**\nexecutive Vice president \n& chief Financial officer **Michael Mclean**\nVice president \nDevelopment **erin Cleveland**\nVice president \nFinance \n\n\n\nmanagement team", - "page_start": 5, - "page_end": 5, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Douglas J. Jacobson \nExecutive Vice President – \nAcquisitions and Divestitures", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "' s role is to assist the Board onsibilities associated with the ounts, its external financial tiemal control structure, riskannual declaration of their independence to the Audit Committee.", - "page_start": 36, - "page_end": 36, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**SIGNATURES**\n\nPursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the \nCompany has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized. \n\nREGISTRANT: \n\nREPUBLIC SERVICES, INC. \n\nBy: /s/ \n\nJAMES E. O'CONNOR \nJames E. O'Connor \n*Chairman of the Board and Chief Executive OÇcer*\n*(principal executive oÇcer)*\n\nFebruary 25, 2005 \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed by the \nfollowing persons on behalf of the Registrant and in the capacities and on the dates indicated. \n\n**Signature** **Title** **Date**\n\n/s/ JAMES E. O'CONNOR \nJames E. O'Connor \nChairman of the Board and Chief \nExecutive OÇcer (principal \nexecutive oÇcer) \n\nFebruary 25, 2005 \n\n/s/ HARRIS W. HUDSON Vice Chairman and Director February 25, 2005 \nHarris W. Hudson \n\n/s/ TOD C. HOLMES \nTod C. Holmes \nFebruary 25, 2005 \n\nSenior Vice President and Chief \n\nFinancial OÇcer (principal Ñnancial \noÇcer) \n\nVice President and Chief Accounting February 25, 2005 \n\nOÇcer (principal accounting \noÇcer) \n\nDirector February 25, 2005 \n\n/s/ CHARLES F. SERIANNI \nCharles F. Serianni \n\n/s/ JOHN W. CROGHAN \nJohn W. Croghan \n\n/s/ W. LEE NUTTER \nW. Lee Nutter \n\n/s/ RAMON A. RODRIGUEZ \nRamon A. Rodriguez \n\n/s/ ALLAN C. SORENSEN \nAllan C. Sorensen \n\n/s/ MICHAEL W. WICKHAM \nMichael W. Wickham", - "page_start": 100, - "page_end": 100, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Property & Casualty**\n**David K. Zwiener**\nPresident and Chief Operating Officer \n\n**Judith A. Blades**\nSenior Executive Vice President, \nProperty & Casualty \n\n**J. Paul Kennedy**\nExecutive Vice President, \nPersonal Lines \n\n**David H. McElroy**\nSenior Vice President, \nHartford Financial Products \n\n**Ralph J. Palmieri**\nSenior Vice President, \nSpecialty Property \n\n**James M. Ruel**\nSenior Vice President, \nSelect Customer \n\n**Gary J. Thompson**\nSenior Vice President, \nMiddle Market \n\n**Fred H. Eppinger**\nExecutive Vice President, \nField and Service Operations \n\n**Richard J. Law**\nSenior Vice President, \nField Operations \n\n**Sharon A. Ritchey**\nSenior Vice President, \nContact Center Operations \n\n**Joseph Z. Gauches**\nExecutive Vice President, \nE-Commerce and Technology \n\n**Calvin Hudson**\nExecutive Vice President, Claims \n\n**David R. Robb**\nExecutive Vice President \n\n**Raymond J. Sprague**\nExecutive Vice President, \nReinsurance Operations \n\n**Michael J. Dury**\nSenior Vice President and \nChief Financial Officer \n\n**Robert A. Ferreira**\nSenior Vice President, \nHuman Resources", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_HIG_2001.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_STO_2004.pdf", - "query": "How mush did the Moomba incident cost to Santos in 2004 ?", - "target_page": 12, - "target_passage": " the Moomba incident resulted in $17 million of one-off costs in 2004.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "A large proportion of the costs \nand foregone revenues associated \nwith the repair of the damaged \nplant and the reduced oil and \ngas production volumes are \nbeing recovered under \ninsurance policies. \n\nImportantly, Santos was able \nto work effectively with its key \nstakeholders, including customers, \njoint venturers and government \ndepartments, to minimise the \ncommercial impacts. \nEven with the large effort \nexpended on the Moomba \nincident, Santos was able to \ndeliver strong results for 2004, \nreflecting higher average prices \nacross most products. \n\nNatural gas supplies were quickly \nrestored, in part by recovering \nprocessed gas from underground \nstorage reservoirs. Liquids \nprocessing facilities were \nprogressively reinstated allowing \nfurther increases to gas production \nand sales volumes, with the \nramp-up to full liquids production \nachieved by August as planned. \n\nThis strong financial performance, \ncombined with the confidence \nthat Santos will continue to grow \nearnings in the future, enabled \nthe Board to increase the final \ndividend on ordinary shares by \n20% from 15 cents to 18 cents \nper share, fully franked. For the \nfull year, dividends increased \nby 10% to 33 cents per share, \ncompared with 30 cents per share \n\nAnnual Report 2004", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**2004 WAS A YEAR OF GOOD**\n**OPERATING RESULTS**\nOverall the increase in 2004 profit \nof 16% reflected a year of sound \noperating performance. Sales \nrevenue was a record $1,501 \nmillion, up 2.5% on 2003, \nreflecting higher prices across \nmost products and was achieved \ndespite lower production as a \nresult of the Moomba incident \nand declining output from late \nlife fields. \n\n**‘The sound operating results**\n**achieved in 2004 underline**\n**the changing face of Santos**\n**towards a higher value, higher**\n**margin business. We ended the**\n**year with a strong financial**\n**position and our financial**\n**flexibility intact.’**\n\nSantos benefited from higher \nworld oil prices and realised \nUS$51.83 per boe in 2004, an \nincrease of 19% over 2003. The \nbenefit of higher world oil prices \nsubstantially offset the impact \nof lower production volumes. \n**PETER WASOW**\nChief Financial Officer \n\nSantos was also able to negotiate \nhigher domestic gas prices (up \n4% on average) and deliver new \nrevenue streams from project \nstart-ups and acquisitions during \nthe year. \n\n\n \n \n \n \n [html]decline reduced n by a furthern boe.to effectively control its casts in the face of significant external pressures in the form of risingthese factors, Santos ’ ojects are starting to jine and have bequn toExamining production costs in detail. reveals :edecline experienced oast three years. Two vere commissioned in Bayu - Undan liquids▪ the start - up of Bayu - Undan and acquisitions added $ 16 million to Santos ’ cost baseand the Minerva gas n addition, acquisitions▪ changes in our accounting added a further $ 16 million to Santos ’ production costsproduction is expected• higher insurance premiums ($ 8 mllion ) and one - off stock res.The impact of the ncident. Santos now roduction to be around boe in 2005. Thisoffset by $ 17 million in cost savings largely as a result of Santos ' continuous improvement initiativess largely driven by the oning of Mutineer - Exeter 2005 and the 3ohnthe Moomba incident resulted in $ 17 million of one - off costs in 2004.as field in the middle ar.Piecing this together, the key themes in our financial performance were :ION COSTS DNTROLcosts in 2004 were lon, up $ 45 million or 003. Analysis shows os was able to continue\n
▪ cost savings in established production areas more than offset increases in the price of services and materialsMean definitionε0Santos ’ cost : base rose as production from new developments and acquisitions were added to the Company ’ s expanding portfolio of producing assets.
0.465Table4030
zo32710
", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "[html]28. Segment Information ( continued )2004Smillion2003 $ millionInt2004 $ million2003 $ millionControl 2004Smillion2003 $ millionPrimary ReportingGeographic segments RevenueTotal segment revenueOther unallocated rever1.633.11.445.9120.7134.61.753.8 ( 0.6 )1.580.538.9Total revenue1.753.21.619.4ResultsEarnings before interest, tax and significant itemsSignificant items :505.9529.83.815.6509.7545.4Insurance recoveryCosts associated with Moomba liquids recovery plant fireProfit on sale of oil and gas assets116.6 ( 17.5 ) 43.9-----116.6 ( 17.5 ) 43.9−Write - down of exploration and development expenditureOrganisation restructure costs( 4.7 )( 21.6 )( 1.3 )( 17.4 )( 58.4 )( 22.1 )( 21.6 )( 59.7 )Accelerated depreciation – HeytesburyP( 20.2 )−––( 20.2 )622.6508.3( 13.6 )( 42.8 )609.0465.5Gain on sale of listed investmentsUnallocated corporate expenses0.1 ( 34.7 )45.8 ( 45.8 )Earnings before interest and tax574.4465.5Unallocated borrowing costs( 33.6 )( 34.6 )Profit from ordinary activities before income tax expenseIncome tax expense540.8 [ 160.9 ]430.9 ( 103.9 )Net profit after income tax attributable to the shareholders of Santos Ltd379.9327.0Non - cash expensesDepreciation, depletion and amortisationUnallocated corporate depreciation, depla434.4454.990.865.9525.2520.810.8Total depreciation, depletion and amortisation539.7531.6Write - down of exploration and development expenditure Unallacated corporate write - down of listed investment4.71.317.458.422.1 –59.74.4Total non - cash expensesΔ8595.7Acquisition of non - current assetsControlled entities92.224.035.1-127.324.0Oll and gas assets, property, plant and equipmentUnallocated corporate acquisition of oll and gas assets,761.8587.0146.4140.0908.2727.0property, plant and equipment21.323.3Total acquisition of non - current assets1.056.8774.3AssetsSegment assetsUnallocated corporate assets5.120.14.447.8694.7602.75.814.85.050.5167.8Consolidated total", - "page_start": 82, - "page_end": 82, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "that we are on track to meet them \nwithin the timeframe set out. \n\nAll our financial measures \nrepresenting shareholder return \nwere favourable, being close to \ntargets which, given the difficult \nstart to the year, was an \nexceptional result. \n\nProduction was down, as \nexpected, but was further reduced \nby the effects of the Moomba \nincident. However, as previously \nstated, we expect this trend to \nbe reversed in 2005. \n\n**CONTINUOUS IMPROVEMENT**\n**IMPORTANT**\nOur primary goal is to produce \nhigher returns for our shareholders \nand, in our drive to do so, it is \nimportant to identify ways in \nwhich we might achieve more \nefficient and cost-effective \noutcomes. \n\nReserve replacement has been \nstrong over the past three years, \naveraging about 130%. While this \nis below our long-term goal of \ngreater than 140%, it does not \ninclude the recent Jeruk discovery \nand is a solid result against the \nindustry average of less \nthan 100%. \n\nAs a result, an important initiative \nhas been the introduction of a \ncontinuous improvement program. \nThe organisational restructure \nimplemented during 2004 yielded \ndividends with savings recorded \nin the past year of $38 million for \nprogram outlays of $22 million. \n\nSimilarly, our reserve replacement \ncost for 2004 is above our target \ndue mainly to the high level \nof expenditure on major \ndevelopment projects during the \nyear. On a three-year average \nbasis, which is more \nrepresentative of the nature \nof the business, the result is \na reserve replacement cost of \nUS$7.19 – much more in line \nwith our target. \n\nThese programs will continue to \ncontribute at even higher levels \ngoing forward for even less cost. \n\n**A PART OF OUR COMMUNITY**\nSantos engages with many \nstakeholders and we believe it \nis important to have rewarding \nrelationships with the communities \nto which we belong. \n\nThe netback achieved in 2004 \nwas an improvement over 2003 \nand was on target due largely to \nhigher average product prices, but \nalso reflected the results of the \ncontinuous improvement program. \nWe sponsor a wide range \nof educational, cultural and \ncommunity events and programs. \n\n\n \n \n \n \n [html]\n
PERIFORMANCE AGALNST TARGETSLong - term target2006 performance
CommentsProduction growth6 – 8 %- 13.1 %
Moomba incident impactReserve replacement ratio> 140 %121 %
Excludes Jeruk exploration successReserve replacement cost per boe< US $ 5.50US $ 12.37
Impacted by development focus in 2004Netback> A $ 22A $ 21
On targetEBITDA growth per share> 10 %8.8 %
Improving trendReturn on capital employed> 10 %9.4 %
", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
As at 31 December1995199619971998199920002001200220032004Santtos average realised onli price ( A $, Pabi ))24.96
27.4327.4220.9527.5746.5445.5344.7443.5951.83Financial performance ( s / million )Product sales revenue571.6729.2
778.5769.4944.51.497.11.459.7478.4465.01.500.9Total operating revenue740.1804.0859.5000.8
995.61.556.21.561.8542.3619.41.753.2Foreign currency quims /( losses )( 16.0 )25.03.62.00.32.7
0.2( 0.7 )( 7.9 )( 3.0 )Profit from ordinary activities before tax241.0331.9322.3267.3339.6725.9627.6493.3
430.9540.8Jancome tax relating to ordinary activities130.4136.0116.191.030.5239.1181.7171.2103.9160.9
Net profit after income tax ettributable to the shareholders of Santos Itd110.6195.9206.2176.3309.1486.8445.9322.1327.0379.9Financial position ( Smilion )Total assets
2.915.5443.4036.2236.14.338.74.659.85.048.7320.8218.35.956.0Net debt542.0938.6
114.2280.01.301.1866.61.060.8162.9897.61.131.4Total equity1.519.3586.3919.0939.2
2.056.72.310.92.726.6863.9087.93.498.3Reserves and production ( n = 1110 )Proven plus Probable reserves ( 29 )7038601.009956941
921724732636643Production36.839.241.145.649.256.055.7
57.354.247.1Exploration *Wells drilled ( number )669111281S - 6422618
1916Expenditure ($ million )87.9121.1190.1180.778.1100.193.4133.1136.4125.6
Other capital expenditure ( Smillion )Delineation and development *53.9105.8179.7158.1116.8187.1308.1308.8519.0572.7Buildings, plant and equipment concernances ( no 201, aponat and normal normal normal non - terms )
40.1150.3205.4165.7102.5153.5258.7319.094.9131.1
", - "page_start": 45, - "page_end": 45, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "There is no current on-market buy-back. \n\nThe 20 largest shareholders of fully paid ordinary shares in Santos as shown in the Company’s Register of Members at 28 February 2005 were: \n\n\n \n \n \n \n [html]Number of fully paid ordinary shares70.657.62662.151.35454.655.78540.453.44012.939.53811.557.82510.659.7467.169.0376.981.6744.034.2783.712.1713.571.7163.280.5153.189.2892.721.1212.321.1342.311.7642.141.7381.956.5381.871.246308.337.535Fully paid ordinary shares ( Holders )% of shares15.151\n
Name%
Westpac Custodian Nominees Limited12.07
National Nominees Limited10.62
3 P Morgan Nominees Australia Limited9.34
ANZ Nominees Limited6.91
Citicorp Nominees Pty Limited2.21
RBC Global Services Australia Nominees Pty Limited1.97
Westpac Custodian Nominees Limited ( ADR Account )1.82
Queensland Investment Corporation1.22
Cogent Nominees Pty Limited1.19
AMP Life Limited0.69
IAG Nominees Pty Limited0.63
HSBC Custody Nominees ( Australia ) Limited0.61
Citicorp Nominees Pty Limited ( CFS WSLE Imputation Fnd A / c )0.56
Australian Foundation Investment Company Limited0.54
Government Superannuation Office ( State Super Fund A / c )0.46
Citicorp Nominees Pty Limited ( CFS WSLE Aust Share Fnd A / c )0.40
Wictorian Workcover Authority0.39
Criticorp Nominees Pty Limited ( U / S Imputation Fund A / c )0.37
Fortis Clearing Nominees P / L ( Settlement A / c )0.33
Logent Nominees Pty Limited ( SMV Accounts )0.32
Total52.65
Analysis of Shares - range of shares held% of holders
Redeemable convertible preference shares ( Holders )
% of holders% of sharesheld1 - 1.00027.79134.99
2.87
97.8840.091.001 - 5.00040.78551.3517.11272
1.7610.005.001 - 10.0007.2099.088.8721
0.132.7010.001 - 100.0003.5054.4112.1926
0.1710.53100.001 and over1330.1758.969
0.0636.68Total79.423100.00100.0015.479
100.00100.00
", - "page_start": 91, - "page_end": 91, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Consolidated** **Santos Ltd**\n\n\n \n \n \n \n [html]20. Retained Profitsated2003 $ millionSa2004Smillion871.97 October 2004 on 2.865.821 shares, fully franked14.387.4Interim dividend of 15.0 cents per ordinary share paid on 30 September 2004,fully franked ( 2003 : 15.0 cents per share, fully franked )Subsequent to reporting dateSince the end of the financial year, the Directors have declared the following dividends payable on 31 March 2005 :\n
Co2004Smillion
Ltd2003 $ millionBalance at the end of the year1.368.31.203.61.299.8
Movements during the yearBalance at the beginning of the year1.203.6983.2
871.9795.5Effect of irritial adoption of revised AASB 1028 “ Employee Benefits ”( 1.9 )
-( 1.8 )Effect of initial adoption of AASB 1044 “ Provisions, Contingent Liabilities andContingent Assets *
93.3-93.3Net profit after income tax attributable to the shareholders of Santos Ltd379.9
327.0643.1182.9Dividends recognised during the year( 212.8 )
( 198.0 )( 212.8 )( 198.0 )Premium paid on buy - back of reset convertible preference share( 2.4 )
( 2.4 )Balance at the end of the year1.368.3
1.203.61.299.8871.9Dividends provided for and paid by the CompanySpecial dividend of $ 5.00 per redeemable convertible preference share paid on
14.3Preferential, non - cumulative dividend of $ 3.2940 per reset convertible preference share paid on 31 March 2004, fully franked ( 2003 : 53.2760 per share providedand paid on 31 March 2003, fully franked )
11.511.511.511.5Preferential, non - cumulative dividend of $ 3.2940 per reset convertible preference share paid on 30 September 2004, fully franked ( 2003 : $ 3.2940 per share pald on
30 September 2003, fully franked )11.511.511.511.5
Final 2003 dividend of 15.0 cents per ordinary share paid on 31 March 2004,fully franked ( 2003 : 15.0 cents per share, fully franked )87.787.487.7
87.887.687.8
87.6212.8198.0
212.8198.0
Final 2004 dividend of 18.0 cents per ordinary share, fully franked105.4105.4
", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "STATEMENTS OF FINANCIAL PERFORMANCE \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n\n \n \n \n \n [html]NoteCo2004Smillion619Earnings per share ( cents )Diluted\n
2003 $ millionS2004SmillionLtd2003 $ millionProduct sales
21.500.91.465.0568.8616.3
Cost of sales3( 1.049.8 )( 974.4 )( 414.5 )( 356.6 )
Gross profit451.1490.6154.3259.7Other revenue
2252.3154.4858.0126.2
Other expenses3( 129.0 )( 179.5 )( 221.0 )( 108.3 )
Borrowing costs4( 33.6 )( 34.6 )( 91.1 )( 84.0 )
Profit from ordinary activities before income tax expense540.8430.9700.2193.6Income tax expense relating to ordinary activities
( 160.9 )( 103.9 )( 57.1 )( 10.7 )
Net profit after income tax attributable to the shareholders of Santos Ltd379.9327.0643.1182.9Net exchange differences relating to self - sustaining foreign operations
( 0.2 )( 4.7 )
Total changes in equity from non - owner related transactions attributableto the shareholders of Santos Ltd379.7322.3643.1182.9
Basic2158.652.1
2158.551.5
", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**32. Additional Financial Instruments Disclosure**\n\n**(a) Foreign exchange risk exposure**\n\nThe Santos Group is exposed to foreign exchange risk principally through the sale of liquid petroleum products denominated in US dollars, \nUS dollar borrowings and US dollar expenditure. In order to hedge this foreign exchange risk, the Santos Group has from time to time entered \ninto forward foreign exchange, foreign currency swap and foreign currency option contracts. \n\nAt 31 December 2004 the Santos Group has one open forward foreign currency exchange contract which has expired in January 2005. If closed \nout at balance date a loss of $0.2 million would have resulted. \n\nUS dollar denominated borrowings are either swapped into Australian dollar exposure (2004: US$321.4 million; 2003: US$115.0 million) or \ndesignated as a hedge of US dollar denominated investments in self-sustaining overseas controlled entities (2004: US$313.0 million; \n2003: US$323.6 million) or as a hedge of future US denominated sales revenues (2004: US$146.4 million; 2003: US$219.4 million). As a result, \nthere were no net foreign currency gains or losses arising from translation of US denominated dollar borrowings recognised in the statements \nof financial performance in 2004. Accordingly, $37.4 million of unrealised foreign currency gains were deferred as at 31 December 2004 \n(2003: gains of $66.3 million). The ultimate foreign currency gains or losses will be included in the measurement of the specific hedged US dollar \ndenominated sales revenues to be realised in the years 2005 through 2006. \n\nThe Australian dollar equivalents of foreign currency monetary items included in the statements of financial position to the extent that they are \nnot effectively hedged are: \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\n\n \n \n \n \n [html]0042003\n
20042003$ million$ million
$ million$ millionCurrent assets– United States dollars126.482.7
32.941.3Current liabilities– United States dollars60.535.4
6.58.5Non - current liabilities– United States dollars26.5
", - "page_start": 85, - "page_end": 85, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Consolidated** **Santos Ltd**\n\n\n \n \n \n \n [html]18. Contributed EquityCo2004Smillionated2003 $ million1.557.2( a )157.014Santos Employee Share Purchase Plan( f )Balance at the end of the year3.500.000( g )Share issue costTransfer from reset convertible preference shares581.8\n
S2004SmillionSantos Ltd4nShare capital585.520.675 ( 2003 : 584.475.013 ) ordinary shares, fully paid
1.550.81.557.21.550.8181.000 ( 2003 : 231.000 ) ordinary shares, paid to one cent
Nii ( 2003 : 3.500.000 ) reset convertible preference shares342.3
342.36.000.000 ( 2003 : nil ) redeemable convertible preference shares581.8581.8
Movement in fully paid ordinary sharesObte2004Number of shares2004Smillion2003 $ millionBalance at the beginning of the year
584.475.013582.782.2931.550.81.542.5Santos Executive Share Plan
50.00035.7500.10.1Santos Employee Share Acquisition Plan
( b )254.1061.3
1.5( c )123.648152.864
0.91.0Shares issued on exercise of options( d )715.0001.250.000
4.15.7Balance at the end of the year585.520.675584.475.0131.557.2
1.550.8Movement in reset convertible preference sharesBalance at the beginning of the year3.500.0003.500.000342.3
342.3Transfer to redeemable convertible preference sharesTable7.7
Shares redeemed0 )( 350.0 )
342.3Movement in redeemable convertible preference shares
Balance at the beginning of the year
Shares issued6.000.000600.0
( 10.5 )
( 7.7 )Balance at the end of the year6.000.000
\n\nShares were issued principally on: 22 December 1987; 7 February and 5 December 1989; and 24 December 1990. In 1997 the Board determined \nthat the Plan be discontinued and, accordingly, there has been no further issues of shares under the Plan. \n\nAt the beginning of the financial year there were 231,000 Plan Shares on issue. During the financial year 50,000 Plan Shares were fully paid and \naggregate proceeds of $138,200 received by the Company. As at 31 December 2004 there were 181,000 Plan Shares outstanding. \n\n**(b) Santos Employee Share Acquisition Plan**", - "page_start": 63, - "page_end": 63, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_STO_2004.pdf", - "query": "What is the main focus of the Santos 2005 program ?", - "target_page": 19, - "target_passage": " Oil is the main focus of the 2005 program", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "…TO DELIVER ON THE STRATEGY \nSantos continues to tap into the spirit and commitment of the \nentrepreneurs and explorers who laid the Company’s foundations \nas we deliver on our growth strategy. \n\nToday, Santos is a major Australian oil and gas exploration and \nproduction company growing a global energy business through:", - "page_start": 2, - "page_end": 2, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
be working in business operations with a lean and efficient corporate and services group.
This long - term program is designed to ensure that the way employees work together enhances Santos ' ability to be successful.With the exception of a small number of project teams, all
non - award based positionsOne of the first tasks undertaken
in the Company were declaredwas a voluntary employee survey
vacant and a selection processto identify the gaps between the
commenced around a set ofexisting culture and the desired
criteria designed to ensure thatculture. The outcomes of the
people with the right skills andsurvey will assist in the
the ability to successfully growdevelopment of programs and
Santos were appointed.activities that will better alig
As is often the case withwork practices with Santos ’
transformational changestrategic goals.
initiatives, not everyone wasTRAINING AND DEVELOPING
re - appointed and, as a result,PEOPLE
TableMaking sure training and
CULTURE CHANGEdevelopment supports current
The need to develop a cultureand future business requirements,
that supports the newly designedand provides opportunities for
business processes was anotherpeople to develop their skills to
of the major outcomes of theachieve optimum performance,
change program. A Santos - wide culture change program led byare key aspects of Santos ’ human resources strateqy.
employees is currently underway.
", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "[html]expCommunicating with stakeholders10→− 41.is an important activity and thes→...1.publication of the SustainabilityTableTable1.TableReview is a further extension% 1%τ031.of Santos ’ commitment in this→ ConbinedEmployee1.Providery care (%)regard. Santos applies considerableThe index isThe health and safetyeffort and aims to presentalculated daily by Dow JonesParametersinformation in a clear and conciseDistancesTablemanner in order to generate aPatients without therapyhe safety focus in 2005 will begreater understanding of theTablefinalising a comprehensive setbusiness by its stakeholders.ollowing is an overview ofF hazard standards which outlineSantos has been recognised forrogress and achievements in thene required controls to ensureSpeciesComparisonTea of sustainaditty for cUU4.1at nazards encountereG acrossits achievements in this area.AFETY IMPR0VINGControl operations and activitiesSantos ' 2003 Annual ReportAFETY IMPROVINGSpecificationswas featured as an examplehe health and safety of employeesComparisonAMESof best practice reporting ins of paramount concern to Santos.OSITIONING THE WORKFORCEPricewaterhouseCoopers ’ Trendsantos delivered another year ofOR THE FUTUREin Corporate Reporting 2004mprovement in 2004 and achievedantos commencepublication. Reports fromcs lowest total recordable caseOpany - wide transfrcompanies worldwide arePrequency rate of 6.4.nange program in late 2003.considered in compiling thisParametersDiagnostic program was controlpublication and they mustDemonstrated bygnificantly improvement1.meet specified criteria. ThisIBGL WIDT UFE IIIIIIIIIIIEIIIIEIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIExperimence in formance1.31the third time a Santos annualTable sensorsLaboratory processes1.report has been featured. SantosDiabetestic statesEfformance, organisationwas also awarded a 2004 SilverRatio ( n = 6 )cructure and company culture.Award for Excellence in Annual.Tractguarding total status status status statusSpecificationsReporting for the 2002 Annualgainst standards for theAborganising and simplifying theReport by the AustralasianTotal differenceompany ’ s structure was one ofReporting Awards.he results demonstratedNo major outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes and / or outcomes ane2.onsiderable improvementAge ( years )Receiving independent recognition (%)ver the baseline assessmThere and", - "page_start": 27, - "page_end": 27, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "across Santos operations. The \nlong-term environmental and \nfinancial benefits of using this \ntechnology are expected to be \nconsiderable. \n\nSantos has a number of long-term \nprojects underway which will \noptimise the substantial \ninvestment the Company makes \nin training people. Importantly, \nthese projects will deliver \nprograms that are targeted to \nmeet business and individual \nneeds and to support culture \nchange initiatives. \n\n**REDUCED OIL SPILLS**\nThere was a substantial reduction \nin the volume of hydrocarbons \nreleased to the environment \nin 2004, with uncontained \nhydrocarbons spilt reducing from \n1,943 cubic metres to 83 cubic \nmetres and Santos continues to \nfocus on reducing oil spills. \n\n**BANKSIA AWARDS**\nSantos was selected in 2004 \nas a finalist in the Banksia \nEnvironmental Awards for the \nwork undertaken in the Company- \nled initiative to protect the \nworld-renowned Coongie Lakes, \nresulting in the area being \ndeclared a new National Park by \nthe South Australian Government. \n**GREENHOUSE POLICY**\nSantos released its Greenhouse \nPolicy in 2004 to drive performance \nimprovements in this area through \nreducing emissions and producing \noil and gas more efficiently. \n\n\n\nAs a finalist for this award Santos \nwas recognised for its leadership \nrole in bringing together a group \nof disparate parties to develop a \nMemorandum of Understanding \nrecommending further protection \nfor the Coongie Lakes. \n\nSantos’ Greenhouse Policy is \nbeing rolled out across the \norganisation through cross- \nfunctional greenhouse gas teams \nthat have the right skill sets and \nresponsibilities to progress this \ninitiative. These teams will \nmanage Greenhouse Policy and \nregulation, carbon management \nand trading opportunities, and \nenergy efficiency. A key internal \ndriver for emissions reduction \nwill be the promotion of energy \nefficiency. \n\n**Santos is investing in the future of Australia’s petroleum industry**\n**through the funding of the Australian School of Petroleum at the**\n**University of Adelaide.**\n\n**WASTE MANAGEMENT**\nSantos trialled innovative waste \nmanagement techniques during \n2004 to reduce the volume of \nhydrocarbon waste generated \nfrom Cooper Basin operations. \nPreliminary results indicate that \nthese waste volumes can be \nreduced to 3-5% of their original \nvolume, which is a significant \nachievement. \n\nSantos is committed to achieving \neffective emission reduction \ntargets, to the pursuit of energy \nefficiency strategies and to the \nidentification and implementation \nThis technology will be \nimplemented where possible", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "that we are on track to meet them \nwithin the timeframe set out. \n\nAll our financial measures \nrepresenting shareholder return \nwere favourable, being close to \ntargets which, given the difficult \nstart to the year, was an \nexceptional result. \n\nProduction was down, as \nexpected, but was further reduced \nby the effects of the Moomba \nincident. However, as previously \nstated, we expect this trend to \nbe reversed in 2005. \n\n**CONTINUOUS IMPROVEMENT**\n**IMPORTANT**\nOur primary goal is to produce \nhigher returns for our shareholders \nand, in our drive to do so, it is \nimportant to identify ways in \nwhich we might achieve more \nefficient and cost-effective \noutcomes. \n\nReserve replacement has been \nstrong over the past three years, \naveraging about 130%. While this \nis below our long-term goal of \ngreater than 140%, it does not \ninclude the recent Jeruk discovery \nand is a solid result against the \nindustry average of less \nthan 100%. \n\nAs a result, an important initiative \nhas been the introduction of a \ncontinuous improvement program. \nThe organisational restructure \nimplemented during 2004 yielded \ndividends with savings recorded \nin the past year of $38 million for \nprogram outlays of $22 million. \n\nSimilarly, our reserve replacement \ncost for 2004 is above our target \ndue mainly to the high level \nof expenditure on major \ndevelopment projects during the \nyear. On a three-year average \nbasis, which is more \nrepresentative of the nature \nof the business, the result is \na reserve replacement cost of \nUS$7.19 – much more in line \nwith our target. \n\nThese programs will continue to \ncontribute at even higher levels \ngoing forward for even less cost. \n\n**A PART OF OUR COMMUNITY**\nSantos engages with many \nstakeholders and we believe it \nis important to have rewarding \nrelationships with the communities \nto which we belong. \n\nThe netback achieved in 2004 \nwas an improvement over 2003 \nand was on target due largely to \nhigher average product prices, but \nalso reflected the results of the \ncontinuous improvement program. \nWe sponsor a wide range \nof educational, cultural and \ncommunity events and programs. \n\n\n \n \n \n \n [html]\n
PERIFORMANCE AGALNST TARGETSLong - term target2006 performance
CommentsProduction growth6 – 8 %- 13.1 %
Moomba incident impactReserve replacement ratio> 140 %121 %
Excludes Jeruk exploration successReserve replacement cost per boe< US $ 5.50US $ 12.37
Impacted by development focus in 2004Netback> A $ 22A $ 21
On targetEBITDA growth per share> 10 %8.8 %
Improving trendReturn on capital employed> 10 %9.4 %
", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Electronic enquiries can also be submitted through the Contact Us \nsection of the Santos website, www.santos.com. \n\n**SHAREHOLDERS’ CALENDAR**\n\n2004 full year results announcement 23 February 2005 \n\n\n \n \n \n \n [html]\n
2004 full year results announcement23 February 2005
Ex - dividend date for 2004 full, year dividend28 February 2005
Record date for 2004 full year dividend4 March 2005
Payment date for 2004 full year dividend31 March 2005
Annual General Meeting20 May 2005
Half year end30 June 2005
2005 interim results announcement16 August 2005
Full, year end31 December 2005
QUARTERLY REPORTING CALENDAR2005 First Quarter Activities Report
27 April 20052005 Second Quarter Activities Report
27 July 20052005 Third Quarter Activities Report
2.0ctober 20052005 Fourth Quarter Activities Report
25 January 2006
", - "page_start": 93, - "page_end": 93, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "These results have left Santos \nwell positioned to continue its \nstrong investment program which \nsaw capital expenditure peak at \n$930 million in 2004. \n\nProduction is forecast to increase \nby 15% in 2005, or by 4% after \nexcluding the effect of the \nMoomba downtime, to about \n54 million boe. We expect this \npositive forward trend to be \nfollowed by further production \ngrowth of more than 10% in 2006. \n\nGrowing our oil and gas reserves \nfor future production is the goal \nof our exploration efforts. On \na rolling three-year average we \nhave replaced the hydrocarbons \nthat Santos has produced at \na rate of 130% of Proven (1P) \nreserves, at an average \nreplacement cost of around \nUS$7 per boe. \n\nIn 2005 we expect to invest \naround $850 million of new \ncapital in projects and our \nstrategy is to plan for firm \ndevelopments based on \naffordability at relatively low oil \nprices. If higher prices continue \nand some projects mature quickly \nand can be given the green light, \nour overall capital expenditure \nmay be higher. \nThe Bayu-Undan liquids project \ncame on line in April 2004 \nand, at its increased design \nthroughput of just over one \nbillion cubic feet of gas per day, \nproduced liquids at a rate of \n100,000 barrels per day. \n\nIn Australia, our increasing focus \non the potential of offshore areas \nwill see Santos drill three wells \noff Western Australia in 2005, \none off southern Australia and \ntwo wells off northern Australia. \nWe will also drill two wells \nonshore in Queensland and one \nonshore in Victoria. \n\nThe discovery of oil and gas \nat Hiu Aman in the Kutei Basin, \noffshore East Kalimantan, has \nprovided a strong start to our \n2005 exploration program and \nwe look forward with anticipation \nto further work on that \nsignificant find. Santos has a \n50% interest in the discovery. We \nbelieve this region of Indonesia \nis very promising and Santos \nexpects to drill four wells in the \nKutei Basin in 2005. \n\n**BIGGEST DEVELOPMENT**\n**YEAR YET**\nI am pleased also to report \nthat 2004 was a record year for \ndevelopment with six projects \nadvancing through the pipeline. \n\nSantos has an exciting \nexploration program for 2005: one \nthat I believe holds the highest \nresource potential of any program \nin the Company's 50-year history. \n\n5 Annual Report 2004", - "page_start": 6, - "page_end": 6, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Santos employees rehabilitating a section of the River Torrens in Adelaide, as part of Santos’ three-year**\n**commitment to the Our Patch project.**\n\n\n \n \n \n \n [html]\n
of opportunities to use fewer greenhouse - emitting or renewable sources of energy.Partnerships continued in 2004 with the Australian School of Petroleum, the Adelatde SymphonySantos has adopted a patch of the River Torrens and employees are assisting with the remediation
To achieve these commitmentsSantos is actively pursuing anCompany of South Australia, the Art Gallecy of South Australiaa volunteering program.
emissions intensity reduction target ( greenhouse emissionsthe Lloyd McDermott : FoundationCORPORATE GOVERNANCEFor the third year running, the
per unit of production ) of 20 % in the period from 2002 to 2008.Une of the migringhts or the cu program was the establishmentIntegrity of Santos ’ corporate governance was recognised in
SUPPORTING COMMUNITIESIt brings together all of therating in the Corporate
Santos has relationships with a number of communities where itcontributions Santos makes to community - based organisationsGovernance Research Report prepared by Horwath and the
operates. Some have been long -and recognises and supports thUniversity of Newcastle.
", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
andCommunicating with stakeholdersRRSSIS and Important acciving and Lire publication of the SustainabilityVariableReview is a further extensionThe publication of our firstSustainability Review in 2004of Santos ’ commitment in this regard. Santos applies considerable resources to the communicationwas a major achievement for Santos. The next steps are to undertake projects to improveeffort and aims to present information in a clear and concise manner in order to generate aour performance – not just in Australia but worldwide – and to accurately collect, verify andgreater understanding of the business by its stakeholders. Santos has been recognised forreport on a range of sustainability data.*its achievements in this area. Santos ’ 2003 Annual ReportMARTYN EARESof best practice reporting in PricewaterhouseCoopers ’ Trends in Corporate Reporting 2004Corporate and Peoplein Corporate Reporting 2004 publication. Reports from companies worldwide areComplementconsidered in compiling this1.1999.2.publication and they must1.95595.82meet specified criteria. This isCulturalthe third time a Santos annual report has been featured. Santos was also awarded a 2004 Silver Award for Excellence in AnnualTableReporting for the 2002 AnnualTableReport by the AustralasianTableReporting Awards.1.Receiving independent recognition1.for these activities serves asLate in 2004 Santos publisheda reference point for Santos ’ desire to continually improveFirst Steps : Sustainability Review, the Company ' s first standalonecommunication performance. Canter base baselines [ 5r ] arpublication on this topic.DatabasetterIt describes how Santos is implementing the principleAustralian SAM Sustainability Time, IAM Sustainability Time, IAM CCTof sustainability in the areasDTA ( AG334 ). TTIE AL334 LiaLAS the performance of around 70of corporate governance, the environment, social responsil and economic performance.Australian companies that lead their industry in terms of social and
", - "page_start": 27, - "page_end": 27, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "NOTES TO THE FINANCIAL STATEMENTS \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million **29. Commitments for Expenditure**\n\nThe Santos Group has the following commitments for expenditure: \n**(a) Capital commitments**\n\nCapital expenditure contracted for at balance date for which no amounts \nhave been provided in the financial statements: \n\nDue not later than one year \nDue later than one year but not later than five years **253.5**\n**13.4** 237.7 \n33.2 **93.9**\n**8.2** 84.3 \n0.2 \n\n**266.9** 270.9 **102.1** 84.5 \n\nSantos Ltd has guaranteed the capital commitments of certain controlled entities \n(refer note 31 for further details). \n**(b) Minimum exploration commitments**\n\nMinimum exploration commitments for which no amounts have been provided \nin the financial statement or capital commitments: \n\nDue not later than one year \nDue later than one year but not later than five years \nDue later than five years **42.1**\n**118.8**\n**11.6** 108.2 \n207.7 \n31.4 **10.3**\n**61.2**\n**–** 36.5 \n70.9 \n– \n\n**172.5** 347.3 **71.5** 107.4 \n\nThe Santos Group has certain obligations to perform minimum exploration work and expend \nminimum amounts of money pursuant to the terms of the granting of petroleum \nexploration permits in order to maintain rights of tenure. These commitments may be \nvaried as a result of renegotiations of the terms of the exploration permits, licences or \ncontracts or alternatively upon their relinquishment. The minimum exploration \ncommitments are less than the normal level of exploration expenditures expected to be \nundertaken by Santos Ltd and its controlled entities. \n\n**(c) Lease commitments**\nOperating leases: \n\nDue not later than one year \nDue later than one year but not later than five years \nDue later than five years \n\n**54.7**\n**102.9**\n**0.1** 39.1 \n140.1 \n19.0 **8.4**\n**21.1**\n**–** 18.7 \n115.1 \n18.9 \n\n**157.7** 198.2 **29.5** 152.7 \n\n**30. Superannuation Commitments**\n\nSantos Ltd and certain controlled entities participate in a number of superannuation funds and pension plans in Australia and the United States of \nAmerica. From 1 February 2002, three of the more significant employee benefit plans were combined into a single plan which provides benefits either \non a defined benefit or cash accumulation basis for employees or their dependants on retirement, resignation, temporary or permanent disablement \nor death. The employers and employee members make contributions as specified in the rules of the plan. \n\nIn the case of the defined benefit component of the combined plan, employer contributions are based on the advice of the plan’s actuary. The most \nrecent actuarial assessment of the plan was undertaken as at 1 January 2004. \n\nThe following is a summary of the Santos Superannuation Plan: \n\n**Type of benefit**\n**Basis of contributions**\n\n\n \n \n \n \n [html]\n
Type of benefitDefined benefits and cash accumulation
Basis of contributions
Percentage of member ' s salary contributed by member and employers. The employer ' s percentage reflects the amount to provide an accumulation and the amount recommended by the actuary to provide the defined benefit.Last actuarial assessment :
Balance date1 January 2004
Date issued20 December 2004
", - "page_start": 83, - "page_end": 83, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed5.pdf", - "query": "What is the primary aim of the OSPRO cohort study ?", - "target_page": 2, - "target_passage": " The primary aim of the OSPRO cohort study was to de velop and validate review of systems (i.e. evidence of sys temic involvement) and yellow flag (i.e. pain-related psychological distress) screening tools for use in out patient orthopedic physical therapy settings", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "a \n\nThis study was undertaken in a nationwide, US cohort \nof patients receiving outpatient physical therapy for a \nprimary complaint of knee, shoulder, back or neck pain. \nThe primary aim of the analysis was to predict incidence \nof additional pain-related healthcare utilization in the \nyear following the episode of physical therapy for mus- \nculoskeletal pain. We considered factors not commonly \nassessed in outcomes prediction for musculoskeletal \npain, \nlike insurance, comorbidities, and treatment re- \nsponse, as well as those more often associated with \npain-related outcomes (e.g. psychological distress). This \nproject will lead to the development of potentially novel \noutcome prediction models for this population in a com- \nmon, non-pharmacological US healthcare setting. The \nresults of this study will be particularly important in \nvalue-based payment settings where enhanced clinical \ndecision-making drives treatment effectiveness and sys- \ntem efficiency. \n\nThe primary aim of the OSPRO cohort study was to de- \nvelop and validate review of systems (i.e. evidence of sys- \ntemic involvement) and yellow flag (i.e. pain-related \npsychological distress) screening tools for use in out- \npatient orthopedic physical therapy settings. These screen- \ning tools, once validated and refined for clinical decision \nmaking, may improve the value of care delivery by accur- \nately identifying individuals who 1) are appropriate for \nreferral \nof \nnon-musculoskeletal symptoms, and/or 2) would benefit \nfrom enhanced, psychologically-informed physical ther- \napy. Early identification of individuals most appropriate \nfor these modified pathways of care has the potential to \nreduce wasteful downstream health care utilization, limit \nthe risk of unwarranted and costly care escalation, and im- \nprove clinical outcomes. Results of the primary analyses \nexamining the predictive ability of the OSPRO tools for \npain, disability, health status, and comorbidity outcomes \nhave been previously published [20]. Pre-planned second- \nary analyses included prediction of persistent pain state \n[21] and this current analysis predicting future healthcare \nutilization. All subjects consented to participation in the \nstudy and ethics approval was granted by the University of \nFlorida Institutional Review Board. \n\nto other providers for management", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed5.pdf" - }, - { - "text": "physical therapy settings where \n\nIn future studies, we will embed the OSPRO tools into \nelectronic medical record (EMR) databases to refine and \ntest outcomes prediction models at the health care systems \nlevel. Importantly, we will collect clinical encounter data \nthrough the EMR and combine it with administrative or \nbilling data to confirm the results of this study with more \nobjective measures of health care use. These studies will \nalso allow us to provide better guidance on how to use the \nOSPRO tools to identify serious psychiatric involvement or \nsystemic sources of pain that require medical referral. Fi- \nnally, we will explore alternative scoring strategies for the \ntools, such as weighted scoring for the OSPRO-ROS and \nuse of predicted full-length psychological questionnaire \nscores for the OSPRO-YF. Healthcare providers could then \nuse the collective information from these studies to build \nlearning health systems that facilitate effective, real-time \nclinical decision-making support to improve value of care \nfor patients with musculoskeletal pain. \n\nConclusion \nBaseline disability and change in pain intensity were im- \nportant predictors of \nsubsequent pain-related \nany \nhealthcare utilization, while predictors of individual ser- \nvice utilization were outcome-specific. Identification of \nrisk is improved through treatment monitoring for pain \nand, in some cases, disability and pain-related psycho- \nlogical distress. Comorbidity burden was an important \npredictor of subsequent utilization of opioids and diag- \nnostic tests and imaging, both of which have been recent \ntargets of healthcare policy to constrain their unneces- \nsary use. Future research is needed to refine these pre- \ndictor variables and incorporate them into risk models \nthat support clinical decision-making so that treatment \neffectiveness and efficiency are optimized in value-based \nsystems. \n\nthe clinical encounter might \n\nThird, we were unable to adequately model the spe- \ncific effects of worker’s compensation, self-pay and some", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed5.pdf" - }, - { - "text": "Abbreviations \nCCI: Charlson comorbidity index; OSPRO: Optimal Screening for Prediction of \nReferral and Outcome; OSPRO-ROS: Review of systems screening tool from \nOSPRO cohort study; OSPRO-YF: Pain-related psychological distress screening \ntool from OSPRO cohort study \n\nReceived: 9 November 2017 Accepted: 14 August 2018 \n\nAcknowledgements \nThe authors wish to acknowledge Dr. Roger B. Fillingim and Dr. Nicole M. \nMarlow for their input on study design and analysis. OPT-IN Network \nParticipants included: University of Florida: Joel Bialosky; UF Health: Giorgio \nZeppieri, Jr., Daniel Broome, Marty Huegel, Debi Jones, Steve Emery, Mike \nHodges, Derek Miles, Jodi Davis, Charlene Stubbington, Mike Darcy; ATI \nPhysical Therapy: Ellen Shanley, Thomas Denninger, Jenna Bartsokas, Elise \nHarris, Jordan Floyd, Wade Harrell; University of Southern California: Lori \nMichener, Amy Pomrantz, Brooks Rehabilitation: Raine Osborne, Nata \nSalvatori, John Leschitz, Brian Hagist, Laura Langer, Tim Shreve, Nando \nMalaman, Michael Bourassa, Justin Zych, Tasha Mouton Shanklin; University \nof Illinois at Chicago: Aaron Keil, Brad Myers, Deb Davey, Justin Payette, \nAdam Wielechowski, Richard Severin, Erik Martinez; Indiana State University: \nRyan Hanigan, Carolina Valencia, Danielle Jena, Nicole Woodard; Arcadia \nUniversity: Angela Tate; Life’s Work Physical Therapy: Sandra Stryker, Aaron \nLeonard, Erin Courtney, Brandon Little, Kathryn Jankord, Brad Simpson, \nCharleen Hall, Paige Nixon, Julia Neufeld; University of Colorado, Denver: Paul \nMintken, Virginia Arnette, Andrea Barsch. \n\nFunding \nThis project was supported by the 2013 Clinical Research Network grant \nfrom the Orthopaedic Section, American Physical Therapy Association. The \nfunding body had no role in the design of the study or collection, analysis, \nand interpretation of the data or in writing the manuscript. TAL received \nadditional support from the Foundation for Physical Therapy with Promotion \nof Doctoral Studies I & II (PODS I& II) Awards. SZG and JMB received additional \nsupport from Brooks Rehabilitation while designing this study. JMB received \nsupport from the American National Institutes of Health (NIH) Rehabilitation \nResearch Career Development Program (K12-HD055929). \n\nAvailability of data and materials \nThe data that support the findings of this study are available from the \ncorresponding author upon reasonable request. \n\nAuthors’ contributions \nTAL provided input on study design and analysis plan, drafted the manuscript \nand approved final version of the manuscript. SZG secured funding, provided \noverall design, gave input on the analysis plan and approved final version of \nthe manuscript. JMB provided input on design and analysis plan and approved \nfinal version of the manuscript. \n\nEthics approval and consent to participate \nEthics approval for this study was granted by the University of Florida \nInstitutional Review Board-01 (Study #: 525–2012). All participants provided \nwritten consent to participate in the study. \n\nConsent for publication \nNot applicable. \n\nCompeting interests \nThe authors declare that they have no competing interests. \n\nPublisher’s Note \nSpringer Nature remains neutral with regard to jurisdictional claims in \npublished maps and institutional affiliations. \n\nAuthor details \n1Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham, \nNC 27705, USA. 2Department of Physical Therapy, College of Public Health & \nHealth Professions, University of Florida, Box 100154, UFHSC, Gainesville, FL \n32610-0154, USA. 3Brooks Rehabilitation Clinical Research Center, 3901 \nUniversity Blvd. South, Suite 103, Jacksonville, FL 32216, USA. 4Duke Clinical \nResearch Institute, Department of Orthopaedic Surgery, Duke University, 2400 \nPratt Street, Durham, NC 27705, USA.", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "Assessment tools \nOSPRO Review of Systems tool (OSPRO-ROS) \nThe OSPRO-ROS is a review-of-systems screening tool for \nuse in outpatient orthopedic physical therapy settings [36]. \nThe OSPRO-ROS has demonstrated good concurrent val- \nidity with depression and a comprehensive 97-item battery \n[36] \nof non-musculoskeletal symptoms (i.e., red flags). \nModerate \nthe \ncapabilities of \nstrong predictive \nOSPRO-ROS have been reported for persistence of pain, \nquality of life, and change in comorbidity 12 months fol- \nlowing physical therapy in patients with musculoskeletal \npain [20, 21]. The OSPRO-ROS includes standard symp- \ntom descriptors to aid with identification of systemic or \nnon-musculoskeletal origins of musculoskeletal pain. It \nincludes questions related to symptoms of the cardiovascu- \nlar, gastrointestinal, endocrine, nervous, \nintegumentary, \npulmonary, and musculoskeletal systems. The full-length \n23-item version of the OSPRO-ROS is capable of identify- \ning 100% of positive red-flag responders (i.e. \nindicating \n“yes” to at least one systemic symptom on a questionnaire) \nin outpatient orthopedic physical therapy settings. [36] A \nshorter, 10-item version is also available that has been \n\nto \n\nPain-related clinical variables \nPain status was determined using established definitions \nthat account for the duration of pain and activity limita- \ntions [22, 23] using the following two questions: 1) \n“How long have you been experiencing your current \npainful symptoms?” and 2) “Have you experienced ANY \npain and activity limitations every day for the past 3 \nmonths?” Responses to question 1 of “greater than 90 \ndays” or responses to question 2 of “Yes” were used to \nclassify patients as having persistent pain at \ninitial \nevaluation. \n\nPain intensity \nPain intensity was assessed by the numerical pain rating \nscale (NPRS) ranging from “0” (no pain) to “10” (worst", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "**Charts showing age-of-onset distributions (by percentage of total cohort) for different**\n**cohorts based on year of first treatment**", - "page_start": 30, - "page_end": 30, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "identifying risk for additional utilization has emerged due \nto the growth of cost-sharing and capitated payment \nmodels, particularly in the United States (US). As a result, \nmany US health care services organizations have begun \nto prioritize early identification of individuals at risk for \ndownstream healthcare use at the onset of treatment \n[10, 11]. Early risk assessment allows systems to deliver \ngreater value by 1) focusing limited health care re- \nsources towards patients who are most in need, and 2) \nidentifying those who may require coordination of mul- \ntiple providers and services to optimize outcomes. \n\nMethods \nDataset and patient population \nThis study used data from the Orthopedic Physical Ther- \napy – Investigative Network’s (OPT-IN) Optimal Screen- \ning for Prediction of Referral and Outcome (OSPRO) \nvalidation cohort study, a longitudinal prospective study \nof individuals with knee, shoulder, back or neck pain seek- \ning Physical Therapy in the US. A convenience sample \nwas recruited from December 2014 and December 2015 \nby participating OPT-IN clinics. The OPT-IN clinics that \nparticipated in data collection represented multiple geo- \ngraphic regions in the US including the Mideast, South- \neast, Great Lakes, Rocky Mountain States and Far West, \nwith an attempt to balance recruitment between urban \nand rural settings over the entire OPT-IN network. Phys- \nical therapists practicing in these clinics identified eligible \nparticipants at initial evaluation and directed them to a se- \ncure study website for the informed consent process and \nbaseline self-report assessment. Eligibility criteria have \nbeen thoroughly reported elsewhere [19] and were \nthat was \nintentionally broad to develop a cohort \ngeneralizable to those seeking physical therapy for com- \nmon musculoskeletal conditions in the US. Participants \ncompleted follow-up self-reported assessments on the \nstudy website at 4 weeks, 6 months and 12 months. Partic- \nipants were notified of a pending assessment by an email \nthat directed them back to the study website to complete \ntheir follow-up assessment. For additional details of the \ndataset and cohort, readers are directed to the published \ncohort profile [19]. \n\nProspective identification of risk for high subsequent \nhealthcare utilization is a different approach to out- \ncomes prediction for musculoskeletal pain [12, 13] and \none that has not been evaluated in physical therapy set- \ntings in the US. Most existing outcomes prediction \nmodels focus on pain and disability endpoints [12–14]. \nThey also concentrate on condition-specific and psycho- \nlogical predictors, with less attention to factors that could \ninfluence healthcare utilization more directly [15–17]. \nThese factors include insurance, comorbidities, symp- \ntoms unrelated to the pain condition, and treatment \nresponse. As \nresult, predictors of pain-related \nhealthcare utilization beyond physical therapy are un- \nthese predictors \nknown. A better understanding of \nwill have significant implications for future healthcare \npathway development. For instance, an influence of \nmodifiable factors like pain-related psychological dis- \ntress might imply the need to build clinical pathways \nthat address those factors directly through physical \ntherapist provided intervention. Additionally, under- \nstanding the relative predictive capabilities of baseline \nversus change estimates for modifiable factors would \nclarify whether prediction is improved by routinely \nassessing outcomes during the course of \ntreatment \n(i.e. treatment monitoring) [18]. \n\na", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed5.pdf" - }, - { - "text": "**7.2 Quantitative data on OSH**\n**Quantitative data are the core**of this report, although the authors are aware that quantitative data \nfinally gain their value by a**well-considered qualitative description**, including an**analytical interpre-**\n**tation of the reasons and context**. Analysis aims to find answers to questions like: Why is this trend \nas it is, what are the reasons? Which data are available and which data do we not have but would like \nto? What do the data tell us about the need for action?", - "page_start": 130, - "page_end": 130, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "and resources utilization in patients with peripheral neuropathic pain. Clin. I Pain. 2015 ; 31 : 273 – 9.18.Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and response to treatment. Phys Ther. 2011 ; 91.712 – 21.19.George SZ, Beneck JM, Lentz TA, Wku SS. The Optimal Screening for Prediction of Referral and Outcome ( CISPRD ) in patients with musculoikeletal pain conditions a longitudinal validation cohort from the USA. BMI Open 2017 ; 1x015188.20.George S2, Benecisk JM, Lentz TA, Vis. SS. Dai Y, Bikoky JE, Zepperi G. ItOplimal Screening for Prediction of Referral and Outcome ( OSPRO ) for Musculoskeletal Pain Conditions : Results From the Visildation Cohort. J Orthop Sports Phys Th", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "The authors also distinguish between the two major principles of legislative approaches in OSH, that is, \neither setting an objective and letting the actors define how this goal can be achieved**(goal-oriented**\n**approach)**, or prescribing also quite detailed measures to reach the objective**(prescriptive**\n**approach)**:352 \n\n*‘There seems to be a general view that the Framework Directive, with its orientation towards a goal-*\n*oriented approach to OSH (rather than prescriptive) successfully lays out a suitable template for*\n*managing workplace risks – but not in itself enough to ensure that all risks are dealt with sufficiently.*\n*One criticism of the goal-setting approach is that the absence of prescriptive intermediate goals makes*\n\n*compliance harder to verify and, in the absence of that verification procedure, harder to enforce*\n*(especially in OSH cultures with a history of the prescriptive approach).’*353 \n\nRegarding the**level of compliance with the legal goals or prescriptions**, the study authors assess it \nas ‘moderate to good.’ They see major differences depending on the topic and the size of the \nenterprises:", - "page_start": 120, - "page_end": 120, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "There is**no strict separation between the following four types for research categories**. For \nexample, the EU-OSHA study ‘Analysis of the determinants of workplace occupational safety and health \npractice in a selection of EU Member States’ 469 includes an analysis of the systems and infrastructures \nas well as of the framework and context influence. To fully cover understanding and support of OSH \nprevention in workplaces, all these types of research are needed.", - "page_start": 133, - "page_end": 133, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed5.pdf", - "query": "What is the range of the pain rating scale ?", - "target_page": 3, - "target_passage": "Pain intensity was assessed by the numerical pain rating scale (NPRS) ranging from “0” (no pain) to “10” (worst pain imaginable)", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "G. The societal impact of pain in the European Union : health - related quality of life and healthcare resource utilization. J Med Econ. 2010 : 13 : 571 – 81.17.Perez C, Navarro A, Saldaria MT, Wilson K, Rejai J. Modeling the predictive value of pain intensity on costs and resources utilization in patients with peripheral neuropathic pain. Clin. I Pain. 2015 ; 31 : 273 – 9.18.Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and response to treatment. Phys Ther. 2011 ; 91.712 – 21.19.George SZ, Beneck JM, Lentz TA, Wku SS. The Optimal Screening for Prediction of Referral and Outcome ( OSPRD ) in patients with musculoskeletal pain conditions a longitudinal validation cohort from the USA. BMI Open 2017 ; 1x015188.20.George SZ, Beneck & JM, Lentz TA, Wku SS, Dia Y, Biolosky Jf, Zeppieri G Jt. Qoltimal Screening for Prediction of Referral and Outcome ( OSRR0 ) for Musculoskeletal Pain Conditions : Results From the Vialidation Cohort. J Orthwa Sports Phys", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "[html]21.Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistentmusculoskeletal pain at 12 months : a secondary analysis of the Optimal Screening for Prediction of Referral and Outcome ( OSPRO ) validation cohort study. Phys Ther. 2018 ; 98 : 290 - 301.22.Freburger JK, Yolmes GM, Agars RP, Jxckman AM, Dierter JD, Wollace AS, et al. The rising prevalence of chronic low back pain. Arch Intern Med. 2009 : 169.251 – 8.23.Carey ' TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al. Race, care seeking, and utilization for chronic back and neck pain :population perspectives. J Pain Off J Am Pain Soc. 2010 ; 11 : 343 – 5024.Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and validity of chronic pain intensity measures. Pain. 1999 ; 83 : 157 – 62.25.Boltton JE. Accuracy of recall of usual pain intensity in back pain patients. Pain. 1999803.533 – 9.26.Childs JD, Piva SR, Frkz JM. Responsiveness of the numeric pain rating scale27.in pirients with low back pain. Spine. 2005 ; X01331 – 4. Venon H. The neck disability index. state - of - the - art, 1991 - 2008. J Manip Physiol Ther. 2008 ; 31491 – 502.28.Vemon H, Mlor S. The neck disability index : a study of reliability and validity. J Manip Physiol Ther. 1991 ; 14409 – 15.29.Hudon - Cook N, Tomes - Nicholson K, Breen A. A revised Oswestry disability questionnaire, In Rioland M. Jerner J. editos. Bioli pairs new approaches to rehabilitation and education. New York Manchester Uriviversity Press, 1989. p. 187 –30.Fritz. IM, Irrgang JJ. A comparison of a modified Oswestry low back pain disability questionnaire and the Quebec back pain disability scale. Phys Ther. 2001.81 : 776 – 88.31.Beaton DE, Wright JG, Katz JN, Upper Extremity Collaborative Group. Development of the QuidOASH : comparison of three item - reduction approaches. J Bone Joint Surg Am. 2005 ; 871038 – 46.32.Irrgang JJ, Anderson AF, Boland AL, Hamer CD, Kurosaka M, Neyret P, et al. Development and validation of the international knee documentation committee subjective knee form. Am J Sports Med 2001 ; 29 : 600 – 13.33.Butera KA, Lentz TA, Beneciuk JM, George SZ. Preliminary evaluation of a modified STarT back screening tool across different musculoskeletal pain conditions. Phys Ther. 2016 ; 96 : 1251 – 61.34.Chirison ME, Pompei P, Alex KL, MacKenzie CR. A new method of classifying prognostic comorbidity in longitudinal studies : development and wildation. J Chronic Dis. 1987 ; 40 : 373 - 83.35.Katz. IN, Chang LC, Sangha O, Fossel AH, Bates DW. Can comorbidity be measured by questionnaire rather than medical record review? Med Care. 1996.94.36.Geoge S2, Beneckal M, Balosky JE, Limtz TA, Zeppiel G, Pir Q, et al. Development of a review - of - systems screening tool for orthopaedic physical therapists results from the Optimal Screening for Prediction of Referral and Outcome ( OSPRR37.Lenta : TA, Benecivik JM, Biakosky JIL, Zeppier G, Dix Y, Wu SS, et al. Development of a yellow flag assessment tool for orthopsedic physical therapists : results from the Optimal Screening for Prediction of Referral a Outcome ( OSRKO ) coho38.Benecivk JM, Fritz JM, George SZ. The STarT back screening tool for prediction of 6 - month clinical outcomes : relevance of change partterms in outpatient physical therapy settings. J Orthop Sports Phys Ther. 20144439.Myers RH. Classical and modern regression with applications. 2nd ed. Pacific Grove :", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - }, - { - "text": "0.0011.45Baseline disability0.810.18< 0.0012.250.980.19< 0.0012.66Change in pain0.340.11< 0.0011.410.370.11< 0.0011.45Emergency roomAge− 0.00.03< 0.0010.910.48− 0.060.030.030.940.50Anatomical location ( neck ) c0.540.970.581.71− 0.370.920.690.69Anatomical location ( low back ) c0.720.950.452.05− 0.040.890.970.96Anatomical location ( shoulder ) c− 2.861.490.060.06− 3.521.530.020.03Insurance ( public ) d1.89", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed5.pdf" - }, - { - "text": "[24–26]. Participants \n\npain imaginable) \nrated their \ncurrent pain intensity, as well as their best (lowest) and \nworst \nthe past 24 h. \nCurrent, best and worst pain ratings were averaged for \npurposes of analysis. \n\nHealthcare utilization predictors \nWe collected potential predictors by self-reported ques- \ntionnaires at initial evaluation using an online study web- \nsite. Participants were directed back to the study website \n4 weeks following initial evaluation to again complete \nquestions on pain intensity, disability, and pain-related \npsychological distress. Change in pain intensity, disability, \nand pain-related psychological distress from baseline to \n4 weeks were modeled as treatment response variables \nand included as potential predictors. \n\n(highest) pain intensity over \n\nRegion-specific disability \nSelf-reported region-specific disability was assessed with \nthe Neck Disability Index [27, 28], Oswestry Disability \nQuestionnaire [29, 30], Quick Disability of Arm Shoulder \nand Hand [31] or International Knee Documentation \nCommittee Subjective Knee Form [32] for cervical, low \nback, shoulder and knee pain, respectively. Region-specific \ndisability measures were z-transformed for purposes of \nanalysis, consistent with our prior work involving multiple \nanatomical regions [33]. \n\nComorbidities \nCharlson comorbidity index (CCI) \nThe Charlson Comorbidity Index was used to measure \nthe presence of chronic comorbid medical conditions \n[34]. It lists 19 medical conditions that participants are \nasked to indicate whether they “have ever been diag- \nnosed with by a physician”. Conditions are weighted \nand added for an overall measure of comorbidity \nburden. The CCI has demonstrated good test-retest re- \nliability (0.91) and positive but weak to modest correla- \ntions with medication use, hospitalizations, \nlength of \ntotal charges, and pharmacy and laboratory \nstay, \ncharges for older adults in general medical care and \nsurgical care settings [35]. \n\nSociodemographic and health-related information \nParticipants completed a standard intake questionnaire \nform previously used in our clinical studies that assessed \nage, sex, race, and insurance provider type. This ques- \ntionnaire also assessed health-related variables included \nanatomical region of primary pain complaint (low back, \nneck, shoulder, or knee) and whether the patient had \nundergone surgery for their primary pain complaints \n(yes or no). Due to small cell sizes for certain categories, \nrace was dichotomized as white or non-white. For insur- \nance type, participants were asked to choose one of the \nfollowing options: private, public (Medicare and/or Me- \ndicaid), uninsured/self-pay, worker’s compensation, and \nother/commercial insurance. Among the study sample, \nwe observed few with no insurance (n = 7) or worker’s \ncompensation (n = 14). The study also included relatively \nfew with ‘other/commercial insurance’ (n = 45). Within \nthis group, informal assessment of these various plans \nsuggested high heterogeneity of plan characteristics and \ncoverage. Due to the small number of subjects in these \nindividual insurance strata and to improve interpretabil- \nity of results, we collapsed those reporting no insurance, \nworker’s compensation and other/commercial insurance \ninto a single category (i.e., ‘Other’). Therefore, insurance \ntype was categorized as private, public, or other (no in- \nsurance, worker’s compensation, or other/commercial \ninsurance) for purposes of analysis.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "\n \n \n \n \n [html]Utilization reported at 6 - month follow - upUtilization reported at 12 month follow - upDichotomous indicator for any healthcare utilization over entire follow - up\n
Label
Utilization volume012 – 55 – 10> 10012 – 55 – 10> 10NoYes
Opioids20918161220419167020145
Injection21217142121717120020640
Surgery24042002311320022719
Diagnostic tests or imaging18340221018826284017274
Emergency room23772002321121022818
Any care140106
\n\nweighted analytic models for each type of healthcare \nservice. \n\nUtilization of individual services \nOpioids \nComorbidity index score (i.e. CCI), baseline pain and \nchange in pain were consistent predictors between the \nmodels of opioid utilization. In these models, higher pain \n(OR = 1.70–1.76, \n(OR = 1.54–1.60, \np < 0.001) and increase in pain (OR = 1.70–1.71, p < 0.001) \nwere associated with higher odds of opioid utilization. \nThese models explained approximately 30% of the variation \nin opioid use. \n\nAny healthcare \nfor any healthcare \nThe final parsimonious models \nutilization differed slightly between complete case and \nweighted analyses (Table 6). Included in the models were \nchronicity of symptoms, CCI, baseline pain, baseline dis- \nability, and change in pain from baseline to 4-week \nfollow-up. However, only baseline disability (OR = 1.48– \n2.47, p < 0.05) and change in pain (OR = 1.28–1.45, \np < 0.05) were significant predictors in both models, with \ngreater baseline disability and worsening pain associated \nwith higher odds of any utilization. \n\np < 0.001), CCI \n\nInjection \nA combination of race, chronicity and baseline disability \nexplained slightly more than 20% of the variance in", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed5.pdf" - }, - { - "text": "42.1 )− 22.01.751.8Number of sites581( 1 )58", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Assessment tools \nOSPRO Review of Systems tool (OSPRO-ROS) \nThe OSPRO-ROS is a review-of-systems screening tool for \nuse in outpatient orthopedic physical therapy settings [36]. \nThe OSPRO-ROS has demonstrated good concurrent val- \nidity with depression and a comprehensive 97-item battery \n[36] \nof non-musculoskeletal symptoms (i.e., red flags). \nModerate \nthe \ncapabilities of \nstrong predictive \nOSPRO-ROS have been reported for persistence of pain, \nquality of life, and change in comorbidity 12 months fol- \nlowing physical therapy in patients with musculoskeletal \npain [20, 21]. The OSPRO-ROS includes standard symp- \ntom descriptors to aid with identification of systemic or \nnon-musculoskeletal origins of musculoskeletal pain. It \nincludes questions related to symptoms of the cardiovascu- \nlar, gastrointestinal, endocrine, nervous, \nintegumentary, \npulmonary, and musculoskeletal systems. The full-length \n23-item version of the OSPRO-ROS is capable of identify- \ning 100% of positive red-flag responders (i.e. \nindicating \n“yes” to at least one systemic symptom on a questionnaire) \nin outpatient orthopedic physical therapy settings. [36] A \nshorter, 10-item version is also available that has been \n\nto \n\nPain-related clinical variables \nPain status was determined using established definitions \nthat account for the duration of pain and activity limita- \ntions [22, 23] using the following two questions: 1) \n“How long have you been experiencing your current \npainful symptoms?” and 2) “Have you experienced ANY \npain and activity limitations every day for the past 3 \nmonths?” Responses to question 1 of “greater than 90 \ndays” or responses to question 2 of “Yes” were used to \nclassify patients as having persistent pain at \ninitial \nevaluation. \n\nPain intensity \nPain intensity was assessed by the numerical pain rating \nscale (NPRS) ranging from “0” (no pain) to “10” (worst", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "shown to identify approximately 95% of positive red-flag re- \nsponders. For statistical analyses, the “yes” responses were \nadded for each version and included in each model as a \ncontinuous independent variable. \n\n\n \n \n \n \n [html]\n
pain complaint in the time following their physical the treatment :
1.
\n\n2. \n3. Surgery \n4. Diagnostic tests or Imaging (eg. xray, MRI, CT \n\nscan, nerve conduction test, etc.) \nvalidity with pain intensity 5. Emergency room visits \n\nOSPRO Yellow Flag tool (OSPRO-YF) \nThe OSPRO-YF is a yellow flag assessment tool that in- \ncludes items from pain vulnerability domains (negative \naffect and fear-avoidance) and pain resilience domains \n(positive affect and self-efficacy) to aid with identification \nof pain-related psychological distress in outpatient ortho- \npedic physical therapy settings [37]. The OSPRO-YF has \ngood concurrent \nand \nregion-specific disability [37] and is capable of predicting \npain intensity, disability, quality of life and persistent pain \n12 months following physical therapy in patients with \nmusculoskeletal pain [20, 21]. The full-length OSPRO-YF \nhas 17-items, however a shortened 10-item version is also \navailable with an acceptable trade-off in accuracy. Like the \nOSPRO-ROS, the OSPRO-YF is designed for implementa- \ntion into electronic medical record (EMR) systems to \nquickly and accurately identify risk for a variety of clinical \noutcomes [19]. For statistical analyses, a summary score \nwas derived for each version by adding the item responses \nafter reverse-scoring items 2, 13, 14, 15 and 17 so that \nhigher scores indicate higher pain-related psychological \ndistress. The summary score was then included in each \nmodel as a continuous independent variable. \n\n“Yes” responses were followed by questions regarding \nthe quantity of services utilized (i.e. number of opioid \npainkillers, number of diagnostic tests or number of \nemergency room visits). All utilization questions were \nanswered on a categorical scale (0, 1, 2–5, 5–10, or > 10) \nindicating the quantity of a particular service received \nduring the applicable follow-up timeframe. At 6-month \nfollow-up, study participants reported their use of ser- \nvices for the previous 2 months, allowing a timeframe of \n4 months from initial evaluation for them to complete \nphysical therapy. At 12-month follow-up, study partici- \npants reported their use of services over the previous \n6 months since their last survey. This method provided \nan 8-month overall follow-up period after physical ther- \napy and two follow-up points were included to minimize \nrecall bias. \n\nIntervention \nAll physical therapy treatment was provided at the discre- \ntion of the treating clinician. The duration of the episode, \nthe number of physical therapy visits, and individual treat- \nment parameters (type, \nfrequency) \nwere not collected for pragmatic reasons. In particular, \nclinical and utilization data are not commonly collected in \na standardized format and would need to be extracted \nfrom disparate medical record databases across different \nhealth care systems to assess treatment. This was not feas- \nible given the scope and design of \nthis multisite \nsurvey-based study. However, instead of coding treatment \ntype we included baseline-to-4 week change in pain inten- \nsity, region-specific disability, and OSPRO-YF scores in \neach model as measures of treatment response. In that \nmanner the individual effects of the treatment received \nwere included in the predictive models, without directly \naccounting for the type of treatment. \n\nintensity, duration,", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" - }, - { - "text": "[html]References1.Von Korff M, Scher Al, Helmick C, Carter - Pokras O, Dodick DIN, Goulet J, et al. United states national pain strategy for population research : concepts, definitions, and pilot data. J Pain Off J Am Pain Soc. 2016 ; I7 : 1068 – 80.2.Clarke JL, Skoufalos A, Scranton R. The American opioid epidemic : population health implications and potential solutions. Report from the netional stakeholder panel. Popul Health Manag. 2016 ; 19 Ssppl 151 – 103.Dowell D, Haegerich TM, Chou R. CDC guideline for prescribing opioids for chronic pain – United States, 2016. JAMA 2016 ; 315 : 1624 – 45.4.Boyles R, Toy P, Mellon J, Hayes M, Hammer B. Effectiveness of manual physical therapy in the treatment of cervical radiopathy a systematic review. J. Man Manip Ther. 2011 ; 19 : 135 – 42.5.Biarge E, Monnin D. Berchtold A, Allet L. Cost - effectiveness of physical therapy only and of usual care for various health conditions : systematic review. Phys Ther 2016 ; 96 ; 774 – 96.6.Desly : GD, Allison SC, Matelei RL, Ryder MG, Stang JM, Gohdes DD, et al. Physical therapy treatment effectiveness for osteoarthritis of the knee a randomized comparison of supervised clinical exercise and manual therapy procedures ves7.Deyle GD, Henderson NE, Matekel RL, Ryder MG, Garber MB, Allison SC, Bfficctiveness of manual physical therapy and exercise in osteoarthritis of the knee. A randomized, controlled trial. Ann Intern Med. 2000 ; 152 : 175 – 81.8.Freburger JK, Carey TS, Holmes GM. Effectiveness of physical therapy for the management of chronic spine disorders : a propensity score approach. Phys ther. 2006 ; 86 : 381 – 949.Kuhn 8 ; Dunn WR, Sanders R, An Q, Baumgarten KM, Bishop I1, et al. Bffectiveness of physical therapy in treating atraumatic full - thickness rotator cuff tears : a multionter prospective cohort study. J Shoulder Elb Surg. 2013 ; 221371 – 9.10.Fritz. ( M. Childs ID, Wainner RS, Flynn TW. Primary care referral of patients with low back pain to physical therapy : impact on future health care utilization and costs. Spine. 2012 : 37 : 2114 – 21.11.Fitz. M., Brennan GP, Hunter SL Magel JS. Initial management decisions after a new consultation for low body pain : implications of the usage of physical therapy for subsequent health care costs and utilization. Arch Phys Med Rehabil. 20112.HIV. IC, Dunn KM, Lewis M, Mullis R, Main C3, Foster NIC, et al. A primary care back pain screening tool : identifying patient subgroups for initial treatment. Arthritis Rheum. 2008.93632 – 41.13.Traeger AC, Henschike N, Hiabscher M, Williams CM, Kamper SJ, Maher CG, et al. Estimating the risk of chronic pain : development and validation of a prognostic model ( PDISP ) for patients with acute low back pain. Plus5 Med, 2016 ; 13x19020014.Karran IS, McAuley JH, Traeger AC, Hillier SL, Grabiter I, Russek LN, et al. Can screening instruments accurately determine poor outcome risk in adults with recent onset low back pain? A systematic review and meta - analysis. BMC Med. 201715.Azevedo LT, Costa - Pereira A, Mendonca L, Dias CC, Castro - Lopes JM. Chronic pain and health services utilization : is there overuse of diagnostic tests and negurilities in nonpharmacologic treatment methods utilization? Med Care. 20116.Limgley P, Muller - Schwelle G, Nicoliaox A, Liedgens H, Pergolizz J, Varnesi G. The societal impact of pain in the European Union : health - related quality of life and healthcare resource utilization. J Med Econ. 2010 : 13 : 571 – 81.17.Perez C,", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "\n \n \n \n \n [html]Table 2 Baseline health - related information for the full cohort, and for those with complete and incomplete follow - upAnatomical region0.27Symptom onset0.03Duration of symptoms urgery for condition0.800.56Work - related injury ( 32 missing )0.36Chronicity0.05Pain Intensity0.01Disability0.16CCI0.76\n
VariableLabelFull cohort at baseline ( n = 440 )Completed follow - up ( n = 246 )Did not complete follow - up ( n = 194 )p - value °
Health - related information
Neck98 ( 22.3 %)48 ( 19.5 %)50 ( 25.8 %)
Low Back118 ( 26.8 %)66 ( 26.8 %)52 ( 26.8 %)
Shoulder107 ( 24.3 %)59 ( 24.0 %)48 ( 24.7 %)
Knee117 ( 26.6 %)73 ( 29.7 %)44 ( 22.7 %)
Gradual239 ( 54.3 %)146 ( 59.3 %)93 ( 47.9 %)
Sudden138 ( 31.4 %)65 ( 26.4 %)73 ( 37.6 %)
Traumatic63 ( 14.3 %)35 ( 14.2 %)28 ( 14.4 %)
Mean ± SD398.58 ± 1715.80379.79 ± 1999.77423.01 ± 1259.33
Median ( min, max )90 ( 0 – 29565 )90 ( 1 – 29565 )90 ( 0 – 10000 )
Yes83 ( 18.9 %)44 ( 17.9 %)39 ( 20.1 %)
No357 ( 81.1 %)202 ( 82.1 %)155 ( 79.9 %)
Yes63 ( 14.3 %)30 ( 12.2 %)33 ( 17.0 %)
No345 ( 78.4 %)198 ( 80.5 %)147 ( 75.8 %)
Acute101 ( 23.0 %)65 ( 26.4 %)36 ( 18.6 %)
Chronic324 ( 73.6 %)173 ( 70.3 %)151 ( 77.8 %)
Mean ± SD4.22 ± 1.983.94 ± 1.724.58 ± 2.21
Median ( min, max )4 ( 0 – 9.67 )4 ( 0 – 8 )4.5 ( 0 – 9.7 )
Mean ± SD0 ± 1.0− 0.06 ±. 970.08 ± 1.03
Median ( min, max )− 0.16 (− 2.41 – 3.14 )− 0.23 (− 2.21 – 2.94 )− 0.01 (− 2.41 – 3.14 )
Mean ± SD0.66 ± 1.470.68 ± 1.620.63 ± 1.25
Median ( min, max )0 ( 0 – 13 )0 ( 0 – 13 )0 ( 0 – 8 )
", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed5.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed5.pdf", - "query": "What are the health consequences of musculoskeletal pain ?", - "target_page": 1, - "target_passage": "Musculoskeletal pain is a prevalent and costly health condition with far-reaching public health consequences including chronic pain, disability and opioid-related ad diction [1].", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "G. The societal impact of pain in the European Union : health - related quality of life and healthcare resource utilization. J Med Econ. 2010 : 13 : 571 – 81.17.Perez C, Navarro A, Saldaria MT, Wilson K, Rejai J. Modeling the predictive value of pain intensity on costs and resources utilization in patients with peripheral neuropathic pain. Clin. I Pain. 2015 ; 31 : 273 – 9.18.Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and response to treatment. Phys Ther. 2011 ; 91.712 – 21.19.George SZ, Beneck JM, Lentz TA, Wku SS. The Optimal Screening for Prediction of Referral and Outcome ( OSPRD ) in patients with musculoskeletal pain conditions a longitudinal validation cohort from the USA. BMI Open 2017 ; 1x015188.20.George SZ, Beneck & JM, Lentz TA, Wku SS, Dia Y, Biolosky Jf, Zeppieri G Jt. Qoltimal Screening for Prediction of Referral and Outcome ( OSRR0 ) for Musculoskeletal Pain Conditions : Results From the Vialidation Cohort. J Orthwa Sports Phys", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "R E S E A R C H A R T I C L E \n\nPrediction of healthcare utilization \nfollowing an episode of physical therapy \nfor musculoskeletal pain \nTrevor A. Lentz1* , Jason M. Beneciuk2,3 and Steven Z. George4 \n\nAbstract \n\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively \nidentify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The \npurpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode \nof physical therapy for musculoskeletal pain. \n\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO) \nlongitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder \npain in physical therapy (n = 440). Demographics, health-related information, review of systems, comorbidity and \npain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in \npain intensity, disability, and pain-related psychological distress were measured as treatment response variables. \nAt 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests \nor imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models \nwere developed for any subsequent care and service-specific utilization. \n\nResults: Subsequent pain-related healthcare utilization was reported by 43% (n = 106) of the study sample that completed \nthe 12-month follow-up (n = 246). Baseline disability and 4-week change in pain intensity were important global predictors \nof subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain \nintensity, disability and pain-related psychological distress predicted specific service utilization. \n\nConclusion: In those completing follow up measures, risk of additional pain-related healthcare utilization after physical \ntherapy was best predicted by baseline characteristics and 4-week treatment response variables for pain intensity, disability \nand pain-related psychological distress. These findings suggest treatment monitoring of specific response variables could \nenhance identification of those at risk for future healthcare utilization in addition to baseline assessment. Further study is \nrequired to determine how specific characteristics of the clinical encounter influence future utilization. \n\nKeywords: Screening, Psychological distress, Multimorbidity, Value, Treatment monitoring \n\n\n\nBackground \nMusculoskeletal pain is a prevalent and costly health \ncondition with far-reaching public health consequences \nincluding chronic pain, disability and opioid-related ad- \ndiction [1]. Clinical practice guidelines now recom- \nfrontline \nmend non-pharmacological \nmanagement for musculoskeletal pain, which will lead \n\nto increased utilization of services such as physical \ntherapy [1–3]. Physical therapy is effective for improving \ndisability and reducing costs associated with many muscu- \nloskeletal pain conditions [4–9]. However, pain-related \nhealthcare utilization beyond the physical therapy episode \n(e.g. subsequent use of surgery, injection, opioids, etc.) \nmay indicate suboptimal treatment response, the presence \nof more complex needs, or unwarranted escalation of care. \nDownstream healthcare utilization is not often considered \nas an outcome of care or indication of treatment effective- \nness for musculoskeletal pain. But the importance of \n\ntreatment as \n\n*Correspondence: trevor.lentz@duke.edu \n1Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham, \nNC 27705, USA \nFull list of author information is available at the end of the article", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "a \n\nThis study was undertaken in a nationwide, US cohort \nof patients receiving outpatient physical therapy for a \nprimary complaint of knee, shoulder, back or neck pain. \nThe primary aim of the analysis was to predict incidence \nof additional pain-related healthcare utilization in the \nyear following the episode of physical therapy for mus- \nculoskeletal pain. We considered factors not commonly \nassessed in outcomes prediction for musculoskeletal \npain, \nlike insurance, comorbidities, and treatment re- \nsponse, as well as those more often associated with \npain-related outcomes (e.g. psychological distress). This \nproject will lead to the development of potentially novel \noutcome prediction models for this population in a com- \nmon, non-pharmacological US healthcare setting. The \nresults of this study will be particularly important in \nvalue-based payment settings where enhanced clinical \ndecision-making drives treatment effectiveness and sys- \ntem efficiency. \n\nThe primary aim of the OSPRO cohort study was to de- \nvelop and validate review of systems (i.e. evidence of sys- \ntemic involvement) and yellow flag (i.e. pain-related \npsychological distress) screening tools for use in out- \npatient orthopedic physical therapy settings. These screen- \ning tools, once validated and refined for clinical decision \nmaking, may improve the value of care delivery by accur- \nately identifying individuals who 1) are appropriate for \nreferral \nof \nnon-musculoskeletal symptoms, and/or 2) would benefit \nfrom enhanced, psychologically-informed physical ther- \napy. Early identification of individuals most appropriate \nfor these modified pathways of care has the potential to \nreduce wasteful downstream health care utilization, limit \nthe risk of unwarranted and costly care escalation, and im- \nprove clinical outcomes. Results of the primary analyses \nexamining the predictive ability of the OSPRO tools for \npain, disability, health status, and comorbidity outcomes \nhave been previously published [20]. Pre-planned second- \nary analyses included prediction of persistent pain state \n[21] and this current analysis predicting future healthcare \nutilization. All subjects consented to participation in the \nstudy and ethics approval was granted by the University of \nFlorida Institutional Review Board. \n\nto other providers for management", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed5.pdf" - }, - { - "text": "routine pain-related psychological distress monitoring \nthe early phases of rehabilitation espe- \nthroughout \ncially if \nis to identify risk for subsequent \npain-related healthcare utilization. The implications of \nthese collective findings are that treatment pathways \nmay provide greater value by 1) addressing modifiable \nhealth-related \nand \npain-related psychological distress, 2) routine moni- \ntoring of these health-related variables and 3) offering \ntreatment alternatives \nsafely escalate care if \nthat \nneeded while minimizing risk of harm and unhelpful \nutilization. \n\nthe goal \n\nvariables like pain, disability \n\nadditional healthcare use is expected following physical \ntherapy, especially among individuals \nthat are on \nlong-term pain management pathways due to chronic or \npersistent symptoms. Yet with over 40% reporting subse- \nquent pain-related healthcare among those completing \nfollow-up, it is apparent that opportunities exist to im- \nprove pathway selection and/or the effectiveness of \ntherapy for individuals with musculoskeletal \nphysical \npain. This finding is particularly notable given recent \nefforts to define physical therapy as an effective first line, \nnon-pharmacological \ntreatment option against more \ninvasive or higher risk services, such as surgery or opioid \nuse, respectively. Predictive variables identified in this \nanalysis can be used to develop risk models that better \ninform pathway selection for those seeking physical ther- \napy for musculoskeletal pain. The precise application of \nthese risk models, and how they inform policy and prac- \ntice should be the target of future study. However, phys- \nical \nincorporate enhanced \ntreatment monitoring to assess ongoing risk for down- \nstream utilization, as well as physical therapist-led inter- \nventions \nimportant \nthoroughly \nmodifiable factors such as pain intensity, disability and \npain-related psychological distress [38]. Improved path- \nway selection might entail the consideration of referral \nto or co-treatment with other providers to more ad- \nequately address non-modifiable characteristics. Collect- \nively, \nthese approaches could improve the value of \nphysical therapy by minimizing risk for high downstream \nhealthcare utilization and potentially unwarranted escal- \nation of care. \n\ntherapy re-design might", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" - }, - { - "text": "[html]Sistent Dptimal46.Harris RU. A primer of multivariate statistics. 3rd ed. Mahwah : Psychology Press ; 2001.Patients with controlled between cohort47.Piette JD, Ken f. A. The impact of comorbid chronic conditions on diabetes care. Diabetes Care. 200629.725 - 31.Mace AS, et al. 2009 ;48.Rice ASC. Smith BH, Blyth FM. Pain and the global burden of disease. Pain. 2016 / 157791 – 6.49.Fritz. IM. Cleland JA. Speckman M. Brennan GP. Hunter SJ. Physical therapy for acute low back pain : associations with subsequent healthcare costs. Spine. 2008 ; 33 : 1800 – 5.50. oility and50.Lenta : TA, Harman JS, Marlow NM, George SZ. Application of a value model for the prevention and management of chronic musculoskeletal pain by physical therapists. Phys Ther. 2017 ; 97 : 354 – 64.patients.51.Steme JAC, White IR, Carlin B, Spraitt M, Royston P, Kenward MG, et al. Multiple imputation for missing dira in epidemiological and clinical research : potential and pitMs. BMJ. 2009 ; 338 : b2393.rating scale52.Bishop MD, Mintken PE, Bialosky IE, Cleland JA. Patient expectations of benefit from interventions for neck pain and resulting influence on outcomes. J Orthop Sports Phys Ther. 2013 ; 45 : 457 – 65.and validity.53.Biakoky JE, Bishop MD, Cleliand JA. Individual expectation : an overlooked, but pertinent, factor in the treatment of individuals experiencing musculoskeletal pain. Phys Ther. 2010 ; 90 : 1345 – 55.proaches to ress ; 1989.54.“ Harmer, Wi, Marariochio M, Loa X, Kofber M. I he rrifiuence of physical therapy guideline adherence on healthcare utilization and costs among patients with low back pain : a systematic review of the literature. PLoS One. 2016.11 e015679Back pain e. Phys55.Childs JD, Fritz. M. Wv. SS, Flym TW, Wairmer RS, Robertson EX, et al. Implications of early and guideline adherent physical therapy for low back pain on utilization and costs. EMC thealth Sens Res. 2015.19.6s : 0.6 arg /Post - term56.Yu S - T, Chang H. Y, Lin M - C, Lin Y - M. Agreement between self - reported and health insurance claims on utilization of health care : a population study. Jret P, et al.57.Petrox S. Mwnsy L. Cooper P. Davidson U. L. The xcoracy of self - reported healthcare resource utilization in health economic studies. Int J Technol Assess Health Care. 2002 : 185 – 10.Percentage58.Short Mf., Goetzel R2, Pei K, Tabrizi MJ, Ozminkowski RJ, Gibson TB, et al. How accurate are self - reports? Analysis of self - reported health careof classifying d validation.utilization and absence when compared with administrative dieta. J OccupEnviron Med. 2009 ; 51 : 786 – 96.Addity be Med Care.Proportional. and experienceCtion of ar. 2015 ; 45 :4.ohysicalReferral and 7 – 43.for2014 ; 44d ed. Pacificand NT,example3 : 119 – 28.Ready to submit your research? Choose BMC and benefit from :10TableAllow• thorough peer review by experienced researchers in your field • rasid oublication an acceptanceJation study• susport for research data, including large and complex data types", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - }, - { - "text": "224 Pega et al., 2022: Global, regional and national burden of disease attributable to 19 selected occupational risk \nfactors for 183 countries, 2000–2016: A systematic analysis from the WHO/ILO Joint Estimates of the Work- \nrelated Burden of Disease and Injury, here \n225 Kauppinen et al., 1998: Occupational exposure to carcinogens in the European Union in 1990-1993: \ninternational information system on occupational exposure to carcinogens, here \nCAREX Canada \nFevotte et al., 2011: Matgéné: A Program to Develop Job-Exposure Matrices in the General Population in France \nMannetje et al., 2011: Developing a general population job-exposure matrix in the absence of sufficient exposure \nmonitoring data \n\n226 YLDs = years lived with disability, together with YLLs = years of life lost, it composes the DALY (DALY = YLL + \nYLD). \n\n227 GBD 2019 Mental Disorders Collaborators, 2022: Global, regional, and national burden of 12 mental disorders \nin 204 countries and territories, 1990–2019: a systematic analysis from the Global Burden of Disease Study 2019, \nhere \n228 WHO: Mental disorders, Key facts and \nIHME: Global Health Data Exchange (GHDx), here \n229 OECD, 2015: Sick on the Job?: Myths and Realities about Mental Health and Work \n230 OECD/European Union, 2018: Health at a Glance: Europe 2018: State of Health in the EU Cycle \n231 Andlin-Sobocki et al., 2005: Cost of disorders of the brain in Europe \n\n233 Norder et al., 2017: Beyond return to work from sickness absence due to mental disorders: 5-year longitudinal \nstudy of employment status among production workers, here \n234 Leka & Jain, 2017: EU Compass for Action on Mental Health and Well-Being - Mental Health in the Workplace \nin Europe \n235 Musculoskeletal disorders refer to backache and/or muscular pains in shoulders, neck, upper limbs and/or \nlower limbs (hips, legs, knees, feet, etc.). In the medical systematic it is the IC 10 group of diseases: Diseases of \nthe musculoskeletal system and connective tissue. \n236 EU-OSHA, 2019: Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU \n237 Graveling, 2018: Ergonomics and Musculoskeletal Disorders (MSDs) in the Workplace. A Forensic and \nEpidemiological Analysis \n238 Da Costa & Viera, 2010: Risk factors for work-related musculoskeletal disorders: a systematic review of recent \nlongitudinal studies, here \n239 EU-OSHA, 2020: Work-related musculoskeletal disorders: why are they still so prevalent? Evidence from a \nliterature review (p. 15). \n240 EU-OSHA, 2019: Summary - Work-related musculoskeletal disorders: prevalence, costs and demographics in \nthe EU (p. 8). \n241 EU-OSHA, 2019: Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU \n242 Ibid., p. 174ff. \n\n243 Eurofound, 2007: Fourth European Working Conditions Survey (2005) (p. 77). \n\n244 United Nations Economic Commission for Europe (UNECE), 2015: Handbook on measuring quality of \nemployment: A statistical framework, here \n\n245 Quinlan & Bohle, 2013: Re-invigorating industrial relations as a field of study: Changes at work, substantive \nworking conditions and the case of OHS, here (p. 8). \n\n246 The percentages of responses to this question in the European Working Conditions Survey (EWCS, 2015) are \ndisplayed. Each bar shows the percentages of the four possible responses for each EU Member State, the \naverage for the EU Member States, and the responses for Switzerland and Norway. Responses are displayed for \nthe question below: How satisfied are you with working conditions in your main paid job? Answer options were: \nNot at all satisfied; Not very satisfied; Satisfied; Very satisfied. See here", - "page_start": 149, - "page_end": 149, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "[html]- ediction of persistent nalysis of the Optimal ( OSPRO ) validation cohort46.Hants RJ. A primer of multivariate statistics. 3rd ed. Mahwah : PsychologyPsess 2001. Plette JD, Kerr EA. The impact of comorbid chronic conditions on diabete47.Piette JD, Kent EA. The impact of comorbid chronic conditions on diabetes care. Diabetes Care. 2006 ; 29.725 - 31.. Darter JD, Wallace AS, et Arch Intern Med. 2009 ;48.Rice ASC, Smith BH, Blyth FM. Pain and the global burden of disease. Pain 2016.157 : 791 – 6.49.Firtc : JM, Cleland JA, Speckman M, Breman GP, Hunter SJ. Physical therapy for acute low back pair : associations with subsequent healthcare costs. Spine. 2008 : 33 : 1800 – S.2010 ; 11 : 343 – 50. parative reliability and 999 ; 83 : 157 – 62.50.Lentz TA, Harman JS, Marfow NW, George SZ. Application of a value model for the prevention and management of chronic musculoskeletal pain by physical therapists. Phys Ther. 20175F354 - 64.v in back pain patients.51.Steme IAC. White IR. Carlin JB, Spratt M, Royston P, Kenward MG, et al. Multiple imputation for missing diea in epidemiological and clinicalnumeric pain rating scale1 – 4.1991 - 2008. J ManipTableresearch : potential and piflisl. BMJ. 2809338.62393. Bihlop MD, Minleri RE, Biololy EE, Cleand JA. Patient expectations of benefit from interventions for neck pain and resulting influence on outcomes. J Orthop Sports Phys Ther. 20134y of reliability and validity.53.Bialosky JE, Bishop MD, Cleland JA. Individual expectation : an overlooked, but pertinent, factor in the treatment of individuals experiencing musculoskeletal pain. Phys Ther. 2010 : 90 : 1345 – 55.Sevised Oswestry disability pain : new approaches toer University Press ; 1989.54.Harmey WJ, Meanocchio M, Liu X, Kolber MJ. The influence of physical therapy guideline adherence on healthcare utilization and costs among patients with low back pain : a systematic review of the literature. Pu. 6 : One 2016 ; 11 : el156799.Swestry low beck pain disability scale. Phys55.Childs JD, Fritz. M, Wu SS, Pynn TW, Wainner RS, Robertson DK, et al. Implications of early and guideline adherent physical therapy for low back pain on uliliation and costs. BMC : Pealth Serv Res. 2015.15 https :// cks org / 10.196 - 3 - 3830 - 3ollaborative Group. nree item - reduction56.Yu S - T, Chang hH - 1, Lin M - C, Lin Y - H. Agreement between self - reported and health insurance claims on utilization of health care : a population study. J Clin Epidemiol. 2009 ( S2 : 1316 – 22.± 2001 ; 29 : 600 – 13.57.Petrox S. Murray L. Cooper P. Dievidson LL. The accuracy of self - reportedminary evaluation of aTablehealthcare resource utilization in health economic studies. Int J lechnol Assess Health Care. 200218705 – 10.# musculoskeletal pain58Short Mf., Goetzel RZ, Pei X, Talbrid MJ, Ozminkowski RJ, Gibson TB, et al.new method of classifying velopment and validation.“ fow accurate are self - reports? Analysis of self - reported health care utilization and absence when compared with administrative data. I Occup Environ Med. 2009 ; 51 : 786 – 96.I. Can comorbidity be cord review? Med Care.opieri G, Pei Q, et al. ol for orthopaedic ning for Prediction of ports Phys Ther. 2015 ; 45 :Y, Wu SS, et al. orthopaedic physicalPrediction of Referral and ner. 2016 ; 46 ; 327 – 43,Screening tool forThe of change patterns in rts Phys Ther. 2014 ; 44 :oplications. 2nd ed.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - }, - { - "text": "[html]References1.Von Korff M, Scher Al, Helmick C, Carter - Pokras O, Dodick DIN, Goulet J, et al. United states national pain strategy for population research : concepts, definitions, and pilot data. J Pain Off J Am Pain Soc. 2016 ; I7 : 1068 – 80.2.Clarke JL, Skoufalos A, Scranton R. The American opioid epidemic : population health implications and potential solutions. Report from the netional stakeholder panel. Popul Health Manag. 2016 ; 19 Ssppl 151 – 103.Dowell D, Haegerich TM, Chou R. CDC guideline for prescribing opioids for chronic pain – United States, 2016. JAMA 2016 ; 315 : 1624 – 45.4.Boyles R, Toy P, Mellon J, Hayes M, Hammer B. Effectiveness of manual physical therapy in the treatment of cervical radiopathy a systematic review. J. Man Manip Ther. 2011 ; 19 : 135 – 42.5.Biarge E, Monnin D. Berchtold A, Allet L. Cost - effectiveness of physical therapy only and of usual care for various health conditions : systematic review. Phys Ther 2016 ; 96 ; 774 – 96.6.Desly : GD, Allison SC, Matelei RL, Ryder MG, Stang JM, Gohdes DD, et al. Physical therapy treatment effectiveness for osteoarthritis of the knee a randomized comparison of supervised clinical exercise and manual therapy procedures ves7.Deyle GD, Henderson NE, Matekel RL, Ryder MG, Garber MB, Allison SC, Bfficctiveness of manual physical therapy and exercise in osteoarthritis of the knee. A randomized, controlled trial. Ann Intern Med. 2000 ; 152 : 175 – 81.8.Freburger JK, Carey TS, Holmes GM. Effectiveness of physical therapy for the management of chronic spine disorders : a propensity score approach. Phys ther. 2006 ; 86 : 381 – 949.Kuhn 8 ; Dunn WR, Sanders R, An Q, Baumgarten KM, Bishop I1, et al. Bffectiveness of physical therapy in treating atraumatic full - thickness rotator cuff tears : a multionter prospective cohort study. J Shoulder Elb Surg. 2013 ; 221371 – 9.10.Fritz. ( M. Childs ID, Wainner RS, Flynn TW. Primary care referral of patients with low back pain to physical therapy : impact on future health care utilization and costs. Spine. 2012 : 37 : 2114 – 21.11.Fitz. M., Brennan GP, Hunter SL Magel JS. Initial management decisions after a new consultation for low body pain : implications of the usage of physical therapy for subsequent health care costs and utilization. Arch Phys Med Rehabil. 20112.HIV. IC, Dunn KM, Lewis M, Mullis R, Main C3, Foster NIC, et al. A primary care back pain screening tool : identifying patient subgroups for initial treatment. Arthritis Rheum. 2008.93632 – 41.13.Traeger AC, Henschike N, Hiabscher M, Williams CM, Kamper SJ, Maher CG, et al. Estimating the risk of chronic pain : development and validation of a prognostic model ( PDISP ) for patients with acute low back pain. Plus5 Med, 2016 ; 13x19020014.Karran IS, McAuley JH, Traeger AC, Hillier SL, Grabiter I, Russek LN, et al. Can screening instruments accurately determine poor outcome risk in adults with recent onset low back pain? A systematic review and meta - analysis. BMC Med. 201715.Azevedo LT, Costa - Pereira A, Mendonca L, Dias CC, Castro - Lopes JM. Chronic pain and health services utilization : is there overuse of diagnostic tests and negurilities in nonpharmacologic treatment methods utilization? Med Care. 20116.Limgley P, Muller - Schwelle G, Nicoliaox A, Liedgens H, Pergolizz J, Varnesi G. The societal impact of pain in the European Union : health - related quality of life and healthcare resource utilization. J Med Econ. 2010 : 13 : 571 – 81.17.Perez C,", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "therapy re-design might \n\nOpioids and diagnostic tests and imaging were the two \nmost common subsequent healthcare services utilized \nfollowing physical therapy. Of the individuals that com- \npleted follow up and had any subsequent healthcare \nutilization, approximately 42% reported opioid use and \n70% reported use of diagnostic tests and imaging. An \nimportant health-related predictor of these services was \nlevel of comorbidity burden. For those with high comor- \nbidity burden and inadequate treatment response to \nphysical therapy, use of additional diagnostic tests and \nimaging or low-dose opioids may be appropriate in some \ncases. But given the growing public health concern over \nopioid use and the desire to avoid unnecessary treat- \nment driven by imaging, our results suggest the import- \nance of considering disease burden when developing \ntreatment pathways and healthcare policy to mitigate \nrisk for avoidable use of these services. Interestingly, \nneither \npredicted \nutilization outcomes even though it has been linked to \nmental health, comorbidity, and persistent pain state in \nother analyses [20, 21]. Systemic symptom burden is a \nmeasure of patient complexity that is related to but dis- \ntinct from comorbidity burden [36, 47]. In these ana- \nlyses, the chronic condition measure (i.e. the CCI) was \na better predictor of utilization than symptom burden \n(i.e. OSPRO-ROS). The reasons for this finding are un- \nclear but may be related to providers and patients being \nmore likely to pursue follow-up medical care for mus- \nculoskeletal pain when known co-existing conditions \nare present as opposed to reporting of symptoms alone. \nThe distinction between symptom and disease burden \nin defining musculoskeletal patient complexity, and its \ninfluence on clinical decision-making and outcomes, \nshould be the subject of future research particularly re- \nlated to aging populations [48]. \n\nversions of the OSPRO-ROS \n\nthe study is longitudinal \nfollow-up at multiple time points following an episode \nof physical therapy for a variety of musculoskeletal pain \nconditions. Anatomical location of pain was not a sig- \nnificant predictor of healthcare use in all but one model, \na \nsuggesting results \nspectrum of musculoskeletal pain conditions. Another \nstrength of this cohort study is the assessment of various \nhealthcare utilization outcomes of interest for establish- \ning health policy. When considered alongside more trad- \nitional pain- or disability-related outcomes prediction \nmodels, these findings will improve the ability of health- \ncare systems and providers \nin \nvalue-based purchasing environments. The consideration \nof multiple screening tools (i.e. yellow flags and review \nof systems) and treatment monitoring variables is also a \nstrength of this study as screening and systematic treat- \nment monitoring are not routine in clinical practice. A \nfinal strength is inclusion of multiple sociodemographic, \nhealth-related and psychosocial factors as potential pre- \ndictors. Healthcare outcomes and utilization exhibit \nemergent properties that require the consideration of \nexplain [50]. \nmultiple, \n\nThe primary strength of \n\nare widely applicable across \n\nUtilization outcomes benchmarks have not been estab- \nlished to determine how the percentage of subsequent \nhealthcare use in this study compares to outcomes using \nother health services. Prior studies suggest physical ther- \napy is associated with reduced incidence of additional \nhealthcare use compared to not using physical therapy \nin patients with acute low back pain [10, 49]. Some competing factors to fully", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" - }, - { - "text": "[html]2.Clarke JL ; Skoufalos A. Scranton R. The American opioid epidemic : population health implications and potential scilutions. Report from the national stakeholder panel. Popul? Health Manag. 2016 ; 151 – 10.3.Dowell D, Haegerich TM, Chou R. CDC guideline for prescribing opioids for chronic pain – United States, 2016. JAMA 2016 ; 315 : 1624 – 45.4.Boyles R, Toy P, Mellon J, Hayes M, Hammer B. Effectiveness of manual physical therapy in the treatment of cervical radiopathy a systematic review. J Man Manip Ther. 2011 ; 19.135 – 42.5.Biarge E, Monnin D. Berchtold A, Allet L. Cost - effectiveness of physical therapy only and of usual care for various health conditions : systematic review, Phys Ther, 2016 ; 96 ; 7714 – 86.6.Deyke GD, Allison SC, Matelei RL, Ryder MG, Stang JM, Gshdes DO, et al. Physical therapy treatment effectiveness for osteoarthritis of the knee a randomized comparison of supervised clinical exercise and manual therapy procedures veri7.Deyle GD, Henderson NE, Matekel RI, Ryder MG, Garber MB, Allison SC. Bfficctiveness of manual physical therapy and exercise in osteoarthritis of the knee. A randomized, controlled trial. Ann Intern Med. 2000 ; 132 : 175 – 818.Freburger JK, Carey TS, Holmes GM. Effectiveness of physical therapy for the management of chronic spine disorders : a propensity score approach. Phys : Ther. 2006 ; 86 : 381 – 94.9.Kuhn 8 ; Dunn WR, Sanders R, An Q, Baumgarten KM, Bishop I1, et al. Bffectiveness of physical therapy in treating atraumatic full - thickness rotator cuff tears : a multionter prospective cohort study. J Shoulder Elb Surg. 2013 ; 221371 – 9.10.Fritz. ( M. Childs ID, Wainner RS, Flynn TW. Primary care referral of patients with low back pain to physical therapy. impact on future health care utilization and costs. Spine. 2012 : 37 : 2114 - 21.11.Fritz. M. Brennan GP, Hunter SL Magel JS. Initial management decisions after a new consultation for low back pain : implications of the usage of physical therapy for subsequent health care costs and unlication. Arch Phys Med Rehabil. 201312.HIV JC, Dunn KM, Lewis M, Mullis R, Main C3, Foster NIC, et al. A primary care back pain screening tool : identifying patient subgroups for initial treatment. Arthritis Rheum. 2008 ; 93632 – 41.13.Traeger AC, Henschke N, Hiabsche M, Willians CM, Kamper SJ, Maher CG, et al. Enlimating the risk of chronic pain : development and validation of a prognostic model ( POKJP ) for patients with acute low back pain. PLzS Med. 2016.13x1002019.14.Karran IS, McAuley JH, Traeger AC, Hiller SL, Grabherr L, Russek LN, et al. Can screening Instruments accurately determine poor outcome risk in adults with recent onset low back pain? A systomatic review and meta - analysis. BMC Med. 2017.15.Azevedo UT. Costa - Pereira A, Mendonca L, Dias CC, Castro - Lopes JM. Chronic pain and health services utilization : is there overuse of diagnostic tests and inequalifies in nonpharmacologic treatment methods utilization? Med Care. 20116.Lengley P, Muller - Schwelle G, Nicoliaox A, Liedgens H, Pergoliazi J. Varnesi - G. The societal impact of pain in the European Union. health - related quality of life and healthcare resource utilization. J Med Econ. 2010 : 13 : 571 – 81.17.Perez C, Navarro A, Saldaria MT, Wilson K, Rejai J. Modeling the predictive value of pain intensity on costs and resources utilization in patients with peripheral neuropathic pain. Clin. I Pain. 2015 ; 31 : 273 – 9.18.Hill JC, Fritz JM. Psychosocial influences on low back pain,", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - } - ] - }, - { - "references": { - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", - "query": "What is Creative Commons ?", - "target_page": 2, - "target_passage": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy.", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. \n\nPublic domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright \n\nThe CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
\n\nWorks marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 \nInternational License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and \nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to \nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver \n(http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. \n\n\n\n“The Pillars of Creation” by \nJames Webb Space Telescope \nis licensed under CC BY 2.0.", - "page_start": 8, - "page_end": 8, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**About this**\n**Open Work**\n\n\"Kaleidoscope\" by \ndocoverachiever is \nlicensed under CC \nBY 2.0.", - "page_start": 0, - "page_end": 0, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - } - ] - }, - { - "references": { - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", - "query": "When was the first CC licence created?", - "target_page": 4, - "target_passage": "The first CC License was created in 2002.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence.", - "page_start": 33, - "page_end": 33, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "All rights reserved. No part of this publication may be reproduced or transmitted \n\nin any form or by any means, electronic or mechanical, including photocopying, \n\nrecording, or any information storage or retrieval system, without prior permission in \n\nwriting from the publisher. Subject to any applicable licensing terms and conditions in \n\nthe case of electronically supplied publications, a person may engage in fair dealing \n\nwith a copy of this publication for his or her personal or private use, or his or her \n\nresearch or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978. \n\nThe authors and the publisher have made every effort to obtain permission for and \n\nto acknowledge the use of copyright material. Should any infringement of copyright \n\nhave occurred, please contact the publisher, and every effort will be made to rectify \n\nomissions or errors in the event of a reprint or new edition.", - "page_start": 1, - "page_end": 1, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "**CC Licenses & Training**$763,196 \n**Programs**$2,248,091 \n**Events**$395,600 \n**Operations**$1,654,225 \n\n\n \n \n \n \n [html]\n
Foundations $ 4.402.563
Major Donors $ 103.215
Small Dollar Donors $ 144.217
Program Income S169.980
Consulting S173.939
In - Kind $ 30.358
Other S38.792
\n\n**Total:**$5,061,112", - "page_start": 9, - "page_end": 9, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**12.3.5 Activate the license manually**\n\nTo manually activate the encryption license for a control enclosure, complete the following \nsteps: \n\n1. Select**Activate License Manually**to open the Manual Activation window, as shown in \nFigure 12-17. \n\nFigure 12-17 Manual encryption license activation window \n\n2. \n\nIf you have not done so already, obtain the encryption license for the control enclosure. \nThe information that is required to obtain the encryption license is displayed in the Manual \nActivation window. Use this data to follow the instructions in 12.3.1, “Obtaining an \nencryption license” on page 609.", - "page_start": 638, - "page_end": 638, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", - "query": "To what subjects Creative Commons expand its work in 2023 ?", - "target_page": 8, - "target_passage": "We expanded our work in biodiversity, climate, and life sciences focused on ensuring that science research and data are open", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. \n\n\n\n“The Pillars of Creation” by \nJames Webb Space Telescope \nis licensed under CC BY 2.0.", - "page_start": 8, - "page_end": 8, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**A Note from Leadership**\n\n\n\n2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. \n\nWe also marked transitions in leadership. \nAt the end of December, Catherine Stihler \nconcluded her time as Chief Executive \nOfficer (CEO) at Creative Commons, and I \ntransitioned in as Interim. In March 2024, I \nwas appointed CC’s permanent CEO. I \nlook forward to working closely with our \nBoard of Directors, staff, and larger \ncommunity on**the critical work that**\n**awaits us in 2024**. \n\n\n\n**Anna Tumadóttir, CEO**", - "page_start": 2, - "page_end": 2, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Our Impact**\n\nCC believes that opening up knowledge is key to addressing the world’s most \npressing challenges. Today, we steer campaigns, programming, and training in \nmany areas: \n\n**Open Culture**\n2023 was quite a year for the CC \nOpen Culture Program, thanks to \ngenerous funding from**Arcadia**. \nWe grew our Open Culture team \nfrom one to two and a half staff, \nrolling out new initiatives like \nTAROC (Towards a \nRecommendation on Open \nCulture) and**Open Culture Live:**\n**A Webinar Series**. We invite you \nto read “**What did Creative**\n**Commons do for Open Culture**\n**in 2023?**” to learn more. \n\n**Open Education**\nWe delivered workshops and \npresentations on CC Licenses and \nOpen Educational Resources at \nover 16 conferences and events. \nThe CC Open Education Platform \nalso funded six global projects, \n**including work to advance the**\n**UNESCO Recommendation on**\n**OER.**\n\n\n\n**Open Journalism**\nThanks to generous funding from \nthe**John D. and Catherine T.**\n**MacArthur Foundation**, CC \nhosted its very first Open \nJournalism track at the CC Global \nSummit, including eight \npresentations, lightning talks, \npanel discussions, and \nworkshops as well as a**keynote**\n**by Anya Kamenetz**. \n\nRepresentatives from 33 news \noutlets and digital rights-focused \norganizations attended the CC \nSummit sessions. The Open \nJournalism track built on \n**numerous collaborations and**\n**workshops**throughout 2023.", - "page_start": 6, - "page_end": 6, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - } - ] - }, - { - "references": { - "source_file": "TSX_KMP_2013.pdf", - "query": "From which country does Killam Properties Inc originate ?", - "target_page": 3, - "target_passage": "Killam Properties Inc. is a growth oriented Canadian real estate company.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Killam properties inc \n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "about Killam properties inc. \nKillam Properties Inc. is a growth oriented Canadian real estate \ncompany. We own, manage and develop multi-family residential \nproperties in Atlantic Canada and Ontario. Since our first acquisition \nin 2002, our real estate portfolio has grown to $1.5 billion and \nincludes 12,647 apartment units and 5,164 manufactured home \ncommunity (MHC) sites. We are committed to growing Killam’s \nearnings by maximizing the returns from our existing portfolio and \nexpanding through acquisitions and development. \n\nour mission \nTo have a team of caring staff deliver clean, safe, quality housing to \ntenants who are proud to call our properties home. \n\nour core Values \n\nDo the \n**Right**\nThing \nStrong \n**Customer**\nRelationships Creative \n**Solutions** Curb \n**Appeal** **Build**\nCommunity \n\n\n\n**president’s letter** **9**\n\n**asset portfolio** **18**\n\n**MD&a** **21**\n\n**Financial Statements 66**\n\n**Five-Year Summary** **96**\n\n180 mill street, london, ontario", - "page_start": 2, - "page_end": 2, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada.", - "page_start": 16, - "page_end": 16, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**PART II**\n\n**Business Overview**\n\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada’s largest residential landlords, owning, operating, managing and developing \nmulti‑family residential and Manufactured Home Community (“MHC”) properties. Killam’s 164 apartment properties are located in Atlantic \nCanada’s six largest urban centres and in Ontario. The Company’s 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam’s \nreal estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and \nincreasing FFo per share. \n\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic \nCanada and MHCs across Canada. Killam’s first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009, \nKillam’s apartment portfolio grew through the acquisition of properties in Atlantic Canada’s six largest cities, namely Halifax, Moncton, Saint \nJohn, Fredericton, St. John’s and Charlottetown. Killam is now Atlantic Canada’s largest residential landlord, with a 14.2% market share of the \nmulti‑family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the \nprovince, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions \nand developments. The apartment business is Killam’s largest business segment, accounting for 86% of the Company’s NOI from property \noperations and equity income in 2013. At December 31, 2013, Killam’s apartment portfolio consisted of 12,647 units. \n\nKillam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development \nof four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect \ndevelopments to exceed 5% of the total asset base in any given year. \n\nIn addition, the Company owns MHCs, also known as land‑lease communities or trailer parks. Killam owns the land and infrastructure supporting \neach community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities \nwhich accounted for 14% of Killam’s NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the \nCompany to crystallize the value of the properties at attractive cap‑rates and use the funds to continue to grow the apartment portfolio. \n\n**Key Performance Indicators (KPIs)**\n\nManagement measures Killam’s performance based on the following KPIs: \n\n1. \nFFO per Share – A standard measure of earnings for real estate entities. Management is focused on growing FFO per share on an annual \nbasis. \n\n2. Rental Increases – Management expects to achieve increases in average rental rates on an annual basis and measures the average rental \nincreases achieved. \n\n3. Occupancy – Management is focused on maximizing occupancy levels while also managing the impact of higher rents. This measure \nconsiders units rented as a percentage of total stabilized units at a point in time. \n\n4. \nSame Store NOI Growth – This measure considers the Company’s ability to increase the NOI at properties that it has owned for equivalent \nperiods year‑over‑year, removing the impact of acquisitions, dispositions, developments and other non same store operating adjustments. \n\n5. Weighted average cost of Debt – Killam monitors the weighted average cost of its mortgage debt and total debt. \n\n6. Debt to total assets – Killam measures its debt levels as a percentage of total assets and works to ensure that the debt to total assets \nremains at a range of 55% to 65%. \n\n7. term to maturity – management monitors the average number of years to maturity on its debt.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. \n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive \ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by \naccretively growing its apartment portfolio in Ontario.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**1. Corporate Information**\n\nKillam Properties Inc (“Killam” or the “Company”) is a real estate company specializing in the acquisition, management and development of \nmulti‑residential apartment buildings and manufactured home communities in Canada. Killam is incorporated under the Canada Business \nCorporations Act. Killam’s common shares are publicly traded and listed on the Toronto Stock Exchange under the symbol “KMP”. The \nconsolidated financial statements comprise the financial statements of Killam and its subsidiaries as at December 31, 2013**.**the company’s \nhead office operations are located at 3700 Kempt Road, Halifax, Nova Scotia, B3K 4X8 and the Company’s registered office is located at \n2571 Windsor Street, Halifax, Nova Scotia, B3K 5C4. \n\nThe consolidated financial statements of the Company for the year ended December 31, 2013, were authorized for issue in accordance \nwith a resolution of the Board of Directors on Tuesday, February 18, 2014. \n\n**2. Significant Accounting Policies**\n\n**(A) Statement of Compliance**\n\nThese consolidated financial statements have been prepared in accordance with International Financial Reporting Standards (“IFRS”) as \nissued by the International Accounting Standards Board (“IASB”). \n\n**(B) Basis of Presentation**\n\nThe consolidated financial statements of the Company have been prepared on a historical cost basis, except for investment properties that \nhave been measured at fair value. Historical cost is generally based on the fair value of the consideration given in exchange for assets. The \nconsolidated financial statements have been prepared on a going concern basis and are presented in Canadian dollars, which is Killam’s \nfunctional currency, and all values are rounded to the nearest thousand ($000), except when otherwise noted. Standards and guidelines \nnot effective for the current accounting period are described in Note 4. \n\n**(C) Basis of Consolidation**\n\n*(i) Subsidiaries*\nThe consolidated financial statements include the accounts of Killam and its subsidiaries. Non‑controlling interests represent the portion of \nprofit or loss and net assets not held by Killam, and are presented separately in the Consolidated Statements of Income and Comprehensive \nIncome and within equity in the Consolidated Statement of Financial Position, separately from shareholders’ equity. \n\nSubsidiaries are entities controlled by Killam. The financial statements of subsidiaries are included in the consolidated financial statements \nfrom the date that control commences until the date that control ceases. The accounting policies of subsidiaries have been changed when \nnecessary to align them with the policies adopted by Killam. In certain circumstances, Killam has control over entities in which it does not \nown more than 50% of the voting power.", - "page_start": 69, - "page_end": 69, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "opportunities for Growth \n\nKillam’s growth opportunities include increasing earnings of its existing \nportfolio and expanding the portfolio through acquisitions and development. \nacquisitions have been an important part of Killam’s growth, having completed \nover $1.1 billion in acquisitions since the first property was acquired in 2002. \nKillam began development as a complement to its acquisition program in 2010, \nand to-date has invested approximately $90 million in new developments. \n2013 was Killam’s largest year for growth since 2005, adding $191 million of \nproperties to the portfolio, including $121 million in acquisitions and $70 \nmillion in new developments. looking ahead to 2014, Killam has targeted \na minimum of $75 million in acquisitions, and the development of two new \napartment buildings totaling approximately $46 million.", - "page_start": 13, - "page_end": 13, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "a Diversified portfolio \n\nKillam has a diverse portfolio of both apartments and manufactured home communities. The \napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types, \nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide \nselection of properties and price points in each city, Killam caters to a broad tenant base. \nKillam’s 35 manufactured home communities represent 14% of earnings and are located \nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the \napartment business, providing stable and predictable cash flows. \n\n\n\n\n\n\n\n\n\ns2, Halifax, nova scotia", - "page_start": 12, - "page_end": 12, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**27. Financial Guarantees**\n\nKillam Properties Inc. is the guarantor for borrowings held through its three equity investments. As at December 31, 2013, the maximum \npotential obligation resulting from these guarantees is $70.5 million, all related to long‑term mortgage financing (December 31, 2012 – \n$72.3 million). These loans are secured by a first ranking mortgage over the associated investment property. Management has reviewed \nthe contingent liability associated with its financial guarantee contracts and, at December 31, 2013, determined that a provision is not \nrequired to be recognized in the Statement of Financial Position. (December 31, 2012 ‑ $nil).", - "page_start": 93, - "page_end": 93, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Investing in**\n**newer properties**\n\n\n \n \n \n \n [html]\n
We are expanding our portfolio with a
Consumption of the compared through development. We believe
That newer buildings often generate
higher total returns due to limited i. e.
Canadadadadadadadadalanadalanadalanalanalanasa
Allower operating costs and a preference
Table
With 55 % of Kilamis apartment portfolio
constructed since the year 2000, Killam has
one of the newest multramily real estate portfolios in Canada.
Apartment Value by Year
\n\n\n \n \n \n \n [html]\n
We are increasing our geographic
diversification by expanding our
apartment ownership outside Atlantic
Canada. Over the last four years we have
invested approximately $ 200 million in
apartments located in Ontario and at the
end of 2013 owned 1.359 units in three
core Ontario markets : Ottawa, Toronto and
Southwestern Ontario. Our long - term goal
is to have 50 % of our earnings generated
outside Atlantic Canada. We plan to
achieve this by focusing future acquisition
and development activity in Ontario, and
potentially Western Canada.
Annual Apartment Net Operating and Equity Income from Atlantic Canada and Ontario
$ millions
__IIIII Atlantic Canada_II || Ontario
$ 80
$ 70
\n\n**2000 + | 35%**\n**1990 - 99 | 10%**\n**1980 - 89 | 6%**\n**1970 - 79 | 25%**\n**Pre 1970 | 24%**", - "page_start": 4, - "page_end": 4, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "TSX_KMP_2013.pdf", - "query": "How Killam Properties Inc does increase its geographic diversification ? ", - "target_page": 5, - "target_passage": "We are increasing our geographic diversification by expanding our apartment ownership outside Atlantic Canada. ", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada.", - "page_start": 16, - "page_end": 16, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. \n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive \ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by \naccretively growing its apartment portfolio in Ontario.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic \nCanada is the foundation of the Company; however, with Atlantic Canada \nrepresenting only 5% of the Canadian rental market, our growth opportunities \nincrease significantly by expanding our target markets outside of this region. \nWith its strong operating platform, Killam can support a larger and more \ngeographically diverse portfolio. We are actively growing a portfolio of \napartments in Ontario in three target markets: Ottawa, the Greater Toronto \nArea, and Southwestern Ontario. An increased investment outside Atlantic \nCanada will increase not only Killam’s growth potential, it will also expand the \nCompany’s diversification and exposure to higher growth markets. \n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition \nto 1,359 apartment units in the province, we also have 2,144 manufactured \nhome community sites, representing 29% of the MHC NOI last year. Based on \nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario, \ncompared to our longer-term goal of generating 50% of NOI outside Atlantic \nCanada. We expect to reach this goal by focusing acquisition activity in \nOntario, with the majority of future investment anticipated in the province over \nthe next few years. We will look for additional development opportunities in \nOntario and we are exploring opportunities in Western Canada, attracted by \nthe strong population growth trends in Alberta’s urban markets. \n\nI would like to thank all Killam employees for their contributions and \ncommitment over the last year and our board of directors for their governance. \nAlso, I would like to thank you, our shareholders, for your continued investment \nin Killam. I invite you to attend the Company’s annual meeting on May 7, 2014 \nat 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in \nperson or via webcast. \n\nYours truly, \n\n\n\n\n \n \n \n \n [html]\n
for 2014Completea minimum corS75 million in acquisitions
Acquire over 20 % of 2014 acquisitions outside Atlantic Canada with a focisin Ontario.
Grow same storeNOI by up to 2 %.Continue to invest in development with two projects
underway, managing projects on schedule and on budget1.
\n\ndevelopment program to a maximum of 5% of our balance sheet per year. We \nhave three other developments projects in various planning stages, but don’t \nexpect to begin construction on any additional new projects until late 2014 or \ninto 2015. \n\nPhilip Fraser", - "page_start": 10, - "page_end": 10, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Killam properties inc \n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "opportunities for Growth \n\nKillam’s growth opportunities include increasing earnings of its existing \nportfolio and expanding the portfolio through acquisitions and development. \nacquisitions have been an important part of Killam’s growth, having completed \nover $1.1 billion in acquisitions since the first property was acquired in 2002. \nKillam began development as a complement to its acquisition program in 2010, \nand to-date has invested approximately $90 million in new developments. \n2013 was Killam’s largest year for growth since 2005, adding $191 million of \nproperties to the portfolio, including $121 million in acquisitions and $70 \nmillion in new developments. looking ahead to 2014, Killam has targeted \na minimum of $75 million in acquisitions, and the development of two new \napartment buildings totaling approximately $46 million.", - "page_start": 13, - "page_end": 13, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "about Killam properties inc. \nKillam Properties Inc. is a growth oriented Canadian real estate \ncompany. We own, manage and develop multi-family residential \nproperties in Atlantic Canada and Ontario. Since our first acquisition \nin 2002, our real estate portfolio has grown to $1.5 billion and \nincludes 12,647 apartment units and 5,164 manufactured home \ncommunity (MHC) sites. We are committed to growing Killam’s \nearnings by maximizing the returns from our existing portfolio and \nexpanding through acquisitions and development. \n\nour mission \nTo have a team of caring staff deliver clean, safe, quality housing to \ntenants who are proud to call our properties home. \n\nour core Values \n\nDo the \n**Right**\nThing \nStrong \n**Customer**\nRelationships Creative \n**Solutions** Curb \n**Appeal** **Build**\nCommunity \n\n\n\n**president’s letter** **9**\n\n**asset portfolio** **18**\n\n**MD&a** **21**\n\n**Financial Statements 66**\n\n**Five-Year Summary** **96**\n\n180 mill street, london, ontario", - "page_start": 2, - "page_end": 2, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI \ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service, \ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes. \n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property \ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s \napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on \nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy \nusage. \n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 \nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island. \n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed \nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, \nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to \nlimit development projects to approximately 5% of the balance sheet on an annual basis. \n\n**Investment in New Properties**\n\nIn addition to developing new properties, Killam also acquires newly constructed assets. Management believes that increasing Killam’s ownership \nin new, high‑quality buildings will result in above‑market and long‑term demand for the Company’s assets from an aging population, reduce \nannual capital requirements for deferred maintenance, and transform Killam’s portfolio, over time, into one of the highest quality portfolios in \ncanada. \n\nDemand by renters for newly constructed rental apartments is strong, with high occupancy rates and above‑average rents. CMHC’s Fall 2013 \nHalifax Rental Market Report reported 97.3% occupancy for properties built in 2000 or later, compared to 96.8% for all rental markets in the city. \nThe average rent for a two‑bedroom unit in these newer buildings was $1,320 per month, compared to a market average two‑bedroom rent of \n$976. \n\nThe new properties added to Killam’s portfolio are condo quality, providing tenants with features and amenities traditionally associated with \nownership. The Company believes that demand for this type of rental accommodation will grow given an increasing number of homeowners \nreaching retirement age and looking for alternatives to home ownership. Killam is also attracted to the low capital spend requirements from new \nassets compared to older buildings, which often include significant capital investment to address deferred maintenance. Generally, the amount \nof annual capital to maintain a property increases as the building ages. In addition, with energy efficient features, the NOI margins are generally \nhigher in newer buildings. \n\nWith strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between \nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a \nsignificant premium for quality assets. \n\n**Geographic Diversification**", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "a Diversified portfolio \n\nKillam has a diverse portfolio of both apartments and manufactured home communities. The \napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types, \nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide \nselection of properties and price points in each city, Killam caters to a broad tenant base. \nKillam’s 35 manufactured home communities represent 14% of earnings and are located \nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the \napartment business, providing stable and predictable cash flows. \n\n\n\n\n\n\n\n\n\ns2, Halifax, nova scotia", - "page_start": 12, - "page_end": 12, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Investing in**\n**newer properties**\n\n\n \n \n \n \n [html]\n
We are expanding our portfolio with a
Consumption of the compared through development. We believe
That newer buildings often generate
higher total returns due to limited i. e.
Canadadadadadadadadalanadalanadalanalanalanasa
Allower operating costs and a preference
Table
With 55 % of Kilamis apartment portfolio
constructed since the year 2000, Killam has
one of the newest multramily real estate portfolios in Canada.
Apartment Value by Year
\n\n\n \n \n \n \n [html]\n
We are increasing our geographic
diversification by expanding our
apartment ownership outside Atlantic
Canada. Over the last four years we have
invested approximately $ 200 million in
apartments located in Ontario and at the
end of 2013 owned 1.359 units in three
core Ontario markets : Ottawa, Toronto and
Southwestern Ontario. Our long - term goal
is to have 50 % of our earnings generated
outside Atlantic Canada. We plan to
achieve this by focusing future acquisition
and development activity in Ontario, and
potentially Western Canada.
Annual Apartment Net Operating and Equity Income from Atlantic Canada and Ontario
$ millions
__IIIII Atlantic Canada_II || Ontario
$ 80
$ 70
\n\n**2000 + | 35%**\n**1990 - 99 | 10%**\n**1980 - 89 | 6%**\n**1970 - 79 | 25%**\n**Pre 1970 | 24%**", - "page_start": 4, - "page_end": 4, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Geographic Diversification
2013 Target2013 acquisition program to include investments in Ontario.
2013 PerformanceDuring 331. Killam aspuired Knitinitin Way, a 320 unit building locatined in Othawa, and 333 Durum Sthent Went in Toronto. These acquisitions increased Millam ' s total unit count in Ontario to L2558 units, representing 1255 of the totali
Growth in Same Store Net Operating Income
2013 TargetSame Store NOI growth of 0 % to 1 % ( adjusted from 2 % to 4 % following Q2 2013 ).
2013 PerformanceConsolidated same stome MDI decreased by 5 / 3 % for the year ended Decreaser 3.2012. This decrease was shiven the an increase in natural go priorice in indiantic Canadu during the peak healthgy peason in the first quarter as well as anothery
\n\n**2014 Targets**\n\n\n \n \n \n \n [html]\n
Consolidation of Multi - family Residential Real Estate Market and Increase Investment New PropertiesComplete a minimum of $ 75 million in acquisitions and continue to develop two current projects on schedule and within 5 % of budget.
Geographic DiversificationKillam ’ s 2014 acquisition program is to include over 50 % of acquisitions outside of Atlantic Canada, with a focus on Ontario.
Growth in Same Store Net Operating IncomeSame Store NOI growth of 0 % to 2 %.
", - "page_start": 26, - "page_end": 26, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "TSX_KMP_2013.pdf", - "query": "What is the Killam Properties Inc 2013 performance about the Geographic Diversification objective ?", - "target_page": 8, - "target_passage": "Target achieved. Killam acquired $55 million in Ontario real estate in 2013, representing 45% of its acquisition program in the year. Assets acquired included a 102-unit property in Ottawa, a newly built, 179-unit, mixed-used property in downtown Toronto and a 5.2 acre parcel of land for development in Cambridge, Ontario. ", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "Killam properties inc \n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. \n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive \ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by \naccretively growing its apartment portfolio in Ontario.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic \nCanada is the foundation of the Company; however, with Atlantic Canada \nrepresenting only 5% of the Canadian rental market, our growth opportunities \nincrease significantly by expanding our target markets outside of this region. \nWith its strong operating platform, Killam can support a larger and more \ngeographically diverse portfolio. We are actively growing a portfolio of \napartments in Ontario in three target markets: Ottawa, the Greater Toronto \nArea, and Southwestern Ontario. An increased investment outside Atlantic \nCanada will increase not only Killam’s growth potential, it will also expand the \nCompany’s diversification and exposure to higher growth markets. \n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition \nto 1,359 apartment units in the province, we also have 2,144 manufactured \nhome community sites, representing 29% of the MHC NOI last year. Based on \nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario, \ncompared to our longer-term goal of generating 50% of NOI outside Atlantic \nCanada. We expect to reach this goal by focusing acquisition activity in \nOntario, with the majority of future investment anticipated in the province over \nthe next few years. We will look for additional development opportunities in \nOntario and we are exploring opportunities in Western Canada, attracted by \nthe strong population growth trends in Alberta’s urban markets. \n\nI would like to thank all Killam employees for their contributions and \ncommitment over the last year and our board of directors for their governance. \nAlso, I would like to thank you, our shareholders, for your continued investment \nin Killam. I invite you to attend the Company’s annual meeting on May 7, 2014 \nat 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in \nperson or via webcast. \n\nYours truly, \n\n\n\n\n \n \n \n \n [html]\n
for 2014Completea minimum corS75 million in acquisitions
Acquire over 20 % of 2014 acquisitions outside Atlantic Canada with a focisin Ontario.
Grow same storeNOI by up to 2 %.Continue to invest in development with two projects
underway, managing projects on schedule and on budget1.
\n\ndevelopment program to a maximum of 5% of our balance sheet per year. We \nhave three other developments projects in various planning stages, but don’t \nexpect to begin construction on any additional new projects until late 2014 or \ninto 2015. \n\nPhilip Fraser", - "page_start": 10, - "page_end": 10, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada.", - "page_start": 16, - "page_end": 16, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Continued Geographic Expansion in Ontario**\n\nKillam acquired two buildings in Ontario during 2013 including a 102‑unit building located in Ottawa for $10.4 million as well as a newly \nconstructed, 8‑storey, mixed‑use complex containing 21,242 square feet of street level retail (TD Bank, Shoppers Drug Mart and Tim Hortons) and \n179 apartment units in downtown Toronto for $40.0 million. With the completion of these two acquisitions, Killam’s future NOI generated from \nits Ontario properties is expected to increase to 15.0% from 7.5%. \n\n**Reduced Cap‑Rate Compression in 2013**\n\nDuring 2013 Killam recorded $13.1 million in fair value gains related to its portfolio compared to $37.7 million in 2012. This decrease \nyear‑over‑year was driven by a combination of reduced cap‑rate compression in 2013 and a slight uptick in cap‑rates of 25 bps in the Saint John \nmarket in the fourth quarter of 2013. The net gain in real estate valuations does not impact the Company’s FFO per share, its key measure of \nperformance. \n\n**Dividend Increase**\n\non December 23, 2013, Killam announced an increase in its annual dividend by 3.4% to $0.60 per share from $0.58 per share. the increase \nreflects Management’s expectation of earning’s growth to be generated in 2014. \n\n\n \n \n \n \n [html]Consolidation of Multi - family Residential Real Estate MarketIncrease Investment in New Properties2013 Performance\n
2013 TargetComplete approximately $ 75 -$ 125 million in acquisitions.
2013 PerformanceKillam completed $ 12.2. 1. million in acquisitions in 2013 which includes $ 12.8 million in apartment acquisitions, $ 2.4 million for 65 MHC sites and $ 6.9 million in vacant land for future developments.
2013 TargetFocus on newer properties as part of the acquisition program in 2013. Complete and lease - up Killam ’ s four developments, and commence two new development projects.
During 2012 Killam asquired SS2 units which were constructed after 2003, representing 14 % of the total units added to the portfolia staining the year. The acquisitions included three building constructed in 2013, an IEI - unit luxury bal
The Company also completed the construction of four development projects totaling. SD antisting the first haff of the year. These buildings were all ready for occupancy by the beiginning of May 2013 with leave up personsitis varying fori
Killam commenced two rewa development projects during the year. Development started on a 1203 until projects in State / s in D. don ’ t in 0.023. and a 22 and projects ' s Combige benefiele ground in December 2013. Pleus refer to the Investment
", - "page_start": 25, - "page_end": 25, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Objective** **2013 Target** **2013 Performance**\n\n**Consolidation of**\n**the Multi-family**\n**Residential Real Estate**\n**Market**\n\nTo complete $75 million \nto $125 million in \nacquisitions. \n\nTarget achieved. $121 million in acquisitions \ncompleted in 2013, including $113 million in \napartment acquisitions, $7 million for three \nparcels of land for future development and $1 \nmillion for an MHC acquisition. \n\n**Increase Investment in**\n**New Properties**\n\nAcquire new properties \nas part of the acquisition \nprogram in 2013. \n\nTarget achieved. During 2013, 74% of the total \nunits added to the portfolio were constructed \nafter 2001. These acquisitions included three \nbuildings constructed in 2013, a 179-unit \nbuilding on Queen Street West in Toronto, an \n83-unit luxury building in Halifax, and a 48-unit \nbuilding in Moncton. \n\nComplete and lease- \nup Killam's four \ndevelopments and \ncommence two new \ndevelopment projects. \n\nTarget partially achieved. The Company \ncompleted the construction of four \ndevelopment projects totaling 282 units during \nthe first half of 2013. Two of the properties, \nBennett House and Brighton House, were \nfully leased within three months of opening, \nwhile S2 and The Plaza are expected to be \nsubstantially leased by the middle of 2014. \nKillam began two new developments during \nthe second half of the year, a 101-unit building \nin St. John’s, Newfoundland, and a 122-unit \nbuilding in Cambridge, Ontario. \n\n**Geographic**\n**Diversification**\n\n2013 acquisition \nprogram to include \ninvestments in Ontario. \n\nTarget achieved. Killam acquired $55 million in \nOntario real estate in 2013, representing 45% \nof its acquisition program in the year. Assets \nacquired included a 102-unit property in \nOttawa, a newly built, 179-unit, mixed-used \nproperty in downtown Toronto and a 5.2 acre \nparcel of land for development in Cambridge, \nOntario. \n\n**Growth in Same Store**\n**Net Operating Income**\n**(NOI)**\n\nSame store NOI growth \nof 2% to 4% in 2013. \n\nTarget not achieved. Despite generating 1.8% \ngrowth in same store revenue, high natural gas \nprices in Atlantic Canada caused total same \nstore utility and fuel expenses to increase 13.8% \nduring the year, which resulted in a decrease in \nsame store NOI of 0.4% for the year.", - "page_start": 7, - "page_end": 7, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Geographic Diversification
2013 Target2013 acquisition program to include investments in Ontario.
2013 PerformanceDuring 331. Killam aspuired Knitinitin Way, a 320 unit building locatined in Othawa, and 333 Durum Sthent Went in Toronto. These acquisitions increased Millam ' s total unit count in Ontario to L2558 units, representing 1255 of the totali
Growth in Same Store Net Operating Income
2013 TargetSame Store NOI growth of 0 % to 1 % ( adjusted from 2 % to 4 % following Q2 2013 ).
2013 PerformanceConsolidated same stome MDI decreased by 5 / 3 % for the year ended Decreaser 3.2012. This decrease was shiven the an increase in natural go priorice in indiantic Canadu during the peak healthgy peason in the first quarter as well as anothery
\n\n**2014 Targets**\n\n\n \n \n \n \n [html]\n
Consolidation of Multi - family Residential Real Estate Market and Increase Investment New PropertiesComplete a minimum of $ 75 million in acquisitions and continue to develop two current projects on schedule and within 5 % of budget.
Geographic DiversificationKillam ’ s 2014 acquisition program is to include over 50 % of acquisitions outside of Atlantic Canada, with a focus on Ontario.
Growth in Same Store Net Operating IncomeSame Store NOI growth of 0 % to 2 %.
", - "page_start": 26, - "page_end": 26, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "opportunities for Growth \n\nKillam’s growth opportunities include increasing earnings of its existing \nportfolio and expanding the portfolio through acquisitions and development. \nacquisitions have been an important part of Killam’s growth, having completed \nover $1.1 billion in acquisitions since the first property was acquired in 2002. \nKillam began development as a complement to its acquisition program in 2010, \nand to-date has invested approximately $90 million in new developments. \n2013 was Killam’s largest year for growth since 2005, adding $191 million of \nproperties to the portfolio, including $121 million in acquisitions and $70 \nmillion in new developments. looking ahead to 2014, Killam has targeted \na minimum of $75 million in acquisitions, and the development of two new \napartment buildings totaling approximately $46 million.", - "page_start": 13, - "page_end": 13, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**2013 Financial Overview**\n\n\n \n \n \n \n [html]Total PortfolioSame StoreNon Same Store\n
20132012% Change20132012% Change20132012% Change
Property revenue$ 141.112$ 133.6415.6 %$ 121.530$ 119.3901.8 %$ 19.582$ 14.25137.4 %
Property expenses
Operating expenses( 23.611 )( 22.713 )4.0 %( 20.313 )( 20.250 )0.3 %( 3.298 )( 2.463 )33.9 %
Utility and fuel expenses( 18.403 )( 15.915 )15.6 %( 16.189 )( 14.225 )13.8 %( 2.214 )( 1.690 )31.0 %
Property taxes( 16.058 )( 14.569 )10.2 %( 13.902 )( 13.519 )2.8 %( 2.156 )( 1.050 )105.3 %
Total property expenses( 58.072 )( 53.197 )9.2 %( 50.404 )( 47.994 )5.0 %( 7.668 )( 5.203 )47.4 %
NOI$ 83.040$ 80.4443.2 %$ 71.126$ 71.396( 0.4 )%$ 11.914S9.04831.7 %
Operating margin58.8 %60.2 %( 2.3 )%58.5 %59.8 %( 2.2 )%60.8 %63.5 %( 4.3 )%
\n\nTotal property revenue for the year ended December 31, 2013, excluding the properties held through the Company’s joint ventures, was $141.1 \nmillion, a 5.6% increase in revenue over the same periods in 2012. The growth was generated through revenue from acquisitions, developments \nand increased rental rates, partially offset by increased vacancy. \n\nKillam’s total property operating expenses increased 9.2% for 2013 compared to 2012, decreasing the operating margins by 140 bps during \nthe year. The overall decrease in the operating margin can be attributed to higher utility costs and new acquisitions and developments in the \nlease‑up phase that were not yet stabilized during 2013. As well, 2013 had a higher percentage of apartment units versus MHC sites than 2012, \nwhich operate with a slightly lower margin. \n\nSame store property NOI reflects the 172 stabilized properties that Killam has owned for equivalent periods in 2013 and 2012. The same store \nanalysis includes 15,848 units and sites, or 89% of Killam’s portfolio. Home sales are excluded from the analysis. Same store properties realized \nnet revenue growth of 1.8% in 2013. This growth was offset by a 5.0% increase in same store expenses. The main driver of the increased \nproperty expenses was higher utility costs, generating a decrease in NOI of 40 bps compared to 2012. These variances are discussed in more \ndetail in the Apartment and MHC results sections of the MD&A. \n\nNon same store property NOI consists of properties acquired in both 2012 and 2013, MHC properties sold in Q2 2012 and Q4 2013, completed \ndevelopment projects, other non‑stabilized properties and adjustments to normalize for non‑operational revenue or expense items. Details of \nproperties acquired in 2013 are found on page 48.", - "page_start": 34, - "page_end": 34, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "about Killam properties inc. \nKillam Properties Inc. is a growth oriented Canadian real estate \ncompany. We own, manage and develop multi-family residential \nproperties in Atlantic Canada and Ontario. Since our first acquisition \nin 2002, our real estate portfolio has grown to $1.5 billion and \nincludes 12,647 apartment units and 5,164 manufactured home \ncommunity (MHC) sites. We are committed to growing Killam’s \nearnings by maximizing the returns from our existing portfolio and \nexpanding through acquisitions and development. \n\nour mission \nTo have a team of caring staff deliver clean, safe, quality housing to \ntenants who are proud to call our properties home. \n\nour core Values \n\nDo the \n**Right**\nThing \nStrong \n**Customer**\nRelationships Creative \n**Solutions** Curb \n**Appeal** **Build**\nCommunity \n\n\n\n**president’s letter** **9**\n\n**asset portfolio** **18**\n\n**MD&a** **21**\n\n**Financial Statements 66**\n\n**Five-Year Summary** **96**\n\n180 mill street, london, ontario", - "page_start": 2, - "page_end": 2, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv2_taclccby4_license.pdf", - "query": "What is the conventional workflow for BERT ?", - "target_page": 1, - "target_passage": "The conventional workflow for BERT consists of two stages: pre-training and fine-tuning. ", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "4.3 BERT layers \n\nThe first layer of BERT receives as input a combina- \ntion of token, segment, and positional embeddings. \nIt stands to reason that the lower layers have \nthe most information about linear word order. \nLin et al. (2019) report a decrease in the knowledge \nof linear word order around layer 4 in BERT-base. \nThis is accompanied by an increased knowledge \n\nThe final layers of BERT are the most task- \nspecific. In pre-training, this means specificity to \nthe MLM task, which explains why the middle", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "4 Localizing linguistic knowledge \n\n4.1 BERT embeddings \n\nIn studies of BERT, the term \"embedding\" refers \nto the output of a Transformer layer (typically, the \nfinal one). Both conventional static embeddings \n(Mikolov et al., 2013) and BERT-style embeddings \ncan be viewed in terms of mutual information max- \nimization (Kong et al., 2019), but the latter are \ncontextualized. Every token is represented by a \nvector dependent on the particular context of occur- \nrence, and contains at least some information about \nthat context (Miaschi and Dell’Orletta, 2020).", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "5 Training BERT \n\nThis section reviews the proposals to optimize the \ntraining and architecture of the original BERT. \n\nTo date, the most systematic study of BERT archi- \ntecture was performed by Wang et al. (2019b), who \nexperimented with the number of layers, heads, and \nmodel parameters, varying one option and freez- \ning the others. They concluded that the number \nof heads was not as significant as the number \nof layers. That is consistent with the findings \nof Voita et al. (2019b) and Michel et al. (2019) \n(section 6), and also the observation by Liu et al. \n(2019a) that the middle layers were the most trans- \nferable. Larger hidden representation size was con- \n\nGong et al. (2019) note that, since self-attention \npatterns in higher and lower layers are similar, the \nmodel training can be done in a recursive man- \nner, where the shallower version is trained first and \nthen the trained parameters are copied to deeper \nlayers. Such a \"warm-start\" can lead to a 25% faster \ntraining without sacrificing performance.", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Anna Rogers \nCenter for Social Data Science \nUniversity of Copenhagen \narogers@sodas.ku.dk Olga Kovaleva \nDept. of Computer Science \nUniversity of Massachusetts Lowell \nokovalev@cs.uml.edu Anna Rumshisky \nDept. of Computer Science \nUniversity of Massachusetts Lowell \narum@cs.uml.edu \n\nimprove BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. \n\nAbstract \n\nTransformer-based models have pushed state \nof the art in many areas of NLP, but our un- \nderstanding of what is behind their success \nis still limited. This paper is the first sur- \nvey of over 150 studies of the popular BERT \nmodel. We review the current state of knowl- \nedge about how BERT works, what kind \nof information it learns and how it is repre- \nsented, common modifications to its training \nobjectives and architecture, the overparame- \nterization issue and approaches to compres- \nsion. We then outline directions for future \nresearch. \n\n0 \n2 \n0 \n2 \n\nv \no \nN \n9 \n\n] \nL \nC \n. \ns \nc \n[ \n\n3 \nv \n7 \n2 \n3 \n2 \n1 \n. \n2 \n0 \n0 \n2 \n: \nv \ni \nX \nr \na \n\nFundamentally, BERT is a stack of Transformer \nencoder layers (Vaswani et al., 2017) which consist \nof multiple self-attention \"heads\". For every input \ntoken in a sequence, each head computes key, value \nand query vectors, used to create a weighted repre- \nsentation. The outputs of all heads in the same layer \nare combined and run through a fully-connected \nlayer. Each layer is wrapped with a skip connection \nand followed by layer normalization. \n\nThe conventional workflow for BERT consists \nof two stages: pre-training and fine-tuning. Pre- \ntraining uses two self-supervised tasks: masked \nlanguage modeling (MLM, prediction of randomly \nmasked input tokens) and next sentence prediction \n(NSP, predicting if two input sentences are adjacent \nto each other). In fine-tuning for downstream ap- \nplications, one or more fully-connected layers are \ntypically added on top of the final encoder layer. \n\nThe input representations are computed as fol- \nlows: each word in the input is first tokenized into \nwordpieces (Wu et al., 2016), and then three em- \nbedding layers (token, position, and segment) are \ncombined to obtain a fixed-length vector. Special \ntoken [CLS] is used for classification predictions, \nand [SEP] separates input segments. \n\nGoogle1 and HuggingFace (Wolf et al., 2020) \nprovide many variants of BERT, including the orig- \ninal \"base\" and \"large\" versions. They vary in the \nnumber of heads, layers, and hidden state size. \n\n1https://github.com/ \ngoogle-research/bert \n\nSince their introduction in 2017, Transformers \n(Vaswani et al., 2017) have taken NLP by storm, \noffering enhanced parallelization and better model- \ning of long-range dependencies. The best known \nTransformer-based model is BERT (Devlin et al., \n2019); it obtained state-of-the-art results in numer- \nous benchmarks and is still a must-have baseline. \nWhile it is clear that BERT works remarkably \nwell, it is less clear why, which limits further \nhypothesis-driven improvement of the architecture. \nUnlike CNNs, the Transformers have little cogni- \ntive motivation, and the size of these models limits \nour ability to experiment with pre-training and per- \nform ablation studies. This explains a large number \nof studies over the past year that attempted to un- \nderstand the reasons behind BERT’s performance. \nIn this paper, we provide an overview of what \nhas been learned to date, highlighting the questions \nwhich are still unresolved. We first consider the \nlinguistic aspects of it, i.e., the current evidence \nregarding the types of linguistic and world knowl- \nedge learned by BERT, as well as where and how \nthis knowledge may be stored in the model. We \nthen turn to the technical aspects of the model and \nprovide an overview of the current proposals to", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.3 World knowledge \n\nThe bulk of evidence about commonsense knowl- \nedge captured in BERT comes from practitioners \nusing it to extract such knowledge. One direct prob- \ning study of BERT reports that BERT struggles \nwith pragmatic inference and role-based event \nknowledge (Ettinger, 2019). BERT also struggles \nwith abstract attributes of objects, as well as visual \nand perceptual properties that are likely to be as- \nsumed rather than mentioned (Da and Kasai, 2019). \nThe MLM component of BERT is easy to \nadapt for knowledge induction by filling in the Furthermore, different probing methods may \nlead to complementary or even contradictory con- \nclusions, which makes a single test (as in most stud-", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Benchmarks that require verbal reasoning. \nWhile BERT enabled breakthroughs on many NLP \nbenchmarks, a growing list of analysis papers are \nshowing that its language skills are not as impres- \nsive as it seems. In particular, it was shown to rely \non shallow heuristics in natural language inference \n(McCoy et al., 2019b; Zellers et al., 2019; Jin et al., \n2020), reading comprehension (Si et al., 2019a; \nRogers et al., 2020; Sugawara et al., 2020; Si et al., \n2019b; Yogatama et al., 2019), argument reason- \ning comprehension (Niven and Kao, 2019), and \ntext classification (Jin et al., 2020). Such heuristics \ncan even be used to reconstruct a non-publicly- \navailable model (Krishna et al., 2020). As with \nany optimization method, if there is a shortcut in \n\n8 Conclusion \n\nIn a little over a year, BERT has become a ubiq- \nuitous baseline in NLP experiments and inspired \nnumerous studies analyzing the model and propos- \ning various improvements. The stream of papers \nseems to be accelerating rather than slowing down, \nand we hope that this survey helps the community \nto focus on the biggest unresolved questions. \n\n9 Acknowledgements \n\nWe thank the anonymous reviewers for their valu- \nable feedback. This work is funded in part by \nthe NSF award number IIS-1844740 to Anna \nRumshisky.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "5.4 Fine-tuning BERT \n\nPre-training + fine-tuning workflow is a crucial \npart of BERT. The former is supposed to provide \ntask-independent knowledge, and the latter would \npresumably teach the model to rely more on the \nrepresentations useful for the task at hand. \n\nKovaleva et al. (2019) did not find that to be the \ncase for BERT fine-tuned on GLUE tasks5: dur- \ning fine-tuning, the most changes for 3 epochs oc- \ncurred in the last two layers of the models, but those \nchanges caused self-attention to focus on [SEP] \nrather than on linguistically interpretable patterns. \nIt is understandable why fine-tuning would increase \nthe attention to [CLS], but not [SEP]. If Clark \net al. (2019) are correct that [SEP] serves as \"no- \nop\" indicator, fine-tuning basically tells BERT what \nto ignore. \n\nFigure 5: Pre-trained weights help BERT find wider \noptima in fine-tuning on MRPC (right) than training \nfrom scratch (left) (Hao et al., 2019) \n\nbeddings as input for training BERT, while Po- \nerner et al. (2019) adapt entity vectors to BERT \nrepresentations. As mentioned above, Wang et al. \n(2020c) integrate knowledge not through entity em- \nbeddings, but through additional pre-training ob- \njective of knowledge base completion. Sun et al. \n(2019b,c) modify the standard MLM task to mask \nnamed entities rather than random words, and Yin \net al. (2020) train with MLM objective over both \ntext and linearized table data. Wang et al. (2020a) \nenhance RoBERTa with both linguistic and factual \nknowledge with task-specific adapters. \n\nSeveral studies explored the possibilities of im- \n\nproving the fine-tuning of BERT: \n\n• Taking more layers into account: learning \na complementary representation of the infor- \nmation in deep and output layers (Yang and \nZhao, 2019), using a weighted combination \nof all layers instead of the final one (Su and \nCheng, 2019; Kondratyuk and Straka, 2019), \nand layer dropout (Kondratyuk and Straka, \n2019). \n\n• Two-stage fine-tuning introduces an inter- \nmediate supervised training stage between \npre-training and fine-tuning (Phang et al., \n2019; Garg et al., 2020; Arase and Tsujii, \n2019; Pruksachatkun et al., 2020; Glavaš and \nVuli´c, 2020). Ben-David et al. (2020) propose \na pivot-based variant of MLM to fine-tune \nBERT for domain adaptation. \n\n• Adversarial token perturbations improve \nrobustness of the model (Zhu et al., 2019). \n• Adversarial regularization in combination \nwith Bregman Proximal Point Optimization \nhelps alleviate pre-trained knowledge forget- \nting and therefore prevents BERT from overfit- \nting to downstream tasks (Jiang et al., 2019a). \n• Mixout regularization improves the stability \nof BERT fine-tuning even for a small number \nof training examples (Lee et al., 2019). \n\nPre-training is the most expensive part of train- \ning BERT, and it would be informative to know \nhow much benefit it provides. On some tasks, a \nrandomly initialized and fine-tuned BERT obtains \ncompetitive or higher results than the pre-trained \nBERT with the task classifier and frozen weights \n(Kovaleva et al., 2019). The consensus in the com- \nmunity is that pre-training does help in most situa- \ntions, but the degree and its exact contribution re- \nquires further investigation. Prasanna et al. (2020) \nfound that most weights of pre-trained BERT are \nuseful in fine-tuning, although there are \"better\" \nand \"worse\" subnetworks. One explanation is that \npre-trained weights help the fine-tuned BERT find \nwider and flatter areas with smaller generalization \nerror, which makes the model more robust to over- \nfitting (see Figure 5 from Hao et al. (2019)). \n\nGiven the large number and variety of proposed \nmodifications, one would wish to know how much \nimpact each of them has. However, due to the \noverall trend towards large model sizes, systematic \nablations have become expensive. Most new mod- \nels claim superiority on standard benchmarks, but \ngains are often marginal, and estimates of model \nstability and significance testing are very rare.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "this strategy often requires compatible hardware. \n\nindividual self- \nattention heads and BERT layers can be disabled \nwithout significant drop in performance (Michel \net al., 2019; Kovaleva et al., 2019; Baan et al., \n2019). Pruning is a compression technique that \ntakes advantage of that fact, typically reducing the \namount of computation via zeroing out of certain \nparts of the large model. In structured pruning, \narchitecture blocks are dropped, as in LayerDrop \n(Fan et al., 2019). In unstructured, the weights in \nthe entire model are pruned irrespective of their lo- \ncation, as in magnitude pruning (Chen et al., 2020) \nor movement pruning (Sanh et al., 2020). \n\nAs discussed in section 6, \n\nPrasanna et al. (2020) and Chen et al. (2020) \nexplore BERT from the perspective of the lottery \nticket hypothesis (Frankle and Carbin, 2019), look- \ning specifically at the \"winning\" subnetworks in \npre-trained BERT. They independently find that \nsuch subnetworks do exist, and that transferability \nbetween subnetworks for different tasks varies. \n\nmodels and compressing them heavily rather than \ncompressing smaller models lightly. \n\nOther techniques include decomposing BERT’s \nembedding matrix into smaller matrices (Lan et al., \n2020a), progressive module replacing (Xu et al., \n2020) and dynamic elimination of intermediate en- \ncoder outputs (Goyal et al., 2020). See Ganesh et al. \n(2020) for a more detailed discussion of compres- \nsion methods. \n\n6.3 Pruning and model analysis \n\nThere is a nascent discussion around pruning as a \nmodel analysis technique. The basic idea is that \na compressed model a priori consists of elements \nthat are useful for prediction; therefore by finding \nout what they do we may find out what the whole \nnetwork does. For instance, BERT has heads that \nseem to encode frame-semantic relations, but dis- \nabling them might not hurt downstream task per- \nformance Kovaleva et al. (2019); this suggests that \nthis knowledge is not actually used. \n\nIf the ultimate goal of training BERT is compres- \nsion, Li et al. (2020) recommend training larger For the base Transformer, Voita et al. (2019b) \nidentify the functions of self-attention heads and", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "5.3 Pre-training BERT \n\nThe original BERT is a bidirectional Transformer \npre-trained on two tasks: next sentence prediction \n(NSP) and masked language model (MLM) (sec- \ntion 2). Multiple studies have come up with alter- \nnative training objectives to improve on BERT, \nwhich could be categorized as follows: \n\n• NSP alternatives. Removing NSP does not \nhurt or slightly improves performance (Liu \net al., 2019b; Joshi et al., 2020; Clinchant \net al., 2019). Wang et al. (2019a) and Cheng \net al. (2019) replace NSP with the task of \npredicting both the next and the previous sen- \ntences. Lan et al. (2020a) replace the negative \nNSP examples by swapped sentences from \npositive examples, rather than sentences from \ndifferent documents. ERNIE 2.0 includes sen- \ntence reordering and sentence distance pre- \ndiction. Bai et al. (2020) replace both NSP \nand token position embeddings by a combina- \ntion of paragraph, sentence, and token index \nembeddings. Li and Choi (2020) experiment \nwith utterance order prediction task for multi- \nparty dialogue (and also MLM at the level of \nutterances and the whole dialogue). \n\n• How to mask. Raffel et al. (2019) systemati- \ncally experiment with corruption rate and cor- \nrupted span length. Liu et al. (2019b) propose \ndiverse masks for training examples within \nan epoch, while Baevski et al. (2019) mask \nevery token in a sequence instead of a random \nselection. Clinchant et al. (2019) replace the \nMASK token with [UNK] token, to help the \nmodel learn a representation for unknowns \nthat could be useful for translation. Song et al. \n(2020) maximize the amount of information \navailable to the model by conditioning on both \nmasked and unmasked tokens, and letting the \nmodel see how many tokens are missing. \n• What to mask. Masks can be applied to full \nwords instead of word-pieces (Devlin et al., \n2019; Cui et al., 2019). Similarly, we can \nmask spans rather than single tokens (Joshi \net al., 2020), predicting how many are missing \n(Lewis et al., 2019). Masking phrases and \nnamed entities (Sun et al., 2019b) improves \nrepresentation of structured knowledge. \n\n• Other tasks. Sun et al. (2019c) propose si- \nmultaneous learning of 7 tasks, including dis- \ncourse relation classification and predicting \nwhether a segment is relevant for IR. Guu \net al. (2020) include a latent knowledge re- \ntriever in language model pretraining. Wang \net al. (2020c) combine MLM with knowledge \nbase completion objective. Glass et al. (2020) \nreplace MLM with span prediction task (as \nin extractive question answering), where the \nmodel is expected to provide the answer not \nfrom its own weights, but from a different pas- \nsage containing the correct answer (a relevant \nsearch engine query snippet). \n\n• Where to mask. Lample and Conneau (2019) \nuse arbitrary text streams instead of sentence \npairs and subsample frequent outputs similar \nto Mikolov et al. (2013). Bao et al. (2020) \ncombine the standard autoencoding MLM \nwith partially autoregressive LM objective us- \ning special pseudo mask tokens. \n\nAnother obvious source of improvement is pre- \ntraining data. Several studies explored the ben- \nefits of increasing the corpus volume (Liu et al., \n2019b; Conneau et al., 2019; Baevski et al., 2019) \nand longer training (Liu et al., 2019b). The data \nalso does not have to be raw text: there is a num- \nber efforts to incorporate explicit linguistic in- \nformation, both syntactic (Sundararaman et al., \n2019) and semantic (Zhang et al., 2020). Wu et al. \n(2019b) and Kumar et al. (2020) include the label \nfor a given sequence from an annotated task dataset. \nSchick and Schütze (2020) separately learn repre- \nsentations for rare words.", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "• Alternatives to masking. Raffel et al. (2019) \nexperiment with replacing and dropping spans, \nLewis et al. (2019) explore deletion, infilling, \nsentence permutation and document rotation, \nand Sun et al. (2019c) predict whether a to- \nken is capitalized and whether it occurs in \nother segments of the same document. Yang \net al. (2019) train on different permutations \nof word order in the input sequence, maximiz- \ning the probability of the original word order \n(cf. the n-gram word order reconstruction task \n(Wang et al., 2019a)). Clark et al. (2020) de- \ntect tokens that were replaced by a generator \nnetwork rather than masked. Although BERT is already actively used as a \nsource of world knowledge (see subsection 3.3), \nthere is also work on explicitly supplying struc- \nOne approach is entity- \ntured knowledge. \nenhanced models. For example, Peters et al. \n(2019a); Zhang et al. (2019) include entity em-", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv2_taclccby4_license.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv2_taclccby4_license.pdf", - "query": "Is syntaxis encoded with Bert model ?", - "target_page": 2, - "target_passage": " As far as how syntaxis represented, it seems that syntactic structure is not directly encoded in self-attention weights.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "3 What knowledge does BERT have? \n\nA number of studies have looked at the knowledge \nencoded in BERT weights. The popular approaches \ninclude fill-in-the-gap probes of MLM, analysis of \nself-attention weights, and probing classifiers with \ndifferent BERT representations as inputs. \n\n3.1 Syntactic knowledge \n\nLin et al. (2019) showed that BERT represen- \ntations are hierarchical rather than linear, i.e. \nthere is something akin to syntactic tree structure \nin addition to the word order information. Ten- \nney et al. (2019b) and Liu et al. (2019a) also \nshowed that BERT embeddings encode informa- \ntion about parts of speech, syntactic chunks \nand roles. Enough syntactic information seems \nto be captured in the token embeddings themselves \nto recover syntactic trees (Vilares et al., 2020; Kim \net al., 2020; Rosa and Mareˇcek, 2019), although \nprobing classifiers could not recover the labels of \ndistant parent nodes in the syntactic tree (Liu et al., \n2019a). Warstadt and Bowman (2020) report evi- \ndence of hierarchical structure in three out of four \nprobing tasks. \n\nFigure 1: Parameter-free probe for syntactic knowledge: \nwords sharing syntactic subtrees have larger impact on \neach other in the MLM prediction (Wu et al., 2020) \n\nparameter-free approach based on measuring the \nimpact that one word has on predicting another \nword within a sequence in the MLM task (Figure 1). \nThey concluded that BERT \"naturally\" learns \nsome syntactic information, although it is not \nvery similar to linguistic annotated resources. \n\nAs far as how syntax is represented, it seems \nthat syntactic structure is not directly encoded \nin self-attention weights. Htut et al. (2019) were \nunable to extract full parse trees from BERT heads \neven with the gold annotations for the root. Jawahar \net al. (2019) include a brief illustration of a depen- \ndency tree extracted directly from self-attention \nweights, but provide no quantitative evaluation. \n\nThe fill-in-the-gap probes of MLM showed that \nBERT takes subject-predicate agreement into \naccount when performing the cloze task (Gold- \nberg, 2019; van Schijndel et al., 2019), even for \nmeaningless sentences and sentences with distrac- \ntor clauses between the subject and the verb (Gold- \nberg, 2019). A study of negative polarity items \n(NPIs) by Warstadt et al. (2019) showed that BERT \nis better able to detect the presence of NPIs (e.g. \n\"ever\") and the words that allow their use (e.g. \n\"whether\") than scope violations. \n\nThe above claims of syntactic knowledge are be- \nlied by the evidence that BERT does not \"under- \nstand\" negation and is insensitive to malformed \ninput. In particular, its predictions were not al- \ntered2 even with shuffled word order, truncated \nsentences, removed subjects and objects (Ettinger, \n2019). This could mean that either BERT’s syn- \ntactic knowledge is incomplete, or it does not \nneed to rely on it for solving its tasks. The latter \nseems more likely, since Glavaš and Vuli´c (2020) \n\n2See also the recent findings on adversarial triggers, which \nget the model to produce a certain output even though they \nare not well-formed from the point of view of a human reader \n(Wallace et al., 2019a). \n\nHowever, syntactic information can be recov- \nered from BERT token representations. Hewitt \nand Manning (2019) were able to learn transfor- \nmation matrices that successfully recovered syn- \ntactic dependencies in PennTreebank data from \nBERT’s token embeddings (see also Manning et al., \n2020). Jawahar et al. (2019) experimented with \ntransformations of the [CLS] token using Tensor \nProduct Decomposition Networks (McCoy et al., \n2019a), concluding that dependency trees are the \nbest match among 5 decomposition schemes (al- \nthough the reported MSE differences are very \nsmall). Miaschi and Dell’Orletta (2020) performs \na range of syntactic probing experiments with con- \ncatenated token representations as input.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Xiaoqi Jiao, Yichun Yin, Lifeng Shang, Xin Jiang, \nXiao Chen, Linlin Li, Fang Wang, and Qun \nLiu. 2019. TinyBERT: Distilling BERT for nat- \nural language understanding. arXiv preprint \narXiv:1909.10351. \n\nKong, China. Association for Computational \nLinguistics. \n\nZhengbao Jiang, Frank F. Xu, Jun Araki, and Gra- \nham Neubig. 2019b. How Can We Know What \nLanguage Models Know? arXiv:1911.12543 \n[cs]. \n\nJohn Hewitt and Christopher D. Manning. 2019. \nA Structural Probe for Finding Syntax in Word \nIn Proceedings of the 2019 \nRepresentations. \nConference of the North American Chapter of \nthe Association for Computational Linguistics: \nHuman Language Technologies, Volume 1 (Long \nand Short Papers), pages 4129–4138. \n\nDi Jin, Zhijing Jin, Joey Tianyi Zhou, and Peter \nIs BERT Really Robust? A \nSzolovits. 2020. \nStrong Baseline for Natural Language Attack \non Text Classification and Entailment. In AAAI \n2020. \nGeoffrey Hinton, Oriol Vinyals, and Jeff Dean. \n2014. Distilling the Knowledge in a Neural Net- \nIn Deep Learning and Representation \nwork. \nLearning Workshop: NIPS 2014. \n\nBenjamin Hoover, Hendrik Strobelt, and Sebastian \nGehrmann. 2019. exBERT: A Visual Analy- \nsis Tool to Explore Learned Representations in \nTransformers Models. arXiv:1910.05276 [cs]. \n\nMandar Joshi, Danqi Chen, Yinhan Liu, Daniel S. \nWeld, Luke Zettlemoyer, and Omer Levy. 2020. \nSpanBERT: Improving Pre-Training by Repre- \nsenting and Predicting Spans. Transactions of \nthe Association for Computational Linguistics, \n8:64–77. \n\nNeil Houlsby, Andrei Giurgiu, Stanislaw Jastrzeb- \nski, Bruna Morrone, Quentin de Laroussilhe, An- \ndrea Gesmundo, Mona Attariyan, and Sylvain \nGelly. 2019. Parameter-Efficient Transfer Learn- \ning for NLP. arXiv:1902.00751 [cs, stat]. \n\nWei-Tsung Kao, Tsung-Han Wu, Po-Han Chi, \nChun-Cheng Hsieh, and Hung-Yi Lee. 2020. \nFurther boosting BERT-based models by du- \nSome intriguing \nplicating existing layers: \narXiv preprint \nphenomena inside BERT. \narXiv:2001.09309. \n\nPhu Mon Htut, Jason Phang, Shikha Bordia, and \nSamuel R Bowman. 2019. Do attention heads \nin BERT track syntactic dependencies? arXiv \npreprint arXiv:1911.12246. \n\nTaeuk Kim, Jihun Choi, Daniel Edmiston, and \nSang-goo Lee. 2020. Are pre-trained language \nmodels aware of phrases? simple but strong \nbaselines for grammar induction. In ICLR 2020. \n\nSarthak Jain and Byron C. Wallace. 2019. Atten- \ntion is not Explanation. In Proceedings of the \n2019 Conference of the North American Chapter \nof the Association for Computational Linguis- \ntics: Human Language Technologies, Volume 1 \n(Long and Short Papers), pages 3543–3556. \nGoro Kobayashi, Tatsuki Kuribayashi, Sho Yokoi, \nand Kentaro Inui. 2020. Attention Module is \nNot Only a Weight: Analyzing Transformers \nwith Vector Norms. arXiv:2004.10102 [cs]. \n\nGanesh Jawahar, Benoît Sagot, Djamé Seddah, \nSamuel Unicomb, Gerardo Iñiguez, Márton Kar- \nsai, Yannick Léo, Márton Karsai, Carlos Sar- \nraute, Éric Fleury, et al. 2019. What does BERT \nlearn about the structure of language? In 57th \nAnnual Meeting of the Association for Computa- \ntional Linguistics (ACL), Florence, Italy. \n\nDan Kondratyuk and Milan Straka. 2019. 75 Lan- \nguages, 1 Model: Parsing Universal Dependen- \nIn Proceedings of the 2019 \ncies Universally. \nConference on Empirical Methods in Natural \nLanguage Processing and the 9th International \nJoint Conference on Natural Language Process- \ning (EMNLP-IJCNLP), pages 2779–2795, Hong \nKong, China. Association for Computational \nLinguistics. \n\nHaoming Jiang, Pengcheng He, Weizhu Chen, Xi- \naodong Liu, Jianfeng Gao, and Tuo Zhao. 2019a. \nSMART: Robust and Efficient Fine-Tuning for \nPre-trained Natural Language Models through \narXiv \nPrincipled Regularized Optimization. \npreprint arXiv:1911.03437. Lingpeng Kong, Cyprien de Masson d’Autume, Lei \nYu, Wang Ling, Zihang Dai, and Dani Yogatama. \n2019. A mutual information maximization per- \nspective of language representation learning. In", - "page_start": 15, - "page_end": 15, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.2 Semantic knowledge \n\nTo date, more studies have been devoted to BERT’s \nknowledge of syntactic rather than semantic phe- \nnomena. However, we do have evidence from an \nMLM probing study that BERT has some knowl- \nedge of semantic roles (Ettinger, 2019). BERT \neven displays some preference for the incorrect \nfillers for semantic roles that are semantically re- \nlated to the correct ones, as opposed to those that \nare unrelated (e.g. \"to tip a chef\" is better than \"to \ntip a robin\", but worse than \"to tip a waiter\"). \n\nFigure 2: BERT world knowledge (Petroni et al., 2019) \n\nblanks (e.g. \"Cats like to chase [___]\"). Petroni \net al. (2019) showed that, for some relation types, \nvanilla BERT is competitive with methods rely- \ning on knowledge bases (Figure 2), and Roberts \net al. (2020) show the same for open-domain QA \nusing T5 model (Raffel et al., 2019). Davison et al. \n(2019) suggest that it generalizes better to unseen \ndata. In order to retrieve BERT’s knowledge, we \nneed good template sentences, and there is work \non their automatic extraction and augmentation \n(Bouraoui et al., 2019; Jiang et al., 2019b). \nTenney et al. (2019b) showed that BERT en- \ncodes information about entity types, relations, \nsemantic roles, and proto-roles, since this infor- \nmation can be detected with probing classifiers. \n\nBERT struggles with representations of num- \nbers. Addition and number decoding tasks showed \nthat BERT does not form good representations for \nfloating point numbers and fails to generalize away \nfrom the training data (Wallace et al., 2019b). A \npart of the problem is BERT’s wordpiece tokeniza- \ntion, since numbers of similar values can be divided \nup into substantially different word chunks. \n\nHowever, BERT cannot reason based on its \nworld knowledge. Forbes et al. (2019) show that \nBERT can \"guess\" the affordances and properties of \nmany objects, but can not reason about the relation- \nship between properties and affordances. For ex- \nample, it “knows\" that people can walk into houses, \nand that houses are big, but it cannot infer that \nhouses are bigger than people. Zhou et al. (2020) \nand Richardson and Sabharwal (2019) also show \nthat the performance drops with the number of nec- \nessary inference steps. Some of BERT’s world \nknowledge success comes from learning stereotypi- \ncal associations (Poerner et al., 2019), e.g., a person \nwith an Italian-sounding name is predicted to be \nItalian, even when it is incorrect. \n\nOut-of-the-box BERT is surprisingly brittle to \nnamed entity replacements: e.g. replacing names \nin the coreference task changes 85% of predictions \n(Balasubramanian et al., 2020). This suggests that \nthe model does not actually form a generic idea of \nnamed entities, although its F1 scores on NER prob- \ning tasks are high (Tenney et al., 2019a). Broscheit \n(2019) find that fine-tuning BERT on Wikipedia \nentity linking \"teaches\" it additional entity knowl- \nedge, which would suggest that it did not absorb all \nthe relevant entity information during pre-training \non Wikipedia. \n\n3.4 Limitations \n\nMultiple probing studies in section 3 and section 4 \nreport that BERT possesses a surprising amount of \nsyntactic, semantic, and world knowledge. How- \never, Tenney et al. (2019a) remarks, “the fact that \na linguistic pattern is not observed by our probing \nclassifier does not guarantee that it is not there, and \nthe observation of a pattern does not tell us how it \nis used.\" There is also the issue of how complex a \nprobe should be allowed to be (Liu et al., 2019a). If \na more complex probe recovers more information, \nto what extent are we still relying on the original \nmodel? \n\n3.3 World knowledge", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Benchmarks that require verbal reasoning. \nWhile BERT enabled breakthroughs on many NLP \nbenchmarks, a growing list of analysis papers are \nshowing that its language skills are not as impres- \nsive as it seems. In particular, it was shown to rely \non shallow heuristics in natural language inference \n(McCoy et al., 2019b; Zellers et al., 2019; Jin et al., \n2020), reading comprehension (Si et al., 2019a; \nRogers et al., 2020; Sugawara et al., 2020; Si et al., \n2019b; Yogatama et al., 2019), argument reason- \ning comprehension (Niven and Kao, 2019), and \ntext classification (Jin et al., 2020). Such heuristics \ncan even be used to reconstruct a non-publicly- \navailable model (Krishna et al., 2020). As with \nany optimization method, if there is a shortcut in \n\n8 Conclusion \n\nIn a little over a year, BERT has become a ubiq- \nuitous baseline in NLP experiments and inspired \nnumerous studies analyzing the model and propos- \ning various improvements. The stream of papers \nseems to be accelerating rather than slowing down, \nand we hope that this survey helps the community \nto focus on the biggest unresolved questions. \n\n9 Acknowledgements \n\nWe thank the anonymous reviewers for their valu- \nable feedback. This work is funded in part by \nthe NSF award number IIS-1844740 to Anna \nRumshisky.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "4 Localizing linguistic knowledge \n\n4.1 BERT embeddings \n\nIn studies of BERT, the term \"embedding\" refers \nto the output of a Transformer layer (typically, the \nfinal one). Both conventional static embeddings \n(Mikolov et al., 2013) and BERT-style embeddings \ncan be viewed in terms of mutual information max- \nimization (Kong et al., 2019), but the latter are \ncontextualized. Every token is represented by a \nvector dependent on the particular context of occur- \nrence, and contains at least some information about \nthat context (Miaschi and Dell’Orletta, 2020).", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "ies) insufficient (Warstadt et al., 2019). A given \nmethod might also favor one model over another, \ne.g., RoBERTa trails BERT with one tree extraction \nmethod, but leads with another (Htut et al., 2019). \nThe choice of linguistic formalism also matters \n(Kuznetsov and Gurevych, 2020). \n\nSeveral studies reported that distilled contex- \ntualized embeddings better encode lexical se- \nmantic information (i.e. \nthey are better at tra- \nditional word-level tasks such as word similarity). \nThe methods to distill a contextualized represen- \ntation into static include aggregating the informa- \ntion across multiple contexts (Akbik et al., 2019; \nBommasani et al., 2020), encoding \"semantically \nbleached\" sentences that rely almost exclusively on \nthe meaning of a given word (e.g. \"This is <>\") \n(May et al., 2019), and even using contextualized \nembeddings to train static embeddings (Wang et al., \n2020d). \n\nIn view of all that, the alternative is to focus on \nidentifying what BERT actually relies on at infer- \nence time. This direction is currently pursued both \nat the level of architecture blocks (to be discussed \nin detail in subsection 6.3), and at the level of in- \nformation encoded in model weights. Amnesic \nprobing (Elazar et al., 2020) aims to specifically \nremove certain information from the model and see \nhow it changes performance, finding, for example, \nthat language modeling does rely on part-of-speech \ninformation. \n\nBut this is not to say that there is no room for \nimprovement. Ethayarajh (2019) measure how \nsimilar the embeddings for identical words are in \nevery layer, reporting that later BERT layers pro- \nduce more context-specific representations3. They \nalso find that BERT embeddings occupy a narrow \ncone in the vector space, and this effect increases \nfrom the earlier to later layers. That is, two ran- \ndom words will on average have a much higher \ncosine similarity than expected if embeddings \nwere directionally uniform (isotropic). Since \nisotropy was shown to be beneficial for static word \nembeddings (Mu and Viswanath, 2018), this might \nbe a fruitful direction to explore for BERT. \n\nAnother direction is information-theoretic prob- \ning. Pimentel et al. (2020) operationalize prob- \ning as estimating mutual information between the \nlearned representation and a given linguistic prop- \nerty, which highlights that the focus should be not \non the amount of information contained in a rep- \nresentation, but rather on how easily it can be ex- \ntracted from it. Voita and Titov (2020) quantify \nthe amount of effort needed to extract information \nfrom a given representation as minimum descrip- \ntion length needed to communicate both the probe \nsize and the amount of data required for it to do \nwell on a task. \n\nSince BERT embeddings are contextualized, an \ninteresting question is to what extent they cap- \nture phenomena like polysemy and homonymy. \nThere is indeed evidence that BERT’s contextu- \nalized embeddings form distinct clusters corre- \nsponding to word senses (Wiedemann et al., 2019; \nSchmidt and Hofmann, 2020), making BERT suc- \ncessful at word sense disambiguation task. How- \never, Mickus et al. (2019) note that the representa- \ntions of the same word depend on the position \nof the sentence in which it occurs, likely due to \nthe NSP objective. This is not desirable from the \nlinguistic point of view, and could be a promising \n\n3Voita et al. (2019a) look at the evolution of token embed- \ndings, showing that in the earlier Transformer layers, MLM \nforces the acquisition of contextual information at the expense \nof the token identity, which gets recreated in later layers. \n\n4 Localizing linguistic knowledge \n\n4.1 BERT embeddings", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Jesse Dodge, Gabriel Ilharco, Roy Schwartz, Ali \nFarhadi, Hannaneh Hajishirzi, and Noah Smith. \n2020. Fine-Tuning Pretrained Language Models: \nWeight Initializations, Data Orders, and Early \nStopping. arXiv:2002.06305 [cs]. \n\nMichael Glass, Alfio Gliozzo, Rishav Chakravarti, \nAnthony Ferritto, Lin Pan, G P Shrivatsa Bhar- \ngav, Dinesh Garg, and Avi Sil. 2020. Span \nSelection Pre-training for Question Answering. \nIn Proceedings of the 58th Annual Meeting of \nthe Association for Computational Linguistics, \npages 2773–2782, Online. Association for Com- \nputational Linguistics. \n\nYanai Elazar, Shauli Ravfogel, Alon Jacovi, and \nYoav Goldberg. 2020. When Bert Forgets How \nTo POS: Amnesic Probing of Linguistic Proper- \nties and MLM Predictions. arXiv:2006.00995 \n[cs]. \n\nGoran Glavaš and Ivan Vuli´c. 2020. \n\nIs Super- \nvised Syntactic Parsing Beneficial for Language \nUnderstanding? An Empirical Investigation. \narXiv:2008.06788 [cs]. \n\nKawin Ethayarajh. 2019. How Contextual are \nContextualized Word Representations? Compar- \ning the Geometry of BERT, ELMo, and GPT-2 \nEmbeddings. In Proceedings of the 2019 Con- \nference on Empirical Methods in Natural Lan- \nguage Processing and the 9th International Joint \nConference on Natural Language Processing \n(EMNLP-IJCNLP), pages 55–65, Hong Kong, \nChina. Association for Computational Linguis- \ntics. \n\nAdele Goldberg. 2006. Constructions at Work: The \nNature of Generalization in Language. Oxford \nUniversity Press, USA. \n\nYoav Goldberg. 2019. Assessing BERT’s syntactic \nabilities. arXiv preprint arXiv:1901.05287. \n\nLinyuan Gong, Di He, Zhuohan Li, Tao Qin, Liwei \nWang, and Tieyan Liu. 2019. Efficient training \nof BERT by progressively stacking. In Interna- \ntional Conference on Machine Learning, pages \n2337–2346. \n\nWhat BERT is \nLessons from a new suite of psy- \nnot: \ncholinguistic diagnostics for language models. \narXiv:1907.13528 [cs]. \n\nMitchell A Gordon, Kevin Duh, and Nicholas An- \ndrews. 2020. Compressing BERT: Studying the \neffects of weight pruning on transfer learning. \narXiv preprint arXiv:2002.08307. \n\nAngela Fan, Edouard Grave, and Armand Joulin. \n2019. Reducing Transformer Depth on Demand \nwith Structured Dropout. In International Con- \nference on Learning Representations. \n\nSaurabh Goyal, Anamitra Roy Choudhary, Venkate- \nsan Chakaravarthy, Saurabh ManishRaje, Yogish \nSabharwal, and Ashish Verma. 2020. Power- \nbert: Accelerating BERT inference for classifi- \ncation tasks. arXiv preprint arXiv:2001.08950. \n\nMaxwell Forbes, Ari Holtzman, and Yejin Choi. \n2019. Do Neural Language Representations \nLearn Physical Commonsense? In Proceedings \nof the 41st Annual Conference of the Cognitive \nScience Society (CogSci 2019), page 7. \n\nFu-Ming Guo, Sijia Liu, Finlay S. Mungall, Xue \nLin, and Yanzhi Wang. 2019. Reweighted Prox- \nimal Pruning for Large-Scale Language Repre- \nsentation. arXiv:1909.12486 [cs, stat]. \n\nJonathan Frankle and Michael Carbin. 2019. The \nLottery Ticket Hypothesis: Finding Sparse, \nIn International \nTrainable Neural Networks. \nConference on Learning Representations. \n\nKelvin Guu, Kenton Lee, Zora Tung, Panupong Pa- \nsupat, and Ming-Wei Chang. 2020. REALM: \nRetrieval-Augmented Language Model Pre- \nTraining. arXiv:2002.08909 [cs]. \n\nPrakhar Ganesh, Yao Chen, Xin Lou, Moham- \nmad Ali Khan, Yin Yang, Deming Chen, Mari- \nanne Winslett, Hassan Sajjad, and Preslav Nakov. \n2020. Compressing large-scale transformer- \nbased models: A case study on BERT. arXiv \npreprint arXiv:2002.11985. \n\nYaru Hao, Li Dong, Furu Wei, and Ke Xu. 2019. \nVisualizing and Understanding the Effective- \nIn Proceedings of the 2019 \nness of BERT. \nConference on Empirical Methods in Natural \nLanguage Processing and the 9th International \nJoint Conference on Natural Language Process- \ning (EMNLP-IJCNLP), pages 4143–4152, Hong", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "avenue for future work. \n\nThe above discussion concerns token embed- \ndings, but BERT is typically used as a sentence or \ntext encoder. The standard way to generate sen- \ntence or text representations for classification is \nto use the [CLS] token, but alternatives are also \nbeing discussed, including concatenation of token \nrepresentations (Tanaka et al., 2020), normalized \nmean (Tanaka et al., 2020), and layer activations \n(Ma et al., 2019). See Toshniwal et al. (2020) for a \nsystematic comparison of several methods across \ntasks and sentence encoders. \n\nLin et al. (2019) present evidence that atten- \ntion weights are weak indicators of subject- \nverb agreement and reflexive anaphora. Instead \nof serving as strong pointers between tokens that \nshould be related, BERT’s self-attention weights \nwere close to a uniform attention baseline, but there \nwas some sensitivity to different types of distrac- \ntors coherent with psycholinguistic data. This is \nconsistent with conclusions by Ettinger (2019). \n4.2 Self-attention heads \n\nTo our knowledge, morphological information \nin BERT heads has not been addressed, but with \nthe sparse attention variant by Correia et al. (2019) \nin the base Transformer, some attention heads ap- \npear to merge BPE-tokenized words. For semantic \nrelations, there are reports of self-attention heads \nencoding core frame-semantic relations (Kovaleva \net al., 2019), as well as lexicographic and common- \nsense relations (Cui et al., 2020). Several studies proposed classification of attention \nhead types. Raganato and Tiedemann (2018) dis- \ncuss attending to the token itself, previous/next \ntokens and the sentence end. Clark et al. (2019) \ndistinguish between attending to previous/next to- \nkens, [CLS], [SEP], punctuation, and \"attending \nbroadly\" over the sequence. Kovaleva et al. (2019) \npropose 5 patterns shown in Figure 3. \n\nThe overall popularity of self-attention as an in- \nterpretability mechanism is due to the idea that \n\"attention weight has a clear meaning: how much \na particular word will be weighted when comput- \ning the next representation for the current word\" \n(Clark et al., 2019). This view is currently debated \n(Jain and Wallace, 2019; Serrano and Smith, 2019; \nWiegreffe and Pinter, 2019; Brunner et al., 2020), \nand in a multi-layer model where attention is fol- \nlowed by non-linear transformations, the patterns \nin individual heads do not provide a full picture. \nAlso, while many current papers are accompanied \nby attention visualizations, and there is a growing \nnumber of visualization tools (Vig, 2019; Hoover \net al., 2019), the visualization is typically limited \nto qualitative analysis (often with cherry-picked \nexamples) (Belinkov and Glass, 2019), and should \nnot be interpreted as definitive evidence. \n\n4.2.1 Heads with linguistic functions \nThe \"heterogeneous\" attention pattern shown in \nFigure 3 could potentially be linguistically inter- \npretable, and a number of studies focused on iden- \nIn \ntifying the functions of self-attention heads. \nparticular, some BERT heads seem to specialize \nin certain types of syntactic relations. Htut et al. \n(2019) and Clark et al. (2019) report that there \nare BERT heads that attended significantly more \nthan a random baseline to words in certain syntac- \ntic positions. The datasets and methods used in \nthese studies differ, but they both find that there are \nheads that attend to words in obj role more than \nthe positional baseline. The evidence for nsubj, \nadvmod, and amod varies between these two stud- \nies. The overall conclusion is also supported by \nVoita et al. (2019b)’s study of the base Transformer \nin machine translation context. Hoover et al. (2019) \nhypothesize that even complex dependencies like \ndobj are encoded by a combination of heads \nrather than a single head, but this work is limited \nto qualitative analysis. Zhao and Bethard (2020) \nlooked specifically for the heads encoding negation \nscope.", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Sofia Serrano and Noah A. Smith. 2019. Is Atten- \ntion Interpretable? arXiv:1906.03731 [cs]. \n\nYu Sun, Shuohuan Wang, Yukun Li, Shikun \nFeng, Hao Tian, Hua Wu, and Haifeng Wang. \n2019c. \nERNIE 2.0: A Continual Pre- \nTraining Framework for Language Understand- \ning. arXiv:1907.12412 [cs]. \n\nSheng Shen, Zhen Dong, Jiayu Ye, Linjian Ma, \nZhewei Yao, Amir Gholami, Michael W Ma- \nhoney, and Kurt Keutzer. 2019. Q-BERT: Hes- \nsian Based Ultra Low Precision Quantization of \nBERT. arXiv preprint arXiv:1909.05840. \n\nZhiqing Sun, Hongkun Yu, Xiaodan Song, Ren- \njie Liu, Yiming Yang, and Denny Zhou. 2020. \nMobileBERT: Task-Agnostic Compression of \nBERT for Resource Limited Devices. \n\nChenglei Si, Shuohang Wang, Min-Yen Kan, and \nJing Jiang. 2019a. What does BERT learn \nfrom multiple-choice reading comprehension \ndatasets? arXiv preprint arXiv:1910.12391. \n\nChenglei Si, Shuohang Wang, Min-Yen Kan, and \nJing Jiang. 2019b. What does BERT Learn \nfrom Multiple-Choice Reading Comprehension \nDatasets? arXiv:1910.12391 [cs]. \n\nKaitao Song, Xu Tan, Tao Qin, Jianfeng Lu, and \nTie-Yan Liu. 2020. MPNet: Masked and Per- \nmuted Pre-training for Language Understanding. \narXiv:2004.09297 [cs]. \n\nAsa Cooper Stickland and Iain Murray. 2019. \nBERT and PALs: Projected Attention Layers for \nEfficient Adaptation in Multi-Task Learning. In \nInternational Conference on Machine Learning, \npages 5986–5995. \n\nEmma Strubell, Ananya Ganesh, and Andrew Mc- \nCallum. 2019. Energy and Policy Considera- \ntions for Deep Learning in NLP. In ACL 2019. \n\n\n \n \n \n \n [html]\n
TableInfused Tansformer and BEK1 Tiodeis IOITablechine Translation and Natural Language U standing, arXiv : 1911.06156 [ cs, stat ].TableTableTableTailmor, Yanai Elazar, Yoav Gold and Jonathan Berant. 2019. oLMpics - what Language Model Pre - Training Capt arXiv : 1912.13283 [ cs ].TableTanaka, Hiroyaki Shimos, Rui Cao, Bai, and Wen Ma, 2020. Document Class tion by Word Embeddings of HERT, In Cstational Linguistics, Communications in Oputer and Information Science, pages 145 - Singapore. Springer.TableLili Olga Vechtomova, and Jimmy Lin. 2019. tilling Task - Specific Knowledge from Binto Simple Neural Networks. arXiv pny, pny, and Networks. arXiv pny, pny,
\n\nSaku Sugawara, Pontus Stenetorp, Kentaro Inui, \nand Akiko Aizawa. 2020. Assessing the Bench- \nmarking Capacity of Machine Reading Compre- \nhension Datasets. In AAAI. \n\nTa-Chun Su and Hsiang-Chih Cheng. 2019. \nfor Anywhere. \n\nSesameBERT: Attention \narXiv:1910.03176 [cs]. \n\nIan Tenney, Dipanjan Das, and Ellie Pavlick. 2019a. \nBERT Rediscovers the Classical NLP Pipeline. \nIn Proceedings of the 57th Annual Meeting of \nthe Association for Computational Linguistics, \npages 4593–4601. \n\nSiqi Sun, Yu Cheng, Zhe Gan, and Jingjing Liu. \n2019a. Patient Knowledge Distillation for BERT \nModel Compression. In Proceedings of the 2019 \nConference on Empirical Methods in Natural \nLanguage Processing and the 9th International \nJoint Conference on Natural Language Process- \ning (EMNLP-IJCNLP), pages 4314–4323. \n\nIan Tenney, Patrick Xia, Berlin Chen, Alex Wang, \nAdam Poliak, R. Thomas McCoy, Najoung Kim, \nBenjamin Van Durme, Samuel R. Bowman, Di- \npanjan Das, and Ellie Pavlick. 2019b. What do \nyou learn from context? Probing for sentence \nstructure in contextualized word representations. \nIn International Conference on Learning Repre- \nsentations.", - "page_start": 19, - "page_end": 19, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Anna Rogers \nCenter for Social Data Science \nUniversity of Copenhagen \narogers@sodas.ku.dk Olga Kovaleva \nDept. of Computer Science \nUniversity of Massachusetts Lowell \nokovalev@cs.uml.edu Anna Rumshisky \nDept. of Computer Science \nUniversity of Massachusetts Lowell \narum@cs.uml.edu \n\nimprove BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. \n\nAbstract \n\nTransformer-based models have pushed state \nof the art in many areas of NLP, but our un- \nderstanding of what is behind their success \nis still limited. This paper is the first sur- \nvey of over 150 studies of the popular BERT \nmodel. We review the current state of knowl- \nedge about how BERT works, what kind \nof information it learns and how it is repre- \nsented, common modifications to its training \nobjectives and architecture, the overparame- \nterization issue and approaches to compres- \nsion. We then outline directions for future \nresearch. \n\n0 \n2 \n0 \n2 \n\nv \no \nN \n9 \n\n] \nL \nC \n. \ns \nc \n[ \n\n3 \nv \n7 \n2 \n3 \n2 \n1 \n. \n2 \n0 \n0 \n2 \n: \nv \ni \nX \nr \na \n\nFundamentally, BERT is a stack of Transformer \nencoder layers (Vaswani et al., 2017) which consist \nof multiple self-attention \"heads\". For every input \ntoken in a sequence, each head computes key, value \nand query vectors, used to create a weighted repre- \nsentation. The outputs of all heads in the same layer \nare combined and run through a fully-connected \nlayer. Each layer is wrapped with a skip connection \nand followed by layer normalization. \n\nThe conventional workflow for BERT consists \nof two stages: pre-training and fine-tuning. Pre- \ntraining uses two self-supervised tasks: masked \nlanguage modeling (MLM, prediction of randomly \nmasked input tokens) and next sentence prediction \n(NSP, predicting if two input sentences are adjacent \nto each other). In fine-tuning for downstream ap- \nplications, one or more fully-connected layers are \ntypically added on top of the final encoder layer. \n\nThe input representations are computed as fol- \nlows: each word in the input is first tokenized into \nwordpieces (Wu et al., 2016), and then three em- \nbedding layers (token, position, and segment) are \ncombined to obtain a fixed-length vector. Special \ntoken [CLS] is used for classification predictions, \nand [SEP] separates input segments. \n\nGoogle1 and HuggingFace (Wolf et al., 2020) \nprovide many variants of BERT, including the orig- \ninal \"base\" and \"large\" versions. They vary in the \nnumber of heads, layers, and hidden state size. \n\n1https://github.com/ \ngoogle-research/bert \n\nSince their introduction in 2017, Transformers \n(Vaswani et al., 2017) have taken NLP by storm, \noffering enhanced parallelization and better model- \ning of long-range dependencies. The best known \nTransformer-based model is BERT (Devlin et al., \n2019); it obtained state-of-the-art results in numer- \nous benchmarks and is still a must-have baseline. \nWhile it is clear that BERT works remarkably \nwell, it is less clear why, which limits further \nhypothesis-driven improvement of the architecture. \nUnlike CNNs, the Transformers have little cogni- \ntive motivation, and the size of these models limits \nour ability to experiment with pre-training and per- \nform ablation studies. This explains a large number \nof studies over the past year that attempted to un- \nderstand the reasons behind BERT’s performance. \nIn this paper, we provide an overview of what \nhas been learned to date, highlighting the questions \nwhich are still unresolved. We first consider the \nlinguistic aspects of it, i.e., the current evidence \nregarding the types of linguistic and world knowl- \nedge learned by BERT, as well as where and how \nthis knowledge may be stored in the model. We \nthen turn to the technical aspects of the model and \nprovide an overview of the current proposals to", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv2_taclccby4_license.pdf", - "query": "Is BERT good with numbers representations ?", - "target_page": 3, - "target_passage": " BERTstruggles with representations of numbers. ", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "Benchmarks that require verbal reasoning. \nWhile BERT enabled breakthroughs on many NLP \nbenchmarks, a growing list of analysis papers are \nshowing that its language skills are not as impres- \nsive as it seems. In particular, it was shown to rely \non shallow heuristics in natural language inference \n(McCoy et al., 2019b; Zellers et al., 2019; Jin et al., \n2020), reading comprehension (Si et al., 2019a; \nRogers et al., 2020; Sugawara et al., 2020; Si et al., \n2019b; Yogatama et al., 2019), argument reason- \ning comprehension (Niven and Kao, 2019), and \ntext classification (Jin et al., 2020). Such heuristics \ncan even be used to reconstruct a non-publicly- \navailable model (Krishna et al., 2020). As with \nany optimization method, if there is a shortcut in \n\n8 Conclusion \n\nIn a little over a year, BERT has become a ubiq- \nuitous baseline in NLP experiments and inspired \nnumerous studies analyzing the model and propos- \ning various improvements. The stream of papers \nseems to be accelerating rather than slowing down, \nand we hope that this survey helps the community \nto focus on the biggest unresolved questions. \n\n9 Acknowledgements \n\nWe thank the anonymous reviewers for their valu- \nable feedback. This work is funded in part by \nthe NSF award number IIS-1844740 to Anna \nRumshisky.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "5 Training BERT \n\nThis section reviews the proposals to optimize the \ntraining and architecture of the original BERT. \n\nTo date, the most systematic study of BERT archi- \ntecture was performed by Wang et al. (2019b), who \nexperimented with the number of layers, heads, and \nmodel parameters, varying one option and freez- \ning the others. They concluded that the number \nof heads was not as significant as the number \nof layers. That is consistent with the findings \nof Voita et al. (2019b) and Michel et al. (2019) \n(section 6), and also the observation by Liu et al. \n(2019a) that the middle layers were the most trans- \nferable. Larger hidden representation size was con- \n\nGong et al. (2019) note that, since self-attention \npatterns in higher and lower layers are similar, the \nmodel training can be done in a recursive man- \nner, where the shallower version is trained first and \nthen the trained parameters are copied to deeper \nlayers. Such a \"warm-start\" can lead to a 25% faster \ntraining without sacrificing performance.", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Xiaoqi Jiao, Yichun Yin, Lifeng Shang, Xin Jiang, \nXiao Chen, Linlin Li, Fang Wang, and Qun \nLiu. 2019. TinyBERT: Distilling BERT for nat- \nural language understanding. arXiv preprint \narXiv:1909.10351. \n\nKong, China. Association for Computational \nLinguistics. \n\nZhengbao Jiang, Frank F. Xu, Jun Araki, and Gra- \nham Neubig. 2019b. How Can We Know What \nLanguage Models Know? arXiv:1911.12543 \n[cs]. \n\nJohn Hewitt and Christopher D. Manning. 2019. \nA Structural Probe for Finding Syntax in Word \nIn Proceedings of the 2019 \nRepresentations. \nConference of the North American Chapter of \nthe Association for Computational Linguistics: \nHuman Language Technologies, Volume 1 (Long \nand Short Papers), pages 4129–4138. \n\nDi Jin, Zhijing Jin, Joey Tianyi Zhou, and Peter \nIs BERT Really Robust? A \nSzolovits. 2020. \nStrong Baseline for Natural Language Attack \non Text Classification and Entailment. In AAAI \n2020. \nGeoffrey Hinton, Oriol Vinyals, and Jeff Dean. \n2014. Distilling the Knowledge in a Neural Net- \nIn Deep Learning and Representation \nwork. \nLearning Workshop: NIPS 2014. \n\nBenjamin Hoover, Hendrik Strobelt, and Sebastian \nGehrmann. 2019. exBERT: A Visual Analy- \nsis Tool to Explore Learned Representations in \nTransformers Models. arXiv:1910.05276 [cs]. \n\nMandar Joshi, Danqi Chen, Yinhan Liu, Daniel S. \nWeld, Luke Zettlemoyer, and Omer Levy. 2020. \nSpanBERT: Improving Pre-Training by Repre- \nsenting and Predicting Spans. Transactions of \nthe Association for Computational Linguistics, \n8:64–77. \n\nNeil Houlsby, Andrei Giurgiu, Stanislaw Jastrzeb- \nski, Bruna Morrone, Quentin de Laroussilhe, An- \ndrea Gesmundo, Mona Attariyan, and Sylvain \nGelly. 2019. Parameter-Efficient Transfer Learn- \ning for NLP. arXiv:1902.00751 [cs, stat]. \n\nWei-Tsung Kao, Tsung-Han Wu, Po-Han Chi, \nChun-Cheng Hsieh, and Hung-Yi Lee. 2020. \nFurther boosting BERT-based models by du- \nSome intriguing \nplicating existing layers: \narXiv preprint \nphenomena inside BERT. \narXiv:2001.09309. \n\nPhu Mon Htut, Jason Phang, Shikha Bordia, and \nSamuel R Bowman. 2019. Do attention heads \nin BERT track syntactic dependencies? arXiv \npreprint arXiv:1911.12246. \n\nTaeuk Kim, Jihun Choi, Daniel Edmiston, and \nSang-goo Lee. 2020. Are pre-trained language \nmodels aware of phrases? simple but strong \nbaselines for grammar induction. In ICLR 2020. \n\nSarthak Jain and Byron C. Wallace. 2019. Atten- \ntion is not Explanation. In Proceedings of the \n2019 Conference of the North American Chapter \nof the Association for Computational Linguis- \ntics: Human Language Technologies, Volume 1 \n(Long and Short Papers), pages 3543–3556. \nGoro Kobayashi, Tatsuki Kuribayashi, Sho Yokoi, \nand Kentaro Inui. 2020. Attention Module is \nNot Only a Weight: Analyzing Transformers \nwith Vector Norms. arXiv:2004.10102 [cs]. \n\nGanesh Jawahar, Benoît Sagot, Djamé Seddah, \nSamuel Unicomb, Gerardo Iñiguez, Márton Kar- \nsai, Yannick Léo, Márton Karsai, Carlos Sar- \nraute, Éric Fleury, et al. 2019. What does BERT \nlearn about the structure of language? In 57th \nAnnual Meeting of the Association for Computa- \ntional Linguistics (ACL), Florence, Italy. \n\nDan Kondratyuk and Milan Straka. 2019. 75 Lan- \nguages, 1 Model: Parsing Universal Dependen- \nIn Proceedings of the 2019 \ncies Universally. \nConference on Empirical Methods in Natural \nLanguage Processing and the 9th International \nJoint Conference on Natural Language Process- \ning (EMNLP-IJCNLP), pages 2779–2795, Hong \nKong, China. Association for Computational \nLinguistics. \n\nHaoming Jiang, Pengcheng He, Weizhu Chen, Xi- \naodong Liu, Jianfeng Gao, and Tuo Zhao. 2019a. \nSMART: Robust and Efficient Fine-Tuning for \nPre-trained Natural Language Models through \narXiv \nPrincipled Regularized Optimization. \npreprint arXiv:1911.03437. Lingpeng Kong, Cyprien de Masson d’Autume, Lei \nYu, Wang Ling, Zihang Dai, and Dani Yogatama. \n2019. A mutual information maximization per- \nspective of language representation learning. In", - "page_start": 15, - "page_end": 15, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Anna Rogers \nCenter for Social Data Science \nUniversity of Copenhagen \narogers@sodas.ku.dk Olga Kovaleva \nDept. of Computer Science \nUniversity of Massachusetts Lowell \nokovalev@cs.uml.edu Anna Rumshisky \nDept. of Computer Science \nUniversity of Massachusetts Lowell \narum@cs.uml.edu \n\nimprove BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. \n\nAbstract \n\nTransformer-based models have pushed state \nof the art in many areas of NLP, but our un- \nderstanding of what is behind their success \nis still limited. This paper is the first sur- \nvey of over 150 studies of the popular BERT \nmodel. We review the current state of knowl- \nedge about how BERT works, what kind \nof information it learns and how it is repre- \nsented, common modifications to its training \nobjectives and architecture, the overparame- \nterization issue and approaches to compres- \nsion. We then outline directions for future \nresearch. \n\n0 \n2 \n0 \n2 \n\nv \no \nN \n9 \n\n] \nL \nC \n. \ns \nc \n[ \n\n3 \nv \n7 \n2 \n3 \n2 \n1 \n. \n2 \n0 \n0 \n2 \n: \nv \ni \nX \nr \na \n\nFundamentally, BERT is a stack of Transformer \nencoder layers (Vaswani et al., 2017) which consist \nof multiple self-attention \"heads\". For every input \ntoken in a sequence, each head computes key, value \nand query vectors, used to create a weighted repre- \nsentation. The outputs of all heads in the same layer \nare combined and run through a fully-connected \nlayer. Each layer is wrapped with a skip connection \nand followed by layer normalization. \n\nThe conventional workflow for BERT consists \nof two stages: pre-training and fine-tuning. Pre- \ntraining uses two self-supervised tasks: masked \nlanguage modeling (MLM, prediction of randomly \nmasked input tokens) and next sentence prediction \n(NSP, predicting if two input sentences are adjacent \nto each other). In fine-tuning for downstream ap- \nplications, one or more fully-connected layers are \ntypically added on top of the final encoder layer. \n\nThe input representations are computed as fol- \nlows: each word in the input is first tokenized into \nwordpieces (Wu et al., 2016), and then three em- \nbedding layers (token, position, and segment) are \ncombined to obtain a fixed-length vector. Special \ntoken [CLS] is used for classification predictions, \nand [SEP] separates input segments. \n\nGoogle1 and HuggingFace (Wolf et al., 2020) \nprovide many variants of BERT, including the orig- \ninal \"base\" and \"large\" versions. They vary in the \nnumber of heads, layers, and hidden state size. \n\n1https://github.com/ \ngoogle-research/bert \n\nSince their introduction in 2017, Transformers \n(Vaswani et al., 2017) have taken NLP by storm, \noffering enhanced parallelization and better model- \ning of long-range dependencies. The best known \nTransformer-based model is BERT (Devlin et al., \n2019); it obtained state-of-the-art results in numer- \nous benchmarks and is still a must-have baseline. \nWhile it is clear that BERT works remarkably \nwell, it is less clear why, which limits further \nhypothesis-driven improvement of the architecture. \nUnlike CNNs, the Transformers have little cogni- \ntive motivation, and the size of these models limits \nour ability to experiment with pre-training and per- \nform ablation studies. This explains a large number \nof studies over the past year that attempted to un- \nderstand the reasons behind BERT’s performance. \nIn this paper, we provide an overview of what \nhas been learned to date, highlighting the questions \nwhich are still unresolved. We first consider the \nlinguistic aspects of it, i.e., the current evidence \nregarding the types of linguistic and world knowl- \nedge learned by BERT, as well as where and how \nthis knowledge may be stored in the model. We \nthen turn to the technical aspects of the model and \nprovide an overview of the current proposals to", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Jesse Dodge, Gabriel Ilharco, Roy Schwartz, Ali \nFarhadi, Hannaneh Hajishirzi, and Noah Smith. \n2020. Fine-Tuning Pretrained Language Models: \nWeight Initializations, Data Orders, and Early \nStopping. arXiv:2002.06305 [cs]. \n\nMichael Glass, Alfio Gliozzo, Rishav Chakravarti, \nAnthony Ferritto, Lin Pan, G P Shrivatsa Bhar- \ngav, Dinesh Garg, and Avi Sil. 2020. Span \nSelection Pre-training for Question Answering. \nIn Proceedings of the 58th Annual Meeting of \nthe Association for Computational Linguistics, \npages 2773–2782, Online. Association for Com- \nputational Linguistics. \n\nYanai Elazar, Shauli Ravfogel, Alon Jacovi, and \nYoav Goldberg. 2020. When Bert Forgets How \nTo POS: Amnesic Probing of Linguistic Proper- \nties and MLM Predictions. arXiv:2006.00995 \n[cs]. \n\nGoran Glavaš and Ivan Vuli´c. 2020. \n\nIs Super- \nvised Syntactic Parsing Beneficial for Language \nUnderstanding? An Empirical Investigation. \narXiv:2008.06788 [cs]. \n\nKawin Ethayarajh. 2019. How Contextual are \nContextualized Word Representations? Compar- \ning the Geometry of BERT, ELMo, and GPT-2 \nEmbeddings. In Proceedings of the 2019 Con- \nference on Empirical Methods in Natural Lan- \nguage Processing and the 9th International Joint \nConference on Natural Language Processing \n(EMNLP-IJCNLP), pages 55–65, Hong Kong, \nChina. Association for Computational Linguis- \ntics. \n\nAdele Goldberg. 2006. Constructions at Work: The \nNature of Generalization in Language. Oxford \nUniversity Press, USA. \n\nYoav Goldberg. 2019. Assessing BERT’s syntactic \nabilities. arXiv preprint arXiv:1901.05287. \n\nLinyuan Gong, Di He, Zhuohan Li, Tao Qin, Liwei \nWang, and Tieyan Liu. 2019. Efficient training \nof BERT by progressively stacking. In Interna- \ntional Conference on Machine Learning, pages \n2337–2346. \n\nWhat BERT is \nLessons from a new suite of psy- \nnot: \ncholinguistic diagnostics for language models. \narXiv:1907.13528 [cs]. \n\nMitchell A Gordon, Kevin Duh, and Nicholas An- \ndrews. 2020. Compressing BERT: Studying the \neffects of weight pruning on transfer learning. \narXiv preprint arXiv:2002.08307. \n\nAngela Fan, Edouard Grave, and Armand Joulin. \n2019. Reducing Transformer Depth on Demand \nwith Structured Dropout. In International Con- \nference on Learning Representations. \n\nSaurabh Goyal, Anamitra Roy Choudhary, Venkate- \nsan Chakaravarthy, Saurabh ManishRaje, Yogish \nSabharwal, and Ashish Verma. 2020. Power- \nbert: Accelerating BERT inference for classifi- \ncation tasks. arXiv preprint arXiv:2001.08950. \n\nMaxwell Forbes, Ari Holtzman, and Yejin Choi. \n2019. Do Neural Language Representations \nLearn Physical Commonsense? In Proceedings \nof the 41st Annual Conference of the Cognitive \nScience Society (CogSci 2019), page 7. \n\nFu-Ming Guo, Sijia Liu, Finlay S. Mungall, Xue \nLin, and Yanzhi Wang. 2019. Reweighted Prox- \nimal Pruning for Large-Scale Language Repre- \nsentation. arXiv:1909.12486 [cs, stat]. \n\nJonathan Frankle and Michael Carbin. 2019. The \nLottery Ticket Hypothesis: Finding Sparse, \nIn International \nTrainable Neural Networks. \nConference on Learning Representations. \n\nKelvin Guu, Kenton Lee, Zora Tung, Panupong Pa- \nsupat, and Ming-Wei Chang. 2020. REALM: \nRetrieval-Augmented Language Model Pre- \nTraining. arXiv:2002.08909 [cs]. \n\nPrakhar Ganesh, Yao Chen, Xin Lou, Moham- \nmad Ali Khan, Yin Yang, Deming Chen, Mari- \nanne Winslett, Hassan Sajjad, and Preslav Nakov. \n2020. Compressing large-scale transformer- \nbased models: A case study on BERT. arXiv \npreprint arXiv:2002.11985. \n\nYaru Hao, Li Dong, Furu Wei, and Ke Xu. 2019. \nVisualizing and Understanding the Effective- \nIn Proceedings of the 2019 \nness of BERT. \nConference on Empirical Methods in Natural \nLanguage Processing and the 9th International \nJoint Conference on Natural Language Process- \ning (EMNLP-IJCNLP), pages 4143–4152, Hong", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "3.2 Semantic knowledge \n\nTo date, more studies have been devoted to BERT’s \nknowledge of syntactic rather than semantic phe- \nnomena. However, we do have evidence from an \nMLM probing study that BERT has some knowl- \nedge of semantic roles (Ettinger, 2019). BERT \neven displays some preference for the incorrect \nfillers for semantic roles that are semantically re- \nlated to the correct ones, as opposed to those that \nare unrelated (e.g. \"to tip a chef\" is better than \"to \ntip a robin\", but worse than \"to tip a waiter\"). \n\nFigure 2: BERT world knowledge (Petroni et al., 2019) \n\nblanks (e.g. \"Cats like to chase [___]\"). Petroni \net al. (2019) showed that, for some relation types, \nvanilla BERT is competitive with methods rely- \ning on knowledge bases (Figure 2), and Roberts \net al. (2020) show the same for open-domain QA \nusing T5 model (Raffel et al., 2019). Davison et al. \n(2019) suggest that it generalizes better to unseen \ndata. In order to retrieve BERT’s knowledge, we \nneed good template sentences, and there is work \non their automatic extraction and augmentation \n(Bouraoui et al., 2019; Jiang et al., 2019b). \nTenney et al. (2019b) showed that BERT en- \ncodes information about entity types, relations, \nsemantic roles, and proto-roles, since this infor- \nmation can be detected with probing classifiers. \n\nBERT struggles with representations of num- \nbers. Addition and number decoding tasks showed \nthat BERT does not form good representations for \nfloating point numbers and fails to generalize away \nfrom the training data (Wallace et al., 2019b). A \npart of the problem is BERT’s wordpiece tokeniza- \ntion, since numbers of similar values can be divided \nup into substantially different word chunks. \n\nHowever, BERT cannot reason based on its \nworld knowledge. Forbes et al. (2019) show that \nBERT can \"guess\" the affordances and properties of \nmany objects, but can not reason about the relation- \nship between properties and affordances. For ex- \nample, it “knows\" that people can walk into houses, \nand that houses are big, but it cannot infer that \nhouses are bigger than people. Zhou et al. (2020) \nand Richardson and Sabharwal (2019) also show \nthat the performance drops with the number of nec- \nessary inference steps. Some of BERT’s world \nknowledge success comes from learning stereotypi- \ncal associations (Poerner et al., 2019), e.g., a person \nwith an Italian-sounding name is predicted to be \nItalian, even when it is incorrect. \n\nOut-of-the-box BERT is surprisingly brittle to \nnamed entity replacements: e.g. replacing names \nin the coreference task changes 85% of predictions \n(Balasubramanian et al., 2020). This suggests that \nthe model does not actually form a generic idea of \nnamed entities, although its F1 scores on NER prob- \ning tasks are high (Tenney et al., 2019a). Broscheit \n(2019) find that fine-tuning BERT on Wikipedia \nentity linking \"teaches\" it additional entity knowl- \nedge, which would suggest that it did not absorb all \nthe relevant entity information during pre-training \non Wikipedia. \n\n3.4 Limitations \n\nMultiple probing studies in section 3 and section 4 \nreport that BERT possesses a surprising amount of \nsyntactic, semantic, and world knowledge. How- \never, Tenney et al. (2019a) remarks, “the fact that \na linguistic pattern is not observed by our probing \nclassifier does not guarantee that it is not there, and \nthe observation of a pattern does not tell us how it \nis used.\" There is also the issue of how complex a \nprobe should be allowed to be (Liu et al., 2019a). If \na more complex probe recovers more information, \nto what extent are we still relying on the original \nmodel? \n\n3.3 World knowledge", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "He Bai, Peng Shi, \n\nJimmy Lin, Luchen \nTan, Kun Xiong, Wen Gao, and Ming Li. \n2020. SegaBERT: Pre-training of Segment- \naware BERT for Language Understanding. \narXiv:2004.14996 [cs]. \nGustavo Aguilar, Yuan Ling, Yu Zhang, Benjamin \nYao, Xing Fan, and Edward Guo. 2019. Knowl- \nedge Distillation from Internal Representations. \narXiv preprint arXiv:1910.03723. \n\nSriram Balasubramanian, Naman Jain, Gaurav Jin- \ndal, Abhijeet Awasthi, and Sunita Sarawagi. \n2020. What’s in a Name? Are BERT Named En- \ntity Representations just as Good for any other \nName? In Proceedings of the 5th Workshop on \nRepresentation Learning for NLP, pages 205– \n214, Online. Association for Computational Lin- \nguistics. \n\nAlan Akbik, Tanja Bergmann, and Roland Voll- \ngraf. 2019. Pooled Contextualized Embeddings \nfor Named Entity Recognition. In Proceedings \nof the 2019 Conference of the North Ameri- \ncan Chapter of the Association for Computa- \ntional Linguistics: Human Language Technolo- \ngies, Volume 1 (Long and Short Papers), pages \n724–728, Minneapolis, Minnesota. Association \nfor Computational Linguistics. \n\nHangbo Bao, Li Dong, Furu Wei, Wenhui Wang, \nNan Yang, Xiaodong Liu, Yu Wang, Songhao \nPiao, Jianfeng Gao, Ming Zhou, and Hsiao- \nWuen Hon. 2020. UniLMv2: Pseudo-Masked \nLanguage Models for Unified Language Model \nPre-Training. arXiv:2002.12804 [cs]. \n\nYuki Arase and Jun’ichi Tsujii. 2019. Transfer \nFine-Tuning: A BERT Case Study. In Proceed- \nings of the 2019 Conference on Empirical Meth- \nods in Natural Language Processing and the \n9th International Joint Conference on Natural \nLanguage Processing (EMNLP-IJCNLP), pages \n5393–5404, Hong Kong, China. Association for \nComputational Linguistics. \n\nEkaterina Arkhangelskaia and Sourav Dutta. 2019. \nWhatcha lookin’at? DeepLIFTing BERT’s At- \ntention in Question Answering. arXiv preprint \narXiv:1910.06431. \n\nMikel Artetxe, Sebastian Ruder, and Dani Yo- \ngatama. 2019. On the Cross-lingual Trans- \nferability of Monolingual Representations. \narXiv:1911.03310 [cs]. \n\n\n \n \n \n \n [html]\n
ysis Methods in veural Language rtocessil A Survey. Transactions of the Association β Computational Linguistics, 7 : 49 – 72.Eyal Ben - David, Carmel Rabinovitz, and Roi Fichart. 2020, PERL : Pivot - based Domain Adation for Pre - trained Deep Contextualized E bedding Models. arXiv : 2006.09075 [ cs ].Rishi Bommasani, Kelly Davis, and Claire Carc 2020. Interpreting Pretrained Contextualiz Representations via Reductions to Static E beddings. In Proceedings of the 50th Amn Meeting of the Association Jor ComparationZird Bouraoui, Jose Camacho - Collados, a Sieven Schockaer, 2019. Inducing Relation Knowledge from BERT. arXiv : 1911.127 Joj.
Samuel Broscheit. 2019. Investigating Ent Knowledge in BERT with Simple Neural Ea
\n\nMatthias Aßenmacher and Christian Heumann. \n2020. On the comparability of Pre-Trained Lan- \nguage Models. arXiv:2001.00781 [cs, stat]. \n\nJoris Baan, Maartje ter Hoeve, Marlies van der \nWees, Anne Schuth, and Maarten de Rijke. \n2019. Understanding Multi-Head Attention \nin Abstractive Summarization. arXiv preprint \narXiv:1911.03898.", - "page_start": 12, - "page_end": 12, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Sastry, Amanda Askell, Sandhini Agarwal, Ariel \nHerbert-Voss, Gretchen Krueger, Tom Henighan, \nRewon Child, Aditya Ramesh, Daniel M. \nZiegler, Jeffrey Wu, Clemens Winter, Christo- \npher Hesse, Mark Chen, Eric Sigler, Mateusz \nLitwin, Scott Gray, Benjamin Chess, Jack Clark, \nChristopher Berner, Sam McCandlish, Alec \nRadford, Ilya Sutskever, and Dario Amodei. \n2020. Language Models are Few-Shot Learners. \narXiv:2005.14165 [cs]. \nGonçalo M. Correia, Vlad Niculae, and André F. T. \nMartins. 2019. Adaptively Sparse Transform- \ners. In Proceedings of the 2019 Conference on \nEmpirical Methods in Natural Language Pro- \ncessing and the 9th International Joint Confer- \nence on Natural Language Processing (EMNLP- \nIJCNLP), pages 2174–2184, Hong Kong, China. \nAssociation for Computational Linguistics. \n\nGino Brunner, Yang Liu, Damian Pascual, Oliver \nRichter, Massimiliano Ciaramita, and Roger \nWattenhofer. 2020. On Identifiability in Trans- \nformers. In International Conference on Learn- \ning Representations. \n\nMatt Crane. 2018. Questionable Answers in Ques- \ntion Answering Research: Reproducibility and \nVariability of Published Results. Transactions of \nthe Association for Computational Linguistics, \n6:241–252. \n\nTianlong Chen, Jonathan Frankle, Shiyu Chang, \nSijia Liu, Yang Zhang, Zhangyang Wang, and \nMichael Carbin. 2020. The Lottery Ticket \nHypothesis for Pre-trained BERT Networks. \narXiv:2007.12223 [cs, stat]. \nLeyang Cui, Sijie Cheng, Yu Wu, and Yue Zhang. \n2020. Does BERT Solve Commonsense Task via \nCommonsense Knowledge? arXiv:2008.03945 \n[cs]. \n\nYiming Cui, Wanxiang Che, Ting Liu, Bing Qin, \nZiqing Yang, Shijin Wang, and Guoping Hu. \n2019. Pre-Training with Whole Word Masking \nfor Chinese BERT. arXiv:1906.08101 [cs]. \n\nXingyi Cheng, Weidi Xu, Kunlong Chen, Wei \nWang, Bin Bi, Ming Yan, Chen Wu, Luo Si, Wei \nChu, and Taifeng Wang. 2019. Symmetric Reg- \nularization based BERT for Pair-Wise Semantic \nReasoning. arXiv:1909.03405 [cs]. \n\n\n \n \n \n \n [html]\n
AllelestingContextual Representations, In Proceeding the First Workshop on Commonsense Infere in Natural Language Processing, pages 1 Hong Kong, China. Association for CompTotal LinguesticsLinguishiolance, and Alsociation, and Also site IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
\n\nKevin Clark, Urvashi Khandelwal, Omer Levy, \nand Christopher D. Manning. 2019. What Does \nBERT Look at? An Analysis of BERT’s Atten- \ntion. In Proceedings of the 2019 ACL Workshop \nBlackboxNLP: Analyzing and Interpreting Neu- \nral Networks for NLP, pages 276–286, Florence, \nItaly. Association for Computational Linguistics. \n\nKevin Clark, Minh-Thang Luong, Quoc V. Le, and \nChristopher D. Manning. 2020. ELECTRA: Pre- \nTraining Text Encoders as Discriminators Rather \nThan Generators. In International Conference \non Learning Representations. \n\nStephane Clinchant, Kweon Woo Jung, and Vas- \nsilina Nikoulina. 2019. On the use of BERT \nfor Neural Machine Translation. In Proceedings \nof the 3rd Workshop on Neural Generation and \nTranslation, pages 108–117, Hong Kong. Asso- \nciation for Computational Linguistics. \n\nAlexis Conneau, Kartikay Khandelwal, Naman \nGoyal, Vishrav Chaudhary, Guillaume Wen- \nzek, Francisco Guzmán, Edouard Grave, Myle \nOtt, Luke Zettlemoyer, and Veselin Stoyanov.", - "page_start": 13, - "page_end": 13, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Tiago Pimentel, Josef Valvoda, Rowan Hall Maud- \nslay, Ran Zmigrod, Adina Williams, and Ryan \nCotterell. 2020. Information-Theoretic Probing \nfor Linguistic Structure. arXiv:2004.03061 [cs]. \n\nNina Poerner, Ulli Waltinger, and Hinrich Schütze. \n2019. \nBERT is not a knowledge base \n(yet): Factual knowledge vs. name-based rea- \narXiv preprint \nsoning in unsupervised qa. \narXiv:1911.03681. Jiaqi Mu and Pramod Viswanath. 2018. All-but- \nthe-top: Simple and effective postprocessing for \nword representations. In International Confer- \nence on Learning Representations.", - "page_start": 17, - "page_end": 17, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "4 Localizing linguistic knowledge \n\n4.1 BERT embeddings \n\nIn studies of BERT, the term \"embedding\" refers \nto the output of a Transformer layer (typically, the \nfinal one). Both conventional static embeddings \n(Mikolov et al., 2013) and BERT-style embeddings \ncan be viewed in terms of mutual information max- \nimization (Kong et al., 2019), but the latter are \ncontextualized. Every token is represented by a \nvector dependent on the particular context of occur- \nrence, and contains at least some information about \nthat context (Miaschi and Dell’Orletta, 2020).", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_FFIN_2002.pdf", - "query": "How many affiliate banks has First Financial Bankshares ?", - "target_page": 4, - "target_passage": "The corporation has 10 affiliate banks, which provide services from 28 full-service locations in the Central, West and High Plains regions of Texas. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "First Financial Bankshares, Inc. is a financial holding company \n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion \n\nas of December 31, 2002. The corporation has 10 affiliate banks, \n\nwhich provide services from 28 full-service locations in the Central, West \n\nand High Plains regions of Texas. The common stock of First Financial \n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed \n\non The NASDAQ Stock Market® under the symbol FFIN.", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n16. CONDENSED FINANCIAL INFORMATION - PARENT COMPANY: \n\n\n \n \n \n \n [html]Condensed_Balance_Shexts_Dscember_31, _2052. and. 2091.ASSETSCash in subsidiary bankInterest - bearing deposits in subsidiary banksTotal cash and cash equivalentsTotal liabilities and shareholders ’ equityCondensed Statements of Earnings - For the Years. Ended December 31.2002.2001, and 2000__1.288.508_2_593.968\n
___2002_____2001___
$ 903.319$ 579.686
_22.212.064_13.796.338
23.115.38314.376.024
Investment in subsidiaries, at equity219.947.550202.758.981Intangible assets
917.350723.375Other assets________________________________________________________________________________________________________________________________________________________________________________________________________
______932.986Total assets$ 244.930.991$ 218.791.366
LIABILITIES AND SHAREHOLDERS ’ EQUITYTotal liabilities$ 6.163.346$ 5.137.353
Shareholders ’ equity :Common stock123.642.010123.332.520
Capital surplus58.087.68757.824.061Retained earnings
45.647.52228.375.353Accumulated other comprehensive earnings__ll, 390.426
__4.122.079Total shareholders ’ equity. 238.767.645213.654.013
$ 244.930.991$ 218.791.366
_2002______2001___
__2000__Income :Cash dividends from subsidiary banks$ 26.550.000
$ 25.500.000$ 21.000.000Excess of earnings over dividends ofStatistics
8.479.9394.582.9937.383.516Gain on sale of investment securities
available - for - sale1.-530.097
Other income___944.911__l_092.325__l, 325.613
Expenses :Salaries and employee benefits1.451.1361.160.903
1.067.664Other operating expenses__1.142.832__1.015.184
_2.176.087_2.356.172Earnings before income taxes33.380.882
28.999.28127.883.054Income tax benefit____522l_668
____355.224____432.993Net earnings$ 33.952.550
$ 29.354.505$ 28.316.047
", - "page_start": 90, - "page_end": 90, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "At First Financial Bankshares, we are not a complicated \n\ncompany. Our value is easy to calculate because our \n\nnumbers are easy to follow. The same holds true for \n\nour values. We believe in doing business the right \n\nway – from our boardrooms to our mailrooms. Maybe \n\nit’s our West Texas roots, but we still appreciate the days \n\nwhen a handshake was binding. The relationships we \n\nhave developed with our customers bear this out. \n\nMore and more, in communities across Texas, we’re the \n\nbanks people turn to for financial services. The result \n\nhas been strong, consistent, above-sector perform- \n\nance for our shareholders. How do values drive value? \n\nLet us explain.", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "range of services to individuals, associations, and corporations. These services include administering estates, \ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, \nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, \nSouthlake, Texas provide securities brokerage services through arrangements with various third parties. \n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose \nnational bank under which we will consolidate the management of our current trust departments. The new entity \nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We \nbelieve that with this structure we can more effectively manage our current trust operations and provide trust \nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust \ncompany will begin operations in the latter part of 2003. \n\n**Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits, \nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our \nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services \noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas \nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions, \nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and \nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel. \n\nOur business does not depend on any single customer or any few customers, the loss of any one of which would \nhave a materially adverse effect upon our business. Although we have a broad base of customers that are not related \nto us, our customers also occasionally include our officers and directors, as well as other entities with which we are \naffiliated. With our subsidiary banks we may make loans to officers and directors, and entities with which we are \naffiliated, in the ordinary course of business. We make these loans on substantially the same terms, including \ninterest rates and collateral, as those prevailing at the time for comparable transactions with other persons. Loans to \ndirectors, officers and their affiliates are also subject to numerous restrictions under federal and state banking laws \nwhich we describe in greater detail below. \n\n**Employees**\n\nWith our subsidiary banks we employed approximately 750 full-time equivalent employees at February 1, 2003. \nOur management believes that our employee relations have been and will continue to be good. \n\n**Supervision and Regulation**\n\nBoth federal and state laws extensively regulate bank holding companies, financial holding companies and \nbanks. These laws (and the regulations promulgated thereunder) are primarily intended to protect depositors and the \ndeposit insurance fund of the Federal Deposit Insurance Corporation, or FDIC, although shareholders may also \nbenefit. The following information describes particular laws and regulatory provisions relating to financial holding \ncompanies and banks. This discussion is qualified in its entirety by reference to the particular laws and regulatory \nprovisions. A change in any of these laws or regulations may have a material effect on our business and the \nbusiness of our subsidiary banks. \n\n*Bank Holding Companies and Financial Holding Companies*", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nQuantitative measures established by regulation to ensure capital adequacy require Bankshares and each of its \nsubsidiaries to maintain minimum amounts and ratios (set forth in the table below) of total and Tier I capital (as \ndefined in the regulations) to risk-weighted assets (as defined), and of Tier I capital (as defined), to average assets \n(as defined). Management believes as of December 31, 2002 and 2001, that Bankshares and each of its subsidiaries \nmeet all capital adequacy requirements to which they are subject. \n\nAs of December 31, 2002 and 2001, the most recent notification from each respective subsidiaries’ primary \nregulator categorized each of Bankshares’ subsidiaries as well-capitalized under the regulatory framework for \nprompt corrective action. To be categorized as well capitalized, the subsidiaries must maintain minimum total \nrisk-based, Tier I risk-based, and Tier I leverage ratios as set forth in the table. \n\nThere are no conditions or events since that notification that management believes have changed the institutions’ \ncategories. Bankshares’ and its significant subsidiaries’ actual capital amounts and ratios are presented in the table \nbelow: \n\n\n \n \n \n \n [html]ActualAdequacy_Purposes :Action Provisions :Total Capital ( to Risk - Weighted Assets ):8.802.000Weatherford National Bank\n
AmountRatioAmountRatioAmountRatio
< underline > As of December 31.2002 :
Consolidated$ 213.725.00020 %≥$ 87.579.000≥ 8 %N / A
N / AFirst National Bank of Abilene$ 68.874.00017 %≥$ 32.153.000≥ 8 %
≥$ 40.191.000≥ 10 %San Angelo National Bank$ 16.039.00012 %≥$ 10.816.000
≥ 8 %≥$ 13.520.000≥ 10 %Weatherford National Bank$ 19.758.00018 %≥$
≥ 8 %≥$ 11.002.000≥ 10 %Tier I Capital ( to Risk - Weighted Assets ):Consolidated$ 202.507.00018 %
≥$ 43.790.000�� 4 %N / AN / AFirst National Bank of Abilene$ 64.971.000
16 %≥$ 16.077.000≥ 4 %≥$ 24.115.000≥ 6 %San Angelo National Bank
$ 14.703.00011 %≥$5.408.000≥ 4 %≥$ 8.112.000≥ 6 %
$ 18.757.00017 %≥$4.401.000≥ 4 %≥$ 6.601.000≥ 6 %
Tier I Capital ( to Average Assets ):Consolidated$ 202.507.00011 %≥$ 57.856.000≥ 3 %
N / AN / AFirst National Bank of Abilene$ 64.971.0009 %≥$ 20.626.000
≥ 3 %≥$ 34.377.000≥ 5 %San Angelo National Bank$ 14.703.0005 %≥$
", - "page_start": 87, - "page_end": 87, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES: \n\nNature of Operations \n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns \n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of \nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First \nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; \nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, \nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of \nrevenue is providing loans and banking services to consumers and commercial customers in the market area in \nwhich the subsidiary is located. \n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied \nin the preparation of the accompanying consolidated financial statements follows. The accounting principles \nfollowed by the Company and the methods of applying them are in conformity with both accounting principles \ngenerally accepted in the United States of America and prevailing practices of the banking industry. \n\nUse of Estimates in Preparation of Financial Statements \n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United \nStates of America requires management to make estimates and assumptions that affect the reported amounts of \nassets and liabilities and disclosure of contingent assets and liabilities at the date of the financial statements and \nreported amounts of revenues and expenses during the reporting period. Actual results could differ from those \nestimates. Material estimates that are particularly susceptible to significant change in the near term relate to the \ndetermination of the allowance for loan losses, the valuations of foreclosed real estate, deferred income tax assets, \nand the fair value of financial instruments. \n\nConsolidation \n\nThe accompanying consolidated financial statements include the accounts of Bankshares and its subsidiaries, all of \nwhich are wholly-owned. All significant intercompany accounts and transactions have been eliminated. \n\nInvestment Securities \n\nManagement classifies debt and equity securities as held-to-maturity, available-for-sale, or trading based on its \nintent. Debt securities that management has the positive intent and ability to hold to maturity are classified as held- \nto-maturity and recorded at cost, adjusted for amortization of premiums and accretion of discounts, which are \nrecognized as adjustments to interest income using the interest method. Securities not classified as held-to-maturity \nor trading are classified as available-for-sale and recorded at estimated fair value, with unrealized gains and losses, \nnet of deferred income taxes, excluded from earnings and reported in a separate component of shareholders’ equity. \nSecurities classified as trading are recorded at estimated fair value, with unrealized gains and losses included in \nearnings. The Company had no trading securities at December 31, 2002, 2001, or 2000. \n\nLoans and Allowance for Loan Losses", - "page_start": 72, - "page_end": 72, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "• Eastland National Bank, Eastland, Texas; \n• First Financial Bank, National Association, Cleburne, Texas; \n• Stephenville Bank and Trust Co., Stephenville, Texas; \n• San Angelo National Bank, San Angelo, Texas; \n• Weatherford National Bank, Weatherford, Texas; \n• First Financial Bank, National Association, Southlake, Texas; and \n• City National Bank, Mineral Wells, Texas. \n\nAs described in more detail below, we elected to be treated as a financial holding company in September 2001. \n\nOur service centers are located primarily in North Central and West Texas. Considering the branches and \nlocations of all our subsidiary banks, as of December 31, 2002, we had 28 financial centers across Texas, with seven \nlocations in Abilene, two locations in Cleburne, two locations in Stephenville, two locations in San Angelo, three \nlocations in Weatherford, and one location each in Mineral Wells, Hereford, Sweetwater, Eastland, Southlake, \nAledo, Alvarado, Burleson, Keller, Trophy Club, Roby, and Trent. \n\nInformation on our revenues, profits and losses and total assets appears in the discussion of our Results of \nOperations contained in Item 7 hereof. \n\n**First Financial Bankshares, Inc.**\n\nWe provide management and technical resources and policy direction to our subsidiary banks, which enables \nthem to improve or expand their banking services while continuing their local activity and identity. Each of our \nsubsidiary banks operates under the day-to-day management of its own board of directors and officers, with \nsubstantial authority in making decisions concerning their own investments, loan policies, interest rates, and service \ncharges. We provide resources and policy direction in, among other things, the following areas: \n\n• \n• \n• \n• \n\nasset and liability management; \n\naccounting, budgeting, planning and insurance; \n\ncapitalization; and \n\nregulatory compliance. \n\nIn particular, we assist our subsidiary banks with, among other things, decisions concerning major capital \nexpenditures, employee fringe benefits, including pension plans and group insurance, dividend policies, and \nappointment of officers and directors and their compensation. We also perform, through corporate staff groups or \nby outsourcing to third parties, internal audits and loan reviews of our subsidiary banks. Through First National \nBank of Abilene, we provide advice and specialized services for our banks related to lending, investing, purchasing, \nadvertising, public relations, and computer services. \n\nWhile we have no specific acquisition agreements in place or commitments to expand our branch network, we \nperiodically evaluate various potential financial institution acquisition opportunities and also periodically evaluate \npotential locations for new branch offices. We anticipate that funding for any acquisitions or expansions would be \nprovided from our existing cash balances, available dividends from subsidiary banks, utilization of available lines of \ncredit and future debt or equity offerings. \n\n**Services Offered by Our Subsidiary Banks**\n\nEach of our subsidiary banks is a separate legal entity that operates under the day-to-day management of its own \nboard of directors and officers. Each of our subsidiary banks provides general commercial banking services, which \ninclude accepting and holding checking, savings and time deposits, making loans, automated teller machines, drive- \nin and night deposit services, safe deposit facilities, transmitting funds, and performing other customary commercial \nbanking services. Certain of our subsidiary banks also administer pension plans, profit sharing plans and other \nemployee benefit plans. First National Bank of Abilene, First National Bank, Sweetwater, Stephenville Bank and \nTrust Co. and San Angelo National Bank have active trust departments. The trust departments offer a complete", - "page_start": 29, - "page_end": 29, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n17. BUSINESS COMBINATION: \n\nIn July 2001, the Company purchased all of the outstanding stock of City Bancshares, Inc. (“City”) and its \nsubsidiary, City National Bank for $16,500,000 in cash. The total purchase price exceeded the estimated fair market \nvalue of net assets acquired by approximately $7,800,000, of which approximately $950,000 was assigned to an \nidentifiable intangible asset with the balance recorded by the Company as goodwill. The identifiable intangible \nasset represents the future benefit associated with the acquisition of the core deposits of City and is being amortized \nover seven years utilizing a method that approximates the expected attrition of the deposits. \n\nThe primary purpose of the acquisition was to expand the Company’s market share in areas with close proximity to \nDallas/Ft. Worth, Texas. Factors that contributed to a purchase price resulting in goodwill include City’s \nhistorically stable record of earnings, capable management and its geographic location, which complements the \nCompany’s existing service locations. Subsequent to the acquisition, the Company liquidated the stock of City and \nCity National Bank is operating as a subsidiary of the Company. The results of operations of City National Bank are \nincluded in the consolidated earnings of the Company commencing July 1, 2001. \n\n\n \n \n \n \n [html]LIABILITIES AND SHAREHOLDER ’ S EQUITY\n
Cash and cash equivalents$ 9.651.769
Investment securities29.717.834
Loans, net51.061.735
Goodwill6.891.959
Identifiable intangible asset946.073
Other assets___1.465.727
Total assets$ _99.735.097
Noninterest - bearing deposits$ 11.949.766
Interest - bearing deposits70.575.256
Other liabilities710.075
Shareholders ' equity16.500.000
Total liabilities and shareholder ’ s equity$ _99.735.097
\n\nGoodwill recorded in the acquisition of City has been accounted for in accordance with SFAS No. 142. \nAccordingly, goodwill has not been amortized, rather it has been tested for impairment. The goodwill and \nidentifiable intangible asset recorded are not deductible for federal income tax purposes. The proforma impact of \nCity is insignificant to the Company's financial statements. \n\nCash flow information relative to the acquisition of City is, as follows: \n\nFair value of assets acquired \nCash paid for the capital stock of City $ 99,735,097 \n 16,500,000 \n\nLiabilities assumed $ 83,235,097", - "page_start": 92, - "page_end": 92, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Plans for the formation of a First Financial Bankshares \n\ntrust company are moving forward with regulatory approval \n\nanticipated in late Spring or early Summer. This will permit \n\nyour Company to provide quality, locally delivered trust \n\nservices to additional markets. \n\nWith skilled trust professionals offering a complete range \n\nof financial products and services, the future of our trust \n\ndepartments look bright. Through dedication to individu- \n\nalized portfolio design and personalized service, our trust \n\ndepartments stand ready to meet the needs of our pres- \n\nent and future clients. \n\n\nRobert S. Patterson \nSenior Vice President, Trust Services \n\nTRUST FEES in millions \n\n9 \n8 \n. \n5 \n$ 3 \n8 \n. \n5 \n$ \n$6 \n0 \n5 \n. \n5 \n$ \n0 \n1 \n. \n5 \n$ \n5 \n7 \n. \n4 \n$ $5 \n\nAssets managed by the Trust Departments at First National \n\nBank of Abilene, San Angelo National Bank, Stephenville \n\nBank & Trust Co. and First National Bank, Sweetwater, \n\nincreased $27.3 million during the past year to a \n\nDecember 31, 2002 book value of $986.2 million. However, \n\ndue to depressed stock market values and volumes, trust \n\ndepartment revenue declined in 2002. Trust combined \n\nrevenues for the year were down slightly from $5.89 mil- \n\nlion in 2001 to $5.83 million for 2002. In 2003, we anticipate \n\na return to improved income growth. \n\nThe performance of the stock market the past three years \n\nhas been a challenge that our trust investment profes- \n\nsionals have managed well. Not since 1939-1941 have \n\nwe seen the S&P 500 drop 35% in a three-year period. Our \n\nportfolio managers outperformed their indices in Large \n\nCap stocks by 83 basis points and Fixed Income securi- \n\nties by 168 basis points. This performance bodes well for \n\nthe present and future of our client accounts. \n\nDuring 2002, we saw a successful conversion of \n\nStephenville Bank & Trust to the SEI Corporation account- \n\ning system. In March 2003, we will be converting First \n\nNational Bank, Sweetwater, to this system as well. This will \n\nTRUST ASSETS in millions \nprovide all First Financial Bankshares trust clients with the \n\nstrength and advantages of a uniform accounting system. \n6 \n8 \n9 \n$ \n9 \n5 \n9 \n$ \n$1000 \nOther operational systems have been examined and con- \n1 \n1 \n9 \n$ \n5 \n4 \n8 \n$ \nsistent practices and procedures have been implemented. \n$900 \n\n4 \n7 \n7 \n$ $800 \nTo further enhance our risk management assessments in \n$700 \n2003, we will be introducing an Operational Peer Review \n\n$600 \nTeam similar to the successful peer review teams used in \n\nthe Personal Trust areas of our four locations. $500", - "page_start": 14, - "page_end": 14, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "*Bank Holding Companies and Financial Holding Companies*\n\nTraditionally, the activities of bank holding companies were limited to the business of banking and activities \nclosely related or incidental to banking. Bank holding companies were generally prohibited from acquiring control \nof any company which was not a bank and from engaging in any business other than the business of banking or \nmanaging and controlling banks. The Gramm-Leach-Bliley Act, which took effect on March 12, 2000, dismantled \nmany Depression-era restrictions against affiliation between banking, securities and insurance firms by permitting \nbank holding companies to engage in a broader range of financial activities, so long as certain safeguards are \nobserved. Specifically, bank holding companies may elect to become “financial holding companies” that may \naffiliate with securities firms and insurance companies and engage in other activities that are financial in nature or", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_FFIN_2002.pdf", - "query": "What was the net income of First Financial Bankshares in 1995 ?", - "target_page": 14, - "target_passage": " 16,355", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n16. CONDENSED FINANCIAL INFORMATION - PARENT COMPANY: \n\n\n \n \n \n \n [html]Condensed_Balance_Shexts_Dscember_31, _2052. and. 2091.ASSETSCash in subsidiary bankInterest - bearing deposits in subsidiary banksTotal cash and cash equivalentsTotal liabilities and shareholders ’ equityCondensed Statements of Earnings - For the Years. Ended December 31.2002.2001, and 2000__1.288.508_2_593.968\n
___2002_____2001___
$ 903.319$ 579.686
_22.212.064_13.796.338
23.115.38314.376.024
Investment in subsidiaries, at equity219.947.550202.758.981Intangible assets
917.350723.375Other assets________________________________________________________________________________________________________________________________________________________________________________________________________
______932.986Total assets$ 244.930.991$ 218.791.366
LIABILITIES AND SHAREHOLDERS ’ EQUITYTotal liabilities$ 6.163.346$ 5.137.353
Shareholders ’ equity :Common stock123.642.010123.332.520
Capital surplus58.087.68757.824.061Retained earnings
45.647.52228.375.353Accumulated other comprehensive earnings__ll, 390.426
__4.122.079Total shareholders ’ equity. 238.767.645213.654.013
$ 244.930.991$ 218.791.366
_2002______2001___
__2000__Income :Cash dividends from subsidiary banks$ 26.550.000
$ 25.500.000$ 21.000.000Excess of earnings over dividends ofStatistics
8.479.9394.582.9937.383.516Gain on sale of investment securities
available - for - sale1.-530.097
Other income___944.911__l_092.325__l, 325.613
Expenses :Salaries and employee benefits1.451.1361.160.903
1.067.664Other operating expenses__1.142.832__1.015.184
_2.176.087_2.356.172Earnings before income taxes33.380.882
28.999.28127.883.054Income tax benefit____522l_668
____355.224____432.993Net earnings$ 33.952.550
$ 29.354.505$ 28.316.047
", - "page_start": 90, - "page_end": 90, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "First Financial Bankshares, Inc. is a financial holding company \n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion \n\nas of December 31, 2002. The corporation has 10 affiliate banks, \n\nwhich provide services from 28 full-service locations in the Central, West \n\nand High Plains regions of Texas. The common stock of First Financial \n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed \n\non The NASDAQ Stock Market® under the symbol FFIN.", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "First Financial Bank, \nNational Association, Southlake \n\nMain Office \n3205 E. Highway 114 \nSouthlake, Texas 76092 \n*Chartered 1985*\nBranches \n95 Trophy Club Drive \nTrophy Club, Texas 76262 \n891 E. Keller Parkway \nSuite 100 \nKeller, Texas 76248 \n\nSenior Officers \nPerry D. Elliott \n*Chairman of the Board*\nMark L. Jones \n*President and Chief Executive Officer*\nF. Mills Shallene \n*Senior Vice President*\nJ. Sean Shope \n*Senior Vice President*\nMichele P. Stevens \n*Senior Vice President and Cashier*\n\nJack Dortch \n*Jack Dortch Insurance Agency*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nDerrell Johnson \n*President, American Council of Engineering*\n*Companies Life Health Trust*\nMark L. Jones \n*President and Chief Executive Officer*\nK. Wayne Lee \n*President, DDFW Properties*\nRobert S. Mundlin \n*Owner, Lifetime Benefits Insurance*\nJim Ridenour \n*President, Sunbelt Station Service*\n\nDirectors \nPerry D. Elliott \n*Chairman of the Board*\nJames E. Burger \n*Burger Construction*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 67.750$ 65.554
Loans45.13242.366
< underline > Deposits 61.53259.672
Equity6.2955.845
Net Income412652
Return on Average Assets0.62 %1.07 %
Return on Average Equity6.7410.97
", - "page_start": 21, - "page_end": 21, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n18. CASH FLOW INFORMATION: \n\nSupplemental information on cash flows and noncash transactions is as follows: \n\n Year Ended December 31, \n 2000 \n 2001 \n 2002 \n\nSupplemental cash flow information: \n\nInterest paid \nFederal income taxes paid $25,704,950 \n14,682,343 $46,243,602 \n13,227,101 $48,123,200 \n13,227,192 \n\nSchedule of noncash investing and financing activities: \n\nAssets acquired through foreclosure \nRetirement of treasury stock 553,840 \n- 628,797 \n4,240,119 285,195 \n-", - "page_start": 93, - "page_end": 93, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "First Financial Bank, \nNational Association, Cleburne \n\nMain Office \n403 N. Main \nCleburne, Texas 76033 \n*Chartered 1927*\nBranches \n200 N. Ridgeway \nCleburne, Texas 76033 \n1900 S.W. Wilshire \nBurleson, Texas 76028 \n201 E. Highway 67 \nAlvarado, Texas 76009 \n\nHomer S. Pittman, Jr. \n*Senior Vice President and Cashier*\nCraig Beskow \n*Senior Vice President*\nDerek Schmidt \n*Senior Vice President*\n\nJim Easdon \n*Investments*\nCurtis R. Harvey \n*First Financial Bankshares, Inc.*\nHollis E. (Gene) Joslin \n*Investments*\nBrent D. Magers \n*Chief Executive Officer and Administrator,*\n*Walls Regional Hospital*\nGeorge Marti \n*Marti Enterprises*\n\nDirectors \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nAlbert A. Archer \n*Chairman of the Board, Walls Industries, Inc.*\nGary Bennett \n*Bennett Printing & Office Supply*\nRobert T. Childress \n*Investments*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\n\nSenior Officers \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nPerry Ginn \n*Executive Vice President*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 205.591$ 209.159
< underline > Loans 106.755108.607
< underline > Deposits 182.715189.597
Equity20.36418.040
< underline > Net Income 3.4513.120
< underline > Return on Average Assets 1.72 %1.62 %
Return on Average Equity17.6617.08
", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nNet periodic pension cost for the years ended December 31, 2002, 2001, and 2000, included: \n\n Year Ended December 31, \n 2000 \n 2001 \n 2002 \n\nService cost - benefits earned during the period \nInterest cost on projected benefit obligation \nExpected return on plan assets \nAmortization of unrecognized net loss \nAmortization of prior-service cost \nOther $ 994,630 \n983,977 \n(880,562) \n 116,722 \n 17,960 \n (59,405) $ 847,620 \n970,710 \n(1,153,733) \n - \n 17,961 \n (58,954) $ 845,372 \n816,583 \n(1,058,787) \n - \n17,961 \n 58,779 \n\nNet periodic pension cost $1,173,322 $ 623,604 $ 679,908 \n\nThe following table sets forth the rates used in the actuarial calculations of the present value of benefit obligations \nand the rate of return on plan assets: \n\n\n \n \n \n \n [html]\n
20022001< underline > 2000
discount rate6.9 %6.9 %7.5 %
future compensation levels4 %4 %4 %
\n\nAs of December 31, 2002 and 2001, the fair value of the plan’s assets included Company common stock valued at \napproximately $468,000 and $297,000, respectively. \n\nThe Company also provides a profit sharing plan, which covers substantially all full-time employees. The profit \nsharing plan is a defined contribution plan and allows employees to contribute up to 5% of their base annual salary. \nEmployees are fully vested to the extent of their contributions and become fully vested in the Company’s \ncontributions over a seven-year vesting period. Costs related to the Company’s defined contribution plan totaled \napproximately $2,681,000, $1,858,000 and $1,874,000 in 2002, 2001 and 2000, respectively, and are included in \nsalaries and employee benefits in the accompanying consolidated statements of earnings. As of December 31, 2002 \nand 2001, the fair value of the plan’s assets included Company common stock valued at approximately $14,323,000 \nand $10,881,000, respectively. \n\n13. DIVIDENDS FROM SUBSIDIARIES: \n\nAt December 31, 2002, approximately $20,728,000 was available for the declaration of dividends by the Company’s \nsubsidiary banks without the prior approval of regulatory agencies. \n\n14. REGULATORY MATTERS: \n\nThe Company is subject to various regulatory capital requirements administered by the federal banking agencies. \nFailure to meet minimum capital requirements can initiate certain mandatory, and possibly additional discretionary, \nactions by regulators that, if undertaken, could have a direct material effect on the Company’s financial statements. \nUnder capital adequacy guidelines and the regulatory framework for prompt corrective action, each of Bankshares’ \nsubsidiaries must meet specific capital guidelines that involve quantitative measures of the subsidiaries’ assets, \nliabilities, and certain off-balance-sheet items as calculated under regulatory accounting practices. The subsidiaries’ \ncapital amounts and classification are also subject to qualitative judgments by the regulators about components, risk \nweightings, and other factors.", - "page_start": 86, - "page_end": 86, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nThe amortized cost and estimated fair value of debt securities at December 31, 2002, by contractual and expected \nmaturity, are shown below. \n\n Held-to-Maturity Available-for-Sale \n\nAmortized \n Cost Basis Estimated \n Fair Value Amortized \n Cost Basis Estimated \n Fair Value \n\nDue within one year \nDue after one year through five years \nDue after five years through ten years \nDue after ten years $ 55,959,878 \n121,052,000 \n9,305,724 \n 14,132,182 $ 57,124,507 \n129,421,284 \n10,071,540 \n 15,244,820 $ 46,281,321 \n377,002,918 \n63,803,688 \n 59,525,959 $ 47,124,793 \n390,627,675 \n65,913,832 \n 62,611,310 \n\nTotal debt securities $200,449,784 $211,862,151 $546,613,886 $566,277,610 \n\nSecurities, carried at approximately $239,971,000 and $243,316,000 at December 31, 2002 and 2001, respectively, \nwere pledged as collateral for public or trust fund deposits and for other purposes required or permitted by law. \n\nDuring 2002 and 2001, sales of investment securities that were classified as available-for-sale totaled $30,077,478 \nand $57,925,815, respectively. Gross realized gains and losses from sales in 2002 were $23,773 and $7,400, \nrespectively. Gross realized gains and losses from 2001 sales were $104,779 and $36,990, respectively. Gross \nrealized gains from 2000 sales were $530,097. The specific identification method was used to determine cost in \ncomputing the realized gains and losses. \n\nCertain subsidiary banks are required to maintain reserve balances with the Federal Reserve Bank. During 2002 and \n2001, such average balances totaled approximately $12,776,000 and $9,017,000, respectively. \n\n December 31, \n 2002 2001 \n\nCommercial, financial, and agricultural \nReal estate - construction \nReal estate - mortgage \nConsumer $311,743,212 \n50,911,156 \n375,255,678 \n 226,140,626 $312,053,042 \n47,173,297 \n350,381,887 \n 230,616,297 \n\n964,050,672 \n (10,899) 940,224,523 \n (93,548) \n\n$964,039,773 $940,130,975 \n\nThe Company’s recorded investment in impaired loans and the related valuation allowance are as follows: \n\n\n \n \n \n \n [html]DecemberS1, < underline > A W < underline >, \n
LevelsSTx_2001_Recorded vestmentValuation Allowance
Recorded InvestmentValuati Allowar1.734.261$ __752_385
", - "page_start": 78, - "page_end": 78, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nOn January 1, 2002, goodwill amounting to $23,765,896 was not subject to further amortization as a result of SFAS \nNo. 142. The Company conducted its initial impairment test in 2002, with no reduction of recorded goodwill \nresulting from the test. A reconciliation adjusting comparative net earnings and earnings per share for the years \nended December 31, 2001 and 2000, to show the effect of no longer amortizing the Company’s goodwill, follows: \n\n 2001 2000 \n\nReported net earnings \nAdd back: goodwill amortization \n$ 29,354,505 $ 28,316,047 \n\nGoodwill amortization, before income tax \nIncome tax benefit \nAdjusted net earnings 1,641,367 \n1,641,367 \n (420,000) \n (420,000) \n $ 30,575,872 $ 29,537,414 \n\nBasic earnings per share: \nReported net earnings \nGoodwill amortization, net of income tax benefit \n$ 2.38 \n .10 \n $ 2.48 $ 2.28 \n .10 \n$ 2.38 Adjusted net earnings \n\nEarnings per share, assuming dilution: \n\nReported net earnings \nGoodwill amortization, net of income tax benefit \n$ 2.37 \n .10 \n $ 2.47 $ 2.27 \n .10 \n $ 2.37 Adjusted net earnings \n\nGoodwill arising from acquisitions of assets and liabilities, rather than acquisitions of stock, amounting to \n$13,000,000, is deductible for federal income tax purposes. \n\nOther identifiable intangible assets recorded by the Company represent the future benefit associated with the \nacquisition of the core deposits of City Bancshares, Inc. (Note 17) and is being amortized over seven years utilizing \na method that approximates the expected attrition of the deposits. \n\nSecurities Sold Under Agreements To Repurchase \n\nSecurities sold under agreements to repurchase, which are classified as secured borrowings, generally mature within \none to four days from the transaction date. Securities sold under agreements to repurchase are reflected at the \namount of the cash received in connection with the transaction. The Company may be required to provide additional \ncollateral based on the estimated fair value of the underlying securities. \n\nSegment Reporting \n\nThe Company has determined that it operates one line of business (community banking) located in a single \ngeographic area (Texas). \n\nStatements of Cash Flows \n\nFor purposes of reporting cash flows, cash and cash equivalents include cash on hand, amounts due from banks, and \nfederal funds sold. \n\nAccounting for Income Taxes \n\nThe Company’s provision for income taxes is based on income before income taxes adjusted for permanent \ndifferences between financial reporting and taxable income. Deferred tax assets and liabilities are determined using \nthe liability (or balance sheet) method. Under this method, the net deferred tax asset or liability is determined based \non the tax effects of the temporary differences between the book and tax bases of the various balance sheet assets \nand liabilities and gives current recognition to changes in tax rates and laws.", - "page_start": 74, - "page_end": 74, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n17. BUSINESS COMBINATION: \n\nIn July 2001, the Company purchased all of the outstanding stock of City Bancshares, Inc. (“City”) and its \nsubsidiary, City National Bank for $16,500,000 in cash. The total purchase price exceeded the estimated fair market \nvalue of net assets acquired by approximately $7,800,000, of which approximately $950,000 was assigned to an \nidentifiable intangible asset with the balance recorded by the Company as goodwill. The identifiable intangible \nasset represents the future benefit associated with the acquisition of the core deposits of City and is being amortized \nover seven years utilizing a method that approximates the expected attrition of the deposits. \n\nThe primary purpose of the acquisition was to expand the Company’s market share in areas with close proximity to \nDallas/Ft. Worth, Texas. Factors that contributed to a purchase price resulting in goodwill include City’s \nhistorically stable record of earnings, capable management and its geographic location, which complements the \nCompany’s existing service locations. Subsequent to the acquisition, the Company liquidated the stock of City and \nCity National Bank is operating as a subsidiary of the Company. The results of operations of City National Bank are \nincluded in the consolidated earnings of the Company commencing July 1, 2001. \n\n\n \n \n \n \n [html]LIABILITIES AND SHAREHOLDER ’ S EQUITY\n
Cash and cash equivalents$ 9.651.769
Investment securities29.717.834
Loans, net51.061.735
Goodwill6.891.959
Identifiable intangible asset946.073
Other assets___1.465.727
Total assets$ _99.735.097
Noninterest - bearing deposits$ 11.949.766
Interest - bearing deposits70.575.256
Other liabilities710.075
Shareholders ' equity16.500.000
Total liabilities and shareholder ’ s equity$ _99.735.097
\n\nGoodwill recorded in the acquisition of City has been accounted for in accordance with SFAS No. 142. \nAccordingly, goodwill has not been amortized, rather it has been tested for impairment. The goodwill and \nidentifiable intangible asset recorded are not deductible for federal income tax purposes. The proforma impact of \nCity is insignificant to the Company's financial statements. \n\nCash flow information relative to the acquisition of City is, as follows: \n\nFair value of assets acquired \nCash paid for the capital stock of City $ 99,735,097 \n 16,500,000 \n\nLiabilities assumed $ 83,235,097", - "page_start": 92, - "page_end": 92, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n4. BANK PREMISES AND EQUIPMENT: \n\nThe following is a summary of bank premises and equipment: \n\n Useful Life \n December 31, \n 2001 \n 2002 \n\nLand \nBuildings \nFurniture and equipment \nLeasehold improvements – \n20 to 40 years \n3 to 10 years \nLesser of lease term or 5 to 15 years $ 7,362,814 \n50,560,723 \n26,347,819 \n 4,385,288 $ 7,104,759 \n49,885,954 \n27,249,965 \n 4,105,350 \n\n88,656,644 88,346,028 \n\nLess- accumulated depreciation and amortization (48,051,243) (46,333,597) \n\n$40,605,401 $42,012,431 \n\nDepreciation expense for the years ended December 31, 2002, 2001 and 2000 amounted to $4,284,473, $3,755,878, \nand $3,700,474, respectively and is included in the captions net occupancy expense and equipment expense in the \naccompanying consolidated statements of earnings. \n\nThe Company is lessor for portions of its banking premises. Total rental income for all leases included in net \noccupancy expense is approximately $1,578,000, $1,432,000 and $1,387,000, for the years ended December 31, \n2002, 2001, and 2000, respectively. \n\n5. TIME DEPOSITS \n\nTime deposits of $100,000 or more totaled approximately $195,754,000 and $196,905,000 at December 31, 2002 \nand 2001, respectively. Interest expense on these deposits was approximately $11,559,000, $10,163,000, and \n$10,022,000 during 2002, 2001, and 2000, respectively. \n\nAt December 31, 2002, the scheduled maturities of time deposits were, as follows: \n\nYear ending December 31, \n\n2003 \n2004 \n2005 \n2006 \n2007 $466,285,411 \n42,007,875 \n12,232,334 \n2,222,764 \n 10,878,020 \n\n$533,626,404 \n\n6. LINE OF CREDIT \n\nThe Company has a line of credit with a nonaffiliated bank under which it could borrow up to $25,000,000. The \nline of credit is unsecured and matures on June 30, 2003. Bankshares paid no fee to secure the unused line of credit \nand, accordingly, did not estimate a fair value of the unused line of credit at December 31, 2002 and 2001. The line \nof credit carries an interest rate of the London Interbank Offering Rate plus 1.0%. There was no outstanding balance \nunder the line of credit as of December 31, 2002 and 2001.", - "page_start": 80, - "page_end": 80, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_FFIN_2002.pdf", - "query": "What is the address of the San Angelo National Bank main office ?", - "target_page": 21, - "target_passage": "Main Office 301 W. Beauregard San Angelo, Texas 76903 Chartered 1997 ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "San Angelo National Bank \n\nMain Office \n301 W. Beauregard \nSan Angelo, Texas 76903 \n*Chartered 1997*\nBranch \n3471 Knickerbocker \nSan Angelo, Texas 76904 \n\nDirectors \nDal DeWees \n*Chairman of the Board*\nGeorge Alexander \n*Partner, Alexander Construction Company*\nMichael L. Boyd \n*President and Chief Executive Officer*\nW. Dan Cravy, M.D. \n*Physician*\nDavid B. Drake \n*Investment Advisor*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nDoug Eakman \n*Owner, Pecos Street Pharmacy*\nJoe Henderson \n*President, Porter Henderson Implement*\n*Company, Inc.*\n\nSenior Officers \nMichael L. Boyd \n*President and Chief Executive Officer*\nDavid Byrd \n*Executive Vice President and Trust Officer*\nRobert Pate \n*Executive Vice President*\nKatherine Reeves \n*Executive Vice President and Cashier*\n\nRobert D. Housley \n*President and Owner,*\n*Housley Communications*\nJim Johnson \n*Shannon, Porter, Johnson, Pfluger,*\n*Davis & Joynton, LLP*\nDavid F. Lupton \n*President, Angelo Glass & Mirror*\n*Company, Inc.*\nKenneth T. Murphy \n*First Financial Bankshares, Inc.*\nBill Pfluger \n*Rancher*\nRichard W. Salmon \n*Investments*\nJohn E. Schwartz, Sr. \n*Farmer/Rancher*\nF.L. (Steve) Stephens \n*Retired Chairman and Chief Executive Officer,*\n*Town & Country Food Stores, Inc.*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 303.124$ 299.808
< underline > Loans 115.450110.685
< underline > Deposits 251.931257.212
Equity30.63427.986
< underline > Net Income 4.9174.167
< underline > Trust Assets 144.047129.471
Return on Average Assets1.70 %1.46 %
< underline > Return on Average Equity 16.4815.13
", - "page_start": 20, - "page_end": 20, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "First National Bank, Sweetwater \n\nMain Office \n201 Elm Street \nSweetwater, Texas 79556 \n*Chartered 1948*\nBranches \n123 N. Concho \nRoby, Texas 79543 \n117 N. Main \nTrent, Texas 79561 \n\nRodney Foster \n*Senior Vice President, Lending*\nJanis McDowell \n*Senior Vice President, Trust Officer*\nDonnie Ruppert \n*Senior Vice President and Controller*\n\nBill W. Burns \n*President, Bill Burns Oil Co., Inc.*\nRonnie Cox \n*Owner, Cox Jewelry*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nCecil J. King \n*Retired President, Citizens State Bank, Roby*\nThomas L. Rees, Sr. \n*Rees and Rees, Attorneys*\n\nDirectors \nJ.V. Martin \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nGlenn D. Bennett \n*Bennett & Associates*\nLouis Brooks, Jr. \n*Ranching, Brooks-Maberry, Inc.*\nSenior Officers \nJ.V. Martin \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nKirby Andrews \n*Senior Vice President, Lending*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 112.079$ 104.968
< underline > Loans 49.48746.666
< underline > Deposits 100.30690.100
Equity11.11410.204
< underline > Net Income 2.0781.605
Trust Assets64.85466.118
Return on Average Assets1.99 %1.53 %
< underline > Return on Average Equity 19.1515.82
", - "page_start": 23, - "page_end": 23, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "• Eastland National Bank, Eastland, Texas; \n• First Financial Bank, National Association, Cleburne, Texas; \n• Stephenville Bank and Trust Co., Stephenville, Texas; \n• San Angelo National Bank, San Angelo, Texas; \n• Weatherford National Bank, Weatherford, Texas; \n• First Financial Bank, National Association, Southlake, Texas; and \n• City National Bank, Mineral Wells, Texas. \n\nAs described in more detail below, we elected to be treated as a financial holding company in September 2001. \n\nOur service centers are located primarily in North Central and West Texas. Considering the branches and \nlocations of all our subsidiary banks, as of December 31, 2002, we had 28 financial centers across Texas, with seven \nlocations in Abilene, two locations in Cleburne, two locations in Stephenville, two locations in San Angelo, three \nlocations in Weatherford, and one location each in Mineral Wells, Hereford, Sweetwater, Eastland, Southlake, \nAledo, Alvarado, Burleson, Keller, Trophy Club, Roby, and Trent. \n\nInformation on our revenues, profits and losses and total assets appears in the discussion of our Results of \nOperations contained in Item 7 hereof. \n\n**First Financial Bankshares, Inc.**\n\nWe provide management and technical resources and policy direction to our subsidiary banks, which enables \nthem to improve or expand their banking services while continuing their local activity and identity. Each of our \nsubsidiary banks operates under the day-to-day management of its own board of directors and officers, with \nsubstantial authority in making decisions concerning their own investments, loan policies, interest rates, and service \ncharges. We provide resources and policy direction in, among other things, the following areas: \n\n• \n• \n• \n• \n\nasset and liability management; \n\naccounting, budgeting, planning and insurance; \n\ncapitalization; and \n\nregulatory compliance. \n\nIn particular, we assist our subsidiary banks with, among other things, decisions concerning major capital \nexpenditures, employee fringe benefits, including pension plans and group insurance, dividend policies, and \nappointment of officers and directors and their compensation. We also perform, through corporate staff groups or \nby outsourcing to third parties, internal audits and loan reviews of our subsidiary banks. Through First National \nBank of Abilene, we provide advice and specialized services for our banks related to lending, investing, purchasing, \nadvertising, public relations, and computer services. \n\nWhile we have no specific acquisition agreements in place or commitments to expand our branch network, we \nperiodically evaluate various potential financial institution acquisition opportunities and also periodically evaluate \npotential locations for new branch offices. We anticipate that funding for any acquisitions or expansions would be \nprovided from our existing cash balances, available dividends from subsidiary banks, utilization of available lines of \ncredit and future debt or equity offerings. \n\n**Services Offered by Our Subsidiary Banks**\n\nEach of our subsidiary banks is a separate legal entity that operates under the day-to-day management of its own \nboard of directors and officers. Each of our subsidiary banks provides general commercial banking services, which \ninclude accepting and holding checking, savings and time deposits, making loans, automated teller machines, drive- \nin and night deposit services, safe deposit facilities, transmitting funds, and performing other customary commercial \nbanking services. Certain of our subsidiary banks also administer pension plans, profit sharing plans and other \nemployee benefit plans. First National Bank of Abilene, First National Bank, Sweetwater, Stephenville Bank and \nTrust Co. and San Angelo National Bank have active trust departments. The trust departments offer a complete", - "page_start": 29, - "page_end": 29, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Weatherford National Bank \n\nMain Office \n101 N. Main Street \nWeatherford, Texas 76086 \n*Chartered 1984*\nBranches \n101 College Park Drive \nWeatherford, Texas 76086 \n1214 N. Main Street \nWeatherford, Texas 76086 \n505 Farm Road 1187 \nAledo, Texas 76008 \n\nSenior Officers \nDoyle Lee \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nBob Bradberry \n*Executive Vice President*\nJay Gibbs \n*Executive Vice President*\nPaul Baker \n*Senior Vice President*\nJean Bryan \n*Senior Vice President*\nLarry Mangrem \n*Senior Vice President and Cashier*\nLouis Sneed \n*Senior Vice President*\n\nDirectors \nDoyle Lee \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nStephen G. Brogdon, D.D.S. \n*General and Cosmetic Dentistry*\nMac A. Coalson \n*Real Estate and Ranching*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nBob Kingsley \n*Host and Producer, American Country*\n*Countdown*\nDave Lang \n*President, Dralco, Inc.*\nKenneth T. Murphy \n*First Financial Bankshares, Inc.*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 211.235$ 201.768
Loans96.66091.096
< underline > Deposits 189.630182.696
Equity20.52618.595
Net Income3.8623.721
< underline > Return on Average Assets 1.97 %1.99 %
Return on Average Equity19.4320.83
", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "*National Banking Associations*. Banks that are organized as national banking associations under the National \nBank Act are subject to regulation and examination by the Office of the Comptroller of the Currency, or OCC. The \nOCC supervises, regulates and regularly examines the First National Bank of Abilene, First National Bank, \nSweetwater, First Financial Bank, National Association, Cleburne, Eastland National Bank, San Angelo National \nBank, Weatherford National Bank, First Financial Bank, National Association, Southlake and City National Bank, \nMineral Wells. The OCC’s supervision and regulation of banks is primarily intended to protect the interests of \ndepositors. The National Bank Act: \n\nrequires each national banking association to maintain reserves against deposits, \n\nrestricts the nature and amount of loans that may be made and the interest that may be charged, and \n\n\n \n \n \n \n [html]\n
Comparison - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single - single -SpecificationsPresence of compared to researchers and senses ( s )TableTable
", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "range of services to individuals, associations, and corporations. These services include administering estates, \ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, \nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, \nSouthlake, Texas provide securities brokerage services through arrangements with various third parties. \n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose \nnational bank under which we will consolidate the management of our current trust departments. The new entity \nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We \nbelieve that with this structure we can more effectively manage our current trust operations and provide trust \nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust \ncompany will begin operations in the latter part of 2003. \n\n**Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits, \nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our \nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services \noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas \nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions, \nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and \nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel. \n\nOur business does not depend on any single customer or any few customers, the loss of any one of which would \nhave a materially adverse effect upon our business. Although we have a broad base of customers that are not related \nto us, our customers also occasionally include our officers and directors, as well as other entities with which we are \naffiliated. With our subsidiary banks we may make loans to officers and directors, and entities with which we are \naffiliated, in the ordinary course of business. We make these loans on substantially the same terms, including \ninterest rates and collateral, as those prevailing at the time for comparable transactions with other persons. Loans to \ndirectors, officers and their affiliates are also subject to numerous restrictions under federal and state banking laws \nwhich we describe in greater detail below. \n\n**Employees**\n\nWith our subsidiary banks we employed approximately 750 full-time equivalent employees at February 1, 2003. \nOur management believes that our employee relations have been and will continue to be good. \n\n**Supervision and Regulation**\n\nBoth federal and state laws extensively regulate bank holding companies, financial holding companies and \nbanks. These laws (and the regulations promulgated thereunder) are primarily intended to protect depositors and the \ndeposit insurance fund of the Federal Deposit Insurance Corporation, or FDIC, although shareholders may also \nbenefit. The following information describes particular laws and regulatory provisions relating to financial holding \ncompanies and banks. This discussion is qualified in its entirety by reference to the particular laws and regulatory \nprovisions. A change in any of these laws or regulations may have a material effect on our business and the \nbusiness of our subsidiary banks. \n\n*Bank Holding Companies and Financial Holding Companies*", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "First Financial Bank, \nNational Association, Southlake \n\nMain Office \n3205 E. Highway 114 \nSouthlake, Texas 76092 \n*Chartered 1985*\nBranches \n95 Trophy Club Drive \nTrophy Club, Texas 76262 \n891 E. Keller Parkway \nSuite 100 \nKeller, Texas 76248 \n\nSenior Officers \nPerry D. Elliott \n*Chairman of the Board*\nMark L. Jones \n*President and Chief Executive Officer*\nF. Mills Shallene \n*Senior Vice President*\nJ. Sean Shope \n*Senior Vice President*\nMichele P. Stevens \n*Senior Vice President and Cashier*\n\nJack Dortch \n*Jack Dortch Insurance Agency*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nDerrell Johnson \n*President, American Council of Engineering*\n*Companies Life Health Trust*\nMark L. Jones \n*President and Chief Executive Officer*\nK. Wayne Lee \n*President, DDFW Properties*\nRobert S. Mundlin \n*Owner, Lifetime Benefits Insurance*\nJim Ridenour \n*President, Sunbelt Station Service*\n\nDirectors \nPerry D. Elliott \n*Chairman of the Board*\nJames E. Burger \n*Burger Construction*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 67.750$ 65.554
Loans45.13242.366
< underline > Deposits 61.53259.672
Equity6.2955.845
Net Income412652
Return on Average Assets0.62 %1.07 %
Return on Average Equity6.7410.97
", - "page_start": 21, - "page_end": 21, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "First Financial Bank, \nNational Association, Cleburne \n\nMain Office \n403 N. Main \nCleburne, Texas 76033 \n*Chartered 1927*\nBranches \n200 N. Ridgeway \nCleburne, Texas 76033 \n1900 S.W. Wilshire \nBurleson, Texas 76028 \n201 E. Highway 67 \nAlvarado, Texas 76009 \n\nHomer S. Pittman, Jr. \n*Senior Vice President and Cashier*\nCraig Beskow \n*Senior Vice President*\nDerek Schmidt \n*Senior Vice President*\n\nJim Easdon \n*Investments*\nCurtis R. Harvey \n*First Financial Bankshares, Inc.*\nHollis E. (Gene) Joslin \n*Investments*\nBrent D. Magers \n*Chief Executive Officer and Administrator,*\n*Walls Regional Hospital*\nGeorge Marti \n*Marti Enterprises*\n\nDirectors \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nAlbert A. Archer \n*Chairman of the Board, Walls Industries, Inc.*\nGary Bennett \n*Bennett Printing & Office Supply*\nRobert T. Childress \n*Investments*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\n\nSenior Officers \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nPerry Ginn \n*Executive Vice President*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 205.591$ 209.159
< underline > Loans 106.755108.607
< underline > Deposits 182.715189.597
Equity20.36418.040
< underline > Net Income 3.4513.120
< underline > Return on Average Assets 1.72 %1.62 %
Return on Average Equity17.6617.08
", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Eastland National Bank \n\nOffice \n201 E. Main \nEastland, Texas 76448 \n*Chartered 1934*\nSenior Officers \nTommy J. Barrow \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nClint S. Ferguson \n*Executive Vice President*\nJim Davidson \n*Senior Vice President and Cashier*\n\nDirectors \nTommy J. Barrow \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nClint S. Ferguson \n*Executive Vice President*\nCurtis R. Harvey \n*First Financial Bankshares, Inc.*\n\nJim Keffer \n*President, EBAA Iron Sales, Inc.*\nMike T. Perry \n*President, Kinnaird, Rossander & Perry*\n*Agency, Inc.*\nDale Squiers, R.Ph. \n*Owner, Eastland Drug Company*\nTommy Warford \n*Turner, Seaberry and Warford, Attorneys*\nM.D. White, Jr. \n*President and Owner, Ace Hardware Store*\n*Eastland/Cisco*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 59.090$ 57.412
< underline > Loans 31.93129.904
< underline > Deposits 50.10951.577
Equity6.1135.737
< underline > Net Income 1.016894
< underline > Return on Average Assets 1.70 %1.58 %
Return on Average Equity16.9015.91
", - "page_start": 17, - "page_end": 17, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "“They stuck \nwith me and were \nalways team players.” \n\nBob Housley appreciates loyalty. \n\nHis company, Housley Communications, is a thriv- \ning business with a staff of 225 and contracting \nrelationships with over 700 firms. The company \nprovides engineering and implementation of \nadvanced telecommunications systems. “We pro- \nvide everything a company needs to go from zero \nto 100 percent.” \n\nSuccess hasn’t necessarily been easy. “We had \nsome difficult times when we were starting out in \nthe ’80s,” says Housley. “San Angelo National \nBank worked very diligently to help me get where \nI am today. They stuck with me and were always \nteam players.” \n\nHousley is a demanding customer – a trait to \nwhich he credits much of his success. “I am very \ncustomer service-oriented. It’s how I built my busi- \nness. I appreciate that I can get that same type of \ndedication from San Angelo National Bank, and I \nsee it reflected throughout the First Financial \nBankshares organization.” \n\nHousley the shareholder is no less demanding, but \nhe’s had good reason to be pleased with his \nreturns from First Financial Bankshares. “First \nFinancial’s expansion strategy is excellent – they \ndo their research and find banks with good oppor- \ntunity. Their operations are sound, and their growth \nis well-managed. I believe they are one of the \nbest mid-size banking organizations around.”", - "page_start": 10, - "page_end": 10, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "news3.pdf", - "query": "What kind of scholarship programs are available to start a financial career?", - "target_page": 1, - "target_passage": "Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "MON EY \n\n3 Great Resources to Kick-Start Your Financial \nPlanning Career \n\n11/23/2022 \n\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of \n\nhelping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should \n\nbe a top contender, whether you are just starting out or looking to make a career change. But once you have \n\ndecided that financial planning is the field for you, how do you get started? Here are three resources that can help \n\nyou launch a successful financial planning career. \n\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide \n\nintroduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry \n\npoints and career tracks, explores the types of companies that hire financial planners and provides information on \n\nhow to find financial planning career opportunities. It also includes resources such as a list of recommended \n\nquestions to ask in a job interview. \n\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional \n\njourney. Some are offered directly through colleges and universities that have financial planning degree and \n\ncertificate programs. Others are available through nonprofits and organizations like the CFP Board Center for \n\nFinancial Planning, which administers 16 scholarship programs that help pay for the education and exam \n\nrequirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer \n\nscholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and \n\ncredentials such as CFP® certification -- some of which may be required to advance within the company. \n\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective \n\nemployers. CFP Board’s spring and fall career fairs are some of the most popular hiring events in the profession, \n\nwith dozens of firms participating in these online exhibitions. Job seekers can visit employers’ virtual exhibit booths \n\nand view open jobs and internships, apply for open positions and interact with employers through one-on-one video \n\nmeetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship \n\nopportunities in financial planning, as well as a collection of articles providing career guidance. \n\nOther top resources include career offices at your college or university, financial services companies’ career \n\nwebsites and professional organizations that may have a local chapter near you. \n\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth \n\nand development as a future financial planning professional. To learn more about CFP® certification, visit the CFP \n\nBoard website. \n\nArticle Link \n\nhttps://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni…", - "page_start": 0, - "page_end": 0, - "source_file": "news3.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "\n \n \n \n \n [html]in - kind39473939tools as nononlo − rTableGroup maximumorganizationprogram.\n
PatientsTumorComponentsSpecificity ( n = 25 )Teduction of controlControl
\n\nto selected students pursuing careers in finance, economics, accounting, \nmarketing, business administration, computer science and information \ntechnology. In addition, scholars will take part in a Chesapeake Presiden- \ntial Leadership Course facilitated by faculty members in coordination with \ndesignated Chesapeake leadership coaches, including a Chesapeake senior \nvice president and OCU alumni. \n\nvolunteer program in which employees roll up their sleeves in the com- \nmunities they call home. \n\nIn 2007 Chesapeake launched a scholarship program in Texas with an \ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal- \nlas to match its gift within a year. The cities responded and matched the gift, \nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the \ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the \ncost of higher education for 48 minority students. The fund provides each \nstudent $20,000 a year for up to four years at the school of their choice. To \ndate more than $1.0 million has been distributed to deserving local students. \nTo help ensure the training of qualified geologists, engineers, land- \nmen and energy lawyers in the next generation, we award scholarships \nto students pursuing energy-related degrees. We also help mentor them \nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship \nrecipients are paired with Chesapeake employee mentors who help devel- \nop students’ knowledge and provide career advice. There are currently 25 \nmentors and 40 scholarship recipients participating in the Peak Program. \n\nChesapeake partners with other companies and organizations to meet \nbasic, practical needs in hundreds of communities. An example is our \n\n\n\nOur recruiting team also initiated a strategic military recruitment \neffort during the past two years to hire former military personnel to \nwork in a variety of leadership and crew positions. This effort earned \nChesapeake an honor from G.I. JOBS magazine when we were named a \n2011 Top 100 Military-Friendly Employer. Chesapeake currently employs \n37 men and women who formerly served as junior military officers and \nmore than 100 former servicemen and servicewomen who joined the \ncompany through a program called Troops 2 Roughnecks. \n\nIn addition to our specific scholarship programs, one-time educational \ndonations and recruitment efforts, in 2010 we gave more than $1.8 million \nto fund higher education for nearly 400 other students in 12 states through \nour Chesapeake Scholars program. Chesapeake’s scholarships help recruit \nthe best and brightest students and provide educational opportunities in \ncommunities where we operate. In Oklahoma City, more than 400 em- \nployees volunteer for up to an hour a week on company time at four local \npublic schools. Chesapeake’s program has grown to become the largest \ncorporate mentoring program in Oklahoma.", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "$ 6,346 $ 4,000 $ (2,346) \n(215) \n1,785 \n$ 8,346 $ 5,785 $ (2,561) \n$44,000 $154,112 $110,112 \n\n2,000", - "page_start": 89, - "page_end": 89, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Dale noseworthy**\nVice president \ninvestor relations and \ncorporate planning \n**Jeremy Jackson**\nVice president \nmarketing **robert richardson**\nexecutive Vice president \n& chief Financial officer **Michael Mclean**\nVice president \nDevelopment **erin Cleveland**\nVice president \nFinance \n\n\n\nmanagement team", - "page_start": 5, - "page_end": 5, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**32. Additional Financial Instruments Disclosure (continued)**\n\n**(b) Interest rate risk exposure**", - "page_start": 86, - "page_end": 86, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "The Foundation has a program of awarding grants to support chapters, affiliates, user groups, and \nindividuals in projects that further the mission of the Foundation. Chapters are independent organizations \nthat share the goals of the Foundation and support the goals within a specified geographical region. In \naddition to this work, which is reflected above in the awards and grants line, an overwhelming majority of \nthe Foundation’s project activities are carried out by an international network of volunteers, whose activity \nis not reflected in the tables above.", - "page_start": 16, - "page_end": 16, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "“We will continue to pursue \nopportunities to grow and \nenhance shareholder value. \nWe plan to actively seek strategic \nacquisitions; look for additional \nbranch locations in higher- \ngrowth areas to expand our \nexisting banks; and increase \nour mortgage and \n.brokerage operations.”", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "The Lambda learning path forks into two paths. The conceptual path focuses on the programming \nmodel, runtime environment, and security concepts. The other path includes practical steps to \n\nbuild a application while introducing development workflow activities such as how to create and", - "page_start": 52, - "page_end": 52, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "news3.pdf", - "query": "what are career fairs for?", - "target_page": 1, - "target_passage": " In-person and virtual career fairs provide valuable opportunities to connect with prospective employers.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "MON EY \n\n3 Great Resources to Kick-Start Your Financial \nPlanning Career \n\n11/23/2022 \n\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of \n\nhelping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should \n\nbe a top contender, whether you are just starting out or looking to make a career change. But once you have \n\ndecided that financial planning is the field for you, how do you get started? Here are three resources that can help \n\nyou launch a successful financial planning career. \n\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide \n\nintroduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry \n\npoints and career tracks, explores the types of companies that hire financial planners and provides information on \n\nhow to find financial planning career opportunities. It also includes resources such as a list of recommended \n\nquestions to ask in a job interview. \n\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional \n\njourney. Some are offered directly through colleges and universities that have financial planning degree and \n\ncertificate programs. Others are available through nonprofits and organizations like the CFP Board Center for \n\nFinancial Planning, which administers 16 scholarship programs that help pay for the education and exam \n\nrequirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer \n\nscholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and \n\ncredentials such as CFP® certification -- some of which may be required to advance within the company. \n\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective \n\nemployers. CFP Board’s spring and fall career fairs are some of the most popular hiring events in the profession, \n\nwith dozens of firms participating in these online exhibitions. Job seekers can visit employers’ virtual exhibit booths \n\nand view open jobs and internships, apply for open positions and interact with employers through one-on-one video \n\nmeetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship \n\nopportunities in financial planning, as well as a collection of articles providing career guidance. \n\nOther top resources include career offices at your college or university, financial services companies’ career \n\nwebsites and professional organizations that may have a local chapter near you. \n\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth \n\nand development as a future financial planning professional. To learn more about CFP® certification, visit the CFP \n\nBoard website. \n\nArticle Link \n\nhttps://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni…", - "page_start": 0, - "page_end": 0, - "source_file": "news3.pdf" - }, - { - "text": "When we think about our careers, and what we need to do to establish them, we \noften forget about the need to develop an essential skill: communication. If you \nstart reading through the job descriptions in a industry, you will find that the vast \nmajority of jobs require one or more of the following: \n\nIn a career context, good language skills can also: \n\n• Affect your credibility. Poor grammar indicates to a prospective \n\nemployer that you are sloppy, while flawless grammar indicates that \n\nyou pay attention to detail. \n\nImprove your relationships with your co- workers. If you are able \nto express yourself clearly, you can eliminate the confusion and \nmisunderstanding that often leads to conflict. \n\n• \n\nIncrease your chances of being promoted. \n• \n\n• Help you to create a good impression. \n\nImprove your ability to persuade others (which is a valuable skill in the \nworking world). \n\n• \n\n• Develop your basic English language skills. \n\n• Improve your English grammar. \n\n Apply your language and communication skills in a business contexT. \n(www.oxbridgeacademy.co.za/find-a- course/business-administration- \ncourses/)", - "page_start": 4, - "page_end": 4, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Outperform \n\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "If you’ve ever applied for a job, you’ll know that writing \nthe cover letter is the most difficult part of almost any job \napplication. Your cover letter creates the first impression, and \noften determines whether an employer will even look at your CV. \n\nYou need to use this opportunity to introduce yourself and your \nskills, and to set yourself apart from all the other candidates. \nYou can also use this opportunity to explain any gaps in your CV, \nand to motivate why you are the right person for the job.", - "page_start": 44, - "page_end": 44, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "If you are leaving for personal reasons (such as moving away, starting a \nfamily, or retiring), you may feel sad about leaving. But if you are leaving \nfor a better opportunity, or you’ve simply had enough of your current job, \nyou may be glad to be moving on.", - "page_start": 47, - "page_end": 47, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "In today’s working environment, it is almost guaranteed that \nyou will be required to communicate with colleagues via e-mail \non a regular basis. And due to the large number of e-mails we \nnow send and receive each day, proper e-mail etiquette is \nmore important than ever.", - "page_start": 51, - "page_end": 51, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "You can read high level explanations of the core services here, and an example of how they interact \n\nwithin the context of an example microservice, or you can choose to skip ahead to the hands on \n\nworkshop that uses three common services to build a working microservice.", - "page_start": 33, - "page_end": 33, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "news3.pdf", - "query": "What are the priorities for job seekers ?", - "target_page": 1, - "target_passage": " Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "*8.5 By 2030, achieve full and productive employment and decent work for all women and men,*\n*including for young people and persons with disabilities, and equal pay for work of equal value*\n\n*8.7 Take immediate and effective measures to eradicate forced labour, end modern slavery and*\n*human trafficking and secure the prohibition and elimination of the worst forms of child labour,*\n*including recruitment and use of child soldiers, and by 2025 end child labour in all its forms*\n\n*8.8 Protect labour rights and promote safe and secure working environments for all workers,*\n*including migrant workers, in particular women migrants, and those in precarious employment*", - "page_start": 115, - "page_end": 115, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**32**| EMPLOYEES", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "If you’ve ever applied for a job, you’ll know that writing \nthe cover letter is the most difficult part of almost any job \napplication. Your cover letter creates the first impression, and \noften determines whether an employer will even look at your CV. \n\nYou need to use this opportunity to introduce yourself and your \nskills, and to set yourself apart from all the other candidates. \nYou can also use this opportunity to explain any gaps in your CV, \nand to motivate why you are the right person for the job.", - "page_start": 44, - "page_end": 44, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "In today’s working environment, it is almost guaranteed that \nyou will be required to communicate with colleagues via e-mail \non a regular basis. And due to the large number of e-mails we \nnow send and receive each day, proper e-mail etiquette is \nmore important than ever.", - "page_start": 51, - "page_end": 51, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "products and services to offer to our:customers and some of the mostpassionate, committed employees I have-ever worked with.:2013 ANNUAL REPORT", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "If you are leaving for personal reasons (such as moving away, starting a \nfamily, or retiring), you may feel sad about leaving. But if you are leaving \nfor a better opportunity, or you’ve simply had enough of your current job, \nyou may be glad to be moving on.", - "page_start": 47, - "page_end": 47, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "“We will continue to pursue \nopportunities to grow and \nenhance shareholder value. \nWe plan to actively seek strategic \nacquisitions; look for additional \nbranch locations in higher- \ngrowth areas to expand our \nexisting banks; and increase \nour mortgage and \n.brokerage operations.”", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "**Figure 40: Workforce structure, mobility and migration – European Commission**\n\nRegarding OSH, it is important to consider that**migrants from non-EU countries are over-**\n**represented in certain sectors and occupations**like cleaners and helpers, personal services and \ncare, building workers, mining, manufacturing, transport, food and agriculture. The next table shows the \npercentage of non-EU citizens in the workforce of certain occupations compared to the share of \nworkforce of EU citizens in the same occupations.310", - "page_start": 111, - "page_end": 111, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", - "query": "What does ShareAlike mean in terms of licencing ?", - "target_page": 1, - "target_passage": "adaptations based on this work must be licensed under the same license.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence.", - "page_start": 33, - "page_end": 33, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": " modifying the content, the dimensions; \n\n making technical changes to the content (necessary correction of technical errors), \nadding new parts or functionalities, changing functionalities, providing third parties \nwith additional information concerning the*result*(e.g. source code) with a view to \nmaking modifications; \n\n addition of new elements, paragraphs, titles, leads, bolds, legend, table of content, \nsummary, graphics, subtitles, sound; \n\n addition of metadata, for text and data-mining purposes; addition of right- \nmanagement information; addition of technological protection measures; \n\n preparation in audio form, preparation as a presentation, animation, pictograms \nstory, slide-show, public presentation; \n\n extracting a part or dividing into parts; \n\n \nincorporating, including by cropping and cutting, the*results*or parts thereof in other \nworks, such as on websites and webpages; \n\n translating, inserting subtitles, dubbing in different language versions: \n\nEnglish, French, German; \nall official languages of EU; \nlanguages used within EU; \nlanguages of candidate countries; \n\n- \n- \n- \n- \n- \n\n(f)rights to authorise or license the modes of exploitation set out in any of the points (a) \nto (e) to third parties, provided however that this does not apply to*pre-existing rights*and \n*pre-existing materials*, if they are only licensed to the Agency, except as foreseen by \nArticle II.13.2.; \n\n(g) other adaptations which the parties may later agree; in such case, the following rules \napply: the contracting authority must consult the contractor. If necessary, the contractor \nmust in turn seek the agreement of any*creator*or other right holder and must reply to the \ncontracting authority within one month by providing its agreement, including any \nsuggestions of modifications, free of charge. The contractor may refuse the intended \nmodification only if a*creator*can demonstrate that the intended modification may harm \nhis/her honour or reputation, thereby violating his/her moral rights. \n\nThe modes of exploitation may be defined in more details in the specific contract. \n\nThe list above is in addition to whatever rights already accrue to the contracting authority \non the basis of existing exceptions in the applicable legislation, such as the copyright \nexception to ensure the proper performance or reporting of administrative proceedings, in \ncases where such exceptions apply. \n\n**I.10.2. Licence or transfer of pre-existing rights**\n\nAll*pre-existing rights*incorporated in the*results*, if any, are licensed to the Agency as set \nout in Article II.13.2. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 9, - "page_end": 9, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "22.Thinking About Africa's Open Data \n\n23.Towards EU Benchmarking 2.0 - Transparency and Open Data on Structural Funds in \n\nEurope \n\n24.UK Open Government Licence removes barriers to re-use of public sector information \n\n25.Western Europe: A journey through tech for transparency projects \n\n26.What open data means to marginalized communities \n\n27.What's in a Name? Open Gov and Good Gov \n\n28.WikiLeaks Relationship With the Media \n\n29.WikiLeaks, Open Information and Effective Use: Exploring the Limits of Open Government", - "page_start": 33, - "page_end": 33, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "All rights reserved. No part of this publication may be reproduced or transmitted \n\nin any form or by any means, electronic or mechanical, including photocopying, \n\nrecording, or any information storage or retrieval system, without prior permission in \n\nwriting from the publisher. Subject to any applicable licensing terms and conditions in \n\nthe case of electronically supplied publications, a person may engage in fair dealing \n\nwith a copy of this publication for his or her personal or private use, or his or her \n\nresearch or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978. \n\nThe authors and the publisher have made every effort to obtain permission for and \n\nto acknowledge the use of copyright material. Should any infringement of copyright \n\nhave occurred, please contact the publisher, and every effort will be made to rectify \n\nomissions or errors in the event of a reprint or new edition.", - "page_start": 1, - "page_end": 1, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "***4. Copyright, Licensing, & Access to Books for***\n***Training***\n\nEven if books can be acquired, digitized, and made technically useful for AI training, the \ndevelopment of a books data commons would necessarily need to navigate and comply with \ncopyright law. \n\n**Out-of-Copyright Books:**A minority of books are old enough to be in the public domain and \nout of copyright, and an AI developer could use them in training without securing any \ncopyright permission. In the United States, all books published or released before 1929 are in \nthe public domain. While use of these books provides maximal certainty for the AI developer \nto train on, it is worth noting that the status of whether a book is in the public domain can be \ndifficult to determine. \n For instance, books released between 1929 and 1963 in the U.S. are \nout of copyright if they were not subject to a copyright renewal; however, data on copyright \nrenewals is not easily accessible. \n\n14 \n\nWhat’s more, copyright definitions and term lengths vary among countries. Even if a work is \nin the public domain in the US, it may not be in other countries. \n Countries generally use the \nlife of the last living author + “x” years to determine the term of copyright protection. For \nmost countries, “x” is either 50 years (the minimum required by the Berne Convention) or 70 \nyears (this is the case for all member states of the European Union and for all works \npublished in the U.S. after 1978). This approach makes it difficult to determine copyright \nterms with certainty because it requires information about the date of death of each author, \nwhich is often not readily available. \n\n15 \n\n**In-Copyright Books:**The vast majority of books are in copyright, and, insofar as the training \nprocess requires making a copy of the book, the use in AI training may implicate copyright \nlaw. Our workshop covered three possible paths for incorporating such works. \n\n**Direct licensing**\n\nOne could directly license books from rightsholders. There may be some publishers who are \nwilling to license their works for this purpose, but it is hard to determine the scale of such \naccess, and, in any event, there are significant limits on this approach. Along with the \nchallenge (and expense) of reaching agreements with relevant rightsholders, there is also the \npractical difficulty of simply identifying and finding the rightsholder that one must negotiate \n\n For a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler.*Finding the Public Domain:*\n\n14 \n*Copyright Review Management System Toolkit*. 2016, quod.lib.umich.edu/c/crmstoolkit/ \n14616082.0001.001. Accessed 20 Mar. 2024.; Kopel, Matthew. “LibGuides: Copyright at Cornell Libraries: \nCopyright Term and the Public Domain.” guides.library.cornell.edu/copyright/publicdomain; \nMannapperuma, Menesha, et al.*Is It in the Public Domain? A HANDBOOK for EVALUATING the*\n*COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES*. 1923. \n\n See e.g. Moody, Glyn. “Project Gutenberg Blocks Access in Germany to All Its Public Domain Books \n\n15 \nbecause of Local Copyright Claim on 18 of Them.”*Techdirt*, 7 Mar. 2018, www.techdirt.com/ \n2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-local- \ncopyright-claim-18-them/. Accessed 20 Mar. 2024.", - "page_start": 8, - "page_end": 8, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "**SHAREHOLDER**I N F O R M A T I O N", - "page_start": 90, - "page_end": 90, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "entities working for it or cooperating with it, including contractors and subcontractors, \nwhether legal or natural persons, but only for the purpose of their mission for the \ncontracting authority; \n\n(b) if the*result*is a \"document\" such as a report or a study, and it is meant to be published, \nthe existence of*pre-existing materials*in the*result*may not prevent the publication of the \ndocument, its translation or its \"reuse\", it being understood however that the \"reuse\" may \nonly be made of the*result*as a whole and not of the*pre-existing materials*taken separately \nfrom the*result*; for the sake of this provision, \"reuse\" and \"document\" have the meaning \ngiven by the Commission Decision of 12 December 2011 on the reuse of Commission \ndocuments (2011/833/EU). \n\nAll*pre-existing rights*are licensed to the contracting authority from the moment the*results*\nare delivered and approved by the contracting authority. \n\nThe licensing of*pre-existing rights*to the contracting authority under this FWC covers all \nterritories worldwide and is valid for the duration of intellectual property rights protection. \n\nThe payment of the price as set out in the specific contracts is deemed to also include any \nfees payable to the contractor in relation to the licensing of*pre-existing rights*to the \ncontracting authority, including for all forms of exploitation and of use of the*results*. \n\nWhere*implementation of the FWC*requires that the contractor uses*pre-existing materials*\nbelonging to the contracting authority, the contracting authority may request that the \ncontractor signs an adequate licence agreement. Such use by the contractor will not entail \nany transfer of rights to the contractor and is limited to the needs of this FWC. \n\n**II.13.3. Exclusive rights**\n\nThe Contracting Authority acquires the following exclusive rights: \n\n(a) reproduction: the right to authorise or prohibit direct or indirect, temporary or \npermanent reproduction of the*results*by any means (mechanical, digital or other) and \nin any form, in whole or in part; \n\n(b) communication to the public: the exclusive right to authorise or prohibit any display, \nperformance or communication to the public, by wire or wireless means, including the \nmaking available to the public of the*results*in such a way that members of the public \nmay access them from a place and at a time individually chosen by them; this also \nincludes the communication on Internet and broadcasting by cable or by satellite; \n(c) distribution: the exclusive right to authorise or prohibit any form of distribution of \n\n*results*or copies of the*results*to the public, by sale or otherwise; \n\n(d) rental: the exclusive right to authorise or prohibit rental or lending of the*results*or of \n\ncopies of the*results*; \n\n(e) adaptation: the exclusive right to authorise or prohibit any modification of the*results*; \n(f) translation: the exclusive right to authorise or prohibit any translation, adaptation, \narrangement, creation of derivative works based on the*results*, and any other \nalteration of the*results*, subject to the respect of moral rights of authors, where \napplicable; \n\n(g) where the*results*are or include a database: the exclusive right to authorise or prohibit \nthe extraction of all or a substantial part of the contents of the database to another \nmedium by any means or in any form; and the exclusive right to authorise or prohibit \nthe re-utilization of all or a substantial part of the contents of the database by the \ndistribution of copies, by renting, by on-line or other forms of transmission; \n\n(h) where the*results*are or include a patentable subject-matter: the right to register them \n\nas a patent and to further exploit such patent to the fullest extent;", - "page_start": 23, - "page_end": 23, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - } - ] - }, - { - "references": { - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", - "query": "What is the most restricive Creative Common licence ?", - "target_page": 1, - "target_passage": "CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. \n\nPublic domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright \n\nThe CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
\n\nWorks marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**About this**\n**Open Work**\n\n\"Kaleidoscope\" by \ndocoverachiever is \nlicensed under CC \nBY 2.0.", - "page_start": 0, - "page_end": 0, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 \n\n See e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary \n16 \nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper \nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. \nAccessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, \nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?”*The Atlantic*, 18 Mar. \n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century- \navailable-as-ebooks/284486/. See also “Google Book Search Settlement and Access to Out of Print \nBooks.”*Google Public Policy Blog*, publicpolicy.googleblog.com/2009/06/google-book-search- \nsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class- \naction settlement between Google, the Authors Guild, and the Association of American Publishers). \nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying \nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at https:// \nweb.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ \ngoogle_final_approval_support.pdf. The Authors Guild and Association of American Publishers also \njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding \ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly \n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether \nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out- \nof-print works anyway — see this brief at https://web.archive.org/web/20130112060213/http:// \nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_of_law.pdf. \n\n In the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce \n\n17 \nworks and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These \nprovisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-of- \ncommerce works or other subject matter permanently in their collections\". The limitation to non- \ncommercial purposes means that works made available under these provisions would be of limited use \nin building a books data commons.", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 \nInternational License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and \nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to \nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver \n(http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - } - ] - }, - { - "references": { - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", - "query": "In which case CC licence can't be used ?", - "target_page": 1, - "target_passage": "fair use, fair dealing, or some other limitation and exception to copyright applies the the work.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence.", - "page_start": 33, - "page_end": 33, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. \n\nPublic domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright \n\nThe CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
\n\nWorks marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "COPYRIGHT LICENSE: \n\nThis information contains sample application programs in source language, which illustrate programming \ntechniques on various operating platforms. You may copy, modify, and distribute these sample programs in \nany form without payment to IBM, for the purposes of developing, using, marketing or distributing application \nprograms conforming to the application programming interface for the operating platform for which the sample \nprograms are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, \ncannot guarantee or imply reliability, serviceability, or function of these programs.", - "page_start": 12, - "page_end": 12, - "source_file": "sg246915.pdf" - }, - { - "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "All rights reserved. No part of this publication may be reproduced or transmitted \n\nin any form or by any means, electronic or mechanical, including photocopying, \n\nrecording, or any information storage or retrieval system, without prior permission in \n\nwriting from the publisher. Subject to any applicable licensing terms and conditions in \n\nthe case of electronically supplied publications, a person may engage in fair dealing \n\nwith a copy of this publication for his or her personal or private use, or his or her \n\nresearch or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978. \n\nThe authors and the publisher have made every effort to obtain permission for and \n\nto acknowledge the use of copyright material. Should any infringement of copyright \n\nhave occurred, please contact the publisher, and every effort will be made to rectify \n\nomissions or errors in the event of a reprint or new edition.", - "page_start": 1, - "page_end": 1, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "COPYRIGHT LICENSE: \n\nThis information contains sample application programs in source language, which illustrate programming \ntechniques on various operating platforms. You may copy, modify, and distribute these sample programs in \nany form without payment to IBM, for the purposes of developing, using, marketing or distributing application \nprograms conforming to the application programming interface for the operating platform for which the sample \nprograms are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, \ncannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are \nprovided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use \nof the sample programs.", - "page_start": 14, - "page_end": 14, - "source_file": "sg247938.pdf" - }, - { - "text": "COPYRIGHT LICENSE: \n\nThis information contains sample application programs in source language, which illustrate programming \ntechniques on various operating platforms. You may copy, modify, and distribute these sample programs in \nany form without payment to IBM, for the purposes of developing, using, marketing or distributing application \nprograms conforming to the application programming interface for the operating platform for which the sample \nprograms are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, \ncannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are \nprovided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use \nof the sample programs.", - "page_start": 8, - "page_end": 8, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RSG_2004.pdf", - "query": "In how many regions the Republic Services operations are organized ?", - "target_page": 9, - "target_passage": "As of December 31, 2004, our operations were organized into five regions whose boundaries may change from time to time: Eastern, Central, Southern, Southwestern and Western.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "On behalf of all of us at Republic, I want to thank our shareholders for the trust they have placed in \nus. We are a Company that cares about you, and we pledge to continue working hard to serve you in \n2005 and beyond. \n\nSincerely, \n\n\n\nAs I thought about these achievements, I realized they result from the environment that we work to \ncreate for both our customers and our people. We care about our customers and the communities we \nserve. About our people. About the environment. And, of course, we care about you -- our \nshareholders. Every year we adopt a theme that captures our Company and our values. Our theme \nfor 2005 is “Republic Services…A Company that cares”. \n\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we \ndeliver our services, increasing our efficiency in routing our collection trucks. We improved the way \nwe construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to \ncontrol prices. And, we communicated to our customers the value of the services we offer. This year \nwill be no different. We will continue to concentrate on these fundamentals. \n\nRepublic’s future is bright. We are mindful of our mission. We know our business exists to ease the \nburden of managing society’s waste. It’s not a glamorous business, but it is an essential one, and we \ntake this responsibility very seriously. \n\nAt the end of the year, Republic had 140 collection companies, 58 landfills, 96 transfer stations and 35 \nrecycling facilities in 22 states. These resources give us many opportunities to listen to our customers, \nanticipate their needs and quickly respond to them. Each customer faces challenges unique to his or \nher business and community. Our goal is to remain flexible and to tailor our services to each \ncustomer. \n\nW. Lee Nutter 2, 3, 4 \n*Chairman, Compensation*\n*Committee*\n*Chairman, President &*\n*Chief Executive Officer*\n*Rayonier, Inc.*\n*(a forest products company)*\n\nMichael W. Wickham 2, 3, 4 \n*Retired Chairman, President*\n*& Chief Executive Officer,*\n*Roadway Corporation*\n\n1*Member, Executive Committee*• 2*Member, Audit Committee*• 3*Member, Compensation Committee*• 4*Member, Nominating and Corporate Governance Committee*\n\nOfficers \n\nJames E. O’Connor \n*Chairman & Chief Executive Officer*\nMichael J. Cordesman \n*President & Chief Operating Officer*\nDavid A. Barclay \n*Senior Vice President & General Counsel*\nTod C. Holmes \n*Senior Vice President & Chief Financial Officer*\nLee V. Twyford \n*Senior Vice President & Chief Information Officer*\nBrian A. Bales \n*Vice President, Corporate Development*\nKenneth M. Baylor \n*Vice President, Employee & Labor Relations*\n\nWilliam C. Flower \n*Vice President, Communications*\nMatthew D. Katz \n*Vice President & Associate General Counsel*\nRonald R. Krall \n*Regional Vice President - Eastern Region*\nEdward A. Lang III \n*Vice President, Finance & Treasurer*\nThomas E. Miller \n*Regional Vice President - Southwest Region*\nCraig J. Nichols \n*Vice President, Human Resources*\nCharles F. Serianni \n*Vice President & Chief Accounting Officer*\nRobert N. Shepard \n*Regional Vice President - Southern Region*\nGary L. Sova \n*Vice President, Marketing & Sales*\nKevin C. Walbridge \n*Regional Vice President - Central Region*\nGerard W. Wickett \n*Vice President, Purchasing & Maintenance*\n\nTim M. Benter \n*Vice President & Associate General Counsel*\n\nJerry S. Clark \n*Vice President & Controller*\nPaul J. Connealy \n*Vice President, Tax*\nMatthew E. Davies \n*Vice President, Environmental Engineering & Compliance*\nArthur J. Dudzinski \n*Regional Vice President - Western Region*", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "On behalf of all of us at Republic, I want to thank our shareholders for the trust they have placed in \nus. We are a Company that cares about you, and we pledge to continue working hard to serve you in \n2005 and beyond. \n\nSincerely, \n\n\n\nAs I thought about these achievements, I realized they result from the environment that we work to \n\ncreate for both our customers and our people. We care about our customers and the communities we \n\nserve. About our people. About the environment. And, of course, we care about you -- our \n\nshareholders. Every year we adopt a theme that captures our Company and our values. Our theme \n\nfor 2005 is “Republic Services…A Company that cares”. \n\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we \n\ndeliver our services, increasing our efficiency in routing our collection trucks. We improved the way \n\nwe construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to \n\ncontrol prices. And, we communicated to our customers the value of the services we offer. This year \n\nwill be no different. We will continue to concentrate on these fundamentals. \n\nRepublic’s future is bright. We are mindful of our mission. We know our business exists to ease the \n\nburden of managing society’s waste. It’s not a glamorous business, but it is an essential one, and we \n\ntake this responsibility very seriously. \n\nAt the end of the year, Republic had 140 collection companies, 58 landfills, 96 transfer stations and 35 \n\nrecycling facilities in 22 states. These resources give us many opportunities to listen to our customers, \n\nanticipate their needs and quickly respond to them. Each customer faces challenges unique to his or \n\nher business and community. Our goal is to remain flexible and to tailor our services to each \n\ncustomer. \n\nW. Lee Nutter 2, 3, 4 \n*Chairman, Compensation*\n*Committee*\n*Chairman, President &*\n*Chief Executive Officer*\n*Rayonier, Inc.*\n*(a forest products company)*\n\nMichael W. Wickham 2, 3, 4 \n*Retired Chairman, President*\n*& Chief Executive Officer,*\n*Roadway Corporation*\n\n1*Member, Executive Committee*• 2*Member, Audit Committee*• 3*Member, Compensation Committee*• 4*Member, Nominating and Corporate Governance Committee*\n\nOfficers \n\nJames E. O’Connor \n*Chairman & Chief Executive Officer*\nMichael J. Cordesman \n*President & Chief Operating Officer*\nDavid A. Barclay \n*Senior Vice President & General Counsel*\nTod C. Holmes \n*Senior Vice President & Chief Financial Officer*\nLee V. Twyford \n*Senior Vice President & Chief Information Officer*\nBrian A. Bales \n*Vice President, Corporate Development*\nKenneth M. Baylor \n*Vice President, Employee & Labor Relations*\n\nWilliam C. Flower \n*Vice President, Communications*\nMatthew D. Katz \n*Vice President & Associate General Counsel*\nRonald R. Krall \n*Regional Vice President - Eastern Region*\nEdward A. Lang III \n*Vice President, Finance & Treasurer*\nThomas E. Miller \n*Regional Vice President - Southwest Region*\nCraig J. Nichols \n*Vice President, Human Resources*\nCharles F. Serianni \n*Vice President & Chief Accounting Officer*\nRobert N. Shepard \n*Regional Vice President - Southern Region*\nGary L. Sova \n*Vice President, Marketing & Sales*\nKevin C. Walbridge \n*Regional Vice President - Central Region*\nGerard W. Wickett \n*Vice President, Purchasing & Maintenance*\n\nTim M. Benter \n*Vice President & Associate General Counsel*\n\nJerry S. Clark \n*Vice President & Controller*\nPaul J. Connealy \n*Vice President, Tax*\nMatthew E. Davies \n*Vice President, Environmental Engineering & Compliance*\nArthur J. Dudzinski \n*Regional Vice President - Western Region*", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "made to our people and service communities. \n\nThe last year was indeed an outstanding one for Republic. Our goal is to continue to deliver \n\nimpressive results in 2005. \n\nI am both privileged and grateful to have the opportunity to lead a team of such exceptional people. \n\nEveryday, I grow more impressed with the experience, knowledge, loyalty and hard work they \n\ncontribute. Republic truly has one of the best management and operations teams in America. \n\nOn behalf of all of us at Republic, I want to thank our shareholders for the trust they have placed in \n\nus. We are a Company that cares about you, and we pledge to continue working hard to serve you in \n\n2005 and beyond. \n\nSincerely, \n\n\n\nAs I thought about these achievements, I realized they result from the environment that we work to \n\ncreate for both our customers and our people. We care about our customers and the communities we \n\nserve. About our people. About the environment. And, of course, we care about you -- our \n\nshareholders. Every year we adopt a theme that captures our Company and our values. Our theme \n\nfor 2005 is “Republic Services…A Company that cares”. \n\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we \n\ndeliver our services, increasing our efficiency in routing our collection trucks. We improved the way \n\nwe construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to \n\ncontrol prices. And, we communicated to our customers the value of the services we offer. This year \n\nwill be no different. We will continue to concentrate on these fundamentals. \n\nRepublic’s future is bright. We are mindful of our mission. We know our business exists to ease the \n\nburden of managing society’s waste. It’s not a glamorous business, but it is an essential one, and we \n\ntake this responsibility very seriously. \n\nAt the end of the year, Republic had 140 collection companies, 58 landfills, 96 transfer stations and 35 \n\nrecycling facilities in 22 states. These resources give us many opportunities to listen to our customers, \n\nanticipate their needs and quickly respond to them. Each customer faces challenges unique to his or \n\nher business and community. Our goal is to remain flexible and to tailor our services to each \n\ncustomer.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
2003Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, Depletion and Accretion ( c )Operating IncomeCapital Expenditures ( d )Total AssetsEastern Region........
$ 600.2$ ( 93.0 )$ 50$ 36.4$ 71.3$ 40.7$ 826.9Central Region..........671.7
( 151.6 )520.174.0106.675.7960.5Southern Region......680.3( 76.9 )
603.462.8107.569.9865.6Southwestern Region...332.6( 31.2 )301.4
28.750.228.9409.4Western Region.......729.4( 143.9 )585.546.2
148.851.4813.2Corporate Entities ( a ). 2. 23.7( 71.7 )
6.6678.5Total..........................$ 3.014.4$( 496.6 )$ 2.517.8$ 251.8$ 412.7$ 273.2
$ 4.554.12002Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, and Depletion ( c )Other Charges ( Income )Operating IncomeCapital Expenditures ( d )
Total AssetsEastern Region..........564.1$ ( 79.7 )$484.4$ 32.0$( 4.1 )$ 87.0
$ 39.2$ 822.2Central Region.......589.6( 120.2 )469.453.6( 1.5 )105.3
77.1950.9Southern Region.....643.1( 65.5 )577.652.7118.3
58.0830.7Southwestern Region...311.8( 29.1 )282.722.841.9
30.6374.6Western Region......690.0( 139.1 )550.941.3145.5
47.3826.7Corporate Entities ( a ).... 2(. 1 ). 1( 2.8 )( 38.5 )
6.4404.0Total..........................$ 2.798.8$ ( 433.7 )$ 2.365.1$ 199.6$( 5.6 )$ 459.5
$ 258.6$ 4.209.1
\n\n(b) Intercompany operating revenue reÖects transactions within and between segments and are generally \nmade on a basis intended to reÖect the market value of such services. \n(c) EÅective January 1, 2003, the Company adopted SFAS 143. (See Note 1, Basis of Presentation, for \nfurther information.) \n\n(d) Capital expenditures for 2002 exclude $72.6 million used to purchase equipment consisting primarily of \nrevenue-producing vehicles originally placed into service pursuant to an operating lease. \n\nGoodwill is the cost of acquired businesses in excess of the fair value of net assets acquired. The activity \nin goodwill, net of accumulated amortization, during 2004 and 2003 is as follows:", - "page_start": 88, - "page_end": 88, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Our decentralized structure is an advantage. It gives us flexibility and speed in reacting to local \nconditions. Our division leaders are well-positioned to respond immediately to the needs, changes \nand developments among their customers. We in the corporate office set the goals, establish the \ndiscipline, provide financial resources, management and operational support, but it is in our local \ndivisions where customer relationships are established and the work is done. Our community-based \nfocus forges strong local relationships and ensures that, at the customer level, the highest expectations \nare exceeded. \n\nUltimately, all the things we do as a Company are aimed at increasing value for our shareholders. We \nknow the importance of strong and predictable cash flow in meeting our shareholders’ expectations. \nOver time, our cash flow has proven to be a strong indicator of the quality of our earnings. Last year’s \nrecord free cash flow enabled us to reinvest in our business, acquire new companies, repurchase $266 \nmillion of our common stock and double the quarterly dividend to $0.12 per share. The plan this year \nis similar. We will continue to use our strong free cash flow to grow and strengthen the Company by \nbuilding our customer base through internal growth and strategic acquisitions. Additionally, we plan \nto repurchase Republic stock worth up to $275 million and pay a regular quarterly cash dividend to \nour shareholders. We believe these steps will increase shareholder value. \n\n*Dear Fellow Shareholders:*\n\nI am pleased to report that 2004 was a very good year for \n\nRepublic Services, Inc. Our team met and exceeded the \n\nimportant financial and management goals we told you \n\nabout here a year ago, and we plan to work just as hard and \n\naccomplish just as much in the coming year. \n\nRepublic is strengthening its competitive position among \n\nthe leading waste services providers every day. As always, \n\nwe are doing so by offering our customers cost-effective \n\nand safe waste collection, reliable recycling, and \n\nenvironmentally protective disposal options. \n\nI am proud of our team and what they accomplished. The \n\nresults tell you just how well they did. \n\nRevenue in 2004 grew 7.6 percent to $2.7 billion, a record. The increases came largely from new \n\nmunicipal contracts and improved pricing. At the same time, we benefited from our presence in high- \n\ngrowth markets, especially those in the rapidly expanding Sunbelt states. \n\nWe met last year’s guidance. Net income per diluted share rose 15 percent to $1.53. Our revenue \n\nenhancement and cost reduction efforts produced results. We generated a record level of free cash \n\nflow - $388 million to be exact. Republic continues to generate strong and predictable levels of cash \n\nflow. As in the past year, we will concentrate on free cash flow and use it for acquisitions, \n\nreinvestment, repurchases of our stock and regular quarterly cash dividends. \n\nThe Year Ahead \n\nWe are focused on improving our service and strengthening relationships with our customers. \nExceptional service allows us to build loyalty and create lasting bonds with those we serve. We will \ncontinue to train and develop our people, too, so they may grow as we grow as a Company. And we \nwill continue to focus on improving the safety of our operations, an important commitment we have \nmade to our people and service communities. \n\nThe last year was indeed an outstanding one for Republic. Our goal is to continue to deliver \nimpressive results in 2005. \n\nI am both privileged and grateful to have the opportunity to lead a team of such exceptional people. \nEveryday, I grow more impressed with the experience, knowledge, loyalty and hard work they \ncontribute. Republic truly has one of the best management and operations teams in America.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Our decentralized structure is an advantage. It gives us flexibility and speed in reacting to local \nconditions. Our division leaders are well-positioned to respond immediately to the needs, changes \nand developments among their customers. We in the corporate office set the goals, establish the \ndiscipline, provide financial resources, management and operational support, but it is in our local \ndivisions where customer relationships are established and the work is done. Our community-based \nfocus forges strong local relationships and ensures that, at the customer level, the highest expectations \nare exceeded. \n\nUltimately, all the things we do as a Company are aimed at increasing value for our shareholders. We \nknow the importance of strong and predictable cash flow in meeting our shareholders’ expectations. \nOver time, our cash flow has proven to be a strong indicator of the quality of our earnings. Last year’s \nrecord free cash flow enabled us to reinvest in our business, acquire new companies, repurchase $266 \nmillion of our common stock and double the quarterly dividend to $0.12 per share. The plan this year \nis similar. We will continue to use our strong free cash flow to grow and strengthen the Company by \nbuilding our customer base through internal growth and strategic acquisitions. Additionally, we plan \nto repurchase Republic stock worth up to $275 million and pay a regular quarterly cash dividend to \nour shareholders. We believe these steps will increase shareholder value. \n\n*Dear Fellow Shareholders:*\n\nI am pleased to report that 2004 was a very good year for \nRepublic Services, Inc. Our team met and exceeded the \nimportant financial and management goals we told you \nabout here a year ago, and we plan to work just as hard and \naccomplish just as much in the coming year. \n\nRepublic is strengthening its competitive position among \nthe leading waste services providers every day. As always, \nwe are doing so by offering our customers cost-effective \nand safe waste collection, reliable recycling, and \nenvironmentally protective disposal options. \n\nI am proud of our team and what they accomplished. The \nresults tell you just how well they did. \n\nRevenue in 2004 grew 7.6 percent to $2.7 billion, a record. The increases came largely from new \nmunicipal contracts and improved pricing. At the same time, we benefited from our presence in high- \ngrowth markets, especially those in the rapidly expanding Sunbelt states. \n\nWe met last year’s guidance. Net income per diluted share rose 15 percent to $1.53. Our revenue \nenhancement and cost reduction efforts produced results. We generated a record level of free cash \nflow - $388 million to be exact. Republic continues to generate strong and predictable levels of cash \nflow. As in the past year, we will concentrate on free cash flow and use it for acquisitions, \nreinvestment, repurchases of our stock and regular quarterly cash dividends. \n\nThe Year Ahead \n\nWe are focused on improving our service and strengthening relationships with our customers. \nExceptional service allows us to build loyalty and create lasting bonds with those we serve. We will \ncontinue to train and develop our people, too, so they may grow as we grow as a Company. And we \nwill continue to focus on improving the safety of our operations, an important commitment we have \nmade to our people and service communities. \n\nThe last year was indeed an outstanding one for Republic. Our goal is to continue to deliver \nimpressive results in 2005. \n\nI am both privileged and grateful to have the opportunity to lead a team of such exceptional people. \nEveryday, I grow more impressed with the experience, knowledge, loyalty and hard work they \ncontribute. Republic truly has one of the best management and operations teams in America.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Our decentralized structure is an advantage. It gives us flexibility and speed in reacting to local \n\nconditions. Our division leaders are well-positioned to respond immediately to the needs, changes \n\nand developments among their customers. We in the corporate office set the goals, establish the \n\ndiscipline, provide financial resources, management and operational support, but it is in our local \n\ndivisions where customer relationships are established and the work is done. Our community-based \n\nfocus forges strong local relationships and ensures that, at the customer level, the highest expectations \n\nare exceeded. \n\nUltimately, all the things we do as a Company are aimed at increasing value for our shareholders. We \n\nknow the importance of strong and predictable cash flow in meeting our shareholders’ expectations. \n\nOver time, our cash flow has proven to be a strong indicator of the quality of our earnings. Last year’s \n\nrecord free cash flow enabled us to reinvest in our business, acquire new companies, repurchase $266 \n\nmillion of our common stock and double the quarterly dividend to $0.12 per share. The plan this year \n\nis similar. We will continue to use our strong free cash flow to grow and strengthen the Company by \n\nbuilding our customer base through internal growth and strategic acquisitions. Additionally, we plan \n\nto repurchase Republic stock worth up to $275 million and pay a regular quarterly cash dividend to \n\nour shareholders. We believe these steps will increase shareholder value. \n\n*Dear Fellow Shareholders:*\n\nI am pleased to report that 2004 was a very good year for \n\nRepublic Services, Inc. Our team met and exceeded the \n\nimportant financial and management goals we told you \n\nabout here a year ago, and we plan to work just as hard and \n\naccomplish just as much in the coming year. \n\nRepublic is strengthening its competitive position among \n\nthe leading waste services providers every day. As always, \n\nwe are doing so by offering our customers cost-effective \n\nand safe waste collection, reliable recycling, and \n\nenvironmentally protective disposal options. \n\nI am proud of our team and what they accomplished. The \n\nresults tell you just how well they did. \n\nRevenue in 2004 grew 7.6 percent to $2.7 billion, a record. The increases came largely from new \n\nmunicipal contracts and improved pricing. At the same time, we benefited from our presence in high- \n\ngrowth markets, especially those in the rapidly expanding Sunbelt states. \n\nWe met last year’s guidance. Net income per diluted share rose 15 percent to $1.53. Our revenue \n\nenhancement and cost reduction efforts produced results. We generated a record level of free cash \n\nflow - $388 million to be exact. Republic continues to generate strong and predictable levels of cash \n\nflow. As in the past year, we will concentrate on free cash flow and use it for acquisitions, \n\nreinvestment, repurchases of our stock and regular quarterly cash dividends. \n\nW. Lee Nutter 2, 3, 4 \n*Chairman, Compensation*\n*Committee*\n*Chairman, President &*\n*Chief Executive Officer*\n*Rayonier, Inc.*\n*(a forest products company)*\n\nMichael W. Wickham 2, 3, 4 \n*Retired Chairman, President*\n*& Chief Executive Officer,*\n*Roadway Corporation*\n\n1*Member, Executive Committee*• 2*Member, Audit Committee*• 3*Member, Compensation Committee*• 4*Member, Nominating and Corporate Governance Committee*\n\nOfficers \n\nThe Year Ahead \n\nWe are focused on improving our service and strengthening relationships with our customers. \n\nExceptional service allows us to build loyalty and create lasting bonds with those we serve. We will \n\ncontinue to train and develop our people, too, so they may grow as we grow as a Company. And we \n\nwill continue to focus on improving the safety of our operations, an important commitment we have \n\nmade to our people and service communities. \n\nThe last year was indeed an outstanding one for Republic. Our goal is to continue to deliver \n\nimpressive results in 2005.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n**ON INTERNAL CONTROL OVER FINANCIAL REPORTING**\n\nThe Board of Directors and Stockholders of Republic Services, Inc.: \n\nWe have audited management's assessment, included in the accompanying Report of Management on \nRepublic Services, Inc.'s Internal Control Over Financial Reporting, that Republic Services, Inc. and \nsubsidiaries maintained eÅective internal control over Ñnancial reporting as of December 31, 2004, based on \ncriteria established in Internal Control Ì Integrated Framework issued by the Committee of Sponsoring \nOrganizations of the Treadway Commission (the COSO criteria). Republic Services, Inc.'s management is \nresponsible for maintaining eÅective internal control over Ñnancial reporting and for its assessment of the \neÅectiveness of internal control over Ñnancial reporting. Our responsibility is to express an opinion on \nmanagement's assessment and an opinion on the eÅectiveness of the company's internal control over Ñnancial \nreporting based on our audit. \n\nWe conducted our audit in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States). Those standards require that we plan and perform the audit to obtain reasonable \nassurance about whether eÅective internal control over Ñnancial reporting was maintained in all material \nrespects. Our audit included obtaining an understanding of internal control over Ñnancial reporting, evaluating \nmanagement's assessment, testing and evaluating the design and operating eÅectiveness of internal control, \nand performing such other procedures as we considered necessary in the circumstances. We believe that our \naudits provide a reasonable basis for our opinion. \n\nA company's internal control over Ñnancial reporting is a process designed to provide reasonable \nassurance regarding the reliability of Ñnancial reporting and the preparation of Ñnancial statements for external \npurposes in accordance with generally accepted accounting principles. A company's internal control over \nÑnancial reporting includes those policies and procedures that (1) pertain to the maintenance of records that, \nin reasonable detail, accurately and fairly reÖect the transactions and dispositions of the assets of the company; \n(2) provide reasonable assurance that transactions are recorded as necessary to permit preparation of Ñnancial \nstatements in accordance with generally accepted accounting principles, and that receipts and expenditures of \nthe company are being made only in accordance with authorizations of management and directors of the \ncompany; and (3) provide reasonable assurance regarding prevention or timely detection of unauthorized \nacquisition, use, or disposition of the company's assets that could have a material eÅect on the Ñnancial \nstatements. \n\nBecause of its inherent limitations, internal control over Ñnancial reporting may not prevent or detect \nmisstatements. Also, projections of any evaluation of eÅectiveness to future periods are subject to the risk that \ncontrols may become inadequate because of changes in conditions, or that the degree of compliance with the \npolicies and procedures may deteriorate. \n\nIn our opinion, management's assessment that Republic Services, Inc. maintained eÅective internal \ncontrol over Ñnancial reporting as of December 31, 2004, is fairly stated, in all material respects, based on the \nCOSO criteria. Also, in our opinion, the Company maintained, in all material respects, eÅective internal \ncontrol over Ñnancial reporting as of December 31, 2004, based on the COSO criteria.", - "page_start": 59, - "page_end": 59, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**SHENTEL SERVICE AREAS**", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_MGM_2004.pdf", - "query": "What was one of the seminal moment of 2004 for MGM MIRAGE ?", - "target_page": 12, - "target_passage": "The announcement of the merger between MGM MIRAGE and Mandalay Resort Group was one of the seminal moments of 2004", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "U S I N G O U R S T R E N G T H... \n\n\n\n\n\n\n\nThe announcement of \nthe merger between \nMGM MIRAGE and \nMandalay Resort Group \nwas one of the seminal \nmoments of 2004.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "o some, momentum is intangible – a product of fortune, a power that cannot be harnessed, and typically \na short-lived sensation. Others wonder how they lost their momentum. At MGM MIRAGE, we are con- \nstantly thinking of better ways to maximize it. We believe momentum is a product of effort and excellence, \n\nT \n\na force which can be observed and measured, and something that can be a lasting and defining quality of a great \ncompany. Our 2004 results are a clear reminder of the power of moving forward. Our financial policies have long \nbeen designed to create and maintain momentum. By investing in our best assets and thinking of new ways to add \nvalue to our shareholders, we are able to redefine our Company’s place in history every year – and 2004 was a defin- \ning time even by our exacting standards. \n\nSo how did we get here? Last year, we discussed the importance of focus, and the laser-like precision with which \n\nwe operated our resorts in 2004 affirms the power of our single-minded dedication to excellence. The hard work of \nour 40,000 employees resulted in a record year in almost every regard. Net revenues increased 10% over 2003 to a \nrecord $4.2 billion, with 12% REVPAR growth at our Las Vegas resorts; property-level EBITDA was an all-time \nrecord, nearly $1.5 billion, and 23% higher than the prior year. We exceeded the expectations of every market \nobserver, and significantly beat our forecasts. And 2004 will not be a zenith year for your company – rather, we \nexpect to continue our excellent operating performance, re-invest the resulting cash flow to stimulate future growth \nand move forward to new defining moments. \n\n\n\nHow do we re-define a company that is already at the top of its industry? First, we continue to execute on our \n\nvision for our existing resorts – to continually evolve and increase the “Wow!” factor for our guests. This strategy \nrequires investment, and we will ensure that our resorts are not only world-class, but best-in-class. Examples include \nthe beautiful Spa Tower at Bellagio and*KÀ*, the latest spectacular creation in collaboration with Cirque du Soleil. \n\n**JAMES J. MURREN**President, CFO & Treasurer \n\n\n\n\n\n\n\n\n\n\n\n**GLENN BONNER**Senior VP & CIO, \nMGM MIRAGE Information Systems **GEORGE R. BOYER III**President, \nMGM Grand Detroit **JOSEPH BRUNINI**President, \nMGM Grand Resorts National Marketing \n**JEFF DAHL**President, Beau Rivage", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "**%**\n**4.9**\n**1**\n\n**KÀ**The most spectacular production ever, by a troupe renowned for its \npageantry. Cirque du Soleil’s KÀ debuted at a new theatre at MGM Grand \nin the fourth quarter of 2004. \n\n**BELLAGIO**underwent a significant expansion during 2004 result- \ning in the opening of the Spa Tower and several important new \namenities at this AAA Five Diamond property. Bellagio remains \nLas Vegas’ first and only hotel-casino to receive this prestigious \nrecognition. These new additions add dimension and depth to the \nworld-famous experience awaiting guests at Bellagio. \n\n**MGM GRAND LAS VEGAS**completed a transformation, begun \nin 2003, of its food and beverage and entertainment offerings. \nMGM Grand is one of the must-see attractions of \n\nLas Vegas, with Cirque du Soleil’s newest pro- \nduction, KA`TM, and several of the Strip’s \nfinest restaurants and hottest nightspots. \n**1**\n**8**\n**.0**\n**%**\n\n**TI**’s transformation was no less extensive, \nas the property’s management team \n\n**47.6%**\n**9 . 5 %**\n**14.9 %**\n\n**1**\nconceived and implemented a program to \nenliven the property with new restaurants \nand nightlife. **%**\n**0**\n\n**THE MIRAGE**was the site of a revolution in \nLas Vegas’ history as the venerable buffet was given \nnew life as a top dining establishment, Cravings. \n2004 Revenue Mix \nOthers may follow this lead, but The Mirage was \nthe first property to breathe new life into what \nremained of the last bastion of “old” Las Vegas. \n\nThese investments in your company’s future paid \ndividends even before the year was out. We established a \nnew record for net revenues posting $4.2 billion, a 10% \nincrease over 2003. \n\nYour company’s resorts produced record EBITDA of \n$1.46 billion, an increase of 23% over 2003, while operating \nincome was $951 million, an increase of 36%, with record \nresults at Bellagio, MGM Grand Las Vegas and Beau Rivage. \n\nDefining Momentum in the Community \nI’ve spent 27 years in this profession and the \nincredible generosity of our employees never \nceases to amaze me. Shortly after the merger \nwith Mirage Resorts in 2000, we established \nthe Voice Foundation. This allows employees to \nexpress themselves in the communities we serve by \n\n**4 7 . 6 %**\n**19 . 5 %**\n\nproviding them a mechanism to raise monies for \n**.**\n**8**\n**1**\n\nworthy causes. It’s their money and they decide \nwhere it goes. Your company provides the marketing \nand administrative support. \n\nCasino \nRooms \nFood & Beverage \nEntertainment, Retail, \n& Other \nIn each year since we established the program, \nemployees have given record amounts to support a \n\n\n\n\n\n\n\n**SKYLOFTS**MGM Grand \nA private sanctuary of sleek, \nelegant two-story accommo- \ndations, offering discerning \nguests the quintessential loft \nenvironment - harmonizing \ndesign, décor, ambiance and \nunparalleled vistas. \n\n**TEATRO**MGM Grand A new \ngenre of Las Vegas nightlife \nwhere European club influ- \nences permeate. DJs spin jazz/ \nhouse throughout the evening, \ngiving way to an energetic \nafter-hours vibe with live cat- \nwalk entertainment.", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "(from left to right)**KENNETH ROSEVEAR**President, MGM MIRAGE Development;**JOHN T. REDMOND**President & CEO, MGM Grand Resorts, LLC; \n**J. TERRENCE LANNI**Chairman & CEO, MGM MIRAGE;**ROBERT H. BALDWIN**President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; \n**GARY N. JACOBS**Executive Vice President, General Counsel & Secretary, MGM MIRAGE;**JAMES J. MURREN**President, CFO & Treasurer, MGM MIRAGE \n\nAs exciting as 2004 was, our momentum will carry us \n\n\n\nto even greater achievements in 2005 and beyond. \n\n**J. TERRENCE LANNI**\nChairman of the Board & Chief Executive Officer \nMarch 31, 2005 \n\nwide array of community needs. From homeless shelters to \nafter-school programs, MGM MIRAGE employees have \ngenerously donated more than $8 million since 2001. \n\nYour company also sets aside a portion of its profits \neach year to be given to important programs intended to \nbuild stronger communities. Since 2001, your company has \ngiven more than $18 million to support such programs. \n\nDefining Momentum in Our Family \n\nOur momentum is driven from within by acknowledging \n\nthe contributions of each and every one of our employees, \nbusiness partners and customers. Our commitment to \ndiversity is recognition of the fact that in today’s ever- \nchanging marketplace, we must reflect that which we see \nin the world around us. \n\nThis commitment should be seen as a common- \n\nsense business decision. That said, we are proud of \nthe recognition our Diversity program has received, \nincluding accolades from prestigious media such as \n*Fortune*and*DiversityInc.*magazines. Defining Momentum in the Future \n\nYour company achieved many business goals in 2004 Since formalizing our program only four years ago, \n\nand set in motion plans for future growth. These initiatives \nwill provide unmatched returns. We have also created unri- \nvaled opportunities for our employees and will continue \nour rich history of strengthening the communities in which \nwe do business. we’ve made enormous strides. There is still progress to \nbe made and your company has the momentum to \nremain at the forefront on diversity initiatives, provid- \ning yet another advantage for sustaining performance in \nthe long term. \n\n**JEAN-PHILIPPE PATISSERIE**\nBELLAGIO A mesmerizing \nfountain of cascading liquid \nchocolate showcases a splen- \ndid selection of chocolates, \ncakes, crêpes, salads and \nsandwiches. \n\n\n\n\n\n\n\n**SENSI**BELLAGIO An \neclectic menu features \ndiverse cuisines in an \nearthy arena replete with \nwaterfalls and chrome. A \nbold wine list complements \nChef Martin Heierling’s \nsumptuous work.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Recently, we opened the SKYLOFTS, a new level of luxury \nfor guests atop MGM Grand Las Vegas. \n\nWe’ll follow the success of these new resort features \nwith a category-defining new nightclub at The Mirage, two \nfabulous restaurants by Joël Robuchon at MGM Grand Las \nVegas and gaming upgrades company-wide. Second, we are \ndoubling down on Las Vegas by merging with Mandalay, \na company we have long admired. The Mandalay merger \nrepresents a tremendous opportunity to build on the mo- \nmentum established by Mike Ensign and his team. And \nthird, we are dreaming of a not-so-distant future, when \n\nProject CityCenter will literally redefine the Las Vegas Strip \nand change the face of Las Vegas forever. \n\nMandalay in Motion \n\nWe are incredibly excited to begin our journey with the \n\ntalented people of Mandalay, as we work to maximize the \nvalue of Mandalay’s instantly recognized brands and world- \nclass resorts. Long a fixture in Las Vegas, Mandalay’s resorts \nwill add to our premium portfolio and allow us to accelerate \nthe pace of our growth. Our hotel people will be able to mar- \nket a wider range of rooms and benefit from a world-class \n\nconvention center. Our casino marketing people will be able \nto offer their customers wonderful new amenities to expand \nour market reach. And our development people will be able \nto maximize the potential of priceless Las Vegas Strip land. \nThe Mandalay merger represents another defining \nmoment for MGM MIRAGE, much like the Mirage Resorts \ntransaction in 2000, at a time when Las Vegas is in a state of \nastounding metamorphosis. No company is better positioned \nto help shape the future of Las Vegas than MGM MIRAGE. \nWe employ more people, invest more money and hold more \nprime real estate than any other company in Las Vegas. The", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "But the bricks and mortar tell only part of the story \nof this transaction. At the heart of Mandalay is its people. \nMandalay employees at all levels are energetic and talented \nand will be a tremendous asset to us. Together, we will become \na family in excess of 70,000 people committed to delivering \nthe best possible experiences for our guests. The transaction \nalso will create unparalleled opportunities for our entire family \nof employees. \n\nIn short, this groundbreaking transaction creates \n\nunstoppable momentum for all stakeholders in the \nMGM MIRAGE family. \n\nDefining Momentum in our Properties \n\nIn 2004, your company invested over $690 million of \ncapital in the creation of new restaurants, clubs, shows and \nnightspots as well as the development of strategic enhance- \nments to existing amenities. These investments generated \nexceptional returns in a time when competition for the \nentertainment dollar has never been higher. \n\nDefining Momentum for Our Industry \n\nThe gaming industry in America is maturing, and \ninternational expansion, while exciting in select markets, \nremains challenging. As a result, your company has \npursued a growth strategy that calls for maximizing the \nassets we currently own and seeking prudent development \nopportunities and strategic acquisitions. \n\nUpon completion of our merger with Mandalay, \nMGM MIRAGE will be the world’s leading gaming and \nleisure company. The combination will result in a well- \ncapitalized company uniquely situated to invest in its \ncurrent portfolio in addition to creating new projects \nin the United States and around the world. \nWe believe this is an outstanding \n\ntransaction for the shareholders of \nboth companies. With this \nacquisition, we will own, \noperate and have investments \nin 28 properties throughout Nevada, Mississippi, \nIllinois, Michigan, and New Jersey. \n\nThe combined company will have an asset portfolio \nwhich includes some of the most widely recognized brand \nnames in the world. These properties cater to a broad \ncustomer base, ranging from value-oriented to the ultra- \nhigh end. Each resort provides a unique customer experience \nthrough its specific personality and combination of amenities. \n\n\n\n**FIX**BELLAGIO Classic \nAmerican fare using the \nfreshest fish, meat, and \npoultry cooked to order on \na wood-burning grill. Costa \nRican Padouk wood inspires \na warm environment in a \nunique, vibrant design. \n\nE \nR \nA \nH \nS \n**2 0 0 4** $2.85 \n\nR \nE \nP $1.61 **2 0 0 3**\n\nS \nG \nN \n**2 0 0 2**\nI \n\nN \nR \nA \nE 0 \n5 0 \n0 0 \n5 0 \n0 0 \n5 0 \n0 0 \n0 \n. . . . . . . \n0 \n$ 1 \n$ 1 \n$ 2 \n$ 2 \n$ 3 \n$ 0 \n$ \n\n\n\nWe also will have at Mandalay Bay the fifth largest \nconvention center in the United States, providing the com- \npany with a great resource to further develop the business \ntravel and convention market.", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "M G M M I R AG E 2 0 0 4 A N N UA L R E P O RT \n\n\n\ndef ining moment um", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Our growth strategy calls \nfor prudent and strategic \ndevelopment of our real \nestate assets to maximize \nshareholder value. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**ATLANTIC CITY LAND/BORGATA EXPANSION Our prime real**\n**estate in Atlantic City, in a location we defined as Renaissance**\n**Pointe, holds spectacular promise to expand MGM MIRAGE’s market**\n**presence on the East Coast.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nKÀTM by Cirque du Soleil®", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "T \n**he Mandalay merger will create a powerful**\n**combination of assets and people positioned**\n**to compete far more strongly than either**\n\n**company individually.**\n\n**With ever-increasing competition from tribal**\n**gaming in California as well as the continuing growth**\n**of gaming across the country and abroad, we are**\n**positioned to grow through improved performance at**\n**existing properties and development of strategic real**\n**estate obtained in the merger.**\n\n**MGM MIRAGE and Mandalay combined will**\n**create an unmatched collection of the world’s most**\n**famous resorts in the gaming, entertainment and travel**\n**markets. Customers will benefit from choices in all**\n**market segments. Lastly, of significance in determin-**\n**ing the value of this transaction for shareholders, the**\n**merger with Mandalay will be immediately accretive.**\n\n**Extraordinary choices for our customers, unrivaled**\n**opportunities for our employees and outstanding returns**\n**for our shareholders all add up to make the merger with**\n**Mandalay a defining moment in company history.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nW I S E L Y", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "“Your company has undergone several defining moments throughout its history.” \n\nF \nrom its roots some 35 years ago with the opening \nof the International Hotel, we have played a \nleading role in continuously redefining the Las \n\nVegas experience. \n\nment will come in the months ahead, I am pleased to tell \nyou that we have secured the services of the internationally \nacclaimed architect Cesar Pelli to design our anchor resort \nat the heart of Project CityCenter. \n\nWe announced two significant initiatives in 2004 that, \ntaken together, give your company unrivaled momentum \nto set industry standards for creativity, performance and \nresponsibility for decades to come. Cesar Pelli & Associates has worked with corporate, \n\ngovernment and private clients to design major public \nspaces, museums, airports, research centers, performing arts \ncenters, academic buildings, hotels, office and residential \ntowers and mixed-use projects. \n\nand our plans to develop Project CityCenter on the Las \nVegas Strip are among the most significant announcements \nin Las Vegas history. As this fabled city begins its second \nhundred years, MGM MIRAGE is positioned like no other \ncompany to take advantage of unsurpassed growth oppor- \ntunities in the most dynamic gaming and entertainment \nmarket in the world. \n\nThe work of Cesar Pelli is not constrained by a personal \nstyle or a signature that would limit his architecture; instead, \nit celebrates the unique characteristics of each project. Using \nthis approach, he has designed several exceptional buildings \nin the United States and abroad. \n\n\n\n\n\n\n\n\n\n\n\n**BELLAGIO SPA TOWER**\nThe quintessential luxury \nhotel is now even more \nopulent. This expansion \nincludes 928 rooms and \nsuites, 80,000 square feet \nof convention space, retail \noutlets, and restaurants. \n\nWe are very excited about our partnership with Mr. \n\nPelli and his colleagues and believe they will deliver for \nMGM MIRAGE and the residents of Southern Nevada \na building of iconic stature around the world. \n**J. TERRENCE LANNI**Chairman & Chief Executive Officer \n\n**SHIBUYA**MGM GRAND \nDesigned by superstar team \nYabu Pushelberg, Shibuya \nfeatures stellar sushi and the \nwidest sake selection this \nside of the Pacific, all served \nin a sleek, airy ambiance. \n**CRAVINGS**THE MIRAGE \nThe zenith of all-you-can-eat. \nDesigned by Adam Tihany, Cravings \nboasts 11 cooking stations, a \nstreet of unique restaurants, \nand an array of temptations in \nwhat’s unquestionably the ultimate \nbuffet dining experience.", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_MGM_2004.pdf", - "query": " What are the most significant piece of undeveloped land remaining on the Las Vegas Strip ?", - "target_page": 21, - "target_passage": "W RESIDENTIAL In lofts, brown stones and high-rise buildings, residential options abound to populate the new city and ener gize the surrounding areas. e have been working for some time on con ceiving the best use of the 66 acres between Monte Carlo and Bellagio, the most significant piece of undeveloped land remaining on the Las Vegas Strip.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**ENTERTAINMENT**\n**From street performers**\n**to Broadway shows,**\n**our entertainment will**\n**evoke the best of New**\n**York or London.**\n**RESIDENTIAL In lofts, brown-**\n**stones and high-rise buildings,**\n**residential options abound to**\n**populate the new city and ener-**\n**gize the surrounding areas.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nW \n**e have been working for some time on con-**\n**ceiving the best use of the 66 acres between**\n**Monte Carlo and Bellagio, the most signifi-**\n\n**cant piece of undeveloped land remaining on the Las**\n**Vegas Strip. We certainly could have come up with a**\n**spectacular casino-hotel. But, the truth is, Las Vegas is**\n**ready for so much more.**\n\n\n\n**PROJECT CITYCENTER**\nInterstate 15 \n\no \ng \nn \nm \na \nl \nF \n**MONTE**\n**CARLO**\ni \n**BELLAGIO**\n**THE**\n**MIRAGE**\n\n**TI**\nLas Vegas Blvd. \n\n**N**\n**MGM GRAND**\n\n\n\na \nn \na \nc \ni \np \no \nr \nT \n**NY/NY**\n\n**THE RESIDENCES**\n**AT MGM GRAND**\n\n**Project CityCenter represents a new era of the**\n\n**urban complex, one that encompasses tourism,**\n**entertainment, gaming, retail and residential elements.**\n**Only MGM MIRAGE has the momentum – financially,**\n**intellectually and professionally – to effectively develop**\n**such a project.**\n\n**The signature building within Project CityCenter**\n\n**As the city eclipses two million residents on its way**\n\n**is the 4,000-room hotel-casino. The internationally**\n**acclaimed architect Cesar Pelli has been commissioned**\n**to design this iconic structure. Pelli’s initial concept**\n**drawing defines a new generation of urban landscape for**\n**the Las Vegas Strip, one which includes gaming at its**\n**economic center but not as an emotional centerpiece.**\n**Project CityCenter will provide the momentum** **to passing three million by the end of the decade, and**\n**with land prices on the Strip soaring, it has become**\n**clear that there is a much better and higher use**\n**for this location. As Las Vegas marks its Centennial,**\n**Project CityCenter stands as a defining moment for**\n**development in this fabled city.**\n\n**for the next era of amazing growth for your company**\n**and Las Vegas.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nn \n\ni \na \nt \nn \nu \no \nM \ng \nn \ni \nr \np \nS", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Gain on sale of North Las Vegas land.................$$ ( 36.776 )
$Siegfried & Roy theatre write - down – The Mirage...
1.408Storm damage – Beau Rivage..............................
7.824Write - off of Detroit development costs....................
4.754Impairment of assets to be disposed of..........473
5.7642.134Demolition costs.........................................................................................................................................................................................7.057
6.614Other net losses on asset sales or disposals......1.135
4.049
\n\n\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002Hotel and other revenue from related parties.......$
416$871$764License fees to entities under common ownership...
( 1.000 )( 1.000 )( 1.000 )Professional fees to directors or firmsaffiliated with directors...........................................( 4.084 )
( 1.551 )( 1.815 )Other related party expenses...........................................( 62 )( 468 )( 224 )
$( 4.730 )$( 2.148 )$( 2.275 )
\n\nIn 2004, there were no material unusual property transactions. In 2003 the \nCompany sold 315 acres of land in North Las Vegas, Nevada near Shadow Creek \nfor approximately $55 million, which resulted in a pretax gain of approximately \n$37 million. Also in 2003, the Company recorded write-downs and impairments of \nassets abandoned or replaced with new construction, primarily at MGM Grand Las \nVegas in preparation for new restaurants and the new theatre. Prior to 2003, the \nCompany classified gains and losses on routine asset sales or disposals as a \nnon-operating item at some resorts and as an operating item at other resorts. \nManagement believes the preferable presentation of these items is as an element of \noperating income. Prior period statements have not been reclassified as such \ntransactions were not material in the prior periods. Until 2003, demolition costs \nwere typically capitalized as part of new construction. The Company began \nexpensing demolition costs on major construction projects as incurred on January 1, \n2003, and is accounting for this change in policy prospectively. Demolition costs \nwere not material in prior periods. Demolition costs in 2004 and 2003 relate \nprimarily to preparation for the Bellagio standard room remodel, Bellagio expansion \nand new theatre at MGM Grand Las Vegas.", - "page_start": 74, - "page_end": 74, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Recently, we opened the SKYLOFTS, a new level of luxury \nfor guests atop MGM Grand Las Vegas. \n\nWe’ll follow the success of these new resort features \nwith a category-defining new nightclub at The Mirage, two \nfabulous restaurants by Joël Robuchon at MGM Grand Las \nVegas and gaming upgrades company-wide. Second, we are \ndoubling down on Las Vegas by merging with Mandalay, \na company we have long admired. The Mandalay merger \nrepresents a tremendous opportunity to build on the mo- \nmentum established by Mike Ensign and his team. And \nthird, we are dreaming of a not-so-distant future, when \n\nProject CityCenter will literally redefine the Las Vegas Strip \nand change the face of Las Vegas forever. \n\nMandalay in Motion \n\nWe are incredibly excited to begin our journey with the \n\ntalented people of Mandalay, as we work to maximize the \nvalue of Mandalay’s instantly recognized brands and world- \nclass resorts. Long a fixture in Las Vegas, Mandalay’s resorts \nwill add to our premium portfolio and allow us to accelerate \nthe pace of our growth. Our hotel people will be able to mar- \nket a wider range of rooms and benefit from a world-class \n\nconvention center. Our casino marketing people will be able \nto offer their customers wonderful new amenities to expand \nour market reach. And our development people will be able \nto maximize the potential of priceless Las Vegas Strip land. \nThe Mandalay merger represents another defining \nmoment for MGM MIRAGE, much like the Mirage Resorts \ntransaction in 2000, at a time when Las Vegas is in a state of \nastounding metamorphosis. No company is better positioned \nto help shape the future of Las Vegas than MGM MIRAGE. \nWe employ more people, invest more money and hold more \nprime real estate than any other company in Las Vegas. The", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
TableTable
Tableof
\n\n**Future Developments**\n**Project CityCenter.**In November 2004, we announced a plan to develop a multi- \nbillion dollar urban metropolis, initially called Project CityCenter, on 66 acres of \nland on the Las Vegas Strip, between Bellagio and Monte Carlo. We anticipate that \nthe first phase of Project CityCenter will include a 4,000-room casino resort, three \n400-room boutique hotels, approximately 550,000 square feet of retail shops, \ndining and entertainment venues, and 1,650 units of luxury condominium, \nhotel/condominium and private residence clubs. \n\nWe expect that the complete design work for Project CityCenter will take 18 \nmonths and that the first phase will open in 2009. The design, budget and schedule \nof Project CityCenter are still preliminary however, and the ultimate timing, cost \nand scope of Project CityCenter are subject to risks attendant to large-scale projects. \n\n**Atlantic City, New Jersey.**We own approximately 130 acres on Renaissance Pointe \nin Atlantic City, New Jersey. In addition, Borgata occupies 29 acres at Renaissance \nPointe, including 27 acres it owns and two acres we lease to Borgata. Of the \nremaining land, approximately 95 acres are suitable for development, and a portion \nof these acres consists of common roads, landscaping and master plan improve- \nments which we designed and developed as required by our agreement with Boyd. \n\nIn October 2002, we announced the suspension of our development activities on our \nwholly-owned project on the Renaissance Pointe land in Atlantic City. We must \napply for and receive numerous governmental permits and satisfy other conditions \nbefore construction of a new resort on the Renaissance Pointe site could begin. No \nassurance can be given that we will develop a casino resort in New Jersey, or its \nultimate schedule, size, configuration or cost if we do develop a casino resort. \n\n**Detroit, Michigan.**MGM Grand Detroit, LLC, in which we hold a controlling \ninterest, has operated an interim casino facility in Detroit, Michigan since July 1999. \nIn August 2002, the Detroit City Council approved revised development agreements \nwith us and two other developers. The revised development agreement released us and \nthe City from certain of the obligations under the original agreement and significantly \nchanged other provisions of the original agreement. We are currently in the process of \nobtaining land and developing plans for the permanent facility. The design, budget \nand schedule of the permanent facility are not finalized, and the ultimate timing, cost \nand scope of the facility are subject to risks attendant to large-scale projects. \n\nThe ability to construct the permanent casino facility is currently subject to resolu- \ntion of the Lac Vieux litigation. The 6th Circuit Court of Appeals has issued an \ninjunction prohibiting the City and the developers from commencing construction \npending further action of the 6th Circuit Court. Therefore, we do not know when \nwe will be able to commence construction of, or complete, the permanent facility.", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "In 2004, there were no material unusual property transactions. In 2003, we sold 315 \nacres of land in North Las Vegas, Nevada near Shadow Creek for approximately \n$55 million, resulting in the $37 million gain reflected above. Prior to 2003, we \nclassified gains and losses on routine assets sales or disposals as a non-operating item at \nsome resorts and as an operating item at other resorts. We believe the preferable pres- \nentation of these items is as an element of operating income. Prior period statements \nhave not been reclassified as such transactions were not material in periods prior to \n2003. Until 2003, demolition costs were typically capitalized as part of new construc- \ntion. We began expensing demolition costs on major construction projects as incurred \non January 1, 2003, and are accounting for this change in policy prospectively. \nDemolition costs were not material in periods prior to 2003. Demolition costs in \n2004 and 2003 related primarily to preparation for the Bellagio standard room \nremodel, Bellagio expansion and new theatre at MGM Grand Las Vegas. Impairments \nof assets to be disposed of in 2003 consisted primarily of assets related to the former \nEFX! show and restaurants closed during 2003 at MGM Grand Las Vegas. \n\nInterest cost was higher in 2004 as we had a higher average borrowing rate due to \nincreases in variable interest rates and the issuance of significant fixed rate debt in \nthe second half of 2004 in anticipation of the Mandalay merger. \n\nCapitalized interest increased in 2004 due to the ongoing Bellagio expansion and \n*KÀ*theatre projects. Capitalized interest in 2005 will include interest capitalized on \nProject CityCenter. Capitalized interest decreased in 2003 due to the suspension of \ndevelopment in Atlantic City in late 2002 and the mid-2003 cessation of interest cap- \nitalization on the Company’s investment in Borgata, which opened on July 3, 2003. \n\nNon-operating items from unconsolidated affiliates, primarily our share of Borgata’s \ninterest expense and state income taxes, increased from $10 million in 2003 to", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "combination of Mandalay’s assets with our financial strength \nand industry-leading financial discipline will yield significant \nreturns for all of our stakeholders. \n\nWe are currently planning the integration of the two \ncompanies, and over time, we expect to realize the full poten- \ntial of cost and revenue synergies. We will report on our \nprogress throughout the coming year. \n\n\n\n(from left to right)**ROBERT C. SELWOOD**Senior Vice President— \nAccounting;**JAMES J. MURREN**President, CFO & Treasurer; \n**BRYAN L. WRIGHT**Senior Vice President — Assistant General \nCounsel & Assistant Secretary;**DANIEL J. D'ARRIGO**Senior Vice \nPresident—Finance \n\n\n \n \n \n \n [html]\n
A City is Idate – Project CityCenter, at the heart of the Las Vega Strip. The Las Vegas Strip has no sense of city now – but wecity? Las Vegas has long beenbelieve it can. The future of Las Vegas is centered around our
capital of the world. The resorts in innovative leaders in the hospitalitygreat resorts and our future development. There are many reasons we believe Project CityCenter is the right project forthe tremendous growth in visitor rates and surging food, beverage,Las Vegas Strip development. We believe there is a social imperative that Las Vegas mature as a city, not just a con -
\n\n\n \n \n \n \n [html]\n
Preat city? Las Vegas has long beenbelieve it can. The future of Las Vegas is centered around ourAge groupgreat resorts and our future development. There are manyThe innovative leaders in the hospitalityreasons we believe Project CityCenter is the right project foriven the tremendous growth in visitorour Las Vegas Strip development. We believe there is a socialncy rates and surging food, beverage,imperative that Las Vegas mature as a city, not just a con -Aming volumes. But there is anotherglomeration of suburbs. A city deserves a center – a centerLongitude and pressuresfor living, working and playing. We want to be an integralby the end of the decade. Las Vegas ispart in defining the Las Vegas of the future.Proportion to the Southwest. Our newcom -And there is a business motivation. Companies in thene lifestyle, weather, cost of living andgaming industry have historically not been valued on par with
\n\n\n\n\n\n\n\n\n\n\n\n\n\n**WILLIAM MCBEATH**President, \nThe Mirage **ROBERT V. MOON**Chairman, \nMGM MIRAGE Marketing **FELIX D. RAPPAPORT**President, \nNew York-New York \n**SCOTT SIBELLA**President, TI", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "**Mandalay Merger**\nOn June 16, 2004, we announced that we had entered into a definitive merger \nagreement with Mandalay Resort Group (“Mandalay”), a publicly traded company, \nunder which we will acquire Mandalay for $71.00 in cash for each share of \ncommon stock of Mandalay. Mandalay owns and operates eleven properties in \nNevada, including Mandalay Bay, Luxor, Excalibur, Circus Circus, and Slots-A-Fun \nin Las Vegas, Circus Circus-Reno in Reno, Colorado Belle and Edgewater in \nLaughlin, Gold Strike and Nevada Landing in Jean, and Railroad Pass in \nHenderson. Mandalay also owns and operates Gold Strike, a hotel/casino in Tunica \nCounty, Mississippi. In addition, Mandalay owns a 50% interest in Silver Legacy in \nReno, a 50% interest in Monte Carlo in Las Vegas, a 50% interest in Grand \nVictoria, a riverboat in Elgin, Illinois, and a 53.5% interest in MotorCity in \nDetroit, Michigan. The total consideration is approximately $8.1 billion, including \nequity value of approximately $4.8 billion, convertible debentures with a redemp- \ntion value of approximately $574 million, the assumption or repayment of other \noutstanding Mandalay debt with a fair value of approximately $2.6 billion as of \nDecember 31, 2004, and $100 million of estimated transaction costs. The transac- \ntion is structured as a merger of one of our wholly-owned subsidiaries with and into \nMandalay. The transaction will be accounted for as a purchase and is anticipated to \nclose during the first quarter of 2005. \n\nWynn Las Vegas will add room capacity to the Las Vegas market, with its 2,700 \nrooms representing a 2% increase in Las Vegas room supply. Wynn Las Vegas will \nalso feature numerous upscale restaurants and generally target customers who might \notherwise choose Bellagio, MGM Grand Las Vegas or The Mirage. We believe there", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "On a consolidated basis, the most important factors and trends contributing to our \noperating performance over the last three years have been: \n\n• The war with Iraq and the outbreak of SARS in Asia, both of which negatively \nimpacted leisure travel and our high-end gaming business in late 2002 and \nearly 2003; \n\n• The new labor contract covering our Las Vegas Strip employees since mid-2002, \nwhich calls for significant annual wage and benefits increases through 2007; \n• The current economic recovery in the United States, which began to impact our \noperations in the latter half of 2003 and continued to positively affect our results \nin 2004.", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
TableTable
ofTable
\n\n**Overall Outlook**\nWe have invested heavily in our existing operations in 2003 and 2004, and expect \nto continue to do so on a targeted basis in 2005. Our Las Vegas Strip resorts require \nongoing capital investment to maintain their competitive advantages. We believe \nthe investments in additional non-gaming amenities we made in 2003 and 2004 \nhave enhanced our ability to generate increased visitor volume and allowed us to \ncharge premium prices for our amenities. \n\nwill be some impact on these resorts from Wynn Las Vegas, but also believe that the \nbreadth of amenities in our portfolio of resorts and our loyalty and other marketing \nprograms will help minimize these competitive pressures. The proximity of Wynn \nLas Vegas to TI and The Mirage, along with pedestrian bridges linking TI with the \nFashion Show Mall and Venetian, will also benefit these resorts. \n\nThe most likely significant factors affecting operating results at our existing resorts \nin 2005 will be the expected continued strength of the leisure and convention travel \nsegments, the expansion of Bellagio and the opening of*KÀ*and other amenities at \nMGM Grand Las Vegas, and new competition from Wynn Las Vegas on the Las \nVegas Strip. Various lodging market observers, such as PricewaterhouseCoopers \nand Smith Travel Research, are forecasting mid-single digit percentage growth in \nREVPAR in 2005, with greater REVPAR gains in full service hotels. Our REVPAR \ngrowth, and REVPAR growth in Las Vegas in general, has outpaced that of the \nnational market, and we expect that trend to continue. \n\nThe Bellagio expansion opened in late 2004 and added over 30% to the resort’s \nroom base. In addition, we added new meeting, retail and dining space and signifi- \ncantly expanded the spa and salon.*KÀ*opened in late November 2004 at MGM \nGrand Las Vegas, which had been without a featured production show for almost \ntwo years. Along with the numerous restaurant and other entertainment additions \nat MGM Grand Las Vegas,*KÀ*will enhance our ability to generate visitor traffic \nand capture a greater share of our guests’ spending.", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]RESULTS OF OPERATIONSAt December 31.2004, out operations consisted of 11 wholly - owned casino resorts and 50 % investments in two other casino resorts, including :Las Vegas, Nevadax Bellagin, MGM Grand Las Vegas, The Mirage, TL, New Yerk - New York, Boardwalk, and Mone Carlo ( 90 % owned ).\n
Key Performance Indicators
As a resort - based company, our speating results are highly dependent on the volume of customers at our resorn, which in num impacts the price we can charge for our hotel rooms and other amenities. We also generate a significant portion of
our operating income from the high - end gaming segment, which can cause variability in our results. Key performance indicators related to revenue are :
Other :The Primm Valley Resorn ( Buffalo Bifls, Primm Valley Resort and Whikey Pretc ) in Primm. Nevada ; Beaa Reage in Biloxi, Mississippi ; MGM Grand Dernit ; Borgana ( 90 % owned ) in Adantic Ciry, New Jeney.▪ Gaming preventa indicators – talks games drop and slot handle ( oxhure indicators ); “ with ” or “ hold ” percentage, which is not fully controllable by as. One normal table games witn percentage is in the range of 18 % to 122 % of table games dro
We operate in one segment, the operation of casino resorts, which includes offering
\n\nMost of our revenue is essentially cash-based, through customers wagering with cash \nor paying for non-gaming services with cash or credit cards. Our resorts, like many \nin the industry, generate significant operating cash flow. Our industry is capital \nintensive and we rely heavily on the ability of our resorts to generate \noperating cash flow to repay debt financing, fund maintenance capital \nexpenditures and provide excess cash for future development. \n\nOur results of operations do not tend to be seasonal in nature, though a variety of \nfactors can affect the results of any interim period, including the timing of major \nLas Vegas conventions, the amount and timing of marketing and special events for \nour high-end customers, and the level of play during major holidays, including New \nYear and Chinese New Year. \n\nWe generate a majority of our net revenues and operating income from our Las \nVegas Strip resorts. In 2004, over 75% of our net revenues and operating income \nwas generated by wholly-owned Las Vegas Strip resorts. We believe that we own the \npremier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to \ncontinually reinvest in these resorts to maintain that competitive advantage. Our \nconcentration on the Las Vegas Strip exposes us to certain risks outside of our \ncontrol, such as competition from other Las Vegas Strip resorts as well as new or \nexpanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005, \nand the impact from potential expansion of gaming in California. This concentra- \ntion also exposes us to risks related to tourism and the general economy, including \nnational and global economic conditions and terrorist attacks or other global events.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_MGM_2004.pdf", - "query": "Which events negatively impacted leisure travel and MCM Mirage high-end gaming business in late 2002 and early 2003 ?", - "target_page": 32, - "target_passage": "The war with Iraq and the outbreak of SARS in Asia, both of which negatively impacted leisure travel and our high-end gaming business in late 2002 and early 2003", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "On a consolidated basis, the most important factors and trends contributing to our \noperating performance over the last three years have been: \n\n• The war with Iraq and the outbreak of SARS in Asia, both of which negatively \nimpacted leisure travel and our high-end gaming business in late 2002 and \nearly 2003; \n\n• The new labor contract covering our Las Vegas Strip employees since mid-2002, \nwhich calls for significant annual wage and benefits increases through 2007; \n• The current economic recovery in the United States, which began to impact our \noperations in the latter half of 2003 and continued to positively affect our results \nin 2004.", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]Goodwill :Indefinite - lived intangible assets :\n
At December 31 ( In thousands )20042003
Mirago acquisition ( 2000 ).................................................................................................................................................................................$ 76.342$ 76.342
MGM Grand Australia acquisition ( 1995 )34.259
Other.7.4157.833
83.757118.434
Detroit development rights................................................................................................................................................................................115.056115.056
Trademarks, license rights and other17.55417.554
132.610132.610
Other intangible assets...................................................................................................................................................................................16.96816.624
$ 233.335$ 267.668
\n\nGoodwill represents the excess of purchase price over fair market value of net assets \nacquired in business combinations. Goodwill related to the Mirage acquisition was \nassigned to Bellagio, The Mirage and TI. Other goodwill relates to the Company’s \n2003 acquisition for $9 million of majority interests in the entities that operate the \nnightclubs Light and Caramel, located in Bellagio, and Mist, located in TI. Changes \nin the recorded balances of goodwill are as follows: \n\n\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )20042003
Balance, beginning of period............................................................................................................................$ 118.434$ 105.504
Currency translation adjustment...........................................................................................................................................................................( 992 )8.433
Goodwill assigned to discontinued operations...............................................( 33.267 )( 3.336 )
Goodwill acquired during the period.........................................................................................................................................................................7.833
Other( 418 )
Balance, end of the period..................................................................................................................................................................................$ 83.757$ 118.434
", - "page_start": 58, - "page_end": 58, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
TableTable
ofTable
\n\n**Overall Outlook**\nWe have invested heavily in our existing operations in 2003 and 2004, and expect \nto continue to do so on a targeted basis in 2005. Our Las Vegas Strip resorts require \nongoing capital investment to maintain their competitive advantages. We believe \nthe investments in additional non-gaming amenities we made in 2003 and 2004 \nhave enhanced our ability to generate increased visitor volume and allowed us to \ncharge premium prices for our amenities. \n\nwill be some impact on these resorts from Wynn Las Vegas, but also believe that the \nbreadth of amenities in our portfolio of resorts and our loyalty and other marketing \nprograms will help minimize these competitive pressures. The proximity of Wynn \nLas Vegas to TI and The Mirage, along with pedestrian bridges linking TI with the \nFashion Show Mall and Venetian, will also benefit these resorts. \n\nThe most likely significant factors affecting operating results at our existing resorts \nin 2005 will be the expected continued strength of the leisure and convention travel \nsegments, the expansion of Bellagio and the opening of*KÀ*and other amenities at \nMGM Grand Las Vegas, and new competition from Wynn Las Vegas on the Las \nVegas Strip. Various lodging market observers, such as PricewaterhouseCoopers \nand Smith Travel Research, are forecasting mid-single digit percentage growth in \nREVPAR in 2005, with greater REVPAR gains in full service hotels. Our REVPAR \ngrowth, and REVPAR growth in Las Vegas in general, has outpaced that of the \nnational market, and we expect that trend to continue. \n\nThe Bellagio expansion opened in late 2004 and added over 30% to the resort’s \nroom base. In addition, we added new meeting, retail and dining space and signifi- \ncantly expanded the spa and salon.*KÀ*opened in late November 2004 at MGM \nGrand Las Vegas, which had been without a featured production show for almost \ntwo years. Along with the numerous restaurant and other entertainment additions \nat MGM Grand Las Vegas,*KÀ*will enhance our ability to generate visitor traffic \nand capture a greater share of our guests’ spending.", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Contract termination costs...................................................$3.693$
4.049$3.257Reversal of certain September 11 charges......
( 10.421 )Siegthied & Roy show closure – The Mirage.....
1.623Reversal of 2000 contract termination costs...
( 9.857 )Other...................................................................................................................................................................................................
1.932925
\n\nSlot revenues increased substantially in both 2003 and 2004. Improvements were \nthe result of strong customer visitation, enhanced marketing programs, the impact \nof our Players Club rewards program, and the implementation of cashless gaming \ntechnology in 2003. Slot win percentages were consistent among all three periods. \n\nNon-casino revenue increased in 2004 primarily due to the enhanced amenities at \nour resorts. In addition, we were able to increase the pricing for our rooms and \nother non-gaming amenities. Our hotel results began to improve notably in the \nlatter half of 2003, particularly at our Las Vegas Strip resorts. For the year ended \nDecember 31, 2004 REVPAR at our Las Vegas Strip resorts was $141 compared to \n$126 in 2003, an increase of 12%. Company-wide REVPAR was $121, an increase \nof 10% over 2003. This increase was largely rate driven, as occupancy increased \nfrom 91% to 92% and ADR increased from $121 to $132. In 2003, company-wide \nREVPAR increased 6% from $104 to $110, with most of the gains coming in the \nsecond half of the year. \n\n\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Bellagio expansion.......................................................................................................................................................................................$ 3.805$
$MA......................................................................................................................................................................................................3.655
Borgata
19.3267.757New York - New York ( Zumanity, Nine Fine Irishmen )
4.310Players Club.............................................................................................................................................................................................
3.0515.117Other...................................................................................................................................................................................................2.816
2.5791.267$ 10.276
", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
At December 31 ( In thousands )20042003
Victoria Partners – Monte Carlo ( 50 %)$424.683
$ 420.853Marina District Development Company – Borgata ( 50 %)......405.322
335.159MGM Grand Newcastle ( Holdings ) Ltd. ( 50 %)9.633
MGM Grand Paradise Limited – Macau ( 50 %).3.002
\n\n\n \n \n \n \n [html]\n
At December 31 ( In thousands )20042003
Casino$174.713
$ 159.569Hotel61.084
36.376Other28.114
22.617263.911
218.562Less : Allowance for doubtful accounts( 59.760 )
( 79.087 )
\n\n\n \n \n \n \n [html]\n
At December 31 ( In thousands )20042003
Land....................................................................................................................................................................................................$ 4.089.106$
4.103.693Buildings, building improvements and land improvements.........4.228.138
3.798.143Equipment, furniture, fixtures and leasehold improvements...........2.235.766
1.960.094Construction in progress..................................................................................................................................................................................299.148
465.47110.852.158
10.327.401Less : Accumulated depreciation and amortization................................( 1.938.016 )
( 1.646.062 )$ 8.914.142
\n\nThe Company’s investments in Monte Carlo and Borgata were recorded at their \nestimated fair value at the date of the Mirage Acquisition, which value exceeded the \nCompany’s share of the net assets of the unconsolidated affiliates by approximately \n$361 million. Substantially all of this difference relates to the excess of the fair value \nof land owned by the affiliates over its pre-existing carrying value. The investment \nbalance also includes interest capitalized on the Borgata investment, which is being \namortized over 40 years.", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "o some, momentum is intangible – a product of fortune, a power that cannot be harnessed, and typically \na short-lived sensation. Others wonder how they lost their momentum. At MGM MIRAGE, we are con- \nstantly thinking of better ways to maximize it. We believe momentum is a product of effort and excellence, \n\nT \n\na force which can be observed and measured, and something that can be a lasting and defining quality of a great \ncompany. Our 2004 results are a clear reminder of the power of moving forward. Our financial policies have long \nbeen designed to create and maintain momentum. By investing in our best assets and thinking of new ways to add \nvalue to our shareholders, we are able to redefine our Company’s place in history every year – and 2004 was a defin- \ning time even by our exacting standards. \n\nSo how did we get here? Last year, we discussed the importance of focus, and the laser-like precision with which \n\nwe operated our resorts in 2004 affirms the power of our single-minded dedication to excellence. The hard work of \nour 40,000 employees resulted in a record year in almost every regard. Net revenues increased 10% over 2003 to a \nrecord $4.2 billion, with 12% REVPAR growth at our Las Vegas resorts; property-level EBITDA was an all-time \nrecord, nearly $1.5 billion, and 23% higher than the prior year. We exceeded the expectations of every market \nobserver, and significantly beat our forecasts. And 2004 will not be a zenith year for your company – rather, we \nexpect to continue our excellent operating performance, re-invest the resulting cash flow to stimulate future growth \nand move forward to new defining moments. \n\n\n\nHow do we re-define a company that is already at the top of its industry? First, we continue to execute on our \n\nvision for our existing resorts – to continually evolve and increase the “Wow!” factor for our guests. This strategy \nrequires investment, and we will ensure that our resorts are not only world-class, but best-in-class. Examples include \nthe beautiful Spa Tower at Bellagio and*KÀ*, the latest spectacular creation in collaboration with Cirque du Soleil. \n\n**JAMES J. MURREN**President, CFO & Treasurer \n\n\n\n\n\n\n\n\n\n\n\n**GLENN BONNER**Senior VP & CIO, \nMGM MIRAGE Information Systems **GEORGE R. BOYER III**President, \nMGM Grand Detroit **JOSEPH BRUNINI**President, \nMGM Grand Resorts National Marketing \n**JEFF DAHL**President, Beau Rivage", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Year Ended December 312004% Change2003% Change2002
Casino revenues, net :
Table games..............943.3439 %$866.096( 3 %)
$893.836Slots....................................1.218.5899 %1.115.029
5 %1.064.491Other................................62.03310 %56.389
3 %54.513Casino revenues, net...2.223.9659 %2.037.514
1 %
2.012.840Non - casino revenue :Rooms..............................911.2599 %833.272
5 %796.861Food and beverage....841.14711 %757.278
7 %
706.153Entertainment, retailand other..............696.1177 %647.702
2 %637.625Non - casino revenues...2.448.5239 %2.238.252
5 %2.140.6394.672.4889 %4.275.766
3 %4.153.479Less : Promotional allowances( 434.384 )5 %( 413.023 )
4 %( 396.551 )$ 4.238.10410 %$ 3.862.743
\n\n• The ongoing capital investments in upscale amenities at our resorts, which we \n\nbelieve is allowing us to market more effectively to visitors, capture a greater share \nof these visitors’ increased travel budgets, and generate premium pricing for our \nresorts’ rooms and other amenities. \n\nAs a result of the above trends, our net revenues increased 10% in 2004, while \nincreasing only 3% in 2003. Net revenues at MGM Grand Las Vegas increased \n14% in 2004, due to the addition of several new restaurants, bars and other \namenities, and in spite of fewer rooms in service due to room remodel activity. \nNet revenues at New York-New York increased 26% as the resort continues to \nbenefit from*Zumanity*and Nine Fine Irishmen, both of which opened in summer \n2003. Net revenues at The Mirage decreased 2% as the resort was without the \nSiegfried & Roy show and the buffet was closed for a portion of the year while \nCravings was constructed. \n\nOur operating income in 2004 increased 36%, due primarily to the strong revenue \ntrends and a full year of Borgata’s results. The increase in income from unconsoli- \ndated affiliates is responsible for approximately one-third of the increase in \noperating income, while improvements at our operating resorts, particularly \nBellagio, MGM Grand Las Vegas and New York-New York, make up the rest of the \nincrease. Operating income at MGM Grand Detroit was essentially flat year-over- \nyear, despite an increase in the gaming tax rate from 18% to 24% effective \nSeptember 2004. Several other factors largely offset: Higher corporate expense due \nto increased development costs; lower bad debt expense due to improved collec- \ntions; lower preopening expenses due to Borgata preopening expenses in 2003; and \nhigher property transactions, net due to a $37 million gain on sale of land in 2003.", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "S E T T I N G T H E F U T U R E I N M O T I O N \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nW \n\n**hile the international opportunities for growth remain to be fully defined,**\n**in 2004 MGM MIRAGE entered into a joint venture agreement with**\n**Pansy Ho Chiu-king to develop, build and operate a major hotel-casino**\n**resort in Macau S.A.R. No other international market has shown its ability to sustain**\n**improved growth even as the government takes important steps to modernize its regu-**\n**latory structure. We have methodically moved through the regulatory process and look**\n**forward to initiating construction in 2005 and opening in 2007.**\n\n**We continue to monitor and pursue opportunities as they arise in the United**\n**Kingdom. The bill modernizing British gaming law has moved steadily through the**\n**legislative process throughout the year. Several key issues are yet to be resolved, but we**\n**remain hopeful that Great Britain will become one of the world’s leading jurisdictions**\n**with significant growth opportunities for decades to come.**\n\n**We are also excited about the emergence of possible new jurisdictions in the Far**\n**East. We plan to pursue additional development opportunities as they become avail-**\n**able, as we believe that the Far East holds considerable promise as a growing gaming market.**\n\n\n\n\n\n\n\n\n\n\n\n**THE RESIDENCES**\n**AT MGM GRAND Our joint**\n**venture with Turnberry Associates**\n**to build luxury condo/hotels ignited**\n**a flurry of development in Las Vegas.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**MGM GRAND MACAU Our joint venture has secured**\n**a prime location to develop and construct an exciting**\n**addition to this dynamic gaming destination.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n**Domestically, we are selectively expanding our presence as well, moving into mar-**\n\n**kets and business lines where our superior brands and assets can provide the best**\n**returns. In Las Vegas we will maximize the use of our vast land holdings, beginning**\n**with The Residences at MGM Grand. This unique venture is a breakthrough combina-**\n**tion of a hotel and condominiums – the first of its kind in Las Vegas. In Atlantic City, we**\n**own an exceptional site for future development. The already successful Borgata is pre-**\n**pared to grow bigger and better. Expansion plans include more casino space, a new hotel**\n**tower, more restaurants, retail outlets and an expanded spa.**", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "[html]ConsclidatedStatementsofIncomeYear Ended December 31 ( In thousands, except per share amounts )200420032002RevenuesCasino$2.223.965$2.037.514$2.012.840Rooms911.259833.272796.861Food and beverage841.147757.278706.153Entertainment270.799255.995251.488Retail184.438180.935170.537Other240.880210.772215.600, 672.4884.275.7664.153.479Less : Promotional allowances( 434.384 )( 413.023 )( 396.551 ), 238.1043.862.7433.756.928ExpensesCasino1.106.1421.040.9481.007.968Rooms247.387234.693211.401Food and beverage482.417436.754393.166Entertainment192.390183.012181.403Retail118.413115.123108.325Other146.146130.698114.431Provision for doubtful accounts( 3.629 )12.57027.675General and administrative.612.615583.599560.909Corporate expense77.91061.54143.856Preopering and start - up expenses10.27629.26614.141Restructuring costs ( credit )5.6256.59717.021Property transactions, net8.66518.94114.712Depreciation and amortization402.545400.766381.7853.406.9023.216.6263.042.751Income from unconsolidated affiliates119.65853.612_32.361Operating income950.860699.729746.538Non - operating income ( expense )Interest income5.664. 4.0784.071Interest experrse, net( 378.386 )( 337.586 )( 283.736 )Non - operating items from unconsolidated affiliates.( 12.298 )( 10.401 )( 1.335 )Other, net( 10.025 )( 12.160 ). 7.611 )( 395.045 )( 356.069 )288.611Income from continuing operations before income taxes555.815343.660457.927Provision for income taxes( 205.959 )( 113.387 )168.451Income from continuing operations349.856230.273289.476Discontinued operationsIncome from discontinued operations, including gain( koss ) on disposal of $ 82.538 ( 2004 ) and $( 6.735 ) ( 2003 )94.20716.0757.883Provision for income taxes( 31.731 )( 2.651 )( 4.924 )62.47613.4242.959Net income412.332$243.697$292.435Basic income per share of common stockIncome from continuing operations$2.51$1.55$1.83Discontinued operations0.440.09. 0.02Net income per", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "But the bricks and mortar tell only part of the story \nof this transaction. At the heart of Mandalay is its people. \nMandalay employees at all levels are energetic and talented \nand will be a tremendous asset to us. Together, we will become \na family in excess of 70,000 people committed to delivering \nthe best possible experiences for our guests. The transaction \nalso will create unparalleled opportunities for our entire family \nof employees. \n\nIn short, this groundbreaking transaction creates \n\nunstoppable momentum for all stakeholders in the \nMGM MIRAGE family. \n\nDefining Momentum in our Properties \n\nIn 2004, your company invested over $690 million of \ncapital in the creation of new restaurants, clubs, shows and \nnightspots as well as the development of strategic enhance- \nments to existing amenities. These investments generated \nexceptional returns in a time when competition for the \nentertainment dollar has never been higher. \n\nDefining Momentum for Our Industry \n\nThe gaming industry in America is maturing, and \ninternational expansion, while exciting in select markets, \nremains challenging. As a result, your company has \npursued a growth strategy that calls for maximizing the \nassets we currently own and seeking prudent development \nopportunities and strategic acquisitions. \n\nUpon completion of our merger with Mandalay, \nMGM MIRAGE will be the world’s leading gaming and \nleisure company. The combination will result in a well- \ncapitalized company uniquely situated to invest in its \ncurrent portfolio in addition to creating new projects \nin the United States and around the world. \nWe believe this is an outstanding \n\ntransaction for the shareholders of \nboth companies. With this \nacquisition, we will own, \noperate and have investments \nin 28 properties throughout Nevada, Mississippi, \nIllinois, Michigan, and New Jersey. \n\nThe combined company will have an asset portfolio \nwhich includes some of the most widely recognized brand \nnames in the world. These properties cater to a broad \ncustomer base, ranging from value-oriented to the ultra- \nhigh end. Each resort provides a unique customer experience \nthrough its specific personality and combination of amenities. \n\n\n\n**FIX**BELLAGIO Classic \nAmerican fare using the \nfreshest fish, meat, and \npoultry cooked to order on \na wood-burning grill. Costa \nRican Padouk wood inspires \na warm environment in a \nunique, vibrant design. \n\nE \nR \nA \nH \nS \n**2 0 0 4** $2.85 \n\nR \nE \nP $1.61 **2 0 0 3**\n\nS \nG \nN \n**2 0 0 2**\nI \n\nN \nR \nA \nE 0 \n5 0 \n0 0 \n5 0 \n0 0 \n5 0 \n0 0 \n0 \n. . . . . . . \n0 \n$ 1 \n$ 1 \n$ 2 \n$ 2 \n$ 3 \n$ 0 \n$ \n\n\n\nWe also will have at Mandalay Bay the fifth largest \nconvention center in the United States, providing the com- \npany with a great resource to further develop the business \ntravel and convention market.", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "00-80T-80.pdf", - "query": "What possess all naval aviators ?", - "target_page": 5, - "target_passage": "All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "PREFACE \n\n\n\n\n\n\n\n\n\n\n\nThe purpose of this textbook is to present the elements of applied \nto \naerodynamics and aeronautical engineering which relate directly \nthe problems of flying operations. All Naval Aviators possess a natural \ninterest in the basic aerodynamic factors which affect the performance \nof all aircraft. Due .to the increasing complexity of modern aircraft, \nthis natural interest must be applied to develop a sound understanding \nof basic engineering principles and an appreciation of some of the more \nadvanced problems of aerodynamics and engineering. The safety and \neffectiveness of flying operations will depend greatly on the under- \nstanding and appreciation of how and why an airplane flies. The \nprinciples of aerodynamics will provide the foundations for developing \nexacting and precise flying techniques and operational procedures. \n\nThe content of this textbook has been arranged to provide as com- \nplete as possible a reference for all phases of flying in Naval Aviation. \nHence, the text material is applicable to the problems of flight train- \ntraining, and general flying operations. The manner \ning, transition \nof presentation throughout \nthe text has been designed to provide the \nelements of both theory and application and will allow either directed \nor unassisted study. As a result, the text material’will be applicable \nto supplement formal class Iectures and briefings and provide reading \nmaterial as a background for training and flying operations. \n\n\n\n\n\n\n\n\n\nMuch of the specialized mathematical detail of aerodynamics has \nbeen omitted wherever it was considered unnecessary in the field of \nflying operations. Also, many of the basic assumptions and limita- \ntions of certain parts of aerodynamic theory have been omitted for the \nIn order to contend with \nsake of simplicity and clarity of presentation. \nthese specific shortcomings, the Naval Aviator should rely on the \nassistance of certain specially qualified individuals within Naval Avia- \ntion. For example, graduate aeronautical engineers, graduates of the \nTest Pilot Training School at the Naval Air Test Center, graduates of \nthe Naval Aviation Safety Officers Course, and technical representatives \nof the manufacturers are qualified to assist in interpreting and applying \nthe more difficult parts of aerodynamics and aeronautical engineering. \nTo be sure, the specialized qualifications of these individuals should \nbe utilized wherever possible. \n\niii", - "page_start": 4, - "page_end": 4, - "source_file": "00-80T-80.pdf" - }, - { - "text": "The majority of aircraft accidents are due to some type of error of \nthe pilot. This fact has been true in the past and, unfortunately, most \nprobably will be true in the future. Each Naval Aviator should strive \nto arm himself with knowledge, training, and exacting, professional \nattitudes and techniques. The fundamentals of aerodynamics as pre- \nsented in this text will provide the knowledge and background for \nsafe and effective flying operations. The flight handbooks for the air- \ncraft will provide the particular techniques, procedures, and operating \ndata which are necessary for each aircraft. Diligent study and continu- \nous training are necessary to develop the professional skills and tech- \nniques for successful flying operations. \n\nThe author takes this opportunity to express appreciation to those \nwho have assisted in the preparation of the manuscript. \nIn particular, \nthe por- \nthanks are due to Mr. J. E. Fairchild for his assistance with \ntions dealing with helicopter aerodynamics and roll coupling phenom- \nena. Also, thanks are due to Mr. J. F. Detwiler and Mr. E. Dimitruk \nfor their review of the text material. \n\nHUGH HARRISON HURT, Jr. \n\n\n\nAugust 1959 \nUniversity of Southern California \nLos Angelesj Cnlif.", - "page_start": 5, - "page_end": 5, - "source_file": "00-80T-80.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Two types of stability are important in the \n(1) angle of attack stability and (2) \nrotor: \nvelocity stability. \nthe \nrelative wind velocity, angle of attack, and \nlift on each blade of the rotor is the same. If \nthe rotor is displaced through some angle, no \nchanges in forces result. Therefore, the rotor \nhas neutral angle of attack stability when \nhovering. However, \nflight, an \nin \nincrease in rotor angle of attack increases the \nlift on the advancing blade more than on the \n\nIn hovering flight \n\nforward \n\n323", - "page_start": 340, - "page_end": 340, - "source_file": "00-80T-80.pdf" - }, - { - "text": "For each mission type of aircraft \n\nthere is \na probable spectrum of loads which the air- \ncraft will encounter. That is, various loads \nwill be encountered with a frequency particular \nto the mission profile. The fighter or attack \ntype of aircraft usually experiences a pre- \ndominance of maneuver loads while the trans- \nport or patrol type usually encounters a pre- \ndominance of gust loads. Since fatigue damage", - "page_start": 345, - "page_end": 345, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS O&ROT-SO \nAPPLICATION OF AERODYNAMICS \nTO SPECIFIC PROBLEMS OF FLYl.NG \n\ninvitation \ntrouble of many sorts. The \nnormal and emergency procedures applicable \nto each specific airplane will \ninsure the \nproper operation of the equipment. \n\nfor \n\nThe performance of \neach specific airplane defines its application to \nvarious uses and missions. The handbook \noperating data must be available at all times \nto properly plan and elnccate the flight of an \naircraft. Constant reference to the operating \ninsure safe and effective operation \ndata will \nof the airplane. \n\n(5) Operating Data. \n\nThe operation of \nthe airplane and powerplant must be conducted \nFailure \nwithin \nto do so will \ninvite failure or malfunction of \nthe equipment and increase the operating cost \nor possibly cause an accident. \n\n(3) Operating Limitatiom. \n\nthe established limitations. \n\nGreat time and effort are expended in the 1 \n\npreparation of the flight handbook to provide \nthe most exact information, data, and pro- \ncedures. Diligent study and continuous UC \nof the flight handbook will ensure that the \nthe \ngreatest effectiveness is achieved from \nairplane while still operating within \nthe \ninherent capabilities of the design. (4) Flight Characteristics. While all aircraft \nwill have certain minimum requirements for \nflying qualities, the actual peculiarities and \nspecial features of specific airplanes will differ. \nThese particular flight characteristics must be \nwell known and understood by the pilot.", - "page_start": 429, - "page_end": 429, - "source_file": "00-80T-80.pdf" - }, - { - "text": "IN THE NOR- \nMAL AND REVERSED REGIONS OF COM- \nMAND. The majority of all airplane flight is \nconducted in the region of normal command, \n\nFEATURES OF FLIGHT", - "page_start": 370, - "page_end": 370, - "source_file": "00-80T-80.pdf" - }, - { - "text": "As in the airplane, there is one angle of \nattack or blade pitch condition that will result \nthe most efficient operation. Unfortu- \nin \nnately, the typical helicopter rotor operates \nat a near constant RPM and thus a constant \ntrue airspeed and cannot operate at this most \neficient condition over a wide range of altitude \nand gross weight as the fixed-wing airplane. \nThe airplane is able to maintain an efficient \nangle of attack at various altitudes, and gross \nweights by flying at various airspeeds but the \nhelicopter will operate with a near constant \nrotor velocity and vary blade angle to contend \nwith variations in altitude and gross weight.", - "page_start": 417, - "page_end": 417, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Chapter 5 \n\nOPERATING STRENGTH \nLIMITATIONS \n\n\n\n\n\n\n\n\n\nThe weight of the structural components of \nan aircraft is an extremely important factor in \nthe development of an efficient aircraft con- \nIn no other field of mechanical \nfiguration. \ndesign is \nthere such necessary importance \nassigned to structural weight. The efficient \naircraft and powerplant structure is the zenith \nof highly reined rknimum weight design. \nin order to obtain the required service life from \nhis aircraft, \nthe Naval Aviator must undet- \nstand, appreciate, and observe the operating \nstrength limitations. \nFailure to do so will \nincur excessive maintenance costs and a high \nincidence of failure during the service life of \nan aircraft. \n\n325", - "page_start": 342, - "page_end": 342, - "source_file": "00-80T-80.pdf" - }, - { - "text": "LIFT \nFORCES IN THE \n\nAUTOROTATION REGION \n\nFORCES IN THE \nPROPELLER REGION \nLIFT \nI \n\nI \nt \n\n\n\n’ \\ \n\n\n\nDRAG \n\n\n\nVELOCITi DUE TO \nROTe;TION \n\n\n\n\n\nFLIGHT 1 \n\nI DIRECTION \n\n\n\n\n\nUTOROTATION \n\n\n\n\nFORWARD FLIGHT \nAUTQRQTa-i\\QN \n\nVERTICAL AUTOROTATION \n\nFigure 6.17. Rotor Autorotation Flaw Conditions", - "page_start": 423, - "page_end": 423, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "00-80T-80.pdf", - "query": "What is the static pressure of the aire at standard sea level ?", - "target_page": 20, - "target_passage": "At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "the proportion of the ambient air temperature \nand the standard sea level air temperature. \nThis temperature ratio is assigned the short- \nhand notation of 0 (theta). \nTemperature ratio \n\npercent water vapor, argon, carbon dioxide, \netc. For the majority of all aerodynamic con- \nis considered as a uniform \nsiderations air \nmixture of these gases. The usual quantities \nused to define the properties of an air mass are \nas follows: \n\nAmbient air temperature \n=Standard sea level air temperature \n\nSTATIC PRESSURE. The absolute static \npressure of the air is a property of primary \nimportance. The static pressure of the air \nat any altitude results from the mass of air \nsupported above that level. At standard sea \nlevel conditions the static pressure of the air \nis 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) \nand at 40,000 feet altitude this static pressure \ndecreases to approximately 19 percent of the \nsea level value. The shorthand notation for \nthe ambient static pressure is “p” \nand the \nstandard sea level static pressure is given the \nsubscript “a” \nfor zero altitude, pa. A more \nusual reference in aerodynamics and perform- \nance is the proportion of the ambient sta~tic \npressure and the standard sea level static \npressure. This static pressure ratio is assigned \nthe shorthand notation of 8 (delta). \n\n@=TITtl \n,+273 \n\n288 \n\nMany items of compressibility effects and jet \nengine performance involve consideration of \nthe temperature ratio. \n\n\n\n\n\n\n\ndensity ratio= \n\n\n\nDENSITY. The density of the air is a prop- \nerty of greatest importance in the study of \naerodynamics. The density of air is simply \nthe mass of air per~cubic foot of volume and \nis a direct measure of the quantity of matter \nin each cubic foot of air. Air at standard sea \nlcvcl conditions weighs 0.0765 pounds per cubic \nfoot and has a density of 0.002378 slugs per \ncubic foot. At an altitude of 40,000 feet the \nair density is approximately 25 percent of the \nsea level value. \n\nThe shorthand notation used for air density \nis p (rho) and the standard sea level air density \nis then pO. In many parts of aerodynamics it \nis very convenient to consider the proportion \nof the ambient air density and standard sea \nlevel air density. This density ratio is assigned \nthe shorthand notation of c (sigma). \n\nambient air density \nstandard sea level air density \n\na = PIP0 \n\nA general gas law defines the relationship of \npressure temperature, and density when there \nis no change of state or heat transfer. Simply \nstated this would be “density varies directly \nwith pressure, inversely with \ntemperature.” \nUsing the properties previously defined, \n\n\ndensity ratio= \nPressure rat’o. \ntemperature rat10 \n\n\n\nAltitude pressure ratio \n\nAmbient static pressure \n=Standard sea level static pressure \n\n6 = PIP0 \n\nMany items of gas turbine engine perform- \nance are directly related to some parameter \nthe altitude pressure ratio. \ninvolving \nTEMPERATURE. The absolute tempera- \ncure of the air is another important property. \nThe ordinary temperature measurement by the \nCentigrade scale has a/datum at the freezing \npoint of water but absolute zero temperature \nis obtained at a temperature of -273“ Centi- \ngrade. Thus, the standard sea level tcmpera- \nture of 15” C. is an absolute temperature of \n288”. This scale of absolute temperature using \nthe Centigrade increments is the Kelvin scale, \nfor the \ne.g., o K. The shorthand notation \nambient air temperature is “T” \nand the stand- \nard sea level air temperature of 288’ K. is \nsignified by Ta. The more usual reference is, \n\n2", - "page_start": 19, - "page_end": 19, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Thus, certain corrections must apply to the \ninstrumentation as well as the aircraft per- \nformance if the operating conditions do not \nfit the standard atmosphere. In order to prop- \nerly account for the nonstandard atmosphere \ncertain terms must be defined. Pressure .&itudc \nthe standard atmosphere \nis the altitude \ncorresponditrg to a particular pressure. The \nis essentially a sensitive \naircraft altimeter \nbarometer calibrated to \nin \nindicate altitude \nIf the altimeter is \nthe staotlard atmosphere. \nset for 29.92 in. Hg the altitude indicated is \nthe pressure altitude-the altitude in the stand- \nard atmosphere corresponding to the sensed \npressure. Of course, this indicated pressure \naltitude may not be the actual height above \nsea level due to variations \nin remperature, \nlapse rate; atniospheric pressure, and possible \nerrors in the sensed pressure. \n\nThis \nin \nrelationship has great application \naerodynamics and is quite fundamental and \nnecessary in certain parts of airplane perform- \nance. \n\nVISCOSITY. The viscosity of the air is \nin scale and friction effects. The \n\nimportant \ncoefficient of absolute viscosity is the propor- \ntion between the shearing stress and velocity \ngradient for a fluid flow. The viscosity of \ngases is unusual in that the viscosity is gen- \nerally a function of temperature alone and an \nincrease in temperature increases the viscosity. \nThe coefficient of absolute viscosity is assigned \nthe shorthand notation I, (mu). Since many \nparts of aerodynamics involve consideration of \nviscosity and density, a more usual form of \nviscosity measure is the proportion of the co- \nefficient of absolute viscosity and density. \nThis combination \nis termed the “kinematic \nviscosity” and is noted by Y (nu). \n\n\n\nkinematic viscosity \n\ncc coefficient of absolute viscosity \ndensity \n\nv=PlP \n\n\n\n\n\n\nfactors requiring con- \n\n\n\n\n\n\n\nThe more appropriate term for correlating \naerodynamic performance in the nonstandard \natmosphere is density &it&-the \naltitude in \nthe standard atmosphere corresponding to a \nparticular value of air density. The computa- \ntion of density altitude must certainly involve \nconsideration of pressure (pressure altitude) \nand temperature. Figure 1.6 illustrates \nthe \nmanner in which pressure altitude and tem- \nperature combine to produce a certain density \naltitude. This chart is quite standard in use \nand is usually included in the performance \nsection of the flight handbook. Many subject \nareas of aerodynamics and aircraft performance \nwill emphasize density altitude and temperature \nas the most important \nsideration. \n\nThe kinematic viscosity of air at standard sea \nlevel conditions is 0.0001576 square feet per \nsecond. At an altitude of 40,000 feet the \nkinematic viscosity is increased to 0.0005059 \nsquare foot per second. \n\nIn order to provide a common denominator \nfor comparison of various aircraft, a standard \natmosphere has been adopted. The standard \natmosphere actually represents the mean or \naverage properties of the atmosphere. Figure \n1.1 illustrates the variation of the most im- \nportant properties of the air throughout \nthe \nstandard atmosphere. Notice that the lapse \nrate is constant in the troposphere and the \nstratosphere begins with the isothermal region. \nSince all aircraft performance is compared \nand,evaluated in the environment of the stand- \nard atmosphere, all of the aircraft instrumenta- \ntion is calibrated for the standard atmosphere. \n\nBERNOULLI’S PRINCIPLE AND SUBSONIC \n\nAIRFLOW \n\nAll of the external aerodynamic forces on a \nsurface are the result of air pressure or air fric- \ntion. Friction effects are generally confined to \na thin layer of air in the immediate vicinity of \nthe surface and friction forces are not the pre- \ndominating aerodynamic forces. Therefore,", - "page_start": 21, - "page_end": 21, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801-80 \nBASIC AERODYNAMICS \n\nTABLE l-l. Effect of Speed and Altitvde on Dwzmnic Prerrure \n\n\n\n\n\n\n\n\n \n \n \n \n [html]Velocity ( knots )True air speed ( ft./ sec.)Dynamic pressurt, 4, psf\n
Sea level10.000fr.20.000fr.30.000ft.40.000ft.
F =1.0000.73850.53280.37410.2462 )
10016935.925.018.112.78.4
100338135.6100.272.340.733.4
30050730522516311475.0
400676542400299203133
900845847625453317208
6001.013l, 221902651457300
\n\n\n\n\n\n\n\nIf the potential energy is represented by the \nstatic pressure, p, the sum of the potential and \nkinetic energy is the total pressure of the air- \nstream. \n\nH=p+% P V’ \n\nwhere H=total pressure, psf (sometimes re- \n\nferred to as “head ’ pressure) \n\np=static pressure, psf. \np=density, siugs per cu. ft. \nV= velocity, ft./set. \n\nThis equation is the Bernoulli equation for \n‘incompressible flow. \nto ap- \nIt \npreciate that the term >$pV2 has the units of \npressure, psf. This term is one of the most \nimportant in all aerodynamics and appears so \nfrequently t&it \nis given the name “dynamic \npressure” and the shorthand notation “4”. \n\nis important \n\nq= dynamic pressure, psf \n\n= jgpv2 \n\nWith this definition it could be said that the \nsum of static and dynamic pressure in the flow \ntube remains constant. \n\n\n\n\n\n\n\n\n\n\n\n\n\nFigure 1.3 illustrates the variation of static, \nflowing \ndynamic, and total pressure of air \nthe total \nthrough a closed tube. Note that \npressure is con,stant throughout \nthe length \nand any change in dynamic pressure produces \nthe same magnitude change in static pressure. \nThe dynamic pressure of a free airstream is \nthe one ‘common denominator of all aero- \ndynamic forces and moments. Dynamic pres- \nsure represents the kinetic energy of the free \nairstream and is a factor relating the capability \nfor producing changes in static pressure on a \nsurface. As defined, the dynamic, pressure \nvaries directly as the density and the square of \nthe velocity. Typical values of dynamic pres- \nsure, 4, are shown in table l-1 for various true \nairspeeds in the standard atmosphere. Notice \nthat the dynamic pressure at some fixed veloc- \nity varies directly with the density ratio at any \naltitude. Also, appreciate the fact that at an \naltitude of 40,oM) feet (where the density ratio, \nb, is 0.2462) it is necessary to have a true air \ntwice that at sea level in order to \nvelocity \nproduct the same dynamic pressure.", - "page_start": 26, - "page_end": 26, - "source_file": "00-80T-80.pdf" - }, - { - "text": "AFT STAGNATION \nPOINT \n\n\n\n\n\nAIRSTREAM AHEAD \nHAS AMBIENT STATIC \nPRESSURE AND DYNAMIC \nPRESSURE \nSTAGNATION PRESSURE \nIS AIRSTREAM TOTAL \nPRESSURE \n\nP+q \n\nFtgure 1.4. Flow Pattern on a Symmetrical Object \n\n\n\n\n\n\n\n\n\n\n\n\n\npressure, q. The pressure gauge is then cali- \nbrated to indicate flight speed in the standard \nsea level air mass. For example, a dynamic \npressure of 305 psf would be realized at a sea \nlevel flight ,speed of 300 knots. \n\nsurface anflow continues to the aft stagnation \npoint where the local velocity is again zero. \nThe important point of this example of aero- \ndynamic flow is existence of the stagnation \npoint. The change in airflow static pressure \nwhich takes place at the stagnation point IS \nequal to the free stream dynamic pressure, q. \nThe measurement of free stream dynamic \npressure is fundamental to the indication of \nIn fact, airspeed indicators are sim- \nairspeed. \nply pressure gauges which measure dynamic \npressure related to various airspeeds. Typical \nin \nairspeed measuring systems are illustrated \nfigure 1.5. The pitot head has no internal \nflow velocity and the pressure in the pitot tube \nis equal to the total pressure of the airstream. \nThe purpose of the static-ports is to sense the \ntrue static pressure of the free airstream. The \ntotal pressure and static pressure lines are \nattached to a differential pressure gauge and \nis the dynamic \nthe net pressure indicated \n\nthere can be many conditions of \nflight where the airspeed indicator does not \ntruly reflect the actual velocity through \nthe \nair mass. The corrections that must be applied \nare many and lisred in sequence below: \n(1) The indicated airspeed (IAS) \n\nActually \n\nis the \nactual instrument indication for some given \nflight condition. Factors such as an altitude \nother than standard sea level, errors of the \ninstrument and errors due to the installation, \ncompressibility, etc. may create great vari- \nance between this instrument indication and \nthe actual flight speed. \n\n(2) The calibrated airspeed (CM)", - "page_start": 27, - "page_end": 27, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-SOT-80 \nBASIC AERODYNAMICS \n\nThus, the airspeed indicator system measures \n\nthe inherent compensation is inadequate and \nadditional correction must be applied. The \nsubtractive corrections that must be applied \nto CA$ depend on pressure altitude and CAS \nand are shown on figure 1.6 for the subsonic \nflight range. The equivalent airspeed (EAS) \nis the flight speed in the standard sea level \nair mass which would produce the same free \nstream dynamic pressure as the actual flight \ncondition. \n\ndynamic pressure and will \nvelocity when instrument, position, compress- \nibility, and density corrections are applied. \nThese corrections are quite necessary for ac- \ncurate determination of \ntrue airspeed and \naccurate navigation. \n\nrelate true flight \n\nBernoulli’s principle and the concepts of \nstatic, dynamic, and total pressure are the basis \nof aerodynamic fundamentals. The pressure \ndistribution caused by the variation of local \nstack and dynamic pressures on a surface is \nthe source of the major aerodynamic forces \nand moment. \n\n\n\n\n\nDEVELOPMENT OF AERODYNAMIC \n\nFORCES \n\n\n\n\n\n\n\n\n \n \n \n \n [html]\n
TableParameters
PTable
SpeciesTable
TableC1 ‘ A3
βpTable
TableTable
TableT
STable
1.Table
TableTable
PTable
\n\n\n\nThe typical airflow patterns exemplify the \nrelationship of static pressure and velocity \ndefined by Bernoulli. Any object placed in an \nairstream will have the a& to impact or stag- \nnate at some point near the leading edge. The \npressure at this point of stagnation will be an \nabsolute static pressure equal to the total pres- \nsure of the airstream. \nIn other words, the \nstatic pressure at the stagnation point will be \ngreater than the atmospheric pressure by the \namount of the dynamic pressure of the air- \nstream. As the \nflow divides and proceeds \naround. the object, the increases in local ve- \nlocity produce decreases in static pressure. \nThis procedure of flow is best illustrated by the \nflow patterns and pressure distributions of \nfigure 1.7. \n\n\n \n \n \n \n [html]Table\n
PatientsPaltitude density ratio, ρ / p0
TableSult
The TAS is a function0
\n\n\n\n\n\n\n\nSTREAMLINE PATTERN AND PRES- \nSURE DISTRIBUTION. \nThe flow pattern of \nthe cylinder of figure 1.7 is characterized by \nthe streamlines which denote the local flow \ndirection. Velocity distribution \nis noted by \nthe streamline pattern since the streamlines \neffect a boundary of flow, and the airflow \nbetween the streamlines is similar to flow in a \nclosed tube. When the streamlines contract \nand are close together, high local velocities \nexist; when the streamlines expand and are \nfar apart, low local velocities exist. At the", - "page_start": 31, - "page_end": 31, - "source_file": "00-80T-80.pdf" - }, - { - "text": "If a sym- \nmetrically shaped object were placed in a \nmoving airstream, the flow pattern typical of \nfigure 1.4 would result. The airstream at the \nvery nose of the object would stagnate and the \nrelative flow velocity at this point would be \nzero. The airflow ahead of the object pos- \nsesses some certain dynamic pressure and \nambient static pressure. At the very nose of \nthe object the local velocity will drop to zero \nand the airstream dynamic pressure will be \nconverted into an increase in static pressure at \nthe stagnation point. \nIn other words, there \nwill exist a static pressure at the stagnation \npoint which \nis equal to the airstream total \npressure-ambient static pressure plus dynamic \npressure. \n\nAIRSPEED MEASUREMENT. \n\nAround the surface of the object the airflow \nwill divide and the local velocity will increase \nfrom zero at the stagnation point \nto some \nmaximum on the sides of the object. \nIf fric- \ntion and viscosity effects are neglected, the \n\n9", - "page_start": 26, - "page_end": 26, - "source_file": "00-80T-80.pdf" - }, - { - "text": "PITOT-STATIC SYSTEM \n\nPITOT WITH SEPARATE \nSTATIC SOURCE \n\n\n\n\n\n\n\n\n\n\n\nw / :% \n. I. q \n\nPRESSURE INDICATED BY GAUGE IS \nDIFFERENCE BETWEEN TOTAL AND \nSTATIC PRESSURE, H-p= q \n\nFigure. 1.5. Airspeed Measurement \n\n\n\n\n\n\n\n\n\n\n\n\n\n0.05 psi position error is an airspeed error \nof 10 knots. A typical variation of air- \nspeed system position error is illustrated in \nfigure 1.6. \n\n(3) The equivalent airspeed (PAS) is the \nresult of correcting the (CAS) for compressi- \nbility effects. At high \nflight speeds the \nstagnation pressure recovered in the pitot \ntube is not representative of the airstream \ndynamic pressure due to a magnification \nby compressibility. Compressibility of the \nairflow produces a stagnation pressure in \nthe pitot which is greater than if the flow \nwere incompressible. As a result, the air- \nspeed indication is given an erroneous mag- \nnihcation. The standard airspeed indicator \nis calibrated to read correct when at standard \nsea level conditions and thus has a com- \npressibility correction appropriate for these \nconditions. However, when the aircraft is \noperating above standard sea level altitude, \n\ninstrument and errors due to position or lo- \ncation of the installation. The instrument \nerror must be small by design of the equip- \nment and is usually negligible in equjpment \nwhich is properly maintained and cared for. \nThe position error of the installation must \nbe small in the range of airspeeds involving \ncritical performance conditions. Position \nerrors are most usually confine,d to the static \nsource in \nthe actual static pressure \nsensed at the static port may be different \nfrom \nfree airstream static pressure. \nWhen the .,aircraft is operated through a \nlarge range’ of angles of attack, the static \nvaries ‘quite greatly \npressure distribution \nto’minimize \nand it becomes quite difficult \nthe static source error. \nIn most instances a \ncompensating group of static sources may \nbe combined to reduce the position error. \nIn order to appreciate the magnitude of this \nproblem, at flight speed near 100 knots a \n\nthat \n\nthe", - "page_start": 28, - "page_end": 28, - "source_file": "00-80T-80.pdf" - }, - { - "text": "An appreciation of the static strength re- \nquirements may be obtained by inspection of \nthe basic properties of a typical aircraft metal. \nFigure 3.1 illustrates the typical static strength \nproperties of a metal sample by a plot of applied \nstress versus resulting strain. At low values \n\n3,26", - "page_start": 343, - "page_end": 343, - "source_file": "00-80T-80.pdf" - }, - { - "text": ")ER PRESSURE DISTRIBUTION ON A 5v’ \n\n\n\nPEAK SUCTION \nPRESSURE \n\n\n\n\n\nSTAGNATION \n\n\nCONSIDERING FRICTION EFFECTS \n(VISCOUS FLOW) \nNEGLECTING FRICTION \n(PERFECT FLUID) \n\nPRESSURE DISTRIBUTION ON A SYMMETRICAL AIRFOIL AT ZERO LIFT \n\n\n\n\n\n-PEAK SUCTION \n\n\n\nAFT STAGNATION POINT \n\nNEGLECTING FRICTION \n\n\n\n\n\n\n\nVISCOUS FLOW \n\nFigure 1.7. Streamline Pattern and Pressure Distribution", - "page_start": 32, - "page_end": 32, - "source_file": "00-80T-80.pdf" - }, - { - "text": "50,ooc \n\n\n\n\\ I \n\\\\ \n\\ \n\\\\ \n\n\n\n45,ooc \n\n40,ooc \n\n\n35,ooc \n\n\n\n\n\nCONSUMPTION \n\n30.000 \n\nt \nI \n\n0” \n2 25,000 \n\n5 \na \n\n20,000 \n\n\n\n\n\n\n\n\n\n,FIXED GEOMETRY \n\n\n\nSEA \nLEVEL’ \n0 \n\n0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.6 0.9 \n\nRATIO OF WANTITY) \n\nAT ALTITUDE \n(QUANTIT’I) AT SEA LEVEL \n\nFigure 2.7 1. Approximate Eftect of Altitude on Engine Performance", - "page_start": 137, - "page_end": 137, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "00-80T-80.pdf", - "query": "What is the phenomenon associated with the production of lift by an airfoil ?", - "target_page": 34, - "target_passage": "An important phenomenon associated with the production of lift by an airfoil is the “circulation” parted to the airstream. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "is capable of producing lift \n\nin figure 1.8. \n\n\n\n\n\n\n\non the upper surface with \n\n\n\nrotation will be quite a “curve ball artist” \nthe golfer that cannot control the lateral mo- \ntion of the club face striking the golf ball will \nimpart an uncontrollable spin and have trouble \nwith a “hook” or “slice.” \n\nWhile a rotating cylinder can produce a net \nfrom the circulatory flow, the method is \nlift \nrelatively \ninefficient and only serves to point \nout the relationship between lift and circula-, \ntion. An airfoil \nwith relatively high efficiency and the process \nis illustrated \nIf a symmetrical \nairfoil \nis placed at zero angle of attack to the \nairstream, the streamline pattern and pressure \ndistribution give evidence of zero lift. HOW- \never, if the airfoil \nis given a positive angle of \nattack, changes occur in the streamline pattern \nand pressure distribution similar to changes \ncaused by the addition of circulation \nto the \ncylinder. The positive angle of attack causes \nincreased velocity \nan increase in upper surface suction while the \ndecreased velocity on the lower surface causes \na decrease in \nlower surface suction. Also, \nthe \nupwash is generated ahead of the airfoil, \nforward stagnation point moves under the \nleading edge, and a downwash is evident aft \nThe pressure distribution 0” \nof the airfoil. \nthe airfoil now provides a net force perpendicu- \nlar to the airstream-lift. \n\n\n\n\n\nThe effect of free stream density and velocity \nis a necessary consideration when studying the \ndevelopment of the various aerodynamic forces. \nSuppose that a particular shape of airfoil \nis \nfixed at a particular angle to the airstream. \nThe relative velocity and pressure distribution \nwill be determined by the shape of the airfoil \nand the angle to the airstream. The effect of \nvarying the airfoil size, air density and air- \nspeed is shown in figure 1.9. \nIf the same air- \nfoil shape is placed at the same angle to an \nairstream with \ntwice as great a dynamic pres- \nsure the magnitude of the pressure distribution \nwill be twice as great but the r&rive shape of \nthe pressure distribution will be the same. \nWith \ntwice as great a pressure existing over \nthe surface, all aerodynamic forces and mo- \nib \nments will ~double. If a half-size airfoil \nplaced at the same angle to the original air- \nstream, the magnitude of the pressure distri- \nbution is the same as the origina! airfoi! and \nagain the relative shape of the pressure dis- \ntribution \nis identical. The same pressure act- \ning on the half-size surface would reduce all \naerodynamic forces to one-half that of the \noriginal. This similarity of \nflow patterns \nmeans that the stagnation point occurs at the \nsame place, the peak suction pressure occurs \nat the same place, and the actual magnitude of \nthe aerodynamic forces and moments depends \nupon the airstream dynamic pressure and the \nsurface area. This concept is extremely im- \nportant when attempting to separate and ana- \nlyze the most important factors affecting the \ndevelopment of aerodynamic forces. \n\n\n\n\n\n\n\nSince the \nTERMINOLOGY. \nshape of an airfoil and the inclination to the \nairstream are so important in determining the \npressure distribution, it is necessary to properly \nterminology. Figure 1.10 \ndefine the airfoil \nshows a typical airfoil and illustrates \nthe \nvarious items of airfoil \n\nAIRFOIL \n\nterminology \n\n(1) The chord line is a straight line connect- \ning the leading and trailing edges of the \nairfoil. \n\n\n \n \n \n \n [html]\n
accountConsimatelyone - third the netlift.
TableTableTableTable
", - "page_start": 37, - "page_end": 37, - "source_file": "00-80T-80.pdf" - }, - { - "text": "airfoil do not ,necessarily occtir at the point of \nmaximum thickness. However, a similarity \ndoes exist in that the minimum pressure points \ncorrespond to the points where the streamlines \nare closest together and this condition exists \nwhen the streamlines are forced to the great- \nest curvature. \n\n\nis the “circulation” \n\nthe \n\n\n\n\n\n\n\n\n\nforward stagnation point \nthe local velocity \nis zero and the maximum positive pressure re- \nsults. As the flow proceeds from the forward \nstagnation point \nincreases as \nshown by the change in streamlines. The \nlocal velocities reach a maximum at the upper \nand lower extremities and a peak suction pres- \nsure is produced at these points on the cylinder. \n(NOTE: Positive pressures are pressures above \natmospheric and negative or .ruction pressures \nare less than atmospheric.) As \nflow \ncontinues aft from the peak suction pressure, \nthe diverging streamlines indicate decreasing \nlocal velocities and increasing local pressures. \nIf friction and compressibility effects are not \nconsidered, the velocity would decrease to zero \nat the aft stagnation point and the full stagna- \ntion pressure would be recovered. The pressure \ndistribution \nfor the cylinder in perfect fluid \nflow would be symmetrical and no net force \n(lift or dragj wvuid rcsuit. Of course, thr \nrelationship between static pressure and ~eloc- \nity along the surface is defined by Bernoulli’s \nequation. \n\nthe velocity \n\nGENERATION OF LIFT. An important \nthe production \nphenomenon associated with \nim- \nof lift by an airfoil \nparted to the airstream. The best practical \nillustration of this phenomenon is shown in \nfigure 1.8 by the streamlines and pressure dis- \ntributions existing on cylinders in an airstream. \nThe cylinder without circulation has a sym- \nmetrical streamline pattern and a pressure dis- \ntribution which creates n-0 n_et lift. \nIf the \nis given a clockwise rotation and \ncylinder \ninduces a rotational or circulatory flow, a dis- \ntinct change takes place in the streamline pat- \ntern and p’ess.~re &str~‘“u~~oii, The vriocitirs \ndue to the vortex of circulatory \nflow cause \nincreased 104 velocity on the upper surface \nof the cylinder and decreased local velocity on \nthe lower surface of the cylinder. Also, the \ncirculatory flow produces an upwash immedi- \nately ahead and downwash immediately be- \nhind the cylinder and both fore and aft stagna- \ntion points are lowered. \n\n\n\n\n\n\n\n\n\n\n\nThe flow pattern for the cylinder in an actual \nfluid demonstrates the effect of friction or \nviscosity. The viscosity of air produces a thin \nlayer of retarded flow immediately adjacent \nto the surface. The energy expended in this \n“boundary \nlayer” can alter the pressure dis- \ntribution and destroy the symmetry of the \npattern. The force unbalance caused by the \nchange in pressure distribution creates a drag \nforce which is in addition to the drag due to \nskin friction.", - "page_start": 33, - "page_end": 33, - "source_file": "00-80T-80.pdf" - }, - { - "text": "of the distributed \n\n\n\n\n\nand high power, the dynamic pressure in the \nshaded area can be much greater than the free \nstream and this causes considerably greater \nlift \nthan at zero thrust. At high power con- \nditions the induced flow also causes an effect \nsimilar to boundary layer control and increases \nthe maximum lift angle of attack. The typical \nfour-engine propeller driven airplane may have \n60 to 80 percent of the wing area affected by \nthe induced flow and power effects on stall \nspeeds may be considerable. Also, the lift of \nthe airplane at a given angle of attack and air- \nspeed will be greatly affected. Suppose the \nairplane shown is in the process of landing \nflare from a power-on approach. \nIf there is \na sharp, sudden reduction of power, the air- \nplane may drop suddenly because of the reduced \nlift. \n\nnet lift produced by the airfoil \nis difference \nbetween the lifts on the upper and lower sur- \nfaces. The point along the chord where the \nis effectively concentrated is \ndistributed \ntermed the “center of pressure, c.p.“ \nThe \ncenter of pressure is essentially the “center of \ngravity” \nlift pressure and \nthe location of the c.p. is a function of camber \nand section lift coe&cient \n\nlift \n\n\n\n\n\n\n\n\n\nAnother aerodynamic reference point is the \n“aerodynamic center, d.e.” The aerodynamic \ncenter is defmed as the point along the chord \nwhere all changes in lift effectively take place. \nTo visualize the existence of such a point, \nnotice the change in pressure distribution with \nthe symmetrical airfoil \nangle of attack \nthe upper \nof figure 1.21. When at zero lift, \nand lower surface lifts are equal and located \nat the same point. With an increase in angle \nof attack, the upper surface lift increases while \nthe lower surface lift decreases. The change \n,of lift has taken place with no change in the \ncenter of pressure-a characteristic of sym- \nmetrical airfoils. \n\nfor \n\nThe typical jet aircraft does not experience \nthe \ninduced flow velocities encountered in \npropeller driven airplanes, thus the only sig- \nnificant factor is the vertical component of \nthrust. Since this vertical component con- \ntributes to supporting the airplane, less aero- \nis required to hold the airplane \ndynamic lift \nIf the thrust is small and the thrust \nin flight. \ninclination \nis slight at maximum lift angle, \nre- \nonly negligible changes in stall speed will \nsult. On the other hand, if the thrust is very \ngreat and is given a large inclination at maxi- \nmum lift angle, the effect on stall speed can \nbe very large. One important \nrelationship \nremains-since there is very little induced flow \nfrom the jet, the angle of attack at stall is \nessentially the same power-on or power-off. \n\n\n\n\n\n\n\nthe cambered airfoil of \nNext, consider \nfigure 1.21 at zero lift. \nTo produce zero lift, \nthe upper and lower surface lifts must be equal. \nOne difference noted from the symmetrical air- \nfoil is that the upper and lower surface lifts are \nnot opposite one another. While no net lift \nthe couple produced by \nexists on the airfoil, \nthe upper and lower surface lifts creates a nose \ndown moment. As the angle of attack is in- \ncreased, the upper surface lift \nincreases while \nlower surface lift decreases. While a \nthe \nchange in lift has taken place, no change in \nmoment takes place about the point where \nthe lift change occurs. Since the moment \nabout the aerodynamic center is the product \nof a force (lift at the c.P.) and a lever arm \n(distance from c.9. to a.~.), an increase in lift \nmoves the center of pressure toward the aero- \ndynamic center. \n\nDEVELOPMENT OF AERODYNAMIC \n\nPITCHING MOMENTS", - "page_start": 64, - "page_end": 64, - "source_file": "00-80T-80.pdf" - }, - { - "text": "is one half \n\nvortex filaments which consist of the tip or \ntrailing vortices coupled with \nthe bound or \nline vortex. The tip vortices are coupled with \nthe bound vortex when circulation is induced \nwith \nlift. The effect of this vortex system is \nto create certain vertical velocity components \nin the vicinity of the wing. The illustration \nof these vertical velocities shows that ahead \nof the wing the bound vortex induces an up- \nwash. Behind the wing, \nthe coupled action \nof the bound vortex and the tip vortices in- \nduces a downwash. With \nthe action of tip \nand bound vortices coupled, a final vertical \nvelocity (220) is imparted to the airstream by \nthe wing producing lift. \nThis result is an \ninevitable consequence of a finite wing pro- \nducing lift. \nThe wing Producing lift applies \nthe equal and opposite force to the airstream \nand deflects it downward. One of the impor- \ntant factors in this system is that a downward \nvelocity is created at the aerodynamic center \n(w) which \nthe final downward \nvelocity imparted to the airstream (2~). \n\nage relative wind which is different from the \nremote free stream wind. Since the aerody- \nnamic forces created by the airfoil sections of a \nwing depend upon the immediate airstream in \nwhich \nthey operate, consideration must be \ngiven to the effect of the inclined average rela- \ntive wind. \n\nTo create a certain lift coefficient with \n\n\n\n\n\nthe vertical,velocity \n\n\n\n\n\nthe \nairfoil section, a certain angle must exist be- \ntween the airfoil chord line and the avcragc \nrelative wind. This angle of attack is a,,, the \nsection angle of attack. However, as this lift \nis developed on the wing, downwash is in- \nis in- \ncurred and the average relative wind \nclined. Thus, the wing must be given some \nangle attack greater than the required section \nangle of attack to account for the inclination of \nthe average relative wind. Since the wing \nmust be given this additional angle of attack \nbecause of the induced flow, the angle between \nthe average reiative wind arid tlie remote fiCC \nstream is termed the induced angle of attack, \nai. From this influence, the wing angle of \nattack is the sum of the section and induced \nangles of attack. \n\nThe effect of the vertical velocities in the \nvicinity of the wing is best appreciated when \nthey are added vectorially \nto the airstream \nvelocity. The remote free stream well ahead \nof the wing is unaffected and its direction is \nopposite the flight path of the airplane. ‘Aft \nof the wing, the vertical velocity (2~) adds to \nthe airstream velocity to produce the down- \nwash angle e (epsilon). At the aerodynamic \ncenter of the wing, \n(w) \nadds to the airstream velocity to produce a \ndownward deflection of the airstream one-half \nIn other words, \nthat of the downwash angle. \nthe wing producing lift by the deflection of an \nairstream incurs a downward slant co the wind \nin the immediate vicinity of the wing. Hence, \nthe JeCtionJ of the wing operate in an average rela- \ntive wind which is inclined downward one-half the \nfinal dowraw& angle. This is one important \nfeature which distinguishes the aerodynamic \nproperties of a wing from \nthe aerodynamic \nproperties of an airfoil section. \n\na=ul)+a; \na= wing angle of attack \nOLD= section angle of attack \nOI;= induced angle of attack \n\n\n\nINDUCED DRAG", - "page_start": 83, - "page_end": 83, - "source_file": "00-80T-80.pdf" - }, - { - "text": "the \n\nthe wave form \n\nvalue all oblique portions of the waves incline \nmore greatly and the detached normal shock \nportion of the bow wave moves closer to the \nleading edge. \n\nshock wave forms as the boundary between \nthe supersonic flow and the subsonic flow on \nthe aft portion of the airfoil surface. The \nacceleration of the airflow \nfrom subsonic to \nsupersonic is smooth and unaccompanied by \nshock waves if the surface is smooth and the \ntransition gradual. However, the transition \nof airflow \nfrom supersonic to subsonic is \nalways accompanied by a shock wave and, \nwhen there is no change in direction of the \nairflow, \nis a normal shock \nwave. \n\nOf course, all components of the aircraft \nin a manner \n\nare affected by compressibility \nthat of basic airfoil. \nsomewhat similar \nThe tail, fuselage, nacelles, canopy, etc. and \ninterference between the \nthe efkct of \nthe aircraft must be \nvarious surfaces of \nconsidered. \n\nto \n\nThe airflow sepa- \nration induced by shock wave formation can \nthe aerody- \ncreate significant variations \nnamic force coefficients. When the free stream \nspeed is greater than critical Mach number some \ntypical effects on an airfoil section are as \nfollows : \n\nFORCE DIVERGENCE. \n\n\n\n\n\n\n\n\n\nthe aerodynamic \n\n(1) An increase in the section drag coeffi- \n\ncient for a given section lift coe5cient. \n\n(2) A decrease in section lift coefficient \n\nfor a given section angle of attack. \n\n(3) A change in section pitching moment \n\ncoe5cient. \n\nA reference point is usually taken by a plot \nof drag coe5cient versus Mach number for \na constant lift coefficient. Such a graph is \nfigure 3.10. The Mach number \nshown in \nwhich produces a sharp change in the drag \ncoe5cient \nis termed the “force divergence” \nMach number and, for most airfoils, usually \nexceeds the critical Mach number at least 5 \nto 10 percent. This condition is also referred \nto as the “drag divergence” or “drag rise.” \n\n\n\n\n\n\n\nto this high \n\n\n\nRecall that one of the principal effects of \nth,e normal shock wave is to produce a large \nincrease in the static pressure of the airstream \nis \nIf \nthe wave. \nbehind \nthe boundary layer may not have \nstrong, \nsufficient kinetic energy to withstand \nthe \nlarge, adverse pressure gradient and separation \nwill occur. At speeds only slightly beyond \ncritical Mach number the shock wave formed \nis not strong enough to cause spearation or \nany noticeable change in \nthe aerodynamic \nforce coefficients. However, an increase in \nspeed above critical Mach number sufhcient \nto form a strong shock wave can cause sepa- \nthe boundary layer and produce \nration of \nforce \nsudden changes in \ncoefficients. Such a flow condition is shown \nin figure 3.9 by the flow pattern for M=O.n. \nNotice that a further increase in Mach number \nto 0.82 can enlarge the supersonic area on the \nupper surface and form an additional area of \nsupersonic flow and normal shock wave on the \nlower surface. \n\nthe shock wave \n\nPHENOMENA OF TRANSONIC FLIGHT. \nAssociated with \nrise” are buffet, \nthe “drag \ntrim and stability changes, and a decrease \nin control surface effectiveness. Conventional \nrudder, and elevator surfaces sub \naileron, \njetted \nfrequency buffet may \n“buzz,” \nand changes in hinge moments may \nproduce undesirable control forces. Of course, \nif \nthe buffet is quite severe and prolonged, \nstructural damage may occur if this operation \nis in violation of operating limitations. When \nairflow separation occurs on the wing due to", - "page_start": 235, - "page_end": 235, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Many factors influence the change in tail \nlift which occurs with a change in airplane \nangle of attack. The area of the horizontal \ntail has the obvious effect that a large surface \nwould generate a large change in lift. \nIn a \nsimilar manner, the change in tail lift would \ndepend on the slope of the lift curve for the \nhorizontal \ntaper, \nsweepback, and Mach number would deter- \nmine the sensitivity of the surface to changes \nin angle of attack. \nIt should be appreciated \nthat the flow at the horizontal tail is not of \nthe same flow direction or dynamic pressure as \nthe free stream. Due to the wing wake, fuse- \nlage boundary layer, and power effects, the q \nat the horizontal tail may be greatfy different \nIn most in- \nfrom the 4 of the free stream. in supersonic flow \ncan develop lift of a magnitude which cannot \nbe neglected. When the body of revolution in \nsupersonic flow is given an angle of attack, a \npressure distribution typical of figure 4.8 is the \nresult. Since the center of pressure is well \nforward, the body contributes a destabilizing \ninfluence. AS is usual with supersonic con- \nfigurations, the fuselage and nacelles may be \nquite large in comparison with \nthe wing area \nand the contribution to stability may be large. \nInteraction between the wing and fuselage and \n\nThe body of revolution", - "page_start": 273, - "page_end": 273, - "source_file": "00-80T-80.pdf" - }, - { - "text": "DEVELOPMENT OF AERODYNAMIC \n\nPITCHING MOMENTS \n\nThe distribution of pressure over a surface \nis the ,source of the aerodynamic moments as \nwell as the aerodynamic forces. A typical \nexample of this fact is the pressure distribution \nacting on the cambered airfoil of figure 1.21. \nThe upper surface has pressures distributed \nwhich produce the upper surface lift; the lower \nsurface has pressures distributed which pro- \nduce the lower surface lift. Of course, the It should be noted that the symmetrical air- \nfoil at zero lift has no pitching moment about \nthe aerodynamic center because the upper and", - "page_start": 64, - "page_end": 64, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Lift generation, by a “rotating wing” enables \nthe helicopter to accomplish its unique mission \nof hovering motionless in the air, taking off \nand landing in a confined or restricted area, \nand autorotating \nto a safe landing following \na power failure. Lift generation by “rotating \nwing’ ’ \nis also responsible for some of the \nunusual problems the helicopter can encounter. \nSince the helicopter problems are due to par- \nticular nature of .the rotor aerodynamics, the \nthe rotor must be \nbasic flow conditions within \nconsidered in detail. \nthe \ninitial discussion will consider only the hover- \ning \nterm hovering \n\nFor simplicity, \n\nrotor. Although the", - "page_start": 416, - "page_end": 416, - "source_file": "00-80T-80.pdf" - }, - { - "text": "1.30 \n1.24 \n1.04 \n.61 \n.38 \n.I7 \n.o!J \n.06 \n.04 loo. ................. \n110 .................. \n17.0 .................. \nlY) .................. \n200 .................. \nMO. ................. \n4&l. ................. \n30.7. ................. \n600 .................. l.lm \n,826 \n,694 \n.444 \n230 \n,111 \n.c453 \n,040 \n.028 \n\n\n\n\n\n\n\nangle of attack indicator allows precision con- \ntrol of the airspeed. The accomplished insttu- \nflying \nment pilot is the devotee of “attitude” \ntechnique-his \nplus \ncreed being \npower equals performance.” During a GCA \napproach, the professional instrument pilot \ncontrols airspeed with stick (angle of attack) \nand rate of descent with power adjustment. \n\n“attitude \n\n20.00 \n15.P \n12.7’ \n8.20 \n4.6’ \n2.10 \n1.10 \n.T= \n.5O \n\ntransient \ntend to complicate the \nconditions of flight \nrelationship of angle of attack and airspeed. \nHowever, the majority of flight and, certainly, \nthe most critical regime of flight (takeoff, ap- \nproach, and landing), \nis conducted in essen- \ntially steady flight condition. \n\nManeuvering flight and certain \n\nNote that for the conditions of steady flight, \neach airspeed requites a specific angle of attack \nand lift coefficient. This fact provides a fun- \ndamental concept of flying technique: Angle \nof attack is tbs primary Control of airspeed in steady \nflight. Of course, the control stick or wheel \nallows the pilot to control the angle of attack \nand, thus, control the airspeed in steady flight. \nIn the same sense, the throttle controls the \noutput of the powerplant and allows the pilot \nto control rate of climb and descent at various \nairspeeds. \n\n\n\n\n\n\n\n\n\n\n\n\n\nAIRFOIL LIFT CHARACTERISTICS. Air- \nfoil section properties differ from wing or \nairplane properties because of the effect of the \nplanform. Actually, the wing may have vati- \nous airfoil sections from root to tip with taper, \ntwist, sweepback and local flow components \nin a spanwise direction. The resulting aeto- \ndynamic properties of the wing are determined \nby the action of each section along the span \nand the three-dimensional flow. Airfoil sec- \ntion properties are derived from the basic shape \nor profile in two-dimensional flow and the force \ncoefficients are given a notation of lower case \nletters. For example, a wing or airplane lift \ncoefficient is C, while an airfoil section lift \ncoefficient is termed cr. Also, wing angle of \nattack is Q while section angle of attack is \ndifferentiated by the use of 01~. The study of \nsection properties allows an objective consider- \nation of the effects of camber, thickness, etc. \n\nThe lift characteristics of five illustrative \nairfoil sections are shown in figure 1.12. The \nsection lift coe&icient, c,, is plotted versus \nsection angle of attack, olO, for five standard \nNACA airfoil profiles. One characteristic fea- \nture of all airfoil sections is that the slope of \nthe various lift curves is essentially the same. \nAt low lift coefhcients, the section lift coeffi- \ncient \nincreases approximately 0.1 for each \ndegree increase in angle of attack. For each \nof the airfoils shown, a S’ change in angle of", - "page_start": 44, - "page_end": 44, - "source_file": "00-80T-80.pdf" - }, - { - "text": "sections have zero lift at zero angle of attack, \nthe sections with positive camber have nega- \ntive angles for zero lift. \n\nattack would produce an approximate 0.5 \nchange in lift coefficient. Evidently, lift,~curve \nslope is not a factor important in the selection \nof an airfoil. \n\nThe importance of maximum lift coefficient \nis obvious. \nIf the maximum lift coefficient is \nhigh, the stall speed will be low. However, \nthe high \nthickness and camber necessary for \nhigh section maximum lift coefficients may \nproduce low critical Mach numbers and large \ntwisting moments at high speed. In other \nwords, a high maximum lift coefficient is just \none of the many features desired of an airfoil \nsection. \n\nlift property affected by the \nairfoil shape is the section maximum lift co- \nThe effect of airfoil shape on \nefficient, ci-. \nci- can be appreciated by comparison of the \nlift curves for the five airfoils of figure 1.12. \nThe NACA airfoils 63X06,63-009, and 63i-012 \nate symmetrical sections of a basic thickness \ndistribution but maximum thicknesses of 6, \n9, and 12 percent respectively. The effect of \nthickness on ~1% is obvious from an inspec- \ntion of these curves : \n\nAn important \n\n\n\n\n \n \n \n \n [html]\n
Sectioncmaxα0forcimea
NACA 6 )- 006,.............................................................................................................................................................................................0.829.0o
NACA 6 )– 009,.............................................................................................................................................................................................1.10 |10.5 °
NACA 6 ) I - 012..........................................................................................................................................1.40 |13.8 *
\n\n\nfriction. \n\n\n\n\n\n\n\n\n\nDRAG CHARACTERISTICS. Drag is the \nnet aerodynamic force parallel to the relative \nwind and its source is the pressure distribution \nand skin friction on the surface. Large, thick \nbluff bodies in an airstream show a predomi- \nnance of form drag due to the unbalanced pres- \nsure \nstreamlined \nbodies with smooth contours show a ptedomi- \nnance of drag due to skin \nIn a \nfashion similar to other aerodynamic forces, \ndrag forces may be considered in the form of a \ncoefficient which \nis independent of dynamic \npressure and surface area. The basic drag \nequation is as follows: \n\ndistribution. However, \n\nThe 12-percent section has a cr- \napproxi- \nmately 70 percent greater than the 6-percent \nthick section. \nIn addition, the thicker airfoils \nhave greater benefit from the use of various \nhigh lift devices. \nD=GqS \n\nThe effect of camber is illustrated by the lift \ncurves of the NACA 4412 and 631-412 sections. \nThe NACA 4412 section is a 12 percent thick \nairfoil which has 4 percent maximum camber \nlocated at 40 percent of \nthe chord. The \nNACA 63i-412 airfoil has the same thickness \nand thickness distribution as the 631-012 but \nlift coefficient \ncamber added to give a “design”’ \n(c, for minimum section drag) of 0.4. The \nlift curves for these two airfoils show that \ncamber has a beneficial e&t \n\nwhere \n\nD=drag, \nC,= drag coefficient \n\nlbs. \n\nq= dynamic pressure, psf \n\nUP \n=z (V in knots, TAS) \n\n\n\n\n\nS= wing surface area, sq. ft.", - "page_start": 46, - "page_end": 46, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", - "query": "What are the recyclable waste ?", - "target_page": 3, - "target_passage": "All types of paper and cardboard, Metal packaging, even the smallest ones, Plastic bottles and flasks, All other packaging", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Metal packaging,**\n**even the smallest ones**\n\n**NEW**\n**All other packaging** \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**RECYCLABLE WASTE**\n\n**All types of paper**\n**and cardboard**\n\n\n\n\n\n\n**Plastic bottles and flasks**\n\n\n\n\n\n**YELLOW BIN OR**\n**YELLOW COLUMN**\n\n**SORTING ERROR IN YELLOW BIN = YELLOW BIN NOT COLLECTED**\n\n**GOOD SORTING HABITS: EMPTY THEM WELL, NO NEED WASH THEM, PUT IN THE**\n**CONTAINER SEPARATE FROM EACH OTHER AND WITHOUT BAG**\n\n**ORGANIC WASTE**\n\n**//50% green materials : all fruit and vegetable**\n**peelings, leftover meat, egg shells, tea and**\n**coffee…**\n\n**//50% brown materials : dead leaves, twigs,**\n**kitchen rolls, shavings, possibly paper,**\n**newspaper and cardboard …**", - "page_start": 2, - "page_end": 2, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "A project of the Washington Organic Recycling Council, with \nsupport from the Washington State Department of Ecology’s \nPublic Participation Grant program. \n\nThis product was partly funded through a grant from the \nWashington Department of Ecology. While these materials \nwere reviewed for grant consistency, this does not necessarily \nconstitute endorsement by the department. \n\n**Special thanks:**the original version of this brochure in 2003 \nwas created by the Washington County, Oregon Solid Waste and \nRecycling Program in cooperation with the Washington Organic \nRecycling Council and the Composting Council of Oregon.", - "page_start": 1, - "page_end": 1, - "source_file": "CompostGuide.pdf" - }, - { - "text": "*Transfer and Disposal Services.*We own or operate 96 transfer stations. We deposit waste at these \nstations, as do other private haulers and municipal haulers, for compaction and transfer to trailers for transport \nto disposal sites or recycling facilities. As of December 31, 2004, we owned or operated 58 landÑlls, which had \napproximately 8,904 permitted acres and total available permitted and probable expansion disposal capacity of \napproximately 1.7 billion in-place cubic yards. The in-place capacity of our landÑlls is subject to change based \non engineering factors, requirements of regulatory authorities and the ability to expand our sites successfully. \nSome of our landÑlls accept non-hazardous special waste, including utility ash, asbestos and contaminated \nsoils. See \"\"Ì Properties.'' \n\nMost of our existing landÑll sites have the potential for expanded disposal capacity beyond the currently \npermitted acreage. We monitor the availability of permitted disposal capacity at each of our landÑlls and \nevaluate whether to pursue expansion at a given landÑll based on estimated future waste volumes and prices, \nmarket needs, remaining capacity and likelihood of obtaining an expansion. To satisfy future disposal demand, \nwe are currently seeking to expand permitted capacity at certain of our landÑlls, although no assurances can be \nmade that all future expansions will be permitted as designed. \n\n*Other Services.*We have 35 materials recovery facilities and other recycling operations, which are \ngenerally required to fulÑll our obligations under long-term municipal contracts for residential collection \nservices. These facilities sort recyclable paper, aluminum, glass and other materials. Most of these recyclable \nmaterials are internally collected by our residential collection operations. In some areas, we receive \ncommercial and industrial solid waste that is sorted at our facilities into recyclable materials and non- \nrecyclable waste. The recyclable materials are salvaged, repackaged and sold to third parties and the non- \nrecyclable waste is disposed of at landÑlls or incinerators. Wherever possible, our strategy is to reduce our \nexposure to Öuctuations in recyclable commodity prices by utilizing third party recycling facilities, thereby \nminimizing our recycling investment. \n\nWe provide remediation and other heavy construction services primarily through our subsidiary located in \nMissouri. \n\nWe also have a Texas-based compost, mulch and soil business at which yard, mill and other waste is \nprocessed, packaged and sold as various products. \n\n**Sales and Marketing**\n\nWe seek to provide quality services that will enable our company to maintain high levels of customer \nsatisfaction. We derive our business from a broad customer base which we believe will enable our company to \nexperience stable growth. We focus our marketing eÅorts on continuing and expanding business with existing \ncustomers, as well as attracting new customers. \n\nWe employ approximately 500 sales and marketing employees. Our sales and marketing strategy is to \nprovide high-quality, comprehensive solid waste collection, recycling, transfer and disposal services to our \ncustomers at competitive prices. We target potential customers of all sizes, from small quantity generators to \nlarge \"\"Fortune 500'' companies and municipalities. \n\nMost of our marketing activity is local in nature. However, in 2000 we initiated a national accounts \nprogram in response to our customers' needs. \n\nWe generally do not change the tradenames of the local businesses we acquire, and therefore we do not \noperate nationally under any one mark or tradename. Rather, we rely on the goodwill associated with the \nacquired companies' local tradenames as used in each geographic market in which we operate. \n\n**Customers**", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. \n\nCompost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. \n\n\n \n \n \n \n [html]\n
1.2TableTableTable
TableTableTable_
parametermin***13
sMRI,1.
\n\n*Many localities now collect food scraps and \nfood-soiled paper along with yard debris for \ncomposting. Call your local collection service \nto find out what is collected in your area.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "transportation, treatment, storage and disposal of hazardous and non-hazardous solid waste, and require \nstates to develop programs to ensure the safe disposal of solid waste in sanitary landÑlls. \n\nSubtitle D of RCRA establishes a framework for regulating the disposal of municipal solid waste. \nRegulations under Subtitle D currently include minimum comprehensive solid waste management \ncriteria and guidelines, including location restrictions, facility design and operating criteria, closure and \npost-closure requirements, Ñnancial assurance standards, groundwater monitoring requirements and \ncorrective action standards, many of which had not commonly been in eÅect or enforced in the past in \nconnection with municipal solid waste landÑlls. Each state was required to submit to the U.S. EPA a \npermit program designed to implement Subtitle D regulations by April 9, 1993. All of the states in which \nwe operate have implemented permit programs pursuant to RCRA and Subtitle D. These state permit \nprograms may include landÑll requirements which are more stringent than those of Subtitle D. \n\nAll of our planned landÑll expansions or new landÑll development projects have been engineered to \nmeet or exceed Subtitle D requirements. Operating and design criteria for existing operations have been \nmodiÑed to comply with these new regulations. Compliance with Subtitle D regulations has resulted in \nincreased costs and may in the future require substantial additional expenditures in addition to other costs \nnormally associated with our waste management activities. \n\n(2)*The Comprehensive Environmental Response, Compensation and Liability Act of 1980, as*\n*amended.*CERCLA, among other things, provides for the cleanup of sites from which there is a release \nor threatened release of a hazardous substance into the environment. CERCLA may impose strict joint \nand several liability for the costs of cleanup and for damages to natural resources upon current owners and \noperators of the site, parties who were owners or operators of the site at the time the hazardous substances \nwere disposed of, parties who transported the hazardous substances to the site and parties who arranged \nfor the disposal of the hazardous substances at the site. Under the authority of CERCLA and its \nimplementing regulations, detailed requirements apply to the manner and degree of investigation and \nremediation of facilities and sites where hazardous substances have been or are threatened to be released \ninto the environment. Liability under CERCLA is not dependent upon the existence or disposal of only \n\"\"hazardous wastes'' but can also be based upon the existence of small quantities of more than 700 \n\"\"substances'' characterized by the U.S. EPA as \"\"hazardous,'' many of which may be found in common \nhousehold waste. \n\nAmong other things, CERCLA authorizes the federal government to investigate and remediate sites \nat which hazardous substances have been or are threatened to be released into the environment or to \norder (or oÅer an opportunity to) persons potentially liable for the cleanup of the hazardous substances to \ndo so. In addition, the U.S. EPA has established a National Priorities List of sites at which hazardous \nsubstances have been or are threatened to be released and which require investigation or cleanup.", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "We strive to conduct our operations in compliance with applicable laws and regulations. However, in the \nexisting climate of heightened environmental concerns, from time to time, we have been issued citations or \nnotices from governmental authorities that have resulted in the need to expend funds for remedial work and \nrelated activities at various landÑlls and other facilities. There is no assurance that citations and notices will \nnot be issued in the future despite our regulatory compliance eÅorts. We have established remediation reserves \nthat we believe, based on currently available information, will be adequate to cover our current estimates of \nregulatory costs. However, we cannot assure you that actual costs will not exceed our reserves. \n\n*Federal Regulation.*The following summarizes the primary environmental, public and occupational \nhealth and safety-related statutes of the United States that aÅect our facilities and operations: \n\n(1)*The Solid Waste Disposal Act, as amended, including the Resource Conservation and Recovery*\n*Act.*RCRA and its implementing regulations establish a framework for regulating the handling, \n\n\n \n \n \n \n [html]\n
TableTableTable
TableTableTable
", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "This annual report is printed on FSC® certified paper. \nThe recycled content of our paper is 30% post-consumer waste. \n©2015 Nordstrom, Inc. All rights reserved. Printed in the USA. \n374047840 PLEASE RECYCLE.", - "page_start": 95, - "page_end": 95, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "This annual report is printed on FSC® certified paper. \nThe recycled content of our paper is 30% post-consumer waste. \n©2015 Nordstrom, Inc. All rights reserved. Printed in the USA. \n374047840 PLEASE RECYCLE.", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "market knowledge, community relations and name recognition, and to instill their entrepreneurial drive \nat all levels of our operations. By furnishing the local management of such acquired companies with our \nÑnancial and marketing resources and technical expertise, we believe that the acquired companies are \nbetter able to secure additional municipal franchises and other contracts. \n\n*Privatize Municipal Operations and Acquire Divested Operations.*We also seek to acquire solid \nwaste collection operations, transfer stations and landÑlls that municipalities and other governmental \nauthorities are privatizing. Many municipalities are seeking to outsource or sell these types of solid \nwaste operations, as they lack the capital, technical expertise and/or operational resources necessary to \ncomply with increasingly stringent regulatory standards and/or to compete eÅectively with private- \nsector companies. In addition, we have acquired, and will continue to seek to acquire, operations and \nfacilities that may be divested by other publicly-owned waste companies. \n\n**Operations**\n\nOur operations primarily consist of the collection, transfer and disposal of non-hazardous solid waste. \n\n*Collection Services.*We provide solid waste collection services to commercial, industrial, municipal and \nresidential customers in 22 states through 140 collection companies. In 2004, 74.3% of our revenue was \nderived from collection services consisting of approximately 32.5% from services provided to municipal and \nresidential customers, 36.6% from services provided to commercial customers, and 30.9% from services \nprovided to industrial and other customers. \n\nOur residential collection operations involve the curbside collection of refuse from small containers into \ncollection vehicles for transport to transfer stations or directly to landÑlls. Residential solid waste collection \nservices are typically performed under contracts with municipalities, which we generally secure by competitive \nbid and which give our company exclusive rights to service all or a portion of the homes in their respective \njurisdictions. These contracts or franchises usually range in duration from one to Ñve years, although some of \nour exclusive franchises are for signiÑcantly longer periods. Residential solid waste collection services may also \nbe performed on a subscription basis, in which individual households contract directly with our company. The \nfees received for subscription residential collection are based primarily on market factors, frequency and type \nof service, the distance to the disposal facility and cost of disposal. In general, subscription residential \ncollection fees are paid quarterly in advance by the residential customers receiving the service. \n\nIn our commercial and industrial collection operations, we supply our customers with waste containers of \nvarying sizes. We also rent compactors to large waste generators. Commercial collection services are generally \nperformed under one- to three-year service agreements, and fees are determined by such considerations as: \n\n‚ market factors, \n\n‚ collection frequency,", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**Competition**\n\nWe operate in a highly competitive industry. Entry into our business and the ability to operate proÑtably \nin the industry requires substantial amounts of capital and managerial experience. \n\nCompetition in the non-hazardous solid waste industry comes from a few large, national publicly-owned \ncompanies, including Waste Management and Allied Waste Industries, several regional publicly- and \nprivately-owned solid waste companies, and thousands of small privately-owned companies. Some of our \ncompetitors have signiÑcantly larger operations, and may have signiÑcantly greater Ñnancial resources, than \nwe do. In addition to national and regional Ñrms and numerous local companies, we compete with \nmunicipalities that maintain waste collection or disposal operations. These municipalities may have Ñnancial \nadvantages due to the availability of tax revenues and tax-exempt Ñnancing. \n\nWe compete for collection accounts primarily on the basis of price and the quality of our services. From \ntime to time, our competitors may reduce the price of their services in an eÅort to expand market share or to \nwin a competitively bid municipal contract. This may have an impact on our future revenue and proÑtability. \n\nIn each market in which we own or operate a landÑll, we compete for landÑll business on the basis of \ndisposal costs, geographical location and quality of operations. Our ability to obtain landÑll business may be \nlimited by the fact that some major collection companies also own or operate landÑlls to which they send their \nwaste. There also has been an increasing trend at the state and local levels to mandate waste reduction at the \nsource and to prohibit the disposal of certain types of waste, such as yard waste, at landÑlls. This may result in \nthe volume of waste going to landÑlls being reduced in certain areas, which may aÅect our ability to operate \nour landÑlls at their full capacity and/or aÅect the prices that we can charge for landÑll disposal services. In \naddition, most of the states in which we operate landÑlls have adopted plans or requirements that set goals for \nspeciÑed percentages of certain solid waste items to be recycled. \n\n**Regulation**\n\nOur facilities and operations are subject to a variety of federal, state and local requirements that regulate \nthe environment, public health, safety, zoning and land use. Operating and other permits, licenses and other \napprovals are generally required for landÑlls and transfer stations, certain solid waste collection vehicles, fuel \nstorage tanks and other facilities that we own or operate, and these permits are subject to revocation, \nmodiÑcation and renewal in certain circumstances. Federal, state and local laws and regulations vary, but \ngenerally govern wastewater or stormwater discharges, air emissions, the handling, transportation, treatment, \nstorage and disposal of hazardous and non-hazardous waste, and the remediation of contamination associated \nwith the release or threatened release of hazardous substances. These laws and regulations provide \ngovernmental authorities with strict powers of enforcement, which include the ability to obtain injunctions \nand/or impose Ñnes or penalties in the case of violations, including criminal penalties. The \nU.S. Environmental Protection Agency and various other federal, state and local environmental, public and \noccupational health and safety agencies and authorities administer these regulations, including the Occupa- \ntional Safety and Health Administration of the U.S. Department of Labor.", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", - "query": "What is the day of the black container in Lachapelle ?", - "target_page": 4, - "target_passage": "LACHAPELLE MONDAY green weeks", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "The following timeline highlights the major shifts in the development of container to date (see \nFigure 2-9): \n\n(cid:2) 2000 FreeBSD Jails: FreeBSD Jails enabled Computer systems to be partitioned into \nmultiple servers that were independent subsystems named Jail with unique IP address. \n\n(cid:2) 2001 Linux Vserver: Similar to FreeBSD Jails, Linux also developed a feature for operating \nsystem virtualization where a file system, memory, and network can be shared among \nindependent systems. \n\n(cid:2) 2004 Solaris Containers: Solaris Containers combined system resource controls and \n\nboundary separation that was provided by zones to take advantage of features, such as \nsnapshots and cloning from ZFS. \n\n(cid:2) 2006 Google process containers: Process Containers was designed for limiting, \n\naccounting, and isolating resource usage (CPU, memory, disk I/O, and network) of a \ncollection of processes. Later, this was renamed as Control Groups (cgroups) and merged \nto Linux kernel 2.6.24. \n\n(cid:2) 2008 LXC evolved (Linux Container Group): Linux Containers (LXC) was the first, most \ncomplete implementation of Linux container manager. It was implemented in 2008 by \nusing cgroups and Linux namespaces. \n\n(cid:2) 2013 Let Me Contain That For You (LMCTFY): Let Me Contain That For You (LMCTFY) \nstarted in 2013 as an open source version of Google’s container stack. Applications can \nbe made container aware, which creates and manages their own subcontainers. \n\n(cid:2) 2013 Docker: Docker emerged, which made container service even more popular. Docker \nand container grew together. \n\n(cid:2) 2016 Security and DevOps: Container security enhanced and DevOps method evolved as \nmost preferred Container Application process. \n\n(cid:2) 2017 Container becomes more matured with CNCF and Kubernetes.", - "page_start": 36, - "page_end": 36, - "source_file": "sg248459.pdf" - }, - { - "text": "During climbing", - "page_start": 167, - "page_end": 167, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**HOW TO GET A COMPOST KIT?**\n\n**Buy your own compost kit and get**\n**tips for good composting practice.**\nOnly during opening hours every \nwednesday from 2 pm to 4 pm at \nthe old recycling centre impasse \nElie Teyssier-Miramont. (In case of \nunavailability, please contact the \nenvironment department). \n30 minute workshops/awareness- \nraising sessions are regularly \norganised (starting at 4pm). It is \npossible to leave with a composter \nduring these workshops**. \nRegistration and information with \nthe service. \n\n**Compost kit** **Plastic** **Wood**\n\n300 L 20 € 30 € \n\n400 L 25 € 35 € \n\n*Only payment by cheque made payable to the \n‘Tresor Public‘ are accepted \n**Specific condition of acquisition apply accor- \nding to your municipality of residence \n\n\n \n \n \n \n [html]\n
Black containerYellow containerAGNAC
TUESDAY white weeksTHURSDAY green weeksALLEMANS - DU - DROPT
MONDAY green weeksWEDNESDAY white weeksARMILLAC
TUESDAY white weeksTHURSDAY green weeksBOURGOUGNAGUE
WEDNESDAY green weeksFRIDAY white weeksCAMBES
MONDAY green weeksWEDNESDAY white weeksLACHAPELLE
MONDAY green weeksTHURSDAY white weeksLAPERCHE
TUESDAY white weeksWEDNESDAY green weeksLA - SAUVETAT - DU - DROPT
TUESDAY white weeksTHURSDAY green weeksLAUZUN
MONDAY green weeksFRIDAY white weeksLAVERGNE
TUESDAY white weeksTHURSDAY green weeksMIRAMONT - DE - GUYENNE
TUESDAY green weeksTHURSDAY white weeksMONTIGNAC - DE - LAUZUN
WEDNESDAY white weeksWEDNESDAY green weeksMONTIGNAC - TOUPINERIE
TUESDAY white weeksTHURSDAY green weeksMOUSTIER
WEDNESDAY green weeksWEDNESDAY white weeksPEYRIERE
MONDAY green weeksTHURSDAY white weeksPUYSSERAMPION
MONDAY green weeksWEDNESDAY white weeks113
ROUMAGNEMONDAY white weeksTHURSDAY green weeks
SAINT - COLOMB - DE - LAUZUNWEDNESDAY white weeksWEDNESDAY green weeks
SAINT - PARDOUX - ISAACMONDAY white weeksFRIDAY green weeks
SEGALASWEDNESDAY white weeksWEDNESDAY green weeks
\n\n**MORE QUESTIONS ?**\n\nWebsite:**www.ccpl47.fr**\n/ Section En Pratique > Environnement > Gestion des déchets \n\n**Environnement Service**: \n12 rue du Renfort 47410 LAUZUN \n**05 53 94 11 23 / secretariat.environnement@ccpl47.fr**\n**Composting**: anim.biodechets@ccpl47.fr / 06 33 72 84 18 \n**Recycling centre access, registration or modification**: iris@ccpl47.fr / 05 53 64 12 26 \n\n3 \n2 \n0 \n2 \n1 \n1 \n- \nm \no \nc \n. \ni \n\n. \n\no \nk \ne \nd \na \nw \nw \nw \n- \n\n. \n\ni \n\no \nk \né \nd \nA \n: \n\nn \no \ni \nt \np \ne \nc \nn \no \nC", - "page_start": 3, - "page_end": 3, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "Figure 2-2 IBM PowerVC \n\nAround 2011, Container technology started to be a strong player in the cloud arena, which is \na method to package an application in a box so it can be run with its dependencies, isolated \nfrom other applications. For more information, see 2.3, “Containers” on page 19. \n\nA year later, Docker Containers exploded in popularity, but one thing was missing: the \nthorough view and management of the entire environment.", - "page_start": 28, - "page_end": 28, - "source_file": "sg248459.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Introduction to containers and**\n**orchestration with Kubernetes**\n\nThis chapter presents the conceptual foundations of containers and the open source \ncontainer orchestration Kubernetes. It also introduces the Red Hat Enterprise Kubernetes \nproduct that is called Red Hat OpenShift. \n\nThis chapter includes the following topics: \n\n(cid:2) 2.1, “A new computing paradigm in cloud transformation” on page 8 \n(cid:2) 2.2, “Virtual machines meet containers” on page 12 \n(cid:2) 2.3, “Containers” on page 19 \n(cid:2) 2.4, “Kubernetes: An open source container orchestration” on page 24 \n(cid:2) 2.5, “Enterprise Kubernetes: Red Hat OpenShift” on page 31", - "page_start": 22, - "page_end": 22, - "source_file": "sg248459.pdf" - }, - { - "text": "New opiate and crack-cocaine users: characteristics and trends 4", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Table A8: Projected non-criminal prison population (end of June figures)10**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
Scenario 1CentralScenario 2
Jun - 151.8001.8001.800
Jun - 161.8001.8001.800
Jun - 171.8001.8001.800
Jun - 181.8001.8001.800
Jun - 191.8001.8001.800
Jun - 201.8001.8001.800
\n\n**Table A9: Projected fine defaulter prison population (end of June figures)8**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
Scenario 1CentralScenario 2
Jun - 15100100100
Jun ‐ 16100100100
Jun - 17100100100
Jun - 18100100100
Jun ‐ 19100100100
Jun - 20100100100
", - "page_start": 18, - "page_end": 18, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "The convention was not the only target within Lyon during the French Revolution. \nAfter the Convention faded into history, the French Directory appeared and days after \nthe 4 September 1797 Coup of 18 Fructidor, a Directory's commissioner was \nassassinated in Lyon. \n\nThe city became an important industrial town in the 19th century. In 1831 and 1834, \nthe*canuts*(silk workers) of Lyon staged two major uprisings for better working \nconditions and pay. In 1862, the first of Lyon's extensive network of funicular \nrailways began operation. \n\nMassacre during the Canut rebellion \nof 1834 \n\nDuring World War II, Lyon was a centre for the occupying Nazi forces, including \nKlaus Barbie, the infamous \"Butcher of Lyon\". However, the city was also a \nstronghold of the French Resistance, the many secret passages known as*traboules*, enabled people to escape Gestapo raids. \nOn 3 September 1944, Lyon was liberated by the 1st Free French Division and the Forces Françaises de l'Intérieur. The city \nis now home to a Resistance museum.[33][34] \n\n\n\n**Geography**\n\nThe Rhône and Saône converge to the south of the historic city centre, forming a \npeninsula – the \"*Presqu'île*\" – bounded by two large hills to the west and north and a \nlarge plain eastward. Place Bellecour is located on the Presqu'île between the two \nrivers and is the third-largest public square in France. The broad, pedestrian-only Rue \nde la République leads north from Place Bellecour. \n\nThe northern hill is La Croix-Rousse, known as \"the hill that works\" because it is \ntraditionally home to many small silk workshops, an industry for which the city has \nlong been renowned.[35] \nThe Saône-Rhône confluence \n\nThe western hill is Fourvière, known as \"the hill that prays\" because it is the location \nfor Basilica of Notre-Dame de Fourvière, several convents, and Archbishop residence. The district, Vieux Lyon, also hosts \nthe Tour métallique (a highly visible TV tower, replicating the last stage of the Eiffel Tower) and one of the city's \nrailways.[36] Fourvière, along with portions of the Presqu'île and much of La Croix-Rousse, is designated as a UNESCO \nWorld Heritage Site.[37] \n\nEast of the Rhône from the Presqu'île is a large flat area upon which sits much of modern Lyon and contains most of the \ncity's population. Situated in this area is La Part-Dieu urban centre, which clusters the landmark structures Tour Incity, Tour \nPart-Dieu, Tour Oxygène, and Tour Swiss Life, as well as the city's primary railway station, Gare de Lyon-Part-Dieu. \n\nNorth of this district lays the sixth arrondissement, which is home to one of Europe's largest urban parks, the Parc de la Tête \nd'or, as well as Lycée du Parc and Interpol's world headquarters.", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", - "query": "What to do if my container is stolen ?", - "target_page": 4, - "target_passage": "Container stolen: What to do? In case of theft, your container will be replaced on presentation of a theft report effected at your local police station.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "During climbing", - "page_start": 167, - "page_end": 167, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**22. Investments in Controlled Entities**", - "page_start": 71, - "page_end": 71, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Note:**If the volumes are not synchronized, the initial copy will copy the entire source \nvolume to the remote target volume. If you suspect volumes are different or if you have \na doubt, then synchronize them to ensure consistency on both sides of the relationship.", - "page_start": 606, - "page_end": 606, - "source_file": "sg247938.pdf" - }, - { - "text": "We have general liability, vehicle liability, employment practices liability, pollution liability, directors and \noÇcers liability, worker's compensation and employer's liability coverage, as well as umbrella liability policies \nto provide excess coverage over the underlying limits contained in these primary policies. We also carry \nproperty insurance. Although we try to operate safely and prudently and while we have, subject to limitations \nand exclusions, substantial liability insurance, no assurance can be given that we will not be exposed to \nuninsured liabilities which could have a material adverse eÅect on our Ñnancial condition, results of operations \nor cash Öows. \n\n12", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]oc get events - n defaultNormalFetchedCatalog\n
LAST SEENFIRST SEENCOUNTNAMEKIND
SUB0BJECTTYPEREASONSOURCEMESSAGE
7m4d704temp1ate - serv1ce - broker. 15d413288a764433ClusterServiceBrokersery1ce - catalga - control
FetchedCatalog
351V ILE * LaLa10g * LUITL1UT IE1 * ISuccessful 1yfetched cata1ogentries from broker.2m
4d1403ans1b1e - service - broker. 15d41326aef38cdaClusterServiceBrokerNormal
serv1ce - cata1og - contro11er - r
Successfullyfetched catalogentries from broker.
\n\n**Note:**For more information about events in OpenShift Container Platform 3.11, see this \nweb page. \n\nThe**oc logs RESOURCE_NAME**command retrieves the log output for a specific build, \ndeployment, or pod. This command works for builds, build configurations, deployment \nconfigurations, and pods. \n\nTo view the logs for the registry Pod use the**oc logs**: \n\n**oc logs docker-registry-3-4flql**\ntime=\"2019-11-09T19:08:13.824438413Z\" level=info msg=response go.version=go1.9.7 \nhttp.request.host=\"10.130.0.48:5000\" \nhttp.request.id=274b894e-93b8-4186-9757-f4736ba792a9 http.request.method=GET \nhttp.request.remoteaddr=\"10.130.0.1:48328\" http.request.uri=/healthz \nhttp.request.useragent=kube-probe/1.11+ \nhttp.response.duration=\"53.286μs\" http.response.status=200 http.response.written=0 \ninstance.id=29752895-706b-4169-951c-351af53ad214 \n\nThe**oc rsync**command copies the contents to or from a directory in a running pod. If a pod \nhas multiple containers, you can specify the container ID by using the -c option. Otherwise, it \ndefaults to the first container in the pod. This is useful for transferring log files and \nconfiguration files from the container. \n\nTo copy contents from a directory in a pod to a local directory, run the following command: \n\noc rsync : [-c ] \n\nTo copy contents from a local directory to a directory in a pod, run the following command: \n\noc rsync : -c [] \n\nUse the**oc port-forward**command to forward one or more local ports to a pod. This allows \nto listen on a specific or random port locally, and have data forwarded to and from specific \nports in the pod. This command features the following format: \n\noc port-forward [:] \n\n**Note:**The OpenShift Container Platform 3.11 CLI Reference is available at this web page. \n\n**153** Chapter 6. Installing Red Hat OpenShift 3.11 on IBM PowerVC", - "page_start": 168, - "page_end": 168, - "source_file": "sg248459.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "“We will continue to pursue \nopportunities to grow and \nenhance shareholder value. \nWe plan to actively seek strategic \nacquisitions; look for additional \nbranch locations in higher- \ngrowth areas to expand our \nexisting banks; and increase \nour mortgage and \n.brokerage operations.”", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "**Businesses we acquire may have undisclosed liabilities.**\n\nIn pursuing our acquisition strategy, our investigations of the acquisition candidates may fail to discover \ncertain undisclosed liabilities of the acquisition candidates. If we acquire a company having undisclosed \nliabilities, as a successor owner we may be responsible for such undisclosed liabilities. We typically try to \nminimize our exposure to such liabilities by obtaining indemniÑcation from each seller of the acquired \ncompanies, by deferring payment of a portion of the purchase price as security for the indemniÑcation and by \nacquiring only speciÑed assets. However, we cannot assure you that we will be able to obtain indemniÑcations \nor that they will be enforceable, collectible or suÇcient in amount, scope or duration to fully oÅset any \nundisclosed liabilities arising from our acquisitions. \n\n\n \n \n \n \n [html]\n
Table.
Table1 *
", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": " ", - "page_start": 51, - "page_end": 51, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed6_cc4.pdf", - "query": "How many people include the Dyspnea study ?", - "target_page": 1, - "target_passage": "This population-based study included 2,857 adults who were experiencing respiratory symptoms.", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 \n\nTake-home Points \n\nStudy Question: How profoundly are adults with \nundiagnosed respiratory symptoms \naffected by \ndyspnea? \nResults: In community-based adults with undiag- \nnosed respiratory symptoms, those identified with \npreserved ratio impaired spirometry experienced the \ngreatest impact of dyspnea, followed by those with \nundiagnosed asthma or COPD. Greater dyspnea \nimpact was associated with increased health care \nutilization, lower quality of life, and reduced work \nproductivity. \nInterpretation: Dyspnea imposes burdens on the \nhealth care system and is associated with impaired \nquality of life and work productivity. \n\nDyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. \n\nDyspnea not only affects individuals with diagnosed \nrespiratory conditions but also poses a significant \nburden on those with undiagnosed conditions. In a \nsystematic review by Müller et al,4 the combined \n\nStudy Design and Methods \nRecruitment of Undiagnosed Cases and Healthy \nControl Patients \nBetween June 2017 and January 2023, adults aged $ 18 \nyears were recruited through a two-step process into the \nUndiagnosed COPD and Asthma Population (UCAP) \nstudy, a multicenter case finding study. Approval for \n\nthe study was obtained from the research ethics boards \nof \nthe 17 participating study sites across Canada. \nInformed, written consent was provided by all study \nparticipants. \n\nBoth landlines and cellphones within a 90-minute radius \nof any of the 17 study sites were dialed randomly. A", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "[html]5. Nishino T. Dyspnoea : underlying mechanisms and treatment. Br J. Anaesth. 2011 ; 106 : 463 – 474.16Jones PW. St George ' s Respiratory Questionnaire : MCID. J Chronic Obstr Pulm Dis 2005 ; 2 : 75 - 79.assessed through inspiratory resistive loading. 1 Bras Pneumol. 2015 ; 41 ( 2 ): 143 - 150.6. Neder J, Berton D, Miller P, et al. Ventilatory inefficiency and exertional dyspnea in early chronic obstructive pulmonary disease. Am Thorac Snc. 2017.141 suppl_1322 - 529.17.Global Initiative for Asthma. Global strategy for asthma management and prevention. Global Initiative for Asthma website. Accessed July 30.2023. https :// ginasthma. org / wp - content / upkoads / 2023 / 07 / GJNA - 2023 - Full - report - 21825Elatrim X, Bornefalk H, Skidid M, et al. Validation of the Swedish Multidimensional Dyspnea Profile ( MDP ) in outpatients with cardiorespiratory disease. BNJ Upen Respor Kes. 2019 / 8 : e00038.7. Groenberger [ 8, Vetri I, Keininger DL, Malker DA, Greater dyspnea is associated with lower bealth - related quality of life umong European patients with COPD. Int J Ornor Obstruct Psomon Dn. 2617.12.937.544,18.Global Initiative for Chronic Obstructive Ling Disease, Gender, Global intrahigh for the Controlled Chronic obstructive pulmonary disease. Global Initiative for Chronic Obstructive Lung Disease website. Accessed July 30, Lung Din26Yorke J, Russell AM, Swigris I, et al. Assessment of dyspnea in asthma : validation of Tbe Dyspnea - 12. J Aribma : 2011 ; 48 ( 6 ): 602 - 608.8. Pretensti M, Whitnore GA, Vandembeen KL, et al. Population - based case - finding to identify subjects with undiagnosed asthma or COPD. Eae Ropir J. 2020 : 55 : 2000024.Table2023. https :// goldcopd. org / wp - content / uploods / 2023 / 03 / GOLD - 2023 - ver - 1.5 - 17Feb2023_WMV gdfTablehyperresponsiveness in subjects with respiratory symptoms and normal spirometry. Eur Respir 1.20123 ; 61 ( 3 ): 2201194.19.Magner KMA, Cherian M, Whitmore GA, et al. Assessment of preserved ratio impaired spirometry ( PRISm ) vsing pre and post bronchodilator spirometry in a randomly - sempled symptomatic cohort, Ass J Rusp Crii Case Med. 20220810 ): 1125 - 11328Gentein E, Bierbrier 1, Whitmore GA, et al. Impact of undiagnosed chronic obstructive pulmonary disease and asthma on symptoms, quality of life, healthcare use, and work productivity. And J Respir Crit Care Mair 2023.200012 ; 1271 - 1282validation of the UCAP - Q case - trnding questionnaire to detect undiagnosed asthma and COPD. Esr Respir J.20.Hanania NA, O ' Donnell DE. Activity - related dyspnea in chronic obstructive29Asron SD, Vandembeen K, Whitmore GA, et al. Early diagnosis and treatment of COPD and asthma : a randomized, controlled trial. N Engl. J Med. 2024.390 ( 22 ): 2061 – 2073.0. Shin B, Cole SL, Park SJ, et al. A new symptom - based questionnaire for predicting the presence of asthma.Tablerelated dyspnea in chronic obstructive pulmonary disease : physical and poychological consequences, unmet needs, and foture directions. Int II Glion Obstruct Pabnor Dis. 2019.14 : 1127 - 113RTableJ Investig Allergol Clin Immunol. 2010 ; 20 : 27 - 34. briva. nto. timbalwas TV : Norbdom B111. Price DB, Tinkelman DG, Nordyke RJ, et al. Scoring system and clinicalReilly Associates. WPAI scoring. Reilly Associates website. Accessed May 1.2024. http :// www. reillyassociates. net / wpai_scoring. htmlTablepersons with symptoms and preserved lung function. N Engl J Med. 2022 ; 387 ( 13 ): 1173 - 1184.application of COPD diagnostic questionnaires. Chest. 2006 ; 129 : 1531 -", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Risk Factors Associated With Dyspnea \nPatient-related risk factors were considered first, and re- \nsults of spirometry considered afterward. The spirom- \netry risk factors chosen for the second stage analysis \nincluded the spirometry-based diagnosis of the patient \n(asthma, COPD, PRISm, or normal) and lung function \nresults indicative of the severity of physiologic impair- \nment. Severity was gauged by assessing three principal \nlung function measures: (1) post-BD FEV1 % predicted, \n(2) post-BD FEV1/FVC ratio, and (3) percentage \nreversal of FEV1 with BD. \n\nindicate greater impairment in work productivity and \ndaily activities. \n\nStatistical Analysis \n\nBox plots were used to compare distribution patterns of \ndyspnea impact assessments among the disease groups. \nPairwise comparison tests were conducted to evaluate \nmean dyspnea differences between groups. Multiple \nlinear regression analysis was used to measure contribu- \ntions to variability of dyspnea by selected patient-specific \nrisk factors, spirometry disease classification, and key \nlung function measures. The selected sets of risk factors \nwere evaluated using successive regression analyses. \nAnalysis of variance sums of squares from the successive \nregression analyses provided the cumulative percentage \ncontributions to variability of dyspnea. Simple, multiple, \nand logistic regression analyses were used to study asso- \nciations between dyspnea and health care utilization, \nquality of life, and work productivity outcomes. All sta- \ntistical analyses were done using STATA 16 statistical \nsoftware (StataCorp). \n\nDyspnea Impact and Health Care Use, Quality of \nLife, and Work Productivity \n\nThe impact of dyspnea and its associations with health \ncare use, quality of life, and work productivity were exam- \nined. Health care utilization was assessed through self- \nreported data. Quality of life was assessed using the 36- \nItem Short Form Health Survey questionnaire, where \nhigher scores indicate better health status. Work produc- \ntivity was assessed using the Work Productivity and Activ- \nscores \nity Impairment questionnaire, where higher \n\nResults \nFigure 1 illustrates the results of the case finding \napproach, including the enrollment of the control group. \nAmong 5,631 potentially eligible participants, 1,359 participants (24%) did not meet the threshold of $ 6 \npoints on the ASQ or $ 20 points on the COPD- \nDiagnostic Questionnaire and were thus excluded, \nleaving 4,272 individuals deemed eligible for spirometry. \n\n21,274 excluded \n8,273 Previous diagnosis of asthma \n5,363 Previous diagnosis of COPD \n190 Age < 18 years \n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary \nfibrosis, or lung cancer \n1,331 History of MI, heart problems, stroke, aortic or cerebral \naneurysm, eye surgery, or detached retina in past 3 mos. \n19 Pregnant, in the third trimester \n3,715 Under care of respirologist or using an inhaled respiratory \n\n2,090 (73.2%) had normal \nspirometry \n172 (6.0%) had PRISM \n\nFigure 1 – Study flow diagram demonstrating the case finding and control group recruitment and allocation. ASQ ¼ Asthma Screening Questionnaire; \nCOPD-DQ¼ COPD Diagnostic Questionnaire; CF ¼ cystic fibrosis; MI ¼ myocardial infarction; PRISM ¼ preserved ratio impaired spirometry.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "\n \n \n \n \n [html]MeasureUnadjustedAdjusted\n
Dyspnea OR ( 95 % CI )P ValueDyspnea OR ( 95 % CI )P Value
In the past 12 mo, did you visit your general practitioner or a nurse practitioner or another physician at a walk - in clinic for any breathing problems?1.011 ( 1.007 - 1.014 )<. 0011.011 ( 1.007 - 1.014 )<. 001
In the past 12 mo, did you visit an emergency department for any breathing problems?1.015 ( 1.009 - 1.021 )<. 0011.015 ( 1.009 – 1.022 )<. 001
In the past 12 mo, were you hospitalized for any breathing problems or respiratory illness?1.021 ( 1.006 - 1.037 ). 0061.023 ( 1.007 - 1.039 ). 005
\n\noutpatients with cardiorespiratory disease25 and the \nDyspnea-12 in patients with asthma26 and found that \nthe affective aspect of dyspnea can significantly influence \nthe impact of dyspnea on health status, irrespective of \nthe intensity of breathlessness. \n\nand validated respiratory health questionnaires, and \nour dyspnea assessment measure is a weighted average \nof responses to these validated questions. \nConsequently, the measure has an immediate \ninterpretation in terms of the lived day-to-day \nexperience of individuals. \n\nIn those with PRISm, there was a strong, positive \nassociation between higher values for the FEV1/FVC \nratio and dyspnea. For the PRISm group, a higher \nFEV1/FVC ratio may reflect diminished lung \ncompliance due to interstitial lung disease and/or \nrespiratory system restriction due to obesity, which \ncould contribute to worse dyspnea. Conversely, the \nassociation of dyspnea with the FEV1/FVC ratio was in \nthe opposite direction for those with asthma or COPD, \nand a lower FEV1/FVC ratio correlated with worse \ndyspnea, as expected. \n\nOur study has limitations. We did not undertake \nreliability/reproducibility testing of our questionnaire. \nThe dyspnea impact assessment score was statistically \nassociated with increased health care utilization, lower \nquality of life, and reduced work productivity; therefore, \nby virtue of this analysis, our questionnaire has \nconstruct validity. However, further attempts at external \nvalidation of the questionnaire using an independent \ndata set would be important. Health care utilization \nduring the preceding 12 months was assessed on entry \ninto the study, and there is potential for impaired recall \nof events. Our study may have missed asthma in some \nparticipants because bronchial challenge testing was not \nconducted on those who tested negative for airflow \nobstruction or BD responsiveness. A previous study \nshowed that an additional diagnostic step incorporating Our study complements the literature by focusing on \nadults with undiagnosed respiratory symptoms who \nwere randomly selected and recruited through active \ncase finding in the community. This increases the \ngeneralizability of our results to a broader population. \nOur dyspnea questions were derived from widely used \n\nTABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI)", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Disease GroupReversibility of FEV1, %Post - BO FEV1 / FVC RatioPost - BD FEV1 % predictedOverall P Value
Control− 0.163 ( P =. 47 )− 0.274 ( P =. 05 )− 0.090 ( P =. 17 ). 096
Normal spirometry0.186 ( P =. 16 )0.240 ( P =. 005 )− 0.131 ( P <. 001 )<. 001
Asthma0.545 ( P =. 01 )0.107 ( P =. 58 )− 0.158 ( P =. 08 ). 009
COPD0.392 ( P =. 002 )− 0.307 ( P =. 05 )− 0.075 ( P =. 37 )<. 001
PRISm− 0.290 ( P =. 39 )0.854 ( p =. 002 )− 0.650 ( P =. 004 )<. 001
\n\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-specific factors and spirometry \ndisease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical significance. BD ¼ bronchodilator; PRISm ¼ preserved ratio \nimpaired spirometry. \n\n(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. \n\nThere were significant but modest differences in mean \ndyspnea levels across the 17 study sites (data not \nshown), which are not explained by the risk factors we \naccounted for in our study. This finding is not surprising \nbecause some of the potential contributing factors \npreviously mentioned and other site-specific factors \nThe affective dimension of dyspnea can be captured \nusing additional questionnaires (eg, Multidimensional \nDyspnea Profile, Dyspnea-12). Studies have explored the \nuse of the Multidimensional Dyspnea Profile in \n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Individuals with undiagnosed respiratory symptoms, \ndetermined to have asthma or COPD through \nspirometry, experience poor health status.28 Therefore, \nthe implementation of known treatment approaches for \nasthma or COPD is important to improve their \nconditions.29 In contrast, those with normal spirometry \nor PRISm face unclear treatment approaches. Long- \nacting BD therapy in symptomatic individuals with \ntobacco exposure with normal spirometry is not \neffective.30 Weight management programs may be useful \nfor individuals who are obese with PRISm-related \ndyspnea; however, this awaits definitive clinical trials.31 In conclusion, our study measured dyspnea impact in \nindividuals with no preexisting diagnosis of lung disease \nwho reported respiratory symptoms as part of a \npurposeful case finding strategy. Individuals with PRISm \nexhibited the greatest impact of dyspnea, even higher \nthan those newly diagnosed with asthma or COPD. \nAfter adjusting for patient factors, comorbidities, \npulmonary diseases, and severity of lung physiologic \nimpairment, most of the variability in dyspnea remained \nunexplained. We also showed that dyspnea was \nassociated with increased health care utilization, \nimpaired quality of life, and work productivity. \n\nDyspnea was severe and prevalent within our study \ngroup; however, it remained undiagnosed. A study \nconducted by Stefan et al32 revealed that physicians \nunderestimated their patients’ dyspnea 37.9% of the \ntime, whereas nurses underestimated it 3.5% of the time. \nMoreover, many patients limit their physical activities, \nwhich lead them to downplay the extent of their \ndyspnea.19 Patient underreporting of symptoms, coupled \n\nFunding/Support \nThis study is supported by the Canadian Institutes of \nHealth Research [FDN Grant 154322]. \n\nFinancial/Nonfinancial Disclosures \nNone declared.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Impact of Dyspnea on Adults With \nRespiratory Symptoms Without a Defined \nDiagnosis \n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD; \n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD; \n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD; \n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD; \n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD \n\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health \ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory \nsymptoms. \n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory \nsymptoms? \n\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were \nexperiencing respiratory symptoms. These individuals had not been previously diagnosed \nwith any lung conditions and were recruited from 17 Canadian centers using random digit \ndialing. Each participant underwent spirometry testing both before and after using a bron- \nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved \nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age- \nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A \ndyspnea impact assessment score from 0 to 100 was produced using questions from the \nCOPD Assessment Test and St. George’s Respiratory questionnaire. \nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, \n63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; \n95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All \ngroups reported significantly more impactful dyspnea than the control group (mean score, \n13.8; 95% CI, 11.8-15.7). Patient-specific risk factors including age, sex, BMI, smoking, and \ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the \nvariation was explained by disease classification and another 1.7% by the severity of lung \nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater \ndyspnea impact was associated with increased health care utilization, lower quality of life, and \nreduced work productivity. \nINTERPRETATION: Our findings showed that in community-based adults with undiagnosed \nrespiratory symptoms, those identified with PRISm experienced the greatest impact of dys- \npnea. Dyspnea imposes burdens on the health care system and is associated with impaired \nquality of life and work productivity. \nCHEST 2024; 166(6):1296-1308", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "TABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36) \n\n\n \n \n \n \n [html]MeasureUnadjustedAdjusted\n
Dyspnea Coefficient ( 95 % CI )P ValueDyspnea Coefficient ( 95 % CI )P Value
Physical functioning− 0.693 (− 0.718 to − 0.668 )<. 001− 0.655 (− 0.680 to − 0.630 )<. 001
Physical health limitations− 0.634 (− 0.666 to − 0.603 )<. 001− 0.628 (− 0.661 to − 0.595 )<. 001
Emotional problems− 0.403 (− 0.438 to − 0.369 )<. 001− 0.407 (− 0.443 to − 0.370 )<. 001
Energy / fatigue− 0.454 (− 0.479 to − 0.428 )<. 001− 0.452 (− 0.479 to − 0.425 )<. 001
Emotional well - being− 0.230 (− 0.256 to − 0.204 )<. 001− 0.239 (− 0.266 to − 0.213 )<. 001
Social functioning− 0.433 (− 0.466 to − 0.399 )<. 001− 0.434 (− 0.469 to − 0.399 )<. 001
Pain− 0.410 (− 0.444 to − 0.377 )<. 001− 0.387 (− 0.423 to − 0.352 )<. 001
General health− 0.390 (− 0.416 to − 0.364 )<. 001− 0.382 (− 0.409 to − 0.355 )<. 001
Total score− 0.485 (− 0.504 to − 0.467 )<. 001− 0.473 (− 0.493 to − 0.454 )<. 001
", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "s \nt \nh \ng \ni \ne \nw \nn \no \ni \nt \ns \ne \nu \nQ \n\n; \ny \nr \nt \ne \nm \no \nr \ni \np \ns \n\nd \ne \nr \ni \na \np \nm \n\n. \nn \nw \no \nh \ns \ni \n\no \ni \nt \na \nr \ne \nr \na \n\nd \ne \nv \nr \ne \ns \ne \nr \np \n¼ \nm \nS \nI \nR \nP \n\ns \ne \ny \n\nd \ne \nr \ne \nw \ns \nn \na \n\no \nh \nw \ns \nt \nn \na \np \ni \nc \ni \nt \nr \na \np \n\n; \nt \ns \ne \nT \n\nt \nn \ne \nm \n\ns \ns \ne \ns \ns \nA \nD \nP \nO \nC \n¼ \nT \nA \nC \n\nf \no \n\ns \ne \ng \na \nt \nn \ne \nc \nr \ne \np \n\ne \nr \ne \nh \nw \n\nHowever, 1,415 either did not attend or were unable to \ncomplete adequate spirometry. Ultimately, 2,857 (67%) \nof those eligible underwent both pre- and post-BD \nspirometry. \n\nOf these 2,857 participants, 2,090 (73.2%) had normal \nspirometry, 265 (9.3%) had undiagnosed asthma, 330 \n(11.5%) had undiagnosed COPD, and 172 (6.0%) had \nPRISm based on post-BD spirometry. Of the 595 \nindividuals with spirometric evidence of asthma or \nCOPD, 253 were independently assessed by a \npulmonologist. In 245 of these 253 cases (97%), the \nindependent physician diagnosis agreed with the study \ndiagnosis of asthma or COPD. \n\nIndividuals in the COPD group were generally older \nand more likely to be male compared with all other \nstudy groups (Table 1). All groups, including healthy \ncontrol participants, had mean BMIs in the overweight \nor obese ranges. The PRISm group was heaviest with an \naverage BMI of 34.7, and 22% of PRISm patients met \nBMI criteria for morbid obesity. Compared with all \nother groups, those with COPD were the most likely to \nhave active or previous tobacco use, with the highest \naverage total pack-years of 32.7. The control group had \nthe lowest number of people with active or previous \ntobacco use. \n\n. \ns \nn \no \ni \nt \ns \ne \nu \nq \n\n, \ns \nn \no \ni \nt \ns \ne \nu \nq \nl \n\na \nu \nd \ni \nv \ni \nd \nn \no \nn \nr \no \ni \ns \ne \ny \nw \no \ne \nb \nl \ns \na \n\ns \nt \nn \na \np \ni \nc \ni \nt \nr \na \np \n\nn \nw \no \nh \ns \n\ne \nr \na \n\nt \nn \ne \nm \no \nt \n\nd \ne \nt \nn \ne \ns \ne \nr \np \ns \ns \ne \ns \ns \na \n\na \ne \nn \np \ns \ny \nd \n\ne \nr \ne \nw \n5 \n1 \nQ \no \nt \ne \nh \nt \n\ng \nn \ni \nt \na \nu \nc \na \nc \n3 \nQ \nd \nn \na \n\n, \n) \nl \na \nt \no \nt \n( \nr \no \nf \n\nd \ne \ns \nu \n\nTable 2 shows mean responses to the 15 dyspnea \nquestions for each disease classification and presents \nquestion weights (PCA scoring coefficients) used for \ncalculating the dyspnea impact assessment. \n\nIndividuals with PRISm reported the highest dyspnea \nimpact, with a significantly greater mean score (63.0; \n95% CI, 59.5-66.4) than those with undiagnosed \nasthma or COPD (Table 3). Those with undiagnosed \nasthma or COPD had similar mean scores (56.6; \n95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9, \nrespectively), followed by those with normal \nspirometry (51.8; 95% CI, 50.7-52.8). All four groups \nreported significantly more impactful dyspnea than \nthe control group (mean score, 13.8; 95% CI, 11.8- \n15.7). Table 3 shows between-group differences in \nmean dyspnea impact assessments for each pair of \ndisease outcomes. Figure 2 compares box plots of the \ndyspnea impact assessment values across disease \nclassifications. \n\nl \n\n. \ne \nr \ni \na \nn \nn \no \ni \nt \ns \ne \nu \nQ \n\nl \n\n3 \nQ \nd \nn \na \n\n) \ns \nt \nn \ne \ni \nc \nfi \nf \ne \no \nc \ny \nr \no \nt \na \nr \ni \np \ns \ne \nR \n\n, \n2 \nQ \n\n, \n1 \nQ \nr \no \nf \ng \nn \ni \nr \no \nc \ns \ns \ne \ng \nr \no \ne \nG \n\n’ \n) \nD \nS \n( \n\ns \ni \ns \ny \na \nn \na \nn \na \ne \nm \n\n. \nt \nS \n¼ \nQ \nR \nG \nS \n\nl \n\ns \na \n\nt \nn \ne \nn \no \np \nm \no \nc \nd \ne \nt \nn \ne \ns \ne \nr \np \nl \n\na \np \ni \nc \nn \ni \nr \np \n( \n\ne \nr \na \n\na \nt \na \nD", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "; Jennifer Biggs, RN ; Jessica Bergeron ;Sarah Anthony, BNRN ; and Tanya Nolan,Prevalence of dyspnea in general adultand Elisabet White ; Vancouver GeneralBNRN ; McGill University Health CentrePreparations : a systematic review andHospital, Vancouver, British Columbia :Montreal, QC : Francine Noel ; Royal Victoriameta - analysis. Respir Med. 2023 ; 218 :Shelley Abercromby, BSc ; Jana Caine, DavidRegional Health Centre, Barrie, ON : Masoud1.07379.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "CompostGuide.pdf", - "query": "Can I put my plants directly on my compost ?", - "target_page": 2, - "target_passage": "Don’t\tput\tplants\tinto\t100%\tcompost.\t\tMix\t\t\t\t\t\t\t\t\t compost\tthoroughly\tinto\texisting\tsoil\tbefore\t\t\t planting.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Ask Your Compost Supplier \n\n**Whether you’re buying direct from the composting facility, or from a local**\n**vendor, here are some good questions to ask:**\n\n**• What ingredients go into your compost?**\n**• What compost products or blends do you sell?**\n**• Are there quality control or testing results available for these**\n**products? (These may be on the manufacturer’s website.)**\n\n**• Which product is best for my intended use?**\n**• What application rate do you recommend?**\n**• How much do I need for my area? (Or see pages 4-6.)**\n\nCompost: A Natural Cycle \nComposting is a natural process in which micro- \norganisms and macro-organisms break down organic \nmaterial (leaves, twigs, grass, etc.) into a dark crum- \nbly soil amendment. Modern compost facilities use \nthe same natural biological composting process. \nTheir controlled-temperature process works faster, \nbreaks down pesticide residues, and also kills weed \nseeds and plant diseases. \n\nCompost improves soil structure and plant \ngrowth by \n\n• Replenishing soil organic matter, and storing \n nutrients in plant-available forms \n\n• Supporting beneficial soil life \n\n• Reducing erosion and water run-off \n\n• Loosening clay soils for better root \n development (increasing soil pore space) \n\n• Retaining moisture in sandy soils so \n plants need less watering. \n\nComparing Landscape Products \nA variety of soil and landscape products are sold. Here’s a \ncomparison: \n\n**Compost**is stable, decomposed organic matter, excellent for \nimproving soil structure, fertility, moisture holding capacity, and \nplant growth. \n\n**Mulch**is any material applied to the soil surface. Woody mulches \n(high in carbon, low in nitrogen) like wood chips, bark and woody \ncomposts are great for woody plants. Annual plants should be \nmulched with nutrient-balanced mulches like compost, grass \nclippings, or leaves. \n\n**Peat Moss**is partially decayed sphagnum moss from peat bogs. It \nprovides soil porosity, but not the nutrients or biological diversity for \nhealthy soil that compost provides. \n\n**Fertilizers**are concentrated sources of plant nutrients, used in small \namounts to supplement natural soil fertility. \n\n**Topsoil**that is sold is usually not native topsoil. Quality \nmanufactured topsoils are a blend of native sandy sub-soils with \ncomposted organic matter to support soil life.", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "**Compost Organizations**\n\nThe Beauty of Your Lawn and Garden \nBlossoms from the Soil \n\nThank you for your interest in compost. \n\nCompost is a versatile product with many benefits. It enhances \nsoil quality, helps save water, and supports your community’s \nefforts to recycle organic debris. All this helps to conserve our \nnatural resources and reduces the amount of material sent to the \nlandfill. \n\nCompost-amended soil also helps break down pollutants and \nabsorb stormwater runoff. By making nutrients slowly available \nto plants and enhancing plant health, compost can reduce the \nneed for chemical fertilizers and pesticides. All these benefits \nhelp protect our lakes, rivers, and marine waters from pollution \nand excessive runoff. \n\nCompost is a natural amendment for your lawn or garden, and \ncan be used regularly to enrich your soil. This guide is designed \nto help you get the most from the compost that you buy. \n\n\n \n \n \n \n [html]\n
www. compostwashington. org
US Composting Council
Seal of Testing Assurance ( STA ) program www. compostingcouncil. org / programs / sta /
Restoring the Soil to Protect our Waterways
Compost amendment and erosion control during construction : information for builders www. buildingsoil. org
Natural Lawn & Garden Care, Soils, and Home Composting
City of Seattle www. seattle. gov / util / services / yard
King County www. kingcounty. gov / soils
Washington State University www. puyallup. wsu. edu / soilmgm
", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Applications for Compost \n**Planting New Garden Beds or Lawns**\nSpread a 2-4 inch layer of compost and mix into the upper 6-12 \ninches of existing soil: use more in sandy soils, and less in heavy clay. \nReapply ½-1 inch annually on garden beds. \n\n**Mulch (surface applications on landscape beds)**\nSpread a 1-2 inch layer of coarse, woody compost. To allow proper \nairflow, it is best not to pile mulch around the stems of trees and \nshrubs. Pull mulch 1-2 inches away from stems. \n\n**Top Dressing for Lawns**\nSpread a ¼ to ½ inch layer of fine screened compost, and rake it into \nthe lawn. For best results, plug-aerate the lawn before top-dressing. \nOverseeding at the same time will thicken thin patches in lawns. \n\n**Blended (Manufactured) Topsoils**\nGood quality “topsoil” products usually include 10-40% compost by \nvolume, mixed with a sandy loam soil that allows good drainage. \nThese compost-soil blends help establish healthy lawns and gardens. \n\nThe Composting Process \nEven though there are a variety of composting methods, most \ncomposting follows a similar process: \n\n**1. Grinding Organic Materials:**\nDepending on the facility, the feedstock (material) available, and \nthe desired compost product, different combinations of materials \nare added together and ground into small pieces: \n\n• Nitrogen-rich materials (such as grass, fresh plant \n cuttings, biosolids, and manures) \n• Carbon-rich materials (such as dried leaves, woody \n materials, and straw). \n\n**2. Heating Up:**\nThe material is placed into piles where it begins to heat up from \nthe biological activity of the compost microbes. Typically, com- \npost temperatures are required to reach at least 131 degrees F in a \nspecified time period in order to destroy weed seeds and patho- \ngens. The compost is turned or aerated, allowing the composting \nmicrobes to breathe. After a period of time, the nitrogen-rich \nmaterial is depleted, the biological process slows, and the hot \ncompost begins to cool. \n\n**3. Finishing:**\nTypically “finished” compost has undergone a series of steps to \nensure maturity and stability. The cooling compost is aged, which \nallows the decomposition process to slow down and the finished \ncompost to stabilize.", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" - }, - { - "text": "How Much Compost to Use \n\n l Estimate the planting area (Math Hint: Square feet = length x width) \n l Decide upon the appropriate application depth of the compost (page 4) \n l Use the charts below to estimate your compost needs. (Abbreviations: ft = foot; yd = yard; sq = square; cu = cubic.) \n l Conversions: 9 square feet = 1 square yard; 27 cubic feet = 1 cubic yard. \n\n**Question:*I have a plot about this big, how much compost do I buy?***\n\n\n \n \n \n \n [html]\n
Plot Size# of Sq Feet1 / 2 * Deep - Mulching or Top - dressing2nd Deep – Amending new lawns or gardens
5 ' x 10 ' plot50 sq ft2.08 cu ft of compost8.33 cu ft of compost ( 0.31 cu yd ) 16.66 cu ft of compost ( 0.62 cu yd )
20 x 50 ′ plot 1 acre1000 sq ft 43.600 sq ft41.7 cu ft of compost1.815 cu ft of compost ( 67 cu vd )166.7 cu ft of compost ( 6.2 cu yd ) 7.257 cu ft of compost ( 268 cu vd )
\n\n\n \n \n \n \n [html]\n
Compost Quantity1 / 2 * Deep - Mulching or Top - dressing2nd Deep - Amending new lawns or gardens
1 cu ft bag of compost24 sq foot area6 sq foot area
1.5 cu ft bag of compost36 sq foot area9 sq foot area
2.2 cu ft bag of compost53 sq foot area13 sq foot area
2.5 cu ft bag of compost60 sq foot area15 sq foot area
1 cubic yard of compost648 sq foot area162 sq foot area
\n\n*Compost Works! Soil blending trials conducted in 2008 by the Washington Organic Recycling Council, with funding from the Washington Department of Ecology,*\n*demonstrated that compost improves soil structure (lowers bulk density), nutrient availability (increases cation exchange capacity), moisture holding*\n\n*capacity, and supplies both nutrients that plants need and organic matter that supports soil life. See the 2008 Soil Blending Trial report at*\n\n**www.compostwashington.org.**", - "page_start": 7, - "page_end": 7, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. \n\nCompost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. \n\n\n \n \n \n \n [html]\n
1.2TableTableTable
TableTableTable_
parametermin***13
sMRI,1.
\n\n*Many localities now collect food scraps and \nfood-soiled paper along with yard debris for \ncomposting. Call your local collection service \nto find out what is collected in your area.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "Selecting Quality Compost \nCompost is available in many product types and blends that may be \nused for different gardening applications. The type of feedstock, \nthe composting process, and any supplementary additives determine \nthe end product. \n\nMany facilities offer a variety of blends based on compost, such as \ngarden mix, potting soil, planting mix, mulches, turf top-dressing \nand soil blends. \n\n**What to Look for in Compost**\nFor most compost applications you will want a finished product that \nhas matured and stabilized. Look for material \n l with a dark, crumbly texture \n l with a mild odor \n\nFor most compost applications you will not want compost that is \nextremely dry or wet, or extremely hot. (Note that it is okay for \ncompost to be warm and to give off some steam and mild odor.) \n\nBuilding Rich and Healthy Soil \nWith Compost \nTo grow healthy plants you need healthy soil. \n\n**Healthy Soil:**\nl \n\nIs teeming with life! Healthy soil is a miniature ecosystem. \nA teaspoon of healthy soil will have upwards of four billion \ntiny organisms which recycle nutrients, suppress disease, and \ndiscourage pests. \n\nl Retains moisture but allows drainage. Healthy soil has \n\nstructure that allows water to drain through, retains moisture, \nand promotes strong root growth. \n\nl Is full of organic nutrients. Plants depend on the micro- \norganisms found in healthy organic-rich soil to provide \nnutrients to their roots, and help them thrive. \n\nA healthy garden and landscape is naturally resistant to pests, \ndrought, weeds, and diseases. Maintaining healthy soil may allow \nyou to reduce use of chemical fertilizers and pesticides. \n\n**Quality Testing at Composting Facilities**\nFeel free to ask your compost provider if they have a quality control \nprogram, and ask for test results. Compost facilities in Washington \nare permitted by the Department of Ecology and must meet \nstandards for both the composting process and contaminants, \nensuring a quality product. Some facilities also participate in the \n“Seal of Testing Assurance” (STA) testing program. See \n“Resources” on page 11 to learn more. \n\n**Soil is a planting medium. Compost is a soil amendment.**\n**Do not place plants directly into 100% compost.**\n**Ask your supplier or see next page for mixes for different uses.**\n\n**Washington State Encourages the Use of Compost,**\n**to Protect Our Water Quality**\nThe Washington State Department of Ecology recommends that soils \non construction sites be restored with compost before planting, and also \nencourages the use of compost for construction site erosion control, to reduce \nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean. \nLearn more at**www.SoilsforSalmon.org**or**www.BuildingSoil.org.**\n\n**Remember:**\n**Your compost provider can help you pick the best compost mix**\n**for your needs.**", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - }, - { - "text": "To**add a new child node**, either a pre-defined or a user-defined item, click on the right mouse button on the parent \nnode and select “**Add new child node**”. For ease of use, the parent nodes, where a child node can be added, are \nhighlighted in orange (figure 25). \n\n***Figure 25. Add new child node***", - "page_start": 18, - "page_end": 18, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "A project of the Washington Organic Recycling Council, with \nsupport from the Washington State Department of Ecology’s \nPublic Participation Grant program. \n\nThis product was partly funded through a grant from the \nWashington Department of Ecology. While these materials \nwere reviewed for grant consistency, this does not necessarily \nconstitute endorsement by the department. \n\n**Special thanks:**the original version of this brochure in 2003 \nwas created by the Washington County, Oregon Solid Waste and \nRecycling Program in cooperation with the Washington Organic \nRecycling Council and the Composting Council of Oregon.", - "page_start": 1, - "page_end": 1, - "source_file": "CompostGuide.pdf" - }, - { - "text": "**HOW TO GET A COMPOST KIT?**\n\n**Buy your own compost kit and get**\n**tips for good composting practice.**\nOnly during opening hours every \nwednesday from 2 pm to 4 pm at \nthe old recycling centre impasse \nElie Teyssier-Miramont. (In case of \nunavailability, please contact the \nenvironment department). \n30 minute workshops/awareness- \nraising sessions are regularly \norganised (starting at 4pm). It is \npossible to leave with a composter \nduring these workshops**. \nRegistration and information with \nthe service. \n\n**Compost kit** **Plastic** **Wood**\n\n300 L 20 € 30 € \n\n400 L 25 € 35 € \n\n*Only payment by cheque made payable to the \n‘Tresor Public‘ are accepted \n**Specific condition of acquisition apply accor- \nding to your municipality of residence \n\n\n \n \n \n \n [html]\n
Black containerYellow containerAGNAC
TUESDAY white weeksTHURSDAY green weeksALLEMANS - DU - DROPT
MONDAY green weeksWEDNESDAY white weeksARMILLAC
TUESDAY white weeksTHURSDAY green weeksBOURGOUGNAGUE
WEDNESDAY green weeksFRIDAY white weeksCAMBES
MONDAY green weeksWEDNESDAY white weeksLACHAPELLE
MONDAY green weeksTHURSDAY white weeksLAPERCHE
TUESDAY white weeksWEDNESDAY green weeksLA - SAUVETAT - DU - DROPT
TUESDAY white weeksTHURSDAY green weeksLAUZUN
MONDAY green weeksFRIDAY white weeksLAVERGNE
TUESDAY white weeksTHURSDAY green weeksMIRAMONT - DE - GUYENNE
TUESDAY green weeksTHURSDAY white weeksMONTIGNAC - DE - LAUZUN
WEDNESDAY white weeksWEDNESDAY green weeksMONTIGNAC - TOUPINERIE
TUESDAY white weeksTHURSDAY green weeksMOUSTIER
WEDNESDAY green weeksWEDNESDAY white weeksPEYRIERE
MONDAY green weeksTHURSDAY white weeksPUYSSERAMPION
MONDAY green weeksWEDNESDAY white weeks113
ROUMAGNEMONDAY white weeksTHURSDAY green weeks
SAINT - COLOMB - DE - LAUZUNWEDNESDAY white weeksWEDNESDAY green weeks
SAINT - PARDOUX - ISAACMONDAY white weeksFRIDAY green weeks
SEGALASWEDNESDAY white weeksWEDNESDAY green weeks
\n\n**MORE QUESTIONS ?**\n\nWebsite:**www.ccpl47.fr**\n/ Section En Pratique > Environnement > Gestion des déchets \n\n**Environnement Service**: \n12 rue du Renfort 47410 LAUZUN \n**05 53 94 11 23 / secretariat.environnement@ccpl47.fr**\n**Composting**: anim.biodechets@ccpl47.fr / 06 33 72 84 18 \n**Recycling centre access, registration or modification**: iris@ccpl47.fr / 05 53 64 12 26 \n\n3 \n2 \n0 \n2 \n1 \n1 \n- \nm \no \nc \n. \ni \n\n. \n\no \nk \ne \nd \na \nw \nw \nw \n- \n\n. \n\ni \n\no \nk \né \nd \nA \n: \n\nn \no \ni \nt \np \ne \nc \nn \no \nC", - "page_start": 3, - "page_end": 3, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": " ", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "CompostGuide.pdf", - "query": "What are fertilizers ?", - "target_page": 4, - "target_passage": " Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Ask Your Compost Supplier \n\n**Whether you’re buying direct from the composting facility, or from a local**\n**vendor, here are some good questions to ask:**\n\n**• What ingredients go into your compost?**\n**• What compost products or blends do you sell?**\n**• Are there quality control or testing results available for these**\n**products? (These may be on the manufacturer’s website.)**\n\n**• Which product is best for my intended use?**\n**• What application rate do you recommend?**\n**• How much do I need for my area? (Or see pages 4-6.)**\n\nCompost: A Natural Cycle \nComposting is a natural process in which micro- \norganisms and macro-organisms break down organic \nmaterial (leaves, twigs, grass, etc.) into a dark crum- \nbly soil amendment. Modern compost facilities use \nthe same natural biological composting process. \nTheir controlled-temperature process works faster, \nbreaks down pesticide residues, and also kills weed \nseeds and plant diseases. \n\nCompost improves soil structure and plant \ngrowth by \n\n• Replenishing soil organic matter, and storing \n nutrients in plant-available forms \n\n• Supporting beneficial soil life \n\n• Reducing erosion and water run-off \n\n• Loosening clay soils for better root \n development (increasing soil pore space) \n\n• Retaining moisture in sandy soils so \n plants need less watering. \n\nComparing Landscape Products \nA variety of soil and landscape products are sold. Here’s a \ncomparison: \n\n**Compost**is stable, decomposed organic matter, excellent for \nimproving soil structure, fertility, moisture holding capacity, and \nplant growth. \n\n**Mulch**is any material applied to the soil surface. Woody mulches \n(high in carbon, low in nitrogen) like wood chips, bark and woody \ncomposts are great for woody plants. Annual plants should be \nmulched with nutrient-balanced mulches like compost, grass \nclippings, or leaves. \n\n**Peat Moss**is partially decayed sphagnum moss from peat bogs. It \nprovides soil porosity, but not the nutrients or biological diversity for \nhealthy soil that compost provides. \n\n**Fertilizers**are concentrated sources of plant nutrients, used in small \namounts to supplement natural soil fertility. \n\n**Topsoil**that is sold is usually not native topsoil. Quality \nmanufactured topsoils are a blend of native sandy sub-soils with \ncomposted organic matter to support soil life.", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. \n\nCompost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. \n\n\n \n \n \n \n [html]\n
1.2TableTableTable
TableTableTable_
parametermin***13
sMRI,1.
\n\n*Many localities now collect food scraps and \nfood-soiled paper along with yard debris for \ncomposting. Call your local collection service \nto find out what is collected in your area.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "**Compost Organizations**\n\nThe Beauty of Your Lawn and Garden \nBlossoms from the Soil \n\nThank you for your interest in compost. \n\nCompost is a versatile product with many benefits. It enhances \nsoil quality, helps save water, and supports your community’s \nefforts to recycle organic debris. All this helps to conserve our \nnatural resources and reduces the amount of material sent to the \nlandfill. \n\nCompost-amended soil also helps break down pollutants and \nabsorb stormwater runoff. By making nutrients slowly available \nto plants and enhancing plant health, compost can reduce the \nneed for chemical fertilizers and pesticides. All these benefits \nhelp protect our lakes, rivers, and marine waters from pollution \nand excessive runoff. \n\nCompost is a natural amendment for your lawn or garden, and \ncan be used regularly to enrich your soil. This guide is designed \nto help you get the most from the compost that you buy. \n\n\n \n \n \n \n [html]\n
www. compostwashington. org
US Composting Council
Seal of Testing Assurance ( STA ) program www. compostingcouncil. org / programs / sta /
Restoring the Soil to Protect our Waterways
Compost amendment and erosion control during construction : information for builders www. buildingsoil. org
Natural Lawn & Garden Care, Soils, and Home Composting
City of Seattle www. seattle. gov / util / services / yard
King County www. kingcounty. gov / soils
Washington State University www. puyallup. wsu. edu / soilmgm
", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" - }, - { - "text": "**Table 2 — Average Balances and Average Yields and Rates (in thousands, except percentages):**", - "page_start": 45, - "page_end": 45, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "ASSETS \n\nCurrent assets: \n\nCash and cash equivalents \n\nShort-term investments (Notes 8 and 19) \n\nReceivables, less allowance for \n\ndoubtful receivables (Notes 4 and 8) \n\nInventories (Note 5) \n\nOther current assets \n\nTotal current assets", - "page_start": 73, - "page_end": 73, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "POSITIVE STATIC \nSTABILITY \n\n\n\n\n\n\nCREASED POSIT,VE \nTIC STABILITY \n\n\n\n\n\n\n\n\n\nNEUTRAL STATIC STABILITY \n\n\n\n\n\n\nNEGATIVE \nSTATIC STABILITY", - "page_start": 265, - "page_end": 265, - "source_file": "00-80T-80.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
1.
AD – Activity Data
AWMS – Animal Waste Management System
BOD – Biochemical Oxygen Demand
C – Carbon
C2F8 – Hexafluoroethane
CF4 – Tetrafluoromethane
CH4 − Methane
CO – Carbon Monoxide
CO2 − Carbon dioxide
COD – Chemical Oxygen Demand
COD − Chemical dm − dry matter
Group – Gigagram
ha − hectare
HFC – Hydrofluorocarbon
hl − hectolitre
k = kilo
k = kilo kg – kilogram
kg – kilogram kha – kilo hec
Krla - Kilotonne
kt – kilotonne LTO – Landin
LUCF – Land - Use Change and Forestry
LULUCF – Land Use, Land - Use Change and Forestry
m3 – cubic meter
MCF – Methane Correction Factor
Table
Mha – Megahectare
Mha – Megal
IVI - JTI ** IVI - IVI - IVI - DUII - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IVI - IV
N = Nitrogen
N2O − Nitrous Oxide
NFP – National Focal Point
NH3 − Ammonia
NMVOC – Non - Methane Volatile Organic Compound
NMVUC — Non - Methane NOX – Nitrogen Dioxide
PFC – Perfluorocarbon
FFC – Perfluorocarbon RA – Reference Approach
RA - Reliefelice Apploal SE – Sectoral Expert
SF6 – Sulphur Hexafluoride
3 ′ UGATGTGTGTGTGTGTGTG
SWUS – S0II0 Waste Lisposal Site
Parameters
T9 * Telagial
Tumor (%)
TJ − Terajoules XML − Extensib
year
", - "page_start": 43, - "page_end": 43, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Annex 2 : Fuel categories
Liguid_Fyels ( Crude oil and petroleum products )Peat
Crude oilCoke
OrimulsionCoke oven coke
Natural gas liquidsGas coke
GasolinePatent fuel
Motor GasolineCoke
Aviation GasolineCoke oven coke
Jet GasolineGas coke
Jet keroseneBKB / Patent Fuel
Other kerosenePatent Fuel
Shale oilBrown coal briquettes
Gas / Diesel oilGas works gas
Residual fuel oilCoke oven gas
Liquefied petroleum gasBlast furnace gas
EthaneOther gases and mixtures from coal - derived carbon
NaphthaCoal - low
BitumenCoal - medium
LubricantsCoal - high
Petroleum cokeRefinery Feedstock
< underline > Gaseous Fuels Other oil
Natural gasRefinery gas
Paraffin waxes< underline > Other Fuels
White spiritMunicipal solid waste
Heavy fuel - lowIndustrial waste
Heavy fuel - mediumFuel mixtures ( fossil and biomass )
Heavy fuel - highWaste gas
Light fuel oil / diesel - lowOther wastes
Light fuel oil / diesel - mediumHydrogen
Light fuel oil / diesel - highDiesel ( road )
< underline > Biomass Gasoline ( road )
SolidWood / Wood waste
Solid Fuels ( Coal and coal products )Agricultural waste
AnthraciteCharcoal
Coking coalOther solid biomass
Other bituminous coalSub - bituminous coal
LiquidOther sub - bituminous coal
Bio - alcoholLignite / brown coal
Sulphur lies ( Black liquor )Oil shale
Sewage sludgeOther liquid biomass
GasLandfill gas
Sludge gas ( sewage gas )Other biogas
", - "page_start": 46, - "page_end": 46, - "source_file": "maiis-user-manual.pdf" - } - ] - }, - { - "references": { - "source_file": "CompostGuide.pdf", - "query": "Explain to me what is peat moss ?", - "target_page": 4, - "target_passage": "Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Ask Your Compost Supplier \n\n**Whether you’re buying direct from the composting facility, or from a local**\n**vendor, here are some good questions to ask:**\n\n**• What ingredients go into your compost?**\n**• What compost products or blends do you sell?**\n**• Are there quality control or testing results available for these**\n**products? (These may be on the manufacturer’s website.)**\n\n**• Which product is best for my intended use?**\n**• What application rate do you recommend?**\n**• How much do I need for my area? (Or see pages 4-6.)**\n\nCompost: A Natural Cycle \nComposting is a natural process in which micro- \norganisms and macro-organisms break down organic \nmaterial (leaves, twigs, grass, etc.) into a dark crum- \nbly soil amendment. Modern compost facilities use \nthe same natural biological composting process. \nTheir controlled-temperature process works faster, \nbreaks down pesticide residues, and also kills weed \nseeds and plant diseases. \n\nCompost improves soil structure and plant \ngrowth by \n\n• Replenishing soil organic matter, and storing \n nutrients in plant-available forms \n\n• Supporting beneficial soil life \n\n• Reducing erosion and water run-off \n\n• Loosening clay soils for better root \n development (increasing soil pore space) \n\n• Retaining moisture in sandy soils so \n plants need less watering. \n\nComparing Landscape Products \nA variety of soil and landscape products are sold. Here’s a \ncomparison: \n\n**Compost**is stable, decomposed organic matter, excellent for \nimproving soil structure, fertility, moisture holding capacity, and \nplant growth. \n\n**Mulch**is any material applied to the soil surface. Woody mulches \n(high in carbon, low in nitrogen) like wood chips, bark and woody \ncomposts are great for woody plants. Annual plants should be \nmulched with nutrient-balanced mulches like compost, grass \nclippings, or leaves. \n\n**Peat Moss**is partially decayed sphagnum moss from peat bogs. It \nprovides soil porosity, but not the nutrients or biological diversity for \nhealthy soil that compost provides. \n\n**Fertilizers**are concentrated sources of plant nutrients, used in small \namounts to supplement natural soil fertility. \n\n**Topsoil**that is sold is usually not native topsoil. Quality \nmanufactured topsoils are a blend of native sandy sub-soils with \ncomposted organic matter to support soil life.", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**Compost Organizations**\n\nThe Beauty of Your Lawn and Garden \nBlossoms from the Soil \n\nThank you for your interest in compost. \n\nCompost is a versatile product with many benefits. It enhances \nsoil quality, helps save water, and supports your community’s \nefforts to recycle organic debris. All this helps to conserve our \nnatural resources and reduces the amount of material sent to the \nlandfill. \n\nCompost-amended soil also helps break down pollutants and \nabsorb stormwater runoff. By making nutrients slowly available \nto plants and enhancing plant health, compost can reduce the \nneed for chemical fertilizers and pesticides. All these benefits \nhelp protect our lakes, rivers, and marine waters from pollution \nand excessive runoff. \n\nCompost is a natural amendment for your lawn or garden, and \ncan be used regularly to enrich your soil. This guide is designed \nto help you get the most from the compost that you buy. \n\n\n \n \n \n \n [html]\n
www. compostwashington. org
US Composting Council
Seal of Testing Assurance ( STA ) program www. compostingcouncil. org / programs / sta /
Restoring the Soil to Protect our Waterways
Compost amendment and erosion control during construction : information for builders www. buildingsoil. org
Natural Lawn & Garden Care, Soils, and Home Composting
City of Seattle www. seattle. gov / util / services / yard
King County www. kingcounty. gov / soils
Washington State University www. puyallup. wsu. edu / soilmgm
", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" - }, - { - "text": "So far, we have created some simple named classes and subclasses which hopefully seem \nintuitive and obvious. However, what does it actually mean to be a subclass of something in \nOWL? For example, what does it mean for VegetableTopping to be a subclass of \nPizzaTopping? In OWL subclass means*necessary implication*. I.e., if VegetableTopping is a \nsubclass of PizzaTopping then*all*instances of VegetableTopping are also instances of \nPizzaTopping. It is for this reason that we try to have standards such as having all \nPizzaTopping classes end with the word “Topping”. Otherwise, it might seem we are saying \nthat anything that is a kind of*Ham*like the*Ham*in your sandwich is a kind of MeatTopping or \nPizzaTopping which is not what we mean. For large ontologies strict attention to the naming \nof classes and other entities can prevent potential confusion and bugs.", - "page_start": 21, - "page_end": 21, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Annex 2 : Fuel categories
Liguid_Fyels ( Crude oil and petroleum products )Peat
Crude oilCoke
OrimulsionCoke oven coke
Natural gas liquidsGas coke
GasolinePatent fuel
Motor GasolineCoke
Aviation GasolineCoke oven coke
Jet GasolineGas coke
Jet keroseneBKB / Patent Fuel
Other kerosenePatent Fuel
Shale oilBrown coal briquettes
Gas / Diesel oilGas works gas
Residual fuel oilCoke oven gas
Liquefied petroleum gasBlast furnace gas
EthaneOther gases and mixtures from coal - derived carbon
NaphthaCoal - low
BitumenCoal - medium
LubricantsCoal - high
Petroleum cokeRefinery Feedstock
< underline > Gaseous Fuels Other oil
Natural gasRefinery gas
Paraffin waxes< underline > Other Fuels
White spiritMunicipal solid waste
Heavy fuel - lowIndustrial waste
Heavy fuel - mediumFuel mixtures ( fossil and biomass )
Heavy fuel - highWaste gas
Light fuel oil / diesel - lowOther wastes
Light fuel oil / diesel - mediumHydrogen
Light fuel oil / diesel - highDiesel ( road )
< underline > Biomass Gasoline ( road )
SolidWood / Wood waste
Solid Fuels ( Coal and coal products )Agricultural waste
AnthraciteCharcoal
Coking coalOther solid biomass
Other bituminous coalSub - bituminous coal
LiquidOther sub - bituminous coal
Bio - alcoholLignite / brown coal
Sulphur lies ( Black liquor )Oil shale
Sewage sludgeOther liquid biomass
GasLandfill gas
Sludge gas ( sewage gas )Other biogas
", - "page_start": 46, - "page_end": 46, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "During climbing", - "page_start": 167, - "page_end": 167, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Figure 7.26. Airflow Separation (sheet 2 of 2)", - "page_start": 75, - "page_end": 75, - "source_file": "00-80T-80.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
CondBanyTableone
\n\nA neural network is an \ninterconnected group of nodes, akin \nto the vast network of neurons in the \nhuman brain. \n\n**Deep learning**\nDeep learning[110] uses several layers of neurons between the network's \ninputs and outputs. The multiple layers can progressively extract higher- \nlevel features from the raw input. For example, in image processing, lower \nlayers may identify edges, while higher layers may identify the concepts \nrelevant to a human such as digits, letters, or faces.[112] \n\nDeep learning has profoundly improved the performance of programs in \nmany important subfields of artificial intelligence, including computer \nvision, \nimage \nclassification,[113] and others. The reason that deep learning performs so \nwell in so many applications is not known as of 2023.[114] The sudden success of deep learning in 2012– \n2015 did not occur because of some new discovery or theoretical breakthrough (deep neural networks and \nbackpropagation had been described by many people, as far back as the 1950s)[i] but because of two \nfactors: the incredible increase in computer power (including the hundred-fold increase in speed by \nswitching to GPUs) and the availability of vast amounts of training data, especially the giant curated \ndatasets used for benchmark testing, such as ImageNet.[j] \n\nspeech recognition, natural language processing, \n\n**GPT**\n\nGenerative pre-trained transformers (GPT) are large language models (LLMs) that generate text based on \nthe semantic relationships between words in sentences. Text-based GPT models are pretrained on a large \ncorpus of text that can be from the Internet. The pretraining consists of predicting the next token (a token \nbeing usually a word, subword, or punctuation). Throughout this pretraining, GPT models accumulate \nknowledge about the world and can then generate human-like text by repeatedly predicting the next \ntoken. Typically, a subsequent training phase makes the model more truthful, useful, and harmless, \nusually with a technique called reinforcement learning from human feedback (RLHF). Current GPT", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia3.pdf" - }, - { - "text": "WING \nROOT’ \n\n\n9- \nLEADING EDGE \n\n\n\n\n\n\n\n\n\n\n\n\n\n\nFigure 5.5. Aeroelastic Effects (Sheet 2 of 2)", - "page_start": 358, - "page_end": 358, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv3.pdf", - "query": "How encourage temporally adjacent representations to be predictive of each other ?", - "target_page": 2, - "target_passage": "One way to encourage temporally adjacent representations to be predictive of each other is to ensure that they vary slowly over time. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Slow Features. One way to encourage temporally \nadjacent representations to be predictive of each other \nis to ensure that they vary slowly over time. Early \nworks targeting predictive features encouraged represen- \ntations of individual video frames to be locally tempo- \nrally invariant, while preventing representation collapse \nby using spectral methods, as in SFA (Wiskott and Se- \njnowski, 2002), SSA (Kayser et al., 2001), and Simulated \nFixations (Zou et al., 2012). More recently, Goroshin \net al. (2015); Wang et al. (2010) train a siamese con- \nvolutional network to map the representations of two \nsubsequent frames to the same point, while encouraging \ndistant frames to have diverse representations via a pair- \nwise margin loss and a triplet loss, respectively. Other \nworks (Oord et al., 2018; Surís et al., 2021; Feichtenhofer \net al., 2021) implement temporal invariance using noise- \ncontrastive estimation (Gutmann and Hyvärinen, 2012). \nOur exploration in this paper goes beyond temporal in- \n\nAdvances in Self-Supervised Learning. The use \nof vision transformers (Dosovitskiy et al., 2020; Li et al., \n2022) has become standard practice in self-supervised \nlearning with joint-embedding architectures (Chen et al., \n2021; Caron et al., 2021; Oquab et al., 2023; Zhou et al., \n2021; Assran et al., 2022), and unlocked masked image \nmodeling in pixel space by parameterizing the pixel de- \ncoder as a transformer with learnable mask tokens (Doso- \nvitskiy et al., 2020; Xie et al., 2021; He et al., 2021; Bao \net al., 2021), demonstrating a step-change in the rep- \nresentation quality of autoencoding methods (Vincent \net al., 2010). This line of generative methods was sub- \nsequently extended to video data using spatio-temporal \nmasking (Tong et al., 2022; Feichtenhofer et al., 2022; \nWang et al., 2023a; Kalluri et al., 2023; Gupta et al., \n2023). It was also recently shown that the representa- \ntions of masked image autoencoders could be significantly \nimproved by using learnable pooling mechanisms based \non cross-attention (Chen et al., 2022). Finally, through \ncareful selection of design choices, the non-contrastive \ncollapse prevention strategy in BYOL (Grill et al., 2020) \nwas recently made to work with image feature prediction \nmethods (Baevski et al., 2022b; Assran et al., 2023), \nwhich demonstrated the ability to learn representations \nthat can be leveraged for various downstream tasks with- \nout relying on invariance to hand-crafted image trans- \nformations.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv3.pdf" - }, - { - "text": "computed from another part of the video, x. The pre- \ndictor network Pϕ( \n), which maps the representation of \n· \nx to the representation of y, is trained simultaneously \nwith the encoder, and is provided specification of the \nspatio-temporal positions of y through the conditioning \nvariable z \n\nFeature Prediction versus Pixel Reconstruction. \nApproaches that predict in pixel space must dedicate \nsignificant model capacity and compute to capture all \nthe low-level detail in the visual input. By contrast, ap- \nproaches that predict in latent space have the flexibility \nto eliminate irrelevant or unpredictable pixel-level details \nfrom the target representation (Vondrick et al., 2016). \nPredicting in representation space has been shown to \nlead to versatile representations that perform well across \nmany downstream tasks through linear probing or low- \nshot adaptation (Assran et al., 2023; Oquab et al., 2023; \nAssran et al., 2022), while demonstrating an efficiency \ngain during pretraining compared to pixel level recon- \nstruction (Assran et al., 2023; Baevski et al., 2022b,a). \nThe works of Baevski et al. (2022a,b) additionally show \nthat predicting in representation space results in compet- \nitive end-to-end fine-tuning performance in the image, \naudio and text domains. In this work, we extend these \nfindings to the video modality. \n\n∆y. \n← \nNaively implementing the objective using the regression \n\nminimizeθ,ϕ \nPϕ(Eθ(x), ∆y) \n∥ 1, \nEθ(y) \n∥ − \n\nwould admit a trivial solution, where the encoder out- \nputs a constant representation, regardless of its input. \nIn practice, we use the following modified objective to \nprevent representation collapse, \n\nminimizeθ,ϕ sg(Eθ(y)) \n(1) \nPϕ(Eθ(x), ∆y) \n1, \n∥ ∥ − \n\n) denotes a stop-gradient operation, which \nwhere sg( \n· \ndoes not backpropagate through its argument, and Eθ( \n) \n· \n). \nis an exponential moving average of the network Eθ( \n· \nThe use of an exponential-moving average feature ex- \ntractor along with a stop-gradient and a predictor has \nbeen used as a collapse prevention strategy for image pre- \ntraining (Grill et al., 2020), and studied empirically (Xie \net al., 2021) and theoretically (Tian et al., 2021). In \nfact, the objective in equation (1) is similar to the loss \nof Assran et al. (2023) used for image pretraining, but \nwe modify it to use an ℓ1 regression, which we found to \nbe more stable. \n\nTheoretical motivation. A theoretical motivation for \nthe effectiveness of this collapse prevention strategy was \nproposed in Grill et al. (2020) for the BYOL method. We \nprovide a simple adaptation of their analysis for our ℓ1 \nloss. For ease of exposition, we will disregard the effect of \nthe conditioning variable z and consider one dimensional \nrepresentations. Denote the representation Eθ(y) by \na random variable Y . The optimal predictor under \nequation (1) is thus given by the following functional \nexpression, \n\nFigure 2 Joint-Embedding Predictive Architectures are \ntrained to predict the representation of an input y from \nthe representation of another input x. The additional vari- \nable z provides the predictor with information about the \ntransformation that computes y from x. \n\nOur goal is to explore the effectiveness of feature pre- \ndiction as a stand-alone objective for learning visual \nrepresentations from video. To that end, we use a \njoint-embedding predictive architecture (JEPA) (LeCun, \n2022); see Figure 2. The main idea behind a JEPA is \nto learn by predicting the representation of an input y \nfrom the representation of another input x. The basic \narchitecture is made up of an encoder, Eθ( \n), which com- \n· \nputes the representation of the inputs, and a predictor, \n), which predicts the representation of y from the \nPϕ( \n· \nrepresentation of x, conditioned on a variable z indicat- \ning the transformation (or corruption) between x and \ny. Conditioning on z enables the generation of distinct \npredictions for various transformations of x. \n\nP ⋆(Eθ(x)) = argmin", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv3.pdf" - }, - { - "text": "Self-Supervised Learning from Videos \n\nSimilar to unsupervised learning from images, a family of unsupervised video representation learning approaches \nenforces a spatio-temporal representation of a video clip to be invariant to hand-crafted spatio-temporal data \naugmentations (Parthasarathy et al., 2022). However, one obvious insight is that the temporal ordering of visual \ninformation in video can provide implicit supervision. Indeed, this insight is the key insight leveraged by many works \non unsupervised video learning. Towards leveraging temporal information as supervision, some approaches train a \nvisual encoder by predicting the temporal ordering of frames (Xu et al., 2019; Lee et al., 2017). Other approaches \nseek to predict low-level motion vectors computed from optical flow (Pintea et al., 2014), or to predict mixing pixels \nin video frames, using either a frame-interpolation objective (Kalluri et al., 2023) or a denoising autoencoder (Tong \net al., 2022; Feichtenhofer et al., 2022; Wang et al., 2023a). \n\n15", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv3.pdf" - }, - { - "text": "Figure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive) \nsensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with \ntemporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding (Rao and \nBallard 1999, Friston 2005), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are \nreciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally, \nthe pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on \nunits encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in \ncortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need \nto map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower \nand intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for \nexteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks \nthat process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al. \n(2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their \nputative neuronal underpinnings. See online article for colored version of this figure. \n\nAnother critical aspect of Fig. 1 is that it illustrates two path- \nways in which prediction errors at the proprioceptive and inte- \nroceptive levels are used to steer physical actions (reflex arcs) \nand autonomic actions (autonomic reflexes). Endowing predictive \ncoding with these reflexes—hence realizing an “active inference” \narchitecture—permits minimizing prediction errors by changing \nthe state of the world (by physically acting) or the internal milieu \n(by engaging in autonomic actions) rather than only by changing \npredictions, as described later. \n\n\n \n \n \n \n [html]\n
Statested***QIIT1BTableCCL.PP0.000TableTableTableParameter
Med
", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed1.pdf" - }, - { - "text": "Chunhui Gu, Chen Sun, David A Ross, Carl Vondrick, Caro- \nline Pantofaru, Yeqing Li, Sudheendra Vijayanarasimhan, \nGeorge Toderici, Susanna Ricco, Rahul Sukthankar, et al. \nAva: A video dataset of spatio-temporally localized atomic \nvisual actions. In Proceedings of the IEEE conference on \ncomputer vision and pattern recognition, pages 6047–6056, \n2018. \n\nHsin-Ying Lee, Jia-Bin Huang, Maneesh Singh, and Ming- \nHsuan Yang. Unsupervised representation learning by \nsorting sequences. In Proceedings of the IEEE international \nconference on computer vision, pages 667–676, 2017. \n\nKunchang Li, Yali Wang, Peng Gao, Guanglu Song, Yu Liu, \nHongsheng Li, and Yu Qiao. Uniformer: Unified trans- \nformer for efficient spatiotemporal representation learning. \narXiv preprint arXiv:2201.04676, 2022. \n\nAgrim Gupta, Jiajun Wu, Jia Deng, and Li Fei-Fei. Siamese \nmasked autoencoders. arXiv preprint arXiv:2305.14344, \n2023. \n\nIlya Loshchilov and Frank Hutter. Decoupled weight decay \nregularization. arXiv preprint arXiv:1711.05101, 2017. \n\nMichael U Gutmann and Aapo Hyvärinen. Noise-contrastive \nestimation of unnormalized statistical models, with appli- \ncations to natural image statistics. Journal of machine \nlearning research, 13(2), 2012. \n\nAntoine Miech, Dimitri Zhukov, Jean-Baptiste Alayrac, \nMakarand Tapaswi, \nIvan Laptev, and Josef Sivic. \nHowto100m: Learning a text-video embedding by watch- \ning hundred million narrated video clips. In Proceedings \nof the IEEE/CVF international conference on computer \nvision, pages 2630–2640, 2019. \n\nTengda Han, Weidi Xie, and Andrew Zisserman. Video \nrepresentation learning by dense predictive coding. \nIn \nProceedings of the IEEE/CVF International Conference \non Computer Vision Workshops, pages 0–0, 2019. \n\nMehdi Noroozi and Paolo Favaro. Unsupervised learning of \nvisual representations by solving jigsaw puzzles. In Euro- \npean conference on computer vision, pages 69–84. Springer, \n2016. \n\nTengda Han, Weidi Xie, and Andrew Zisserman. Memory- \naugmented dense predictive coding for video representation \nlearning. In European conference on computer vision, pages \n312–329. Springer, 2020. \n\nAaron van den Oord, Yazhe Li, and Oriol Vinyals. Represen- \ntation learning with contrastive predictive coding. arXiv \npreprint arXiv:1807.03748, 2018. \n\nKaiming He, Xinlei Chen, Saining Xie, Yanghao Li, Piotr Dol- \nlár, and Ross Girshick. Masked autoencoders are scalable \nvision learners. arXiv preprint arXiv:2111.06377, 2021. \n\nMaxime Oquab, Timothée Darcet, Théo Moutakanni, Huy \nVo, Marc Szafraniec, Vasil Khalidov, Pierre Fernandez, \nDaniel Haziza, Francisco Massa, Alaaeldin El-Nouby, et al. \nDinov2: Learning robust visual features without supervi- \nsion. arXiv preprint arXiv:2304.07193, 2023. \n\nGeoffrey E Hinton. Connectionist learning procedures. In \n\nMachine learning, pages 555–610. Elsevier, 1989. \n\nTarun Kalluri, Deepak Pathak, Manmohan Chandraker, and \nDu Tran. Flavr: Flow-agnostic video representations for \nfast frame interpolation. In Proceedings of the IEEE/CVF \nWinter Conference on Applications of Computer Vision, \npages 2071–2082, 2023. \nNikhil Parthasarathy, SM Eslami, João Carreira, and \nSelf-supervised video pretraining \narXiv preprint \nOlivier J Hénaff. \nyields strong image representations. \narXiv:2210.06433, 2022. \n\nDeepak Pathak, Philipp Krahenbuhl, Jeff Donahue, Trevor \nDarrell, and Alexei A Efros. Context encoders: Feature \nlearning by inpainting. In Proceedings of the IEEE con- \nference on computer vision and pattern recognition, pages \n2536–2544, 2016. \nJared Kaplan, Sam McCandlish, Tom Henighan, Tom B \nBrown, Benjamin Chess, Rewon Child, Scott Gray, Alec \nRadford, Jeffrey Wu, and Dario Amodei. Scaling laws for \nneural language models. arXiv preprint arXiv:2001.08361, \n2020.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv3.pdf" - }, - { - "text": "Cond. Curr. Res. Theory**1972**, 2, 64–69. \nFrässle, S.; Aponte, E.A.; Bollmann, S.; Brodersen, K.H.; Do, C.T.; Harrison, O.K.; Harrison, S.J.; Heinzle, J.; Iglesias, S.; Kasper, \nL.; et al. TAPAS: An Open-Source Software Package for Translational Neuromodeling and Computational Psychiatry. Front. \nPsychiatry**2021**, 12, 680811. [CrossRef] \nSmith, R.; Schwartenbeck, P.; Parr, T.; Friston, K.J. An Active Inference Approach to Modeling Structure Learning: Concept \nLearning as an Example Case. Front. Comput. Neurosci.**2020**, 14, 41. [CrossRef] [PubMed] \n\n43. \n\n44. \n\n45. Neacsu, V.; Mirza, M.B.; Adams, R.A.; Friston, K.J. Structure learning enhances concept formation in synthetic Active Inference \n\nagents. PLoS ONE**2022**, 17, e0277199. [CrossRef] [PubMed] \n\n[CrossRef] [PubMed] \nFriston, K.J.; Da Costa, L.; Tschantz, A.; Kiefer, A.; Salvatori, T.; Neacsu, V.; Koudahl, M.; Heins, C.; Sajid, N.; Markovic, D.; et al. \nSupervised structure learning. arXiv**2023**, arXiv:2311.10300. [CrossRef] [PubMed] \nSerrano, S.A.; Santiago, E.; Martinez-Carranza, J.; Morales, E.F.; Sucar, L.E. Knowledge-Based Hierarchical POMDPs for Task \nPlanning. J. Intell. Robot. Syst.**2021**, 101, 82. [CrossRef] \nFriston, K.J.; Rosch, R.; Parr, T.; Price, C.; Bowman, H. Deep temporal models and active inference. Neurosci. Biobehav. Rev.**2017**, \n77, 388–402. [CrossRef] [PubMed] \nFriston, K.; Mattout, J.; Trujillo-Barreto, N.; Ashburner, J.; Penny, W. Variational free energy and the Laplace approximation. \nNeuroImage**2007**, 34, 220–234. [CrossRef] [PubMed] \nFriston, K.J. Variational filtering. NeuroImage**2008**, 41, 747–766. [CrossRef] \n\n46. Xia, R.; Zhang, Y.; Liu, X.; Yang, B. A survey of sum–product networks structural learning. Neural Netw.**2023**, 164, 645–666. \n\n47. \n\n48. \n\n49. \n\n50. \n\n51. \n52. Tu, S. The Dirichlet-Multinomial and Dirichlet-Categorical Models for Bayesian Inference. 2014. Available online: https: \n\n//people.csail.mit.edu/stephentu/writeups/dirichlet-conjugate-prior.pdf (accessed on 21 June 2024). \nSmith, R.; Badcock, P.; Friston, K.J. Recent advances in the application of predictive coding and active inference models within \nclinical neuroscience. Psychiatry Clin. Neurosci.**2021**, 75, 3–13. [CrossRef] \n\n53. \n\n54. Deacon, R.M.J.; Rawlins, J.N.P. T-maze alternation in the rodent. Nat. Protoc.**2006**, 1, 7–12. [CrossRef] \n55. Lin, M.H.; Liran, O.; Bauer, N.; Baker, T.E. Power dynamics of theta oscillations during goal-directed navigation in freely moving \n\nhumans: A mobile EEG-virtual reality T-maze study. bioRxiv**2021**, bioRxiv:2021.10.05.463245. [CrossRef] \n\n56. Ghafari, M.; Falsafi, S.K.; Szodorai, E.; Kim, E.J.; Li, L.; Höger, H.; Berger, J.; Fuchs, K.; Sieghart, W.; Lubec, G. Formation of \nGABAA receptor complexes containing α1 and α5 subunits is paralleling a multiple T-maze learning task in mice. Brain Struct. \nFunct.**2017**, 222, 549–561. [CrossRef] \nSharma, S.; Rakoczy, S.; Brown-Borg, H. Assessment of spatial memory in mice. Life Sci.**2010**, 87, 521–536. [CrossRef] \n57. \nFriston, K.; Da Costa, L.; Hafner, D.; Hesp, C.; Parr, T. Sophisticated Inference. arXiv**2020**, arXiv:2006.04120. [CrossRef] [PubMed] \n58. \n59. Vehtari, A.; Simpson, D.; Gelman, A.; Yao, Y.; Gabry, J. Pareto Smoothed Importance Sampling. arXiv**2024**, arXiv:1507.02646. \n\n[CrossRef] \n\n60. Aponte, E.A.; Yao, Y.; Raman, S.; Frässle, S.; Heinzle, J.; Penny, W.D.; Stephan, K.E. An introduction to thermodynamic integration \n\nand application to dynamic causal models. Cogn. Neurodyn.**2021**, 16, 1. [CrossRef] [PubMed] \n\n61. Daunizeau, J.; Ouden, H.E.M.d.; Pessiglione, M.; Kiebel, S.J.; Stephan, K.E.; Friston, K.J. Observing the Observer (I): Meta-Bayesian \n\nModels of Learning and Decision-Making. PLoS ONE**2010**, 5, e15554. [CrossRef] [PubMed]", - "page_start": 31, - "page_end": 31, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "When individuals search their memory for a particular piece of a message in their mind, \nthe targeted node becomes salient and activated in the temporary memory [39]. If two messages \nare always activated simultaneously, their connection tends to be more robust and the messages are \nregarded as associated [36]. If a link is recorded between two concepts, activations are likely to spread \nthrough the link from one concept to another with or without conscious awareness [40]. Whereas \nassociations of nodes in the mind may not necessarily reflect the actual relationships of objects, in reality, \nseveral factors, including media usage, personal experience, and political stance [34,41,42], may help \nbundle different sets of concepts.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed10.pdf" - }, - { - "text": "Silvia L Pintea, Jan C van Gemert, and Arnold WM Smeul- \nders. Déja vu: Motion prediction in static images. In \nComputer Vision–ECCV 2014: 13th European Conference, \nZurich, Switzerland, September 6-12, 2014, Proceedings, \nPart III 13, pages 172–187. Springer, 2014. \nWill Kay, Joao Carreira, Karen Simonyan, Brian Zhang, \nChloe Hillier, Sudheendra Vijayanarasimhan, Fabio Vi- \nola, Tim Green, Trevor Back, Paul Natsev, et al. The \nkinetics human action video dataset. \narXiv preprint \narXiv:1705.06950, 2017. \n\nAlec Radford, Jong Wook Kim, Chris Hallacy, Aditya \nRamesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, \nAmanda Askell, Pamela Mishkin, Jack Clark, et al. Learn- \ning transferable visual models from natural language su- \npervision. In International conference on machine learning, \npages 8748–8763. PMLR, 2021. \n\nChristoph Kayser, Wolfgang Einhäuser, Olaf Dümmer, Peter \nKönig, and Konrad Körding. Extracting slow subspaces \nfrom natural videos leads to complex cells. In Artificial \nNeural Networks—ICANN 2001: International Conference \nVienna, Austria, August 21–25, 2001 Proceedings 11, pages \n1075–1080. Springer, 2001. \n\nRajesh PN Rao and Dana H Ballard. Predictive coding \nin the visual cortex: a functional interpretation of some \nextra-classical receptive-field effects. Nature neuroscience, \n2(1):79–87, 1999. \n\nGustav Larsson, Michael Maire, and Gregory Shakhnarovich. \nLearning representations for automatic colorization. 2016. \n\nGustav Larsson, Michael Maire, and Gregory Shakhnarovich. \nColorization as a proxy task for visual understanding. 2017. \n\nOlga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, San- \njeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, \nAditya Khosla, Michael Bernstein, Alexander C. Berg, and", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv3.pdf" - }, - { - "text": "Table 2 shows that average performance across tasks \nmonotonically increases as we increase the size of the \npretraining dataset, but the best task-specific perfor- \nmance is obtained by independently selecting the pre- \ntraining data for each specific downstream task. For \ninstance, the L/16 obtains its best SSv2 performance \nwhen pretrained on K710+SSv2, its best K400 perfor- \nmance when pretrained only on K710, and its best IN1K \nperformance when pretrained only on K710+HT. The \nbest average performance across all tasks is achieved by \npretraining VideoMix2M, which combines all the data \nsources. Similarly, the H/16 pretrained on K710+SSv2 \nachieves a greater K400 score than the H/16 pretrained \non VideoMix2M, however, the top performing H/16 on \naverage is pretrained on VideoMix2M. \n\n4.4 Prediction Task: Predicting y from x \n\nWe conduct an ablation on the masking strategy used in \nV-JEPA pretraining. We examine the following masking \nstrategies: random-tube[r] in which x is obtained by \nremoving a random fraction r of tubes (spatial patches \nextended across the entire temporal duration) from the \nvideo, causal multi-block[p] in which x is restricted to \nthe first p frames of the 16-frame video, which are then \nmasked with a random set of spatio-temporal blocks, \nand multi-block in which x obtained by masking a ran- \ndom set of spatio-temporal blocks from the entire video. \nSpatio-temporal blocks are sampled using the parame- \nters described in Section 3.2; an ablation on the size and \nquantity of masked spatio-temporal blocks is provided \nin Appendix E.4. \n\n4.3 Evaluation: Attentive Probing \n\nNext we explore the feature pooling strategy for apply- \ning the model’s representations in downstream tasks. \nSince the prediction objective in equation (1) is unnor- \nmalized, there is no a priori reason for the encoder to \nyield a linearly separable subspace (Chen et al., 2020). \nThus, rather than using a linear operation (averaging) \nto pool the features output of the frozen backbone, we \nexplore a learnable non-linear pooling strategy. Specifi- \ncally, when evaluating the frozen pretrained backbone \non downstream tasks, we learn a cross-attention layer \nwith a learnable query token. The output of the cross- \nattention layer is then added back to the query token \n(residual connection), and then fed into two-layer MLP \n\nTable 4 indicates that the best results are obtained by \nsampling x using a multi-block strategy, wherein the \nnetwork is forced to make predictions after removing \nlarge continuous blocks in the video. When x is only \nsampled from the first few frames of the video, as in \nthe causal multi-block strategy, we observe a decrease \nin downstream performances. Finally, the random-tube \nstrategy, wherein 90% of the tubes in the video are ran- \ndomly masked, leads to features of low-semantic quality \nwhen combined with our feature prediction objective.", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv3.pdf" - }, - { - "text": "Li Fei-Fei. Imagenet large scale visual recognition chal- \nlenge. International Journal of Computer Vision, 115(3): \n211–252, 2015. \n\nPascal Vincent, Hugo Larochelle, Isabelle Lajoie, Yoshua Ben- \ngio, Pierre-Antoine Manzagol, and Léon Bottou. Stacked \ndenoising autoencoders: Learning useful representations \nin a deep network with a local denoising criterion. Journal \nof machine learning research, 11(12), 2010. \n\nChaitanya Ryali, Yuan-Ting Hu, Daniel Bolya, Chen Wei, \nHaoqi Fan, Po-Yao Huang, Vaibhav Aggarwal, Arka- \nbandhu Chowdhury, Omid Poursaeed, Judy Hoffman, et al. \nHiera: A hierarchical vision transformer without the bells- \nand-whistles. arXiv preprint arXiv:2306.00989, 2023. \n\nCarl Vondrick, Hamed Pirsiavash, and Antonio Torralba. \nAnticipating visual representations from unlabeled video. \nIn Proceedings of the IEEE conference on computer vision \nand pattern recognition, pages 98–106, 2016. \n\nLaura Sevilla-Lara, Shengxin Zha, Zhicheng Yan, Vedanuj \nGoswami, Matt Feiszli, and Lorenzo Torresani. Only time \ncan tell: Discovering temporal data for temporal modeling. \nIn Proceedings of the IEEE/CVF winter conference on \napplications of computer vision, pages 535–544, 2021. \nFei Wang, Ping Li, and Arnd Christian Konig. Learning \nIn 2010 IEEE \na bi-stochastic data similarity matrix. \nInternational Conference on Data Mining, pages 551–560. \nIEEE, 2010. \n\nElizabeth S Spelke, Peter Vishton, and Claes Von Hofsten. \nObject perception, object-directed action, and physical \nknowledge in infancy. 1995. \n\nLimin Wang, Bingkun Huang, Zhiyu Zhao, Zhan Tong, Yinan \nHe, Yi Wang, Yali Wang, and Yu Qiao. Videomae v2: \nScaling video masked autoencoders with dual masking. In \nProceedings of the IEEE/CVF Conference on Computer \nVision and Pattern Recognition, pages 14549–14560, 2023a. \n\nNitish Srivastava, Elman Mansimov, and Ruslan Salakhudi- \nnov. Unsupervised learning of video representations using \nlstms. In International conference on machine learning, \npages 843–852. PMLR, 2015. \n\nDídac Surís, Ruoshi Liu, and Carl Vondrick. Learning the pre- \ndictability of the future. In Proceedings of the IEEE/CVF \nConference on Computer Vision and Pattern Recognition, \npages 12607–12617, 2021. \n\nRui Wang, Dongdong Chen, Zuxuan Wu, Yinpeng Chen, \nXiyang Dai, Mengchen Liu, Lu Yuan, and Yu-Gang Jiang. \nMasked video distillation: Rethinking masked feature mod- \neling for self-supervised video representation learning. In \nProceedings of the IEEE/CVF Conference on Computer \nVision and Pattern Recognition, pages 6312–6322, 2023b. \nChen Sun, Austin Myers, Carl Vondrick, Kevin Murphy, and \nCordelia Schmid. Videobert: A joint model for video and \nlanguage representation learning. In Proceedings of the \nIEEE/CVF international conference on computer vision, \npages 7464–7473, 2019. \n\nYi Wang, Kunchang Li, Yizhuo Li, Yinan He, Bingkun Huang, \nZhiyu Zhao, Hongjie Zhang, Jilan Xu, Yi Liu, Zun Wang, \net al. Internvideo: General video foundation models via \ngenerative and discriminative learning. arXiv preprint \narXiv:2212.03191, 2022. \n\nLaurenz Wiskott and Terrence J Sejnowski. Slow feature \nanalysis: Unsupervised learning of invariances. Neural \ncomputation, 14(4):715–770, 2002. \n\nReuben Tan, Matthias De Lange, Michael Iuzzolino, Bryan A \nPlummer, Kate Saenko, Karl Ridgeway, and Lorenzo Tor- \nresani. Multiscale video pretraining for long-term activity \nforecasting. arXiv preprint arXiv:2307.12854, 2023. \n\nZhirong Wu, Yuanjun Xiong, Stella X Yu, and Dahua Lin. \nUnsupervised feature learning via non-parametric instance \ndiscrimination. In Proceedings of the IEEE conference on \ncomputer vision and pattern recognition, pages 3733–3742, \n2018. \nAntti Tarvainen and Harri Valpola. Mean teachers are bet- \nter role models: Weight-averaged consistency targets im- \nprove semi-supervised deep learning results. arXiv preprint \narXiv:1703.01780, 2017.", - "page_start": 12, - "page_end": 12, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv3.pdf", - "query": "What does mean the JEPA acronym ?", - "target_page": 3, - "target_passage": " joint-embedding predictive architecture (JEPA)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Douglas J. Jacobson \nExecutive Vice President – \nAcquisitions and Divestitures", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Table 7 Low-Shot Frozen Evaluation. Comparing V-JEPA to other video models in frozen evaluation on Kinetics-400 and \nSomething-Something-v2 as we vary the percentage of labeled examples from each dataset available for training the attentive \nprobe. We train the probes in several low-shot settings: using either 5% of the train set, 10%, or 50%, and take 3 random \nsplits in each setting to obtain more robust metrics, resulting in 9 different evaluation experiments for each model. We report \nthe mean performances and standard deviation using the K400 and SSv2 validation sets. V-JEPA is more label-efficient than \nother models; specifically, decreasing the available number of labeled examples from each class increases the performance gap \nbetween V-JEPA and the baselines. \n\n\n \n \n \n \n [html]MethodArch.K400 ( 16 × 8 × 3 )SSv2 ( 16 × 2 × 3 )5 % (~ 29 semples per chas )ViT - H / 16\n
10 % (~ 58 semples per chos )50 % (~ 287 samples per class )5 % (~ 48 samples per das )10 % (~ 96 semples per class )50 % (~ 440 semples per closs )MVD
ViT - L / 1662.6 ± 0.268.3 ± 0.277.2 ± 0.342.9 ± 0.849.5 ± 0.661.0 ± 0.2VideoMAE
ViT - H / 1662.3 ± 0.368.5 ± 0.278.2 ± 0.141.4 ± 0.848.1 ± 0.260.5 ± 0.4VideoMAEv2
ViT - g / 1437.0 ± 0.348.8 ± 0.467.8 ± 0.128.0 ± 1.037.3 ± 0.354.0 ± 0.3V - JEPA
67.0 ± 0.2.72.1 ± 0.180.2 ± 0.251.9 ± 0.357.5 ± 0.467.3 ± 0.2ViT - H / 16384
68.2 ± 0.272.8 ± 0.280.6 ± 0.254.0 ± 0.259.3 ± 0.567.9 ± 0.2
\n\nlayer attentive probe, which can be further improved to \n77.9% using a two-layer attentive probe. More generally, \nwe hypothesize that the datasets used to train V-JEPA \nand other video models are too constrained and lack the \nvisual diversity of the internet-scale pretraining data used \nby the images models; as such, there is value in focusing \nfuture work on building diverse publicly available video \ndatasets. \n\nto 54.0% top-1 when we reduce the number of labeled \nexamples by a factor of 10 \n(from roughly 440 examples \nper class to 48 examples per class). By contrast, Video- \nMAEv2 drops by 26% to 28.0% top-1, VideoMAE drops \nby 19.1% to 41.4% top-1, and MVD drops by 18.1% to \n42.9% top-1. \n\n× \n\n6 Evaluating the Predictor \n\nNext, we seek to qualitatively inspect the V-JEPA mod- \nels. Recall that the predictor network in V-JEPA predicts \nthe representations of a masked spatio-temporal region y \nfrom a visible region x, given the positional information \nof the masked regions (see Section 3). To qualitatively in- \nvestigate the grounding of the feature-space predictions, \nwe freeze the pretrained encoder and predictor networks \nand train a conditional diffusion decoder to map the \nV-JEPA predictions to interpretable pixels. Notably, the \ndecoder is only fed the representations predicted for the \nmissing regions of the video, and does not have access \nto the unmasked regions of the video (see Figure 6a). \n\n5.3 Label-efficiency", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv3.pdf" - }, - { - "text": "the \n\n\n\nway.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**SHENTEL SERVICE AREAS**", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "(a) Visualization Methodology. We train a conditional diffusion model to decode the V-JEPA feature-space predictions to \ninterpretable pixels; the pretrained V-JEPA encoder and predictor networks are kept frozen in this process. The decoder is \nonly fed the representations predicted for the missing regions of the video, and does not have access to the unmasked regions \nof the video. \n\n\n\n\n\n(b) Visualizations. First Row: Masked videos used as input to the V-JEPA models (a pretrained ViT-H/16 encoder and its \ncorresponding predictor network). Other rows: Bounding boxes contain various samples from the decoder overlayed on the \noriginal video. V-JEPA is not a generative model and the decoder does not have access to the context (first row), so we do \nnot expect samples to exactly match the input. This experiment qualitatively illustrates what information is encoded and \npredicted by V-JEPA. In particular, characteristics that are common across samples represent information that is encoded in \nthe V-JEPA predictions. V-JEPA generates predictions that are spatially and temporally coherent with unmask region of the \nvideo. The predictions also capture consistent motion through time. \n\nFigure 6 Qualitative Analysis. Offline visualizations of the V-JEPA feature-space predictions. \n\nstream tasks requiring fine-grained motion understand- \ning, while large-scale image models trained on internet \nscale datasets fall short on such tasks. Finally, we em- \npirically observed that V-JEPA models are label-efficient \nlearners, and exhibit good performance on downstream \ntasks, even when only few labeled examples are available. \n\n7 Conclusion \n\nIn this work, we explored the effectiveness of feature \nprediction as a stand-alone objective for unsupervised \nlearning from video and introduced V-JEPA, a collection \nof vision models trained solely using a self-supervised \nfeature prediction objective. The V-JEPA models demon- \nstrate the ability to solve various downstream image and \nvideo tasks without adaption of the model parameters, \nand outperform previous video representation learning \napproaches in frozen evaluation on action recognition, \nspatio-temporal action detection, and image classifica- \ntion tasks. Additionally, we show that pretraining V- \nJEPA on videos is particularly effective for solving down- \nHassan Akbari, Liangzhe Yuan, Rui Qian, Wei-Hong Chuang, \nShih-Fu Chang, Yin Cui, and Boqing Gong. Vatt: Trans- \nformers for multimodal self-supervised learning from raw \nvideo, audio and text. Advances in Neural Information \nProcessing Systems, 34:24206–24221, 2021.", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv3.pdf" - }, - { - "text": "5.1 Comparison with Pixel Prediction \n\nTo investigate the effectiveness of feature prediction pre- \ntraining, we first compare V-JEPA to video masked mod- \neling models relying on a pixel prediction loss. We control \n\n7", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv3.pdf", - "query": "What is the average performance of the ViT-L/16 architecture on the K710 dataset with 700k samples ?", - "target_page": 5, - "target_passage": "70.9", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "16 \n× \n\nOptimization. We use AdamW (Loshchilov and Hutter, 2017) to optimize the x-encoder and predictor weights. \nThe ViT-L/16224 and ViT-H/16224 models use a batch size of 3072 while the ViT-H/16384 uses a batch size of \n2400. Models are trained for a total of 90,000 iterations. The learning rate is linearly increased from 2 \n10−4 \n10−4 during the first 12, 000 iterations of pretraining, and decayed to 10−6 following a cosine schedule. \nto 6.25 \n× \n× \n\n17", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv3.pdf" - }, - { - "text": "× \n\nPretraining. We combine several public datasets to \nconstruct an unsupervised video pretraining dataset, \nwhich we refer to as VideoMix2M. Specifically, we com- \nbine the videos from HowTo100M (HT) (Miech et al., \n2019), Kinetics-400/600/700 (K710) (Kay et al., 2017), \nand Something-Something-v2 (SSv2) (Goyal et al., 2017), \nand remove any overlap with the validation sets of \nKinetics-400/600/700 and Something-Something-v2, re- \nsulting in approximately 2 million videos. We train a \nViT-L/16, a ViT-H/16, and a ViT-H/16384 transformer \nmodel on VideoMix2M. We use a batch size of 3072 for \nthe ViT-L/16 and ViT-H/16 models, and a batch size \nof 2400 for the ViT-H/16384 model. Each model takes \nas input a video clip of 16 frames sampled with a frame- \nskip of 4, corresponding to roughly 3 second clips on \naverage. The ViT-L/16 and ViT-H/16 process the video \nat a spatial resolution of 224, while the ViT-H/16384 \nuses an input resolution of 384; cf. Appendix C.", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv3.pdf" - }, - { - "text": "\n \n \n \n \n [html]MethodArch.Params.DataVideo TasksImoge TosksMethods pretruined on ImagesMethods pretruined on VideosV - JEPA80.8\n
K400 ( 16 × 8 × 3 )SSv2 ( 16 × 2 × 3 )AVAIN1KPlaces205iNat21
I - JEPAViT - H / 16612630MIN22K79.750.019.884.466.585.7
OpenCLIPViT - G / 141800MLAION81.834.823.285.370.283.6
DlNOv2ViT - g / 141100MLVD - 142M83.450.624.386.268.488.8
MVDViT - L / 16200MIN1K + K40079.466.519.773.359.465.7
OmniMAEViT - H / 16630MIN1K + SSv271.465.416.076.360.672.4
VideoMAEViT - H / 16630MK40079.866.220.772.359.165.5
VideoMAEv2ViT - g / 141100MUn. Hybrid71.261.212.971.460.668.3
HieraHiera - H670MK40077.064.717.571.459.561.7
ViT - L / 16200M69.525.674.860.367.8ViT - H / 16
630MVideoMix2M82.071.425.875.961.767.9
ViT - H / 16384630M81.9T2.225.077.462.872.6
\n\nfor the possible confounding factor of model architec- \nture by evaluating all models using either a ViT-L/16 \nencoder, or a Hiera-L encoder, which has a similar num- \nber of parameters. For the pixel prediction baselines \nwe consider VideoMAE (Tong et al., 2022; Wang et al., \n2023a), which trains vision transformer autoencoders \nexclusively on video, Hiera (Ryali et al., 2023), which \ntrains a hierarchical transformer autoencoder on video, \nand OmniMAE (Girdhar et al., 2023), which trains a \nvision transformer autoencoder on static images and \nvideo simultaneously. \n\n5 Comparison with Prior Work \n\nIn Section 5.1, we investigate the impact of feature pre- \ndiction by comparing V-JEPA with video approaches \nthat rely on pixel prediction, while using a similar ar- \nchitecture for all baselines. Subsequently, in Section 5.2, \nwe remove the architectural constraint and report the \nbest performance across architectures for self-supervised \nvideo and image pretraining approaches. Finally, we ex- \nplore the label-efficiency of V-JEPA relative to other self- \nsupervised video pretraining approaches in Section 5.3. \nWe further detail the evaluation setup in Appendix D. \n\nTable 5 examines both frozen evaluation with an atten- \ntive probe on downstream video and image tasks, as well \nas end-to-end fine-tuning. In frozen evaluation, V-JEPA \noutperforms the baselines on all downstream tasks, ex- \ncept ImageNet, where we achieve 74.8% compared to \n75.1% of an OmniMAE model trained directly on Im- \n\n5.1 Comparison with Pixel Prediction", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "Figure 4 SSv2 fine-tuning performance vs. Samples Seen. We \nreport SSv2 fine-tuning for V-JEPA and pixel-reconstruction \nbaselines using a ViT-L/16 or Hiera-L architecture. V-JEPA \noutperforms all pixel-reconstruction methods using a ViT- \nL/16 and matches the Hiera-L performance while seeing \nsignificantly less samples during pretraining. \n\nFigure 5 SSv2 frozen-evaluation performance vs. Pretraining \nTime. Wallclock times for all methods are measured on a \nsingle GPU with a batch size of 10 clips, using the official \ncodebases for VideoMAE and VideoMAEv2, and linearly \nextrapolated assuming a global batch size of 2400 samples. \nHowever, note that the SSv2 accuracies of video pixel pre- \ndiction methods are actually obtained with small batch sizes \nand significantly longer training schedules. V-JEPA out- \nperforms pixel-reconstruction methods while training signifi- \ncantly faster. ageNet; hence, V-JEPA achieves comparable ImageNet \nperformance despite only pretraining on video. \n\nUnder the fine-tuning protocol, V-JEPA also achieves the \nbest performance of any model trained with a ViT-L/16, \nand matches the performance of the Hiera-L on SSv2, \nwhich benefits from a hierachical prior (Ryali et al., 2023). \nThe V-JEPA models achieve this result while processing \nsignificantly fewer samples during pretraining (Figure 4), \ndemonstrating the efficiency of feature prediction as a \nlearning principle. \n\nand image task with notable margin (see Table 6). Our \nH/16 model outperforms the largest publicly available \nVideoMAE, VideoMAEv2, OmniMAE, MVD, and Hiera \nmodels by at least +5 points in motion understanding \n(Something-Something-v2), +2 points in action recogni- \ntion (Kinetics-400), +5 points on action detection (AVA), \n+1 point on object recognition (ImageNet-1K), +2 points \nin scene recognition (Places205), and +0.2 points on fine- \ngrained recognition (iNaturalist). Moreover, when com- \nparing pretraining wallclock time in Figure 5, we see that \nV-JEPA achieves this performance with a roughly 2 \n× \nspeedup compared to the large pixel prediction models. \n\n5.2 Comparison with State-of-the-Art \n\nNext, in Table 6, we inspect how the V-JEPA models \npretrained on video stack up next to the largest state- \nof-the-art self-supervised image and video models when \nfreezing the backbone encoder and training an attentive \nprobe on top. Our image pretrained baselines include \nOpenCLIP (Cherti et al., 2023), DINOv2 (Oquab et al., \n2023), and I-JEPA (Assran et al., 2023). The Open- \nCLIP model is trained with a contrastive image-text \nalignment objective, DINOv2 and I-JEPA are trained \nwith self-supervision. These models are known to excel \nin their frozen-evaluation performance (Oquab et al., \n2023); i.e., their ability to produce visual features that \ncan be applied to many downstream tasks simultane- \nously, without end-to-end fine-tuning, and thus pro- \nvide highly competitive baselines. Our video pretrained \nbaselines include VideoMAE (Tong et al., 2022), Omni- \nMAE (Girdhar et al., 2023), Hiera (Ryali et al., 2023), \nVideoMAEv2 (Wang et al., 2023a), and MVD (Wang \net al., 2023b). The OpenCLIP, DINOv2 and Video- \nMAEv2 models are parameterized as Giant/Gigantic \nvision transformer architectures containing over 1B pa- \nrameters trained on large-scale image or video datasets. \n\nComparison with image models. On tasks that re- \nquire a fine-grained understanding of motion (Something- \nSomething-v2), the V-JEPA models provide a major im- \nprovement (over +21 points) compared to large-scale \nimage baselines, such as DINOv2, OpenCLIP, and I- \nJEPA. Self-supervised pretraining from videos allows to \nmodel dynamic concepts that are not easily learned from \nstatic image datasets. Similarly, we observe that the \nV-JEPA models outperform image-based pretraining on \naction localization.", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv3.pdf" - }, - { - "text": "Table 14 Temporal Coverage on Kinetics-400. We evaluate the effect of temporal coverage on K400. We train an attentive \nprobe on K400 using either 1 clip (≈ 2 seconds of a video) or 8 clips (≈ 16 seconds of a video). To sample N clips, we first \ndivide a video in N equal-length temporal segments and sample one clip at random per segment. The video encoder processes \neach clip in parallel and all the encoder output tokens are concatenated at the input of the attentive probe. Increasing the \ntemporal coverage from 1 clip per video to 8 clips significantly improves the performance for both our VideoMAE baseline \nand V-JEPA. \n\nMethod \nVideoMAE ViT-L/16 \nViT-L/16 \nV-JEPA \n\nArch. 1 Clip 8 Clips \n\n69.4 \n73.7 77.8 \n80.9 \n\nTable 15 Finetuning results. We evaluate a V-JEPA model with the finetuning protocol on the K400 and SSv2 datasets \nusing 16 frames per clip and multi-view fusion (5×3 or 2×3) for inference. The #Samples Seen entry corresponds to the \nnumber of video clips processed during pretraining, which is larger than the size of the pretraining dataset for multi-epoch \ntraining. We compare V-JEPA with different video self-supervised learning approaches. We report the VideoMAEv2 results \nwithout instruction-turning for consistency with the other approaches. V-JEPA obtains competitive performance using the \nfinetuning protocol. \n\n\n \n \n \n \n [html]VideoMAEv1VideoMAEv276.7\n
MethodArch.Pretraining Data# Samples SeenK400 ( 16 × 5 × 3 )SSv2 ( 16 × 2 × 3 )
ViT - L / 16K400 | SSv2380M | 410M85.474.3
ViT - H / 16K400 | SSv2380M | 410M86.674.8
ViT - H / 16Un. Hybrid1600M86.976.8
MVDViT - L / 16K400 + IN1K2400M86.4
ViT - H / 16K400 + IN1K2400M87.277.3
V - JEPAViT - L / 16VideoMix2M270M85.6
\n\nexamine our multi-masking strategy and find that sampling two masks for each clip (long-range and short-range) to \nbe more effective than sampling just a single mask for each clip. \n\nIn Figure 8c, we explore different average spatial and temporal masking ratio, i.e. the spatial/temporal ratio of \nthe area that is covered by a mask on average for a clip. Recall that each mask is constructed by sampling several \n(possibly overlapping) blocks and taking their union. We change the average spatial or temporal masking ratio by \nchanging a block spatial or temporal size, as well as the overall number of blocks. We found that low spatial or \ntemporal coverage results in a trivial prediction task, which degrades downstream performance. Based on those \nresults, we sample masks that remove roughly 90% of the frame and extend along the entire temporal dimension of \nthe clip by default. \n\nIn Figure 8b , we explore different block size given an effective spatial masking ratio of 90% and temporal ratio of \n100%. We keep the masking ratio approximately constant by changing the block size and the number of block at the \nsame time. We find that sampling several blocks to perform better than sampling a single large block. Figure 9 \nvisually illustrates the effect of sampling several smaller blocks to construct a mask.", - "page_start": 21, - "page_end": 21, - "source_file": "arxiv3.pdf" - }, - { - "text": "Table 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), Video- \nMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using \na ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, \niNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. \nAll models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from \nseveral spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream \ntasks, except ImageNet, where the model achieves 74.8% compared to 75.1% of an OmniMAE model trained directly on \nImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on \nSSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining. \n\n\n \n \n \n \n [html]MethodArch.# Samples SeenIter.K400 ( 16 × 8 × 3 )SSv2 ( 16 × 2 × 3 )ViT - L / 16\n
AVAIN1KPlaces205iNat21K400 - ft ( 16 × 5 × 3 )SSv2 - ft ( 36 × 2 × 3 )Methods pretroined using pivel prolictionOmniMAE
2400M1170K65.660.614.475.159.866.184.074.2VideoMAEViT - L / 16
410M400K77.865.521.671.159.364.685.474.3HieraHiera - L
770M1500K75.564.215.868.958.556.987.375.1V - JEPAViT - L / 16
270M90K80.869.525.674.860.367.885.675.1
\n\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation \nwith an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models \nare evaluated at resolution 224, except I-JEPA512 and V-JEPA384 which are evaluated respectively at resolution 512 and \n384. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views \nfrom the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. \nCompared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on \ntasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks \nrequiring static appearance-based features.", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "Table 16 Sample efficiency. We compare the sample efficiency of pretraining various state-of-the-art image and video models. \nThe #Samples Seen entry corresponds to the number of samples (image or video clips) processed by the network during \npretraining, which is larger than the size of the pretraining dataset for multi-epoch training. The V-JEPA results in this \npaper are obtained while processing an order of magnitude fewer samples than previous methods. \n\n\n \n \n \n \n [html]\n
MethodArch.Data# Samples Seen
OpenCLIPViT - G / 14LAION - 2B39000M
DINOv2ViT - g / 14LVD 142M1900M
VideoMAEv2ViT - g / 14UnlabeledHybrid1600M
V - JEPAViT - H / 16384VideoMix2M210M
\n\n(a) (b) \n\nFigure 8 Masking Strategy Ablation. Evaluating a linear probe on a ViT-B/16 pretrained with V-JEPA on K400 under \nvarious 3D Multi-Block masking settings. We examine the impact of (a) sampling several masks per video, (b) varying the \nnumber of blocks in a mask, and (c) varying the average spatial and temporal masking ratio. A temporal masking ratio of \n100% extends the spatial mask across all the frames in the clip. We find it important to maintain a high spatial and temporal \nmasking ratio during pretraining. \n\n\n\n\n\n\n\n(c) Num. Blocks: 2, Spatial Block Size: 160 × 160 \n\nFigure 9 Illustration of mask with number of blocks and block size. Each mask is constructed by sampling several (possibly \noverlapping) blocks and taking their union.", - "page_start": 22, - "page_end": 22, - "source_file": "arxiv3.pdf" - }, - { - "text": "Table 12 Linear vs. Attentive Probe Evaluation for V-JEPA and VideoMAE. We evaluate the effect of linear (Lin.) \nand attentive (Att.) probing when adapting V-JEPA to the K400 (16 × 5 × 3) and SSv2 (16 × 2 × 2) tasks. V-JEPA and \nVideoMAE benefit from using a non-linear attentive probe. \n\nK400 SSv2 \nMethod Arch. Lin. Att. Lin. Att. \n\nVideoMAE ViT-L/16 \nViT-L/16 \nV-JEPA 52.5 \n56.7 77.8 \n80.8 41.3 \n50.1 61.2 \n69.5 \n\nTable 13 Linear vs. Attentive Probe Evaluation for DINOv2 and OpenCLIP. We evaluate the effect of linear (Lin.) \nand attentive probing (Att.) when adapting DINOv2 and OpenCLIP. Image-baselines benefit from using an attentive probing \nstrategy. Results shown in gray are reported from the linear probe evaluation in Oquab et al. (2023). \n\n\n \n \n \n \n [html]MethodArch.K400 ASLin.Att.\n
II Lin.Att.Place205Lin.iN Lin.21Att.DINOv2ViT - g / 1478.483.438.350.086.5
86.267.568.485.788.8OpenCLIPViT - G / 1478.381.835.834.886.2
85.369.870.276.083.6
\n\nOne Clip vs Multiple clips. We examine the impact of changing the temporal coverage of a model during downstream \nevaluation on K400 action classification. In Table 14, we evaluate VideoMAE and V-JEPA models using an attentive \nprobe with access to either the feature map of 1 clip randomly sampled from the video, or the concatenated feature \nmap of 8 clips randomly sampled from the video. To sample 8 clips from a video, we first divide the video into 8 \nequal length temporal segments, and sample 1 clip at random from each segment. A single clip corresponds to \n2 \n≈ \nseconds of a video on average, while 8 clips correspond to \n16 seconds. The video encoders processes each clip \nseparately to produce a clip-level feature map, which are then concatenated at the input to the attentive probe. \n≈ \n\nIncreasing the temporal coverage from 1 clip per video to 8 clips improves the performance of both V-JEPA and \nVideoMAE on K400 action classification. We therefore use the multiclip attentive probing setup as our default \nevaluation pipeline. \n\nIn Table 15, we evaluate V-JEPA using finetuning (separately) on K400 and SSv2. We compare V-JEPA with \nVideoMAEv2 (Wang et al., 2023a), VideoMAE (Tong et al., 2022) and MVD (Wang et al., 2023b) using a ViT-L/16 \nor a ViT-H/16 architecture. V-JEPA obtains competitive performance using a finetuning protocol. With a ViTiH/16 \narchitecture, V-JEPA outperforms by 1.2% VideoMAE and +0.3% VideoMAEv2 on the SSv2 dataset, while obtaining \ncomparable performance on K400. V-JEPA also obtains performance similar to MVD on the SSv2 dataset. The \nMVD model achieves the best performance across models on the K400 dataset, and is trained using the image \ndataset ImageNet1K, in contrast to the other methods in the table, which only use video data. Additionally MVD \nrequires the processing of significantly more samples during pretraining due to the cost of training the teacher \nencoder networks in a pre-pre-training step. \n\nE.3 Sample Efficiency of pretraining", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv3.pdf" - }, - { - "text": "Table 1 Pixels vs. Featurized Targets. We ablate the effect of computing the prediction loss in feature space vs pixel space. All \nmodels are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We \nexamine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single \ncenter view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide \na consistent improvement over pixel space prediction. \n\n\n \n \n \n \n [html]TargetArch.Frozen Evaluation\n
Fine - Tuning
K400 ( 16 × 1 × 1 )SSv2 ( 36 × 1 × 1 )IN1KK400 - ft ( 16 × 5 × 3 )
PixelsViT - L / 1668.666.073.385.4
FeaturesViT - L / 1673.766.274.885.6
\n\nTable 2 Pretraining Data Distribution. We pretrain all models for 90K iterations using a batch size of 3072, and evaluate \ndownstream performance of the frozen backbones with an attentive probe using a single center view. Average performance \nacross tasks increases with the pretraining dataset size. \n\n\n \n \n \n \n [html]Frozen EvaluationArch.Data# SamplesK400 ( 96 × 1 × 1 )ViT - L / 16ViT - H / 16\n
SSv2 ( 15 × 1 × 1 )IN1KAvg.
K710700K75.863.273.770.9
K710 + SSv2900K72.967.472.871.0
K710 + HT1900K74.564.274.871.1
VideoMix2M2000K73.766.274.871.5
K710 + SSv2900K75.766.873.772.0
VideoMix2M2000K74.068.575.972.8
\n\nversus pixel prediction objective, b) the construction of \nthe pretraining data distribution, c) the feature pooling \nstrategy for leveraging the model’s representations in \ndownstream tasks, and d) the masking strategy, towards \nidentifying: what to predict from what?", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" - }, - { - "text": "\n \n \n \n \n [html]dotabasets results resultion nurses to include horiginal care flip senior transition to the care senior transition to the care to the care transient trainee to takin workers to the workers workers workers workers workers workers worke wbfloat16 A10.80G\n
Hyper - parameterViT - L / 16224ViT - H / 16224ViT - H / 16384
VideoMix2M4564554 ( 0.3, 1.0 )( 0.75.1. 35 )( 0.75.1. 5 )VideoMix2M444 ( 0.31.1. 0 )( 0.75.1. 35 )( 0.75.1. 5 )VideoMix2M1616416344444444.03 ( 0.75.1. 35 )( 0.75.1. 5 )shortrange_mask_num_blocks shortrange_mask_spatial_scale longrange_mask_num_blocks longrange_mask_spatial_scale
80.1520.780.1520.780.1520.7optimization batch_size total_number_ol_iterations warmup_iterations
30729000012000307290000120002400900012000lr start_lr
6.25e - 42 × 10 − 46.25 × 10 − 42 × 10 − 46.25 × 10 − 42 × 10 − 4final_lr start − momentum final_momentums
1 × 10 − 60.9981.001 × 10 − 60.9981.001 × 10 − 60.9981.00start_weight_decay final_weight_decay scheduler_scale_factor
0.040.41.250.040.41.250.040.41.25architecture patch size tubelet. size pred_depth pred_dembed_dim
162123841621238416212384hardware : dtypeaccelerator
bfloat16 A10.80Gbfloat16A10.80G
\n\nMulti-Mask Prediction. To increase the efficiency of V-JEPA, we use a multi-masking strategy (Caron et al., \n2020; Baevski et al., 2022a), which enables us to amortize the cost of the target computation. As mentioned in \nSection 3, for a given video clip, we sample 2 different masks, short-range and long-range. While we need to forward \npropagate the x-encoder and predictor separately for each mask, we only need to compute the y-representation once. \n\nC Pretraining details \n\nIn section, we report V-JEPA pretraining details. Table 8 summarizes the main hyperparameters used during \npretraining. \n\nArchitectures. We use Vision Transformer (Dosovitskiy et al., 2020) (ViT) architectures for the x-encoder and \ny-encoder. We train three V-JEPA encoders: a ViT-L/16224, a ViT-H/16224 and a ViT-H/16384. All three encoders \ntake as input a short video clip of 16 frames with a temporal stride of 4 between consecutive frames. The subscripts, \n224 and 384, indicate the spatial resolution of the video clip. V-JEPA flattens the video clip into a sequence of \n2 (see Figure 7). For all three models, the predictor is \nnon-overlapping spatio-temporal patches of size 16 \n× \ndesigned as a narrow ViT architecture, consisting of 12 transformer blocks with an embedding dimension of 384. For \nsimplicity, we keep the number of self-attention heads in the predictor equal to that of the backbone used for the \ncontext-encoder/target-encoder. V-JEPA is pretrained without using a [cls] token. \n\n16 \n×", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "PLAW-116publ30.pdf", - "query": "What is appropriate authority ?", - "target_page": 1, - "target_passage": "APPROPRIATE AUTHORITY.—The term ‘appropriate authority’ means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**3.2 User and group administration**\n\nWhen you design a Content Manager OnDemand system, you must determine the best way \nto implement the many authority structures that are available for users and administrators of \nyour system. The span of control for the administration of the system must be considered with \nthe level of user access to the data that is stored in the system. How many different \nadministrators are required? Will all administrators have system administrator authority or will \ndifferent administrators have different levels of authority? What is the most effective way to \nrestrict a user’s access to only the data that is necessary to do that user’s job? \n\nThe answers to these questions depend on the size of the system, the degree of \ncentralization to be exercised over system administration, and the nature of the data and the \nbusiness needs of the users. \n\n**Centralized or decentralized**\nIn a system design that exercises centralized control, one or a few administrators are granted \nsystem administrator authority. A centralized system typically is used when the number of \nreports and users to be added to the system is small. Centralized administration is also \nappropriate where resources are limited and only one person might have the skills and \nknowledge to perform the system administration tasks, or where one user group performs all \nof the administration tasks. \n\nIn a system design with decentralized control, different users are granted different levels of \nadministrative authority. For example, you might have users that have the authority to create \nusers and groups. Other users might have the authority to create application groups and \nfolders, and others might be given full system administration authority.", - "page_start": 89, - "page_end": 89, - "source_file": "sg246915.pdf" - }, - { - "text": "**Figure 6: Psychosocial risk factors – Differences between skill groups (Decision authority)**", - "page_start": 27, - "page_end": 27, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "the \n\n\n\nway.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "' s role is to assist the Board onsibilities associated with the ounts, its external financial tiemal control structure, riskannual declaration of their independence to the Audit Committee.", - "page_start": 36, - "page_end": 36, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**22. Investments in Controlled Entities**", - "page_start": 71, - "page_end": 71, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "PLAW-116publ30.pdf", - "query": "What criteria must a lactation room meet?", - "target_page": 1, - "target_passage": "LACTATION ROOM.—The term ‘lactation room’ means a hygienic place, other than a bathroom, that— ‘‘(A) is shielded from view; ‘‘(B) is free from intrusion; and ‘‘(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "*Be it enacted by the Senate and House of Representatives of*\n*the United States of America in Congress assembled,*\n\nFairness For \nBreastfeeding \nMothers Act \nof 2019. \n40 USC 101 note. \n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding \nMothers Act of 2019’’. \n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.—Chapter 33 of \ntitle 40, United States Code, is amended by adding at the end \nthe following new section: \n\n**‘‘§ 3318. Lactation room in public buildings** 40 USC 3318. \n\n‘‘(a) DEFINITIONS.—In this section: \n\n‘appropriate \nauthority’ means the head of a Federal agency, the Architect \nof the Capitol, or other official authority responsible for the \noperation of a public building. \n\n‘‘(1) APPROPRIATE AUTHORITY.—The term \n\n‘‘(2) COVERED PUBLIC BUILDING.—The term ‘covered public \nbuilding’ means a public building (as defined in section 3301) \nthat is open to the public and contains a public restroom, \nand includes a building listed in section 6301 or 5101. \n\n‘‘(3) LACTATION ROOM.—The term ‘lactation room’ means \na hygienic place, other than a bathroom, that— \n\n‘‘(A) is shielded from view; \n‘‘(B) is free from intrusion; and \n‘‘(C) contains a chair, a working surface, and, if the \npublic building is otherwise supplied with electricity, an \nelectrical outlet. \n\n‘‘(b) LACTATION ROOM REQUIRED.—Except as provided in sub- \nsection (c), the appropriate authority of a covered public building \nshall ensure that the building contains a lactation room that is \nmade available for use by members of the public to express breast \nmilk. \n\n‘‘(c) EXCEPTIONS.—A covered public building may be excluded \nfrom the requirement in subsection (b) at the discretion of the \nappropriate authority if— \n‘‘(1) the public building— \n‘‘(A) does not contain a lactation room for employees \nwho work in the building; and \n\n‘‘(B) does not have a room that could be repurposed \nas a lactation room or a space that could be made private \nusing portable materials, at a reasonable cost; or \n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00001 Fmt 6580 Sfmt 6581 E:\\PUBLAW\\PUBL030.116 PUBL030 \n\nS \nW \nA \nL \nB \nU \nP \nh \nt \ni \n\nw \nD \nO \nR \nP \n2 \nB \nH \n8 \n2 \nC \nB \nK \nS \nD \nn \no \ne \ns \nu \na \nr \nk \nd", - "page_start": 0, - "page_end": 0, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "PUBLIC LAW 116–30—JULY 25, 2019 133 STAT. 1033 \n\n‘‘(2) new construction would be required to create a lacta- \ntion room in the public building and the cost of such construc- \ntion is unfeasible. \n‘‘(d) NO UNAUTHORIZED ENTRY.—Nothing in this section shall \nbe construed to authorize an individual to enter a public building \nor portion thereof that the individual is not otherwise authorized \nto enter.’’. \n\n(b) CLERICAL AMENDMENT.—The table of sections at the begin- \nning of chapter 33 of title 40, United States Code, is amended \nby inserting after the item related to section 3316 the following \nnew item: \n\n‘‘3318. Lactation room in public buildings.’’. \n\n(c) EFFECTIVE DATE.—The amendments made by this section \nshall take effect 1 year after the date of the enactment of this \nAct. \n\n40 USC 3318 \nnote. \n\nApproved July 25, 2019. \n\nLEGISLATIVE HISTORY—H.R. 866 (S. 528): \n\n\n \n \n \n \n [html]\n
Feb. 6, considered and passed House. June 26, considered and passed SenateTable
TableTable
\n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00002 Fmt 6580 Sfmt 6580 E:\\PUBLAW\\PUBL030.116 PUBL030 \n\nS \nW \nA \nL \nB \nU \nP \nh \nt \ni \n\nw \nD \nO \nR \nP \n2 \nB \nH \n8 \n2 \nC \nB \nK \nS \nD \nn \no \ne \ns \nu \na \nr \nk \nd", - "page_start": 1, - "page_end": 1, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "(e) in relation to a point of care test, they meet the relevant requirements for accreditation to \nISO Standard 15189 and ISO standard 22870; \n\n(f) \n\nthey receive the information required by paragraph 10(3) or (4) (as appropriate), and if \nthey administer the test to P, they do so no earlier than the end of the seventh day after the \nday on which P arrived in England;", - "page_start": 62, - "page_end": 62, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "the date of the report the facility is and / or, the compared to the compared the compared to the compared the study. The option of represent the facility is and / or written the facility will be co", - "page_start": 47, - "page_end": 47, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Main issues are: \n\n• \n• \nspace (in cars, trains, hotels, private flats, etc.); \nless well-adapted work equipment, for example, possibilities for ergonomic equipment at \nmobile workplaces; \n\n• availability of tools, that is, for example, lifting equipment in home care; \n• \n• emergency facilities, for example, fire extinguisher; \n\ncertain facilities like toilets, for example, at construction sites, for bus drivers; \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n53", - "page_start": 52, - "page_end": 52, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Amber list passengers**\n\n1. Book tests for day 2 and 8 \n\n2. Complete a Passenger Locator Form \n\n3. Make plans to self-quarantine in private accommodation for 10 full days after arrival (or full \nduration of stay if less than 10 days)", - "page_start": 81, - "page_end": 81, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "Figure 7.26. Airflow Separation (sheet 2 of 2)", - "page_start": 75, - "page_end": 75, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**i) Provisions**\nProvisions are recognised when the group has a legal or constructive obligation, as a result of past events, for which \nit is probable that an outflow of economic benefits will result and that outflow can be reliably measured.", - "page_start": 67, - "page_end": 67, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
of, non - executive, independentDirectors, except for theEnvironmental and SafetyCommittee, which includesthe CE0 as a member.• the Board Is to comprise a minimum of five and a maximum of ten Directors ( exclusive of the CEO );• the Board ehould communise aperceived to materially interfere with, the Director ' s ability to act in the best interests of the Company, The Board will assess the material / ity of any givenresponsibilities, and term of office of each Director of the Company are set out on page 4.1 of this Annual Report. Details of each Director ' s attendance at Board and Committee Meetings and their shareholdings are also
The Board Guidelines prescribe that the Board is to meet at least eight times a year, including a strategy meeting ofsubstantial majority of independent, non - executive Directors ;relationship that may affectIndependence on a case by case basis and has adopted materiality guidelines to assist inBoard and Committee Meetings and their shareholdings are also set out on page 47 of this Annual Report.
two days duration. The number of meetings of the Board and of each of its Committees and the names of attendees at those• there should be a separation of the roles of Chairman and Chief Executive Officer of the Company ; andthat assessment. Under these guidelines, the following interests are regarded as material. in the absence of any mitligating2.4 Nomination Committee The role, responsibilities and membership requirements of the Nomination Committee are
meetings are set out on page 47 of this Annual Report. Board▪ the Chairman of the Board should be an independent, non - executive Director.• a holding of 5 % or more ofdocumented in the Board Guidelines and in a separate Charter, approved by the Board.
Meetings are structured in two separate sessions, without management present for one of those sessions. The agenda forUnder the Company ’ s Constitution approximately one - third of Directors retire bythe Company ’ s voting shares a direct association with an entity that holds more than 5 % of the Company ’ s voting shares :Under the Board Guidelines, it is the responsibility of the Nomination Committee to devise the criteria for, and review
meetings is prepared by the Company Secretary inrotation each year and Directors appointed during the year are• an affiliation with an entitythe criteria for, and review membership of, and nomin
conjunction with the Chairman and CE0, with periodic inputrequired to submit themselves for election by shareholders at the Company ’ s next Annualwhich accounts for 5 % or more or the revenue or expense of the Company.to, the Board. The primary criteria adopted in selection of suitable Board candidates is their
from the Board. Comprehensive Board papers are distributed toGeneral Meeting. The Board Guidelines encourage Directors to retire at the First Annual General.The Board has determined that there should not be any arbitrary length of tenure that should becapacity to contribute to the ongoing development of the Company having regard to the
", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "2.6 Data collection \n\nThe interview guide (Table 4) was developed based on literature \nreviews, clinical experience and discussions within the research \ngroup and with user representatives. Two test interviews were", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - } - ] - }, - { - "references": { - "source_file": "PLAW-116publ30.pdf", - "query": "When take effect the Fairness For Breastfeeding Mothers Act ?", - "target_page": 2, - "target_passage": "The amendments made by this section shall take effect 1 year after the date of the enactment of this Act. ", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "*Be it enacted by the Senate and House of Representatives of*\n*the United States of America in Congress assembled,*\n\nFairness For \nBreastfeeding \nMothers Act \nof 2019. \n40 USC 101 note. \n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding \nMothers Act of 2019’’. \n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.—Chapter 33 of \ntitle 40, United States Code, is amended by adding at the end \nthe following new section: \n\n**‘‘§ 3318. Lactation room in public buildings** 40 USC 3318. \n\n‘‘(a) DEFINITIONS.—In this section: \n\n‘appropriate \nauthority’ means the head of a Federal agency, the Architect \nof the Capitol, or other official authority responsible for the \noperation of a public building. \n\n‘‘(1) APPROPRIATE AUTHORITY.—The term \n\n‘‘(2) COVERED PUBLIC BUILDING.—The term ‘covered public \nbuilding’ means a public building (as defined in section 3301) \nthat is open to the public and contains a public restroom, \nand includes a building listed in section 6301 or 5101. \n\n‘‘(3) LACTATION ROOM.—The term ‘lactation room’ means \na hygienic place, other than a bathroom, that— \n\n‘‘(A) is shielded from view; \n‘‘(B) is free from intrusion; and \n‘‘(C) contains a chair, a working surface, and, if the \npublic building is otherwise supplied with electricity, an \nelectrical outlet. \n\n‘‘(b) LACTATION ROOM REQUIRED.—Except as provided in sub- \nsection (c), the appropriate authority of a covered public building \nshall ensure that the building contains a lactation room that is \nmade available for use by members of the public to express breast \nmilk. \n\n‘‘(c) EXCEPTIONS.—A covered public building may be excluded \nfrom the requirement in subsection (b) at the discretion of the \nappropriate authority if— \n‘‘(1) the public building— \n‘‘(A) does not contain a lactation room for employees \nwho work in the building; and \n\n‘‘(B) does not have a room that could be repurposed \nas a lactation room or a space that could be made private \nusing portable materials, at a reasonable cost; or \n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00001 Fmt 6580 Sfmt 6581 E:\\PUBLAW\\PUBL030.116 PUBL030 \n\nS \nW \nA \nL \nB \nU \nP \nh \nt \ni \n\nw \nD \nO \nR \nP \n2 \nB \nH \n8 \n2 \nC \nB \nK \nS \nD \nn \no \ne \ns \nu \na \nr \nk \nd", - "page_start": 0, - "page_end": 0, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "As of January 31, 2015 and February 1, 2014, we were in compliance with this covenant. We will continue to monitor this covenant and \nbelieve that we will remain in compliance with this covenant during 2015.", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "PUBLIC LAW 116–30—JULY 25, 2019 133 STAT. 1033 \n\n‘‘(2) new construction would be required to create a lacta- \ntion room in the public building and the cost of such construc- \ntion is unfeasible. \n‘‘(d) NO UNAUTHORIZED ENTRY.—Nothing in this section shall \nbe construed to authorize an individual to enter a public building \nor portion thereof that the individual is not otherwise authorized \nto enter.’’. \n\n(b) CLERICAL AMENDMENT.—The table of sections at the begin- \nning of chapter 33 of title 40, United States Code, is amended \nby inserting after the item related to section 3316 the following \nnew item: \n\n‘‘3318. Lactation room in public buildings.’’. \n\n(c) EFFECTIVE DATE.—The amendments made by this section \nshall take effect 1 year after the date of the enactment of this \nAct. \n\n40 USC 3318 \nnote. \n\nApproved July 25, 2019. \n\nLEGISLATIVE HISTORY—H.R. 866 (S. 528): \n\n\n \n \n \n \n [html]\n
Feb. 6, considered and passed House. June 26, considered and passed SenateTable
TableTable
\n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00002 Fmt 6580 Sfmt 6580 E:\\PUBLAW\\PUBL030.116 PUBL030 \n\nS \nW \nA \nL \nB \nU \nP \nh \nt \ni \n\nw \nD \nO \nR \nP \n2 \nB \nH \n8 \n2 \nC \nB \nK \nS \nD \nn \no \ne \ns \nu \na \nr \nk \nd", - "page_start": 1, - "page_end": 1, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "table, th, td {\n border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]\n
20.Cotridge, A. et al. Change in brain size during and after pregnancy : study in healthy women and women with preeclampsia. Am. J. Neuroradiol. 23.19 – 26 ( 2002 ).38.
21.Paternina - Di, M. et al. Women ’ s neuroplasticity during gestation, childbirth and postpartum. Nat. Neurosci. 27.399 – 327 ( 2024 ).39.
22.Makris, N. et al. Decreased volume of the brain reward system in alcoholism. Biol. Psychiatry 64.192 - 202 ( 2008 ).23.
Filevich, E. et al. Day2day : investigating daily variability of magnetic resonance imaging measures over half a year. BMC Neurosci. 18.65 ( 2017 ).40.24.
Dulac, C., O ’ Connell, L. A. & Wu, Z. Neural control of maternal and paternal behaviors. Science 345.765 – 770 ( 2014 ).41.25.
Carmona, S. et al. Pregnancy and adolescence entail similar neuroanatomical adaptations. a comparative analysis of cerebral morphometric changes. Hum. Brain Mapp, 40.2143 – 2152 ( 209 ).42.26.
Pawluski, J. L., Hoekzema, E., Leuner, B. & Lonstein, J. S. Less canTableTable
be more. fine tuning the maternal brain. Neurosci. Biobehax. Rev. 133.104475 ( 2022 ).43.27.
Martinez - Garcia, M., Jacobs, E. G., de Lange, A. M. G. & Carmona, S. Advancing the neuroscience of human pregnancy. Nat. Neurosci, ZT, 805 – 807 ( 2024 ).44.28.
Pritschet, L., Taylor, C. M., Santander, T. & Jacobs, E. G. Applying dense - sampling methods to reveal dynamic endocrine45.Table
modulation of the nervous system. Curr. Opin. Behav. Sci. 40.72 – 78 ( 2021 ).46.29.
Taxier, L. R., Gross, K. S. & Frick, K. M. Oestradiol as a neuromodulator of learning and memory. Nat. Rev. Neurosci. 2f,47.Table
535 – 550 ( 2020 ).48.30.
Kohl, J. et al. Functional circuit architecture underlying parental behaviour. Nature 556.326 – 331 ( 2018 ). Article 7701.31.Rodrigo, M. J. et al. Inferior fronto - temporo - occipital connectivity : a missing link between maltreated girls and neglectful mothers. Soc. Cogn. Affect. Neurosci. It, 1658 – 1665 ( 2016 ).
Pubjuris32.Pawluski, J. L., L., Lonstein, J. S. & Fleming, A. S. The neurobiology of postpartum anxiety and depression. Trends Neurosci. 40.106 – 120 ( 2017 ).
Ope Attrition33.Barba - Muller, E., Craddock, S., Carmona, S. & Hoekzema, E. Brain plasticity in pregnancy and the postpartum period : links to maternal caregiving and mental health. Arch. Womens Ment. Health 22.289 – 299 ( 2019 ).
adapas last south34.Barth, C. & de Lange, A.- M. G. Towards an understanding of women ’ s brain aging the immunology of pregnancy and menopause. Front. Neuroendocrinol, 58.100850 ( 2020 ).
artic individual incleaves35.Orchard, E. R., Rutherford, H. J. V., Holmes, A. J. & Jamadar, S. D. Matrescence. Ufetime impact of motherhood on cognition and the brain. Trends Cogn. Sci. Zf, 302 – 316 [ 2023 ].
use use, hold36.Duarte - Guterman, F : et al. Cellular and molecular signatures of motherhood in the adult and ageing rat brain. Open Biol. 10.230217 ( 2023 ).
org /
", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed4.pdf" - }, - { - "text": "Each state bank that is a member of the Federal Reserve System and each national banking association is \nrequired by federal law to obtain the prior approval of the Federal Reserve Board and the OCC, respectively, to \ndeclare and pay dividends if the total of all dividends declared in any calendar year would exceed the total of (1) \nsuch bank’s net profits (as defined and interpreted by regulation) for that year plus (2) its retained net profits (as \ndefined and interpreted by regulation) for the preceding two calendar years, less any required transfers to surplus. In \naddition, these banks may only pay dividends to the extent that retained net profits (including the portion transferred \nto surplus) exceed bad debts (as defined by regulation).", - "page_start": 32, - "page_end": 32, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "*Monetary Policy*\n\nBanks are affected by the credit policies of other monetary authorities, including the Federal Reserve Board, \nthat affect the national supply of credit. The Federal Reserve Board regulates the supply of credit in order to \ninfluence general economic conditions, primarily through open market operations in United States government \nobligations, varying the discount rate on financial institution borrowings, varying reserve requirements against \nfinancial institution deposits, and restricting certain borrowings by financial institutions and their subsidiaries. The \nmonetary policies of the Federal Reserve Board have had a significant effect on the operating results of banks in the \npast and are expected to continue to do so in the future. \n\n\n \n \n \n \n [html]\n
TableTable
TableTable10
", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "*8.5 By 2030, achieve full and productive employment and decent work for all women and men,*\n*including for young people and persons with disabilities, and equal pay for work of equal value*\n\n*8.7 Take immediate and effective measures to eradicate forced labour, end modern slavery and*\n*human trafficking and secure the prohibition and elimination of the worst forms of child labour,*\n*including recruitment and use of child soldiers, and by 2025 end child labour in all its forms*\n\n*8.8 Protect labour rights and promote safe and secure working environments for all workers,*\n*including migrant workers, in particular women migrants, and those in precarious employment*", - "page_start": 115, - "page_end": 115, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Based on her increased responsibilities due to the Company’s growth, Ms. Ford was deemed to be a Key Management Personnel \nduring the 2014 fiscal year. Prior to that time, Ms. Ford was not considered to be Key Management Personnel.", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200471_en.pdf", - "query": "When is it not necessary to review an EHC plan ?", - "target_page": 3, - "target_passage": " It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**10.**In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”. \n\n**11.**After regulation 18 (circumstances in which a local authority must review an EHC plan) \n\ninsert— \n\n“**Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.**—(1) It is not necessary for a local authority to review an EHC plan in accordance \nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the \nincidence or transmission of coronavirus. \n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as \n\nsoon as reasonably practicable.”. \n\n**12.**In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert— \n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3) \nand (4) if it is impractical to do so because of a reason relating to the incidence or \ntransmission of coronavirus.”. \n\n**13.**In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**14.**In regulation 45 (unopposed appeals), after paragraph (7) insert— \n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e) \napply.”. \n\n**Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.**The Special Educational Needs (Personal Budgets) Regulations 2014(**a**) are amended as \n\nfollows. \n\n**16.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**17.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time period due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, the requirement for the local authority \nto review the making and use of direct payments within the first three months of them being \nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read \ninstead as a requirement for such action to be taken as soon as reasonably practicable.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess \n\neducational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. \n\n**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "PART 6 \n\nFinal provisions \n\n**Review of need for requirements**\n\n**24.**The Secretary of State must review the need for the requirements imposed by these \n\nRegulations by 14th June 2021 and at least once every 28 days thereafter. \n\n**Expiry of Regulations**\n\n**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "As of January 31, 2015 and February 1, 2014, we were in compliance with this covenant. We will continue to monitor this covenant and \nbelieve that we will remain in compliance with this covenant during 2015.", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Legal and regulatory frameworks**\n\nOSH is a shared EU and national responsibility. Over the last 35 years, the EU developed a \ncomprehensive legal framework that covers and regulates OSH risks. It changed the focus from \nprescription of obligatory prevention measures for certain predominantly safety risks towards a general \npreventive and participative approach. That is, all OSH risks have to be assessed, consultation between \nemployers and workers is required, and OSH training, expertise and preventive capacities are required \nfor every enterprise. All EU OSH directives have to be transposed into national law. In parallel, national, \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n15", - "page_start": 14, - "page_end": 14, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Outperform \n\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "Excel Training Manual 1.pdf", - "query": "Give me some info about the scroll bars in excel", - "target_page": 6, - "target_passage": "Appear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**5** **6**\n\n\n\n \n \n \n\nA worksheet (or page) in a workbook contains 16,384***columns***that are labelled using letters of \nthe alphabet. The first column in a worksheet is labelled column***A***, while the last is labelled***XFD***\n\nA worksheet (or page) in a workbook contains 1,048,576***rows***that are labelled using numbers \nfrom 1 to 1,048,576 \n\nWhere a column and row intersect we get what is known as a***cell***. You enter your data into \nthese cells. Each cell in a worksheet can hold up to 32,767 characters – although it would be \nunrealistic to ever push it this far. Cells are referred to by their column and row labels. For \nexample, in the screen above the cell we are pointing to is***C11***– this reference is known as the \n***cell address***and is most important as it is frequently used in commands and formulas \n\n \n\nWhen you start typing something, you want it to appear somewhere in the worksheet. As a \nconsequence when the Status Bar shows***Ready***mode, at least one cell in the worksheet will be \nhighlighted – this is known as the***active cell***. In the screen above, the active cell is cell***A1***– \nnotice that the column label and the row label also appears coloured to indicate the active cell. \nYou can have more than one active cell – when this occurs you have what is known as a***range***\n\n \n\nA workbook (as you would expect) is made up of pages known as***worksheets***. You can have as \nmany sheets in a workbook as your computer resources can accommodate. As a default, a new \nblank workbook normally has 3 worksheets labelled*Sheet1*,*Sheet2*, and*Sheet3*. Of course \nthese labels are pretty boring and meaningless and can be changed to something more relevant \n\n \nThe***Insert Worksheet***button here will insert another worksheet into the current workbook \nshould you need it", - "page_start": 4, - "page_end": 4, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Before starting this exercise*\n***e***\n\n***n***\n***e***\n***p***\n***O***\n*you MUST open the file E723*\n*Cell Alignment_9.xlsx...*\n\n***l***\n***i***\n***F***\n\n Click in cell***A5***\n\n*This cell contains a long text*\n*entry that spills across several*\n*columns…*\n\n Click on the***Expand Formula***\n\n***Bar***tool \nformula bar to see all of the \ntext \n\n to the right of the \n\n Click on the***Wrap Text***\n\ncommand \n***Alignment***group on the \n***Home***tab to wrap the text in \ncell***A5***\n\n in the \n\n**5**\n\n*Notice how the row height has*\n*now increased…*\n\n Hold down the \n\n key and \nclick in cell***E5***to select the \nrange***A5:E5***\n\n Click on the drop arrow \n\nfor***Merge & Centre***\n in the \n***Alignment***group and select \n**Merge Cells**to merge the cells \nin the range \n\n Move the mouse pointer to the \n\nbottom of the row***5***heading \nborder and drag the row height \nup until you reach***30***points \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\n \n\nTo wrap text - click in the cell to merge and \nclick on the***Wrap Text***command \n in the \n***Alignment***group on the***Home***tab \n\nTo merge text - click on the drop arrow  \n\nfor***Merge & Centre***\ngroup and select**Merge Cells**\n\n in the***Alignment***\n\n\n\n\n\n**Handy to Know…**\n \n\nIn the example above, wrapping forced the \ntext into one cell and Excel expanded the \nrow height so that all of the text was \naccommodated. We then merged the text \nacross several horizontal cells in the exercise \nabove so that we could reduce the row \nheight to a more acceptable level. \n\n", - "page_start": 25, - "page_end": 25, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Continue using the previous file*\n*with this exercise, or open the file*\n*E1324 Worksheet*\n*Techniques_11.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n\n\n\n\n***25***is below row***5***\n\n + \n\n\n\n Click on the***Maintenance***\nworksheet tab, then spend a few \nmoments examining the worksheet \n\n*Depending on your screen, it is*\n*possible that you won’t be able to*\n*see all of the figures on the screen*\n*at once...*\n\n Click in cell***B6***to select the cell \n Click on the***VIEW***tab, click on \n***Freeze Panes***in the***Window***\ngroup, then select**Freeze Panes**\n\n*Thin black lines appear above and*\n*to the left of the selected cell. This*\n*indicates that the areas above and*\n*to the left are frozen...*\n\n Scroll to the right until***Yearly***\n***Average***in column***L***appears next \nto column***A***\n\n Scroll down until***Overheads***in row \n Press \n\n to move to cell \n***B6***– this is our temporary home \ncell, as the cells above and to the \nleft are frozen \n\n On the***VIEW***tab, click on***Freeze***\n\n***Panes***in the***Freeze Panes***group, \nthen click on***Unfreeze Panes***to \nunfreeze the rows and columns \n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***freeze panes***in a***worksheet***: \n\n1. Click in the cell below and to the right of the \narea you want to freeze/unfreeze \n\n2. Click on the***VIEW***tab \n3. Click on***Freeze Panes***in the***Window***\ngroup, then select**Freeze Panes**\n\n**Handy to Know…**\n \n\nIf you want to freeze only the rows above the \nselected cell (leaving all columns unfrozen), \nselect the cell in column***A***of that row – e.g. \nto freeze rows***1***to***6***, click in cell***A7***. The \nsame applies to freezing only columns and \nleaving the rows unfrozen: select the cell in \nrow***1***.", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_3.xlsx...*\n Click on the chart to \n Point to the sizing \n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nselect it \n\nhandle on the left \nborder of the chart until \nthe mouse pointer \nchanges to a double \narrow \n\n Hold down the left \n\nmouse button and drag \nleft until the chart \nappears as shown \n\n*You can also resize a*\n*chart from the ribbon…*\n\n Click on the***CHART***\n Click on the up spinner \n\n***TOOLS: FORMAT***tab \n\narrow for***Shape***\n***Height***in the***Size***\ngroup until it shows***8.5***\n***cm***\n\n Click on the up spinner \n\narrow for***Shape Width***\nin the***Size***group until it \nshows***17 cm***\n\n Click in cell***A1***to \ndeselect the chart \n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n \n\nIf you wish to change the size of a chart \nquickly and easily, clicking on and dragging \nthe resize handles is the best option whereas \nif you want to resize a chart to a specific size \nit is best to resize the chart using the tools in \nthe***Size***group on the***CHART TOOLS:***\n***FORMAT***tab. \n\n**For Your Reference…**\nTo***resize***a***chart***: \n\n1. Select the chart, then click on and drag a \n\nsizing handle on the border of the chart, or \n Click on the***CHART TOOLS: FORMAT***tab, \nthen click on up/down spinner arrows for \n***Shape Height***and***Shape Width***in the***Size***\ngroup", - "page_start": 48, - "page_end": 48, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "***Figure 44. Data Entry Grid Export to Excel screen***\n\n\n\n\n \n \n \n \n [html]\n
TableTableTableTable
TableTableNAIIS - User - Mamual. DocsPage 30
10 / 02 / 2013
", - "page_start": 29, - "page_end": 29, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_8.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Revenue***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart to \nselect it and see the \n***CHART TOOLS:***\n***DESIGN***and***CHART***\n***TOOLS: FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Quick***\n***Layout***in the***Chart***\n***Layouts***group to display \na gallery of layout \noptions \n\n Click on***Layout 3***to \napply this chart layout to \nthe chart \n\n Repeat steps***2***and***3***to \n\nselect other***chart***\n***layouts***and see how \nthey appear when \napplied to the chart \n\n**5**\n\n Click on***Quick Layout***in \nthe***Chart Layouts***group \nand click on***Layout 5***\n\n Click on the***Chart Data***\nworksheet tab to display \nthis worksheet \n\n\n\n\n\n\n\n**Handy to Know…**\n***Chart layouts***are predefined themes \n\ncreated by Microsoft. Even if you choose one \nof these layouts you can still make your own \nmodifications to the way the elements and \nobjects are positioned and how they appear. \n\n**For Your Reference…**\nTo***change***the***chart layout***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Quick Layout***in the***Chart***\n***Layouts***group \n\n3. Select the desired layout", - "page_start": 53, - "page_end": 53, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Point to the vertical dots \n\nbetween the sheet names and \nthe horizontal scroll bar, as \nshown \n\n*The pointer will change to a*\n*double-headed arrow...*\n\n Click and drag the bar across \n\nto the right, to the end of \ncolumn***L***, then release the \nmouse button \n\n Double-click on***Sheet1 (5)***to \nselect the worksheet tab name \n\n*This will also place it into edit*\n*mode…*\n\n Type**Comms**, then press \n Repeat steps***3***and***4***to \n\n***Sheet1 (4)*Admin**\n***Sheet1 (3)***\n***Sheet1 (2)***\n***Sheet1*** **Shop**\n**IT**\n**Maintenance**\n\n\n\nrename the other worksheets: \n\n\n\n\n\n**For Your Reference…**\nTo***rename***a***worksheet***: \n\n1. Double click on the current name on the \nworksheet tab \n\n 2. Type the new name and press \n\n**Handy to Know…**\n You can rename a worksheet by \n\nright-clicking on the worksheet tab to display \nthe shortcut menu and clicking on***Rename***. \n\n A worksheet tab name can contain up to 31 \n\ncharacters including spaces, but it is better to \nkeep it short and succinct.", - "page_start": 11, - "page_end": 11, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Functions Overview**\n\nFunctions are simply pre-programmed formulas already provided for you in Excel which can perform \ncalculations covering a wide range of categories including statistics, date and time arithmetic, financial \ncalculations, lists, engineering, and more. \nJust like normal formulas that you create, functions must start with an***equal sign***. The equal sign is \nthen followed by the***name***of the function (usually a descriptive name which indicates the purpose of \nthe function). Most functions also require additional information known as***arguments***which are \nsupplied to the function in brackets after the function name. Functions are therefore written as follows: \n**=*name*(*arguments*)**\nThe arguments are quite often cell or range references that contain values that can be used in the \nfunction. For example, the commonest function is the***SUM***function which, as its name suggests, is \nused to sum or add values together. If you wanted to add all of the values in the cells from***B10***to***D15***\nyou would write this function as: \n**=SUM(B10:D15)**\nAs you can see this is much simpler than writing your own referential formula which would look like: \n**=B10+B11+B12+B13+B14+B15+D10+D11+D12+D13+D14+D15**\nImagine writing and proofing a formula where you had to add 200 cells! \n\n\n\n**Typing Functions**\n\nIf you are familiar with the function that you need you can type it into a cell exactly the same way you \ntype any other formula. If you are not sure if Excel has a function or you can’t quite remember how it is \n on the Formula Bar to assist you. When you click on \nwritten you can use the***Insert Function***tool \nthis tool the***Insert Function***dialog box will be presented to you which lists the most recently used or \ncommon functions and also allows you to search for other functions that you might need. \n\n\n\n\n\n\nThe***Insert Function***dialog box will also type the function out for you and then provide you with a \nfurther dialog box to guide you through the process of specifying the arguments that the function \nneeds to perform its calculation.", - "page_start": 29, - "page_end": 29, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_6.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the chart to \n\nselect it and display the \n***CHART TOOLS:DESIGN***\nand***CHART TOOLS:***\n***FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Move Chart***\nin the***Location***group to \ndisplay the***Move Chart***\ndialog box \n\n Click on***New Sheet***, then \ntype**Revenue Chart**\n\n*This will become the*\n*sheet name for the*\n*chart…*\n\n Click on**[OK]**to move the \nembedded chart to its \nown sheet \n\n Click on the***Chart Data***\nworksheet tab to see the \ndata again \n\n*Notice that the chart is no*\n*longer embedded on this*\n*worksheet*\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***create***a***chart sheet***: \n\n1. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Move Chart***in the***Location***\ngroup \n\n2. Click on***New Sheet***, type a name for the \nsheet and click on**[OK]**\n\n\n\n\n\n**Handy to Know…**\n Keeping charts on their own sheets makes \nthem easier to work with as they do not \nobstruct the data.", - "page_start": 51, - "page_end": 51, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "Excel Training Manual 1.pdf", - "query": "How to rename a worksheet in Excel ?", - "target_page": 12, - "target_passage": "To rename a worksheet: 1. Double click on the current name on the worksheet tab 2. Type the new name and press ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Point to the vertical dots \n\nbetween the sheet names and \nthe horizontal scroll bar, as \nshown \n\n*The pointer will change to a*\n*double-headed arrow...*\n\n Click and drag the bar across \n\nto the right, to the end of \ncolumn***L***, then release the \nmouse button \n\n Double-click on***Sheet1 (5)***to \nselect the worksheet tab name \n\n*This will also place it into edit*\n*mode…*\n\n Type**Comms**, then press \n Repeat steps***3***and***4***to \n\n***Sheet1 (4)*Admin**\n***Sheet1 (3)***\n***Sheet1 (2)***\n***Sheet1*** **Shop**\n**IT**\n**Maintenance**\n\n\n\nrename the other worksheets: \n\n\n\n\n\n**For Your Reference…**\nTo***rename***a***worksheet***: \n\n1. Double click on the current name on the \nworksheet tab \n\n 2. Type the new name and press \n\n**Handy to Know…**\n You can rename a worksheet by \n\nright-clicking on the worksheet tab to display \nthe shortcut menu and clicking on***Rename***. \n\n A worksheet tab name can contain up to 31 \n\ncharacters including spaces, but it is better to \nkeep it short and succinct.", - "page_start": 11, - "page_end": 11, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Before starting this exercise*\n*you MUST open the file*\n*E1324 Worksheet*\n*Techniques_1.xlsx…*\n***n***\n***e***\n***p***\n***O***\n\n***e***\n***l***\n***i***\n***F***\n\n Examine the workbook – it \ncurrently contains one \nworksheet named***Sheet1***\n\n Click on the***New Sheet***icon \nat the end of the worksheet \ntabs \n\n*A new worksheet named*\n*Sheet2 will be inserted. You*\n*can also use the keyboard*\n*shortcut...*\n\n Press + \nanother new worksheet \n\n to insert \n\n*This sheet is named Sheet3*\n*and is inserted before the*\n*currently selected sheet.*\n*Now let’s delete a sheet...*\n\n Right-click on the***Sheet3***\nworksheet tab to display the \nshortcut menu \n\n Select**Delete**to remove the \nworksheet \n\n*As the worksheet contains no*\n*data, the sheet will be*\n*deleted immediately. If a*\n*worksheet contains data,*\n*Excel will ask you to confirm*\n*your actions...*\n\n Repeat steps***4***and***5***to \n\n\ndelete***Sheet2***\n\n\n\n\n\n\n\n**Handy to Know…**\n To insert a worksheet between existing \n\nworksheets, right-click on the worksheet tab \nbefore which you want to insert a new sheet, \nthen click on***Insert***to display the***Insert***\ndialog box. Select***Worksheet***and click on \n**[OK]**. \n\n**For Your Reference…**\nTo***insert***a***new worksheet***into a***workbook***: \n\n Click on the***New Sheet***icon to the right of \nthe worksheet tabs \n\nTo***delete***a***worksheet***from a***workbook***: \n\n Right click on the worksheet tab, then select \n**Delete**", - "page_start": 9, - "page_end": 9, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "press to clear it \n\n\n\n\n\n\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_1.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Right-click on***Sheet1***to \ndisplay the worksheet shortcut \nmenu \n\n Select**Move or Copy**to \ndisplay the***Move or Copy***\ndialog box \n\n Click on***Create a copy***so it \nappears ticked, then click on \n**[OK]**\n\n*The new worksheet is named*\n*Sheet1 (2). Let’s create a*\n*“template” from this worksheet*\n*by deleting unwanted data...*\n\n Select the range***B7:E9***, then \n Repeat step***4***to clear the \nranges***B14:E23***,***G7:J9***and \n***G14:J23***, then press + \n\n to return to cell***A1***\n\n*Now we can copy this*\n*“template” to create additional*\n*worksheets...*\n\n Repeat steps***1***to***3***three \n\ntimes to create three copies of \nthe*template*worksheet – this \ntime without data \n\n*The final worksheet should be*\n*named Sheet1 (5)*\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***copy***a***worksheet***: \n\n1. Right-click on the worksheet to copy, then \nselect***Move or Copy***\n\n2. Click on***Create a copy***so it appears ticked \n3. Click on**[OK]**\n\n**Handy to Know…**\n You can copy the current worksheet using \nthe***HOME***tab by clicking on***Format***in the \n***Cells***group, then clicking on***Move or Copy***\n***Sheet***. \n\n The***Before sheet***options in the***Move or***\n***Copy***dialog box allow you to position the \ncopied worksheet where you want.", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**5** **6**\n\n\n\n \n \n \n\nA worksheet (or page) in a workbook contains 16,384***columns***that are labelled using letters of \nthe alphabet. The first column in a worksheet is labelled column***A***, while the last is labelled***XFD***\n\nA worksheet (or page) in a workbook contains 1,048,576***rows***that are labelled using numbers \nfrom 1 to 1,048,576 \n\nWhere a column and row intersect we get what is known as a***cell***. You enter your data into \nthese cells. Each cell in a worksheet can hold up to 32,767 characters – although it would be \nunrealistic to ever push it this far. Cells are referred to by their column and row labels. For \nexample, in the screen above the cell we are pointing to is***C11***– this reference is known as the \n***cell address***and is most important as it is frequently used in commands and formulas \n\n \n\nWhen you start typing something, you want it to appear somewhere in the worksheet. As a \nconsequence when the Status Bar shows***Ready***mode, at least one cell in the worksheet will be \nhighlighted – this is known as the***active cell***. In the screen above, the active cell is cell***A1***– \nnotice that the column label and the row label also appears coloured to indicate the active cell. \nYou can have more than one active cell – when this occurs you have what is known as a***range***\n\n \n\nA workbook (as you would expect) is made up of pages known as***worksheets***. You can have as \nmany sheets in a workbook as your computer resources can accommodate. As a default, a new \nblank workbook normally has 3 worksheets labelled*Sheet1*,*Sheet2*, and*Sheet3*. Of course \nthese labels are pretty boring and meaningless and can be changed to something more relevant \n\n \nThe***Insert Worksheet***button here will insert another worksheet into the current workbook \nshould you need it", - "page_start": 4, - "page_end": 4, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n\n\n\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_12.xlsx...*\n Click on***Sheet 2***to \n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nsee the chart in the \nworksheet, then click \non the chart to select it \n\n Press \n to delete \nthe chart \n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n Because it is so easy to delete a chart object \n\nit is also easy to delete it by accident! \nRemember, you can use the***Undo***feature in \nExcel to restore accidental deletions. \n\n**For Your Reference…**\nTo***delete***a***chart***: \n\n1. Click on the worksheet to see the chart, then \nclick on the chart to select it \n\n\n2. Press", - "page_start": 57, - "page_end": 57, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**4** **2**\n\n\n\n\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the file*\n*E1324 Worksheet*\n*Techniques_6.xlsx...*\n Click on the***Maintenance***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nworksheet tab \n\n*We’ll copy this completed*\n*data to another workbook...*\n\n Right-click on the \n\nworksheet tab to display \nthe shortcut menu, then \nclick on***Move or Copy***to \ndisplay the***Move or Copy***\ndialog box \n\n Click on the drop arrow for \n***To book***, then select**(new**\n**book)**\n\n Click on***Create a copy***so \nit appears ticked \n\n*This will create a new*\n*workbook as well as*\n*making a copy of the*\n*worksheet...*\n\n Click on**[OK]**\n\n*A new workbook will be*\n*created and Maintenance*\n*will be the only worksheet*\n*in the workbook…*\n\n Save the new workbook as \n***Maintenance.xlsx***, then \nclose it \n\n\n\n\n\n\n\n**Handy to Know…**\n To copy a worksheet into an existing \n\nworkbook, make sure that you open the \ndestination workbook first to ensure that it is \nlisted in***To book***in the***Move or Copy***\ndialog box. \n\n**For Your Reference…**\nTo***copy***a***sheet***to***another workbook***: \n\n1. Right click on the worksheet tab, then click \non***Move or Copy***\n\n2. Select either***(new book)***or the name of \nanother workbook in***To book***\n\n3. Tick***Create a copy***, then click on**[OK]**", - "page_start": 12, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_6.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the chart to \n\nselect it and display the \n***CHART TOOLS:DESIGN***\nand***CHART TOOLS:***\n***FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Move Chart***\nin the***Location***group to \ndisplay the***Move Chart***\ndialog box \n\n Click on***New Sheet***, then \ntype**Revenue Chart**\n\n*This will become the*\n*sheet name for the*\n*chart…*\n\n Click on**[OK]**to move the \nembedded chart to its \nown sheet \n\n Click on the***Chart Data***\nworksheet tab to see the \ndata again \n\n*Notice that the chart is no*\n*longer embedded on this*\n*worksheet*\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***create***a***chart sheet***: \n\n1. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Move Chart***in the***Location***\ngroup \n\n2. Click on***New Sheet***, type a name for the \nsheet and click on**[OK]**\n\n\n\n\n\n**Handy to Know…**\n Keeping charts on their own sheets makes \nthem easier to work with as they do not \nobstruct the data.", - "page_start": 51, - "page_end": 51, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_7.xlsx...*\n Click on the***Revenue***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart \nto select it and display \nthe chart commands on \nthe ribbon \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Change***\n***Chart Type***in the***Type***\ngroup to display the \n***Change Chart Type***\ndialog box \n\n Click on***3-D Column***, \n Click on**[OK]**to apply \n Click on the***Chart Data***\n\nas shown \n\nthe change to the chart \n\nworksheet tab to return \nto the worksheet \n\n\n\n\n\n\n\n\n\n **4**\n\n**Handy to Know…**\n You can use***Change Chart Type***in the \n***Type***group on the***CHART TOOLS:***\n***DESIGN***tab for either embedded charts or \ncharts that have their own worksheet tabs. \n\n**For Your Reference…**\nTo***change***the***chart type***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Change Chart Type***in the \n***Type***group \n\n3. Click on the desired chart and click on**[OK]**", - "page_start": 52, - "page_end": 52, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Contents**\nUnderstanding Workbooks ................................................................................................................................ 1 \nNavigating in a File ............................................................................................................................................ 2 \n\nTyping Text or Numbers Into A Worksheet ....................................................................................................... 3 \nTyping Simple Formulas In A Worksheet .......................................................................................................... 4 \n\nFilling A Series ................................................................................................................................................... 5 \nInserting And Deleting Worksheets ................................................................................................................... 6 \n\nCopying A Worksheet ........................................................................................................................................ 7 \nRenaming A Worksheet ..................................................................................................................................... 8 \n\nMoving or Copying A Sheet To Another Workbook ........................................................................................... 9 \nChanging Worksheet Tab Colours .................................................................................................................. 10 \n\nGrouping Worksheets ...................................................................................................................................... 11 \nFreezing Rows And Columns .......................................................................................................................... 12 \n\nSelecting Ranges .............................................................................................................................................................. 13 \n\nSelecting Rows ................................................................................................................................................ 14 \nSelecting Columns ........................................................................................................................................... 15 \n\nUnderstanding Formatting ................................................................................................................................................. 16 \nApplying General Formatting ........................................................................................................................... 17 \n\nChanging Fonts ............................................................................................................................................... 18 \nChanging Font Size ......................................................................................................................................... 19 \n\nUnderstanding Borders .................................................................................................................................... 20 \nApplying A Border To A Range ....................................................................................................................... 21 \n\nWrapping And Merging Text ............................................................................................................................ 22 \n**PRACTICE EXERCISE**.......................................................................................................................................... 23", - "page_start": 1, - "page_end": 1, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "Excel Training Manual 1.pdf", - "query": "I want to freeze a pane in my Excel worksheet ", - "target_page": 16, - "target_passage": "To freeze panes in a worksheet: 1. Click in the cell below and to the right of the area you want to freeze/unfreeze 2. Click on the VIEW tab 3. Click on Freeze Panes in the Window group, then select Freeze Panes ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Try This Yourself:**\n\n*Continue using the previous file*\n*with this exercise, or open the file*\n*E1324 Worksheet*\n*Techniques_11.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n\n\n\n\n***25***is below row***5***\n\n + \n\n\n\n Click on the***Maintenance***\nworksheet tab, then spend a few \nmoments examining the worksheet \n\n*Depending on your screen, it is*\n*possible that you won’t be able to*\n*see all of the figures on the screen*\n*at once...*\n\n Click in cell***B6***to select the cell \n Click on the***VIEW***tab, click on \n***Freeze Panes***in the***Window***\ngroup, then select**Freeze Panes**\n\n*Thin black lines appear above and*\n*to the left of the selected cell. This*\n*indicates that the areas above and*\n*to the left are frozen...*\n\n Scroll to the right until***Yearly***\n***Average***in column***L***appears next \nto column***A***\n\n Scroll down until***Overheads***in row \n Press \n\n to move to cell \n***B6***– this is our temporary home \ncell, as the cells above and to the \nleft are frozen \n\n On the***VIEW***tab, click on***Freeze***\n\n***Panes***in the***Freeze Panes***group, \nthen click on***Unfreeze Panes***to \nunfreeze the rows and columns \n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***freeze panes***in a***worksheet***: \n\n1. Click in the cell below and to the right of the \narea you want to freeze/unfreeze \n\n2. Click on the***VIEW***tab \n3. Click on***Freeze Panes***in the***Window***\ngroup, then select**Freeze Panes**\n\n**Handy to Know…**\n \n\nIf you want to freeze only the rows above the \nselected cell (leaving all columns unfrozen), \nselect the cell in column***A***of that row – e.g. \nto freeze rows***1***to***6***, click in cell***A7***. The \nsame applies to freezing only columns and \nleaving the rows unfrozen: select the cell in \nrow***1***.", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_6.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the chart to \n\nselect it and display the \n***CHART TOOLS:DESIGN***\nand***CHART TOOLS:***\n***FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Move Chart***\nin the***Location***group to \ndisplay the***Move Chart***\ndialog box \n\n Click on***New Sheet***, then \ntype**Revenue Chart**\n\n*This will become the*\n*sheet name for the*\n*chart…*\n\n Click on**[OK]**to move the \nembedded chart to its \nown sheet \n\n Click on the***Chart Data***\nworksheet tab to see the \ndata again \n\n*Notice that the chart is no*\n*longer embedded on this*\n*worksheet*\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***create***a***chart sheet***: \n\n1. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Move Chart***in the***Location***\ngroup \n\n2. Click on***New Sheet***, type a name for the \nsheet and click on**[OK]**\n\n\n\n\n\n**Handy to Know…**\n Keeping charts on their own sheets makes \nthem easier to work with as they do not \nobstruct the data.", - "page_start": 51, - "page_end": 51, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n\n\n\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_12.xlsx...*\n Click on***Sheet 2***to \n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nsee the chart in the \nworksheet, then click \non the chart to select it \n\n Press \n to delete \nthe chart \n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n Because it is so easy to delete a chart object \n\nit is also easy to delete it by accident! \nRemember, you can use the***Undo***feature in \nExcel to restore accidental deletions. \n\n**For Your Reference…**\nTo***delete***a***chart***: \n\n1. Click on the worksheet to see the chart, then \nclick on the chart to select it \n\n\n2. Press", - "page_start": 57, - "page_end": 57, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Before starting this exercise*\n*you MUST open the file*\n*E1324 Worksheet*\n*Techniques_1.xlsx…*\n***n***\n***e***\n***p***\n***O***\n\n***e***\n***l***\n***i***\n***F***\n\n Examine the workbook – it \ncurrently contains one \nworksheet named***Sheet1***\n\n Click on the***New Sheet***icon \nat the end of the worksheet \ntabs \n\n*A new worksheet named*\n*Sheet2 will be inserted. You*\n*can also use the keyboard*\n*shortcut...*\n\n Press + \nanother new worksheet \n\n to insert \n\n*This sheet is named Sheet3*\n*and is inserted before the*\n*currently selected sheet.*\n*Now let’s delete a sheet...*\n\n Right-click on the***Sheet3***\nworksheet tab to display the \nshortcut menu \n\n Select**Delete**to remove the \nworksheet \n\n*As the worksheet contains no*\n*data, the sheet will be*\n*deleted immediately. If a*\n*worksheet contains data,*\n*Excel will ask you to confirm*\n*your actions...*\n\n Repeat steps***4***and***5***to \n\n\ndelete***Sheet2***\n\n\n\n\n\n\n\n**Handy to Know…**\n To insert a worksheet between existing \n\nworksheets, right-click on the worksheet tab \nbefore which you want to insert a new sheet, \nthen click on***Insert***to display the***Insert***\ndialog box. Select***Worksheet***and click on \n**[OK]**. \n\n**For Your Reference…**\nTo***insert***a***new worksheet***into a***workbook***: \n\n Click on the***New Sheet***icon to the right of \nthe worksheet tabs \n\nTo***delete***a***worksheet***from a***workbook***: \n\n Right click on the worksheet tab, then select \n**Delete**", - "page_start": 9, - "page_end": 9, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "press to clear it \n\n\n\n\n\n\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_1.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Right-click on***Sheet1***to \ndisplay the worksheet shortcut \nmenu \n\n Select**Move or Copy**to \ndisplay the***Move or Copy***\ndialog box \n\n Click on***Create a copy***so it \nappears ticked, then click on \n**[OK]**\n\n*The new worksheet is named*\n*Sheet1 (2). Let’s create a*\n*“template” from this worksheet*\n*by deleting unwanted data...*\n\n Select the range***B7:E9***, then \n Repeat step***4***to clear the \nranges***B14:E23***,***G7:J9***and \n***G14:J23***, then press + \n\n to return to cell***A1***\n\n*Now we can copy this*\n*“template” to create additional*\n*worksheets...*\n\n Repeat steps***1***to***3***three \n\ntimes to create three copies of \nthe*template*worksheet – this \ntime without data \n\n*The final worksheet should be*\n*named Sheet1 (5)*\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***copy***a***worksheet***: \n\n1. Right-click on the worksheet to copy, then \nselect***Move or Copy***\n\n2. Click on***Create a copy***so it appears ticked \n3. Click on**[OK]**\n\n**Handy to Know…**\n You can copy the current worksheet using \nthe***HOME***tab by clicking on***Format***in the \n***Cells***group, then clicking on***Move or Copy***\n***Sheet***. \n\n The***Before sheet***options in the***Move or***\n***Copy***dialog box allow you to position the \ncopied worksheet where you want.", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "***Chart***worksheet tab \n\n\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_11.xlsx...*\n Click on the***Revenue***\n Click on the***CHART***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\n***TOOLS: DESIGN***tab, \nthen click on the***Move***\n***Chart***tool in the \n***Location***group to \ndisplay the***Move Chart***\ndialog box \n\n Click on***Object in***, then \nclick on the drop arrow \nand click on***Sheet 2***\n\n Click on**[OK]**to move \nthe chart to the \nworksheet \n**5**\n\n Reposition the chart by \n\ndragging it to the top \nleft of the sheet, then \ndrag the resizing \nhandles to resize it as \nshown \n\n Click on the***Chart Data***\nworksheet tab \n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***embed***a***chart***in a***worksheet***: \n\n1. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Move Chart***in the***Location***\ngroup \n\n2. Click on the drop arrow, select the sheet to \nembed it into, then click on**[OK]**\n\n\n\n\n\n**Handy to Know…**\n Embedding is normally only done when it is \nnecessary to print the worksheet and the \ndata together.", - "page_start": 56, - "page_end": 56, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Before starting this exercise*\n***e***\n\n***n***\n***e***\n***p***\n***O***\n*you MUST open the file E723*\n*Cell Alignment_9.xlsx...*\n\n***l***\n***i***\n***F***\n\n Click in cell***A5***\n\n*This cell contains a long text*\n*entry that spills across several*\n*columns…*\n\n Click on the***Expand Formula***\n\n***Bar***tool \nformula bar to see all of the \ntext \n\n to the right of the \n\n Click on the***Wrap Text***\n\ncommand \n***Alignment***group on the \n***Home***tab to wrap the text in \ncell***A5***\n\n in the \n\n**5**\n\n*Notice how the row height has*\n*now increased…*\n\n Hold down the \n\n key and \nclick in cell***E5***to select the \nrange***A5:E5***\n\n Click on the drop arrow \n\nfor***Merge & Centre***\n in the \n***Alignment***group and select \n**Merge Cells**to merge the cells \nin the range \n\n Move the mouse pointer to the \n\nbottom of the row***5***heading \nborder and drag the row height \nup until you reach***30***points \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\n \n\nTo wrap text - click in the cell to merge and \nclick on the***Wrap Text***command \n in the \n***Alignment***group on the***Home***tab \n\nTo merge text - click on the drop arrow  \n\nfor***Merge & Centre***\ngroup and select**Merge Cells**\n\n in the***Alignment***\n\n\n\n\n\n**Handy to Know…**\n \n\nIn the example above, wrapping forced the \ntext into one cell and Excel expanded the \nrow height so that all of the text was \naccommodated. We then merged the text \nacross several horizontal cells in the exercise \nabove so that we could reduce the row \nheight to a more acceptable level. \n\n", - "page_start": 25, - "page_end": 25, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Point to the vertical dots \n\nbetween the sheet names and \nthe horizontal scroll bar, as \nshown \n\n*The pointer will change to a*\n*double-headed arrow...*\n\n Click and drag the bar across \n\nto the right, to the end of \ncolumn***L***, then release the \nmouse button \n\n Double-click on***Sheet1 (5)***to \nselect the worksheet tab name \n\n*This will also place it into edit*\n*mode…*\n\n Type**Comms**, then press \n Repeat steps***3***and***4***to \n\n***Sheet1 (4)*Admin**\n***Sheet1 (3)***\n***Sheet1 (2)***\n***Sheet1*** **Shop**\n**IT**\n**Maintenance**\n\n\n\nrename the other worksheets: \n\n\n\n\n\n**For Your Reference…**\nTo***rename***a***worksheet***: \n\n1. Double click on the current name on the \nworksheet tab \n\n 2. Type the new name and press \n\n**Handy to Know…**\n You can rename a worksheet by \n\nright-clicking on the worksheet tab to display \nthe shortcut menu and clicking on***Rename***. \n\n A worksheet tab name can contain up to 31 \n\ncharacters including spaces, but it is better to \nkeep it short and succinct.", - "page_start": 11, - "page_end": 11, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Before starting this*\n*exercise you MUST open*\n*the file E1317*\n*Charting_1.xlsx…*\n***n***\n***e***\n***p***\n***O***\n\n***e***\n***l***\n***i***\n***F***\n\n Click in cell***A3***, hold down \n\n, then click in cell***G7***\nto select the range***A3:G7***\n\n*Note that we have*\n*selected the data*\n*including headings but*\n*excluding the totalling…*\n\n Click on the***INSERT***tab, \n\nthen click on***Insert***\n***Column Chart***in the \n***Charts***group to see a \ngallery of***Column***chart \ntypes \n\n Under***2-D Column***, click \non***Clustered Column***\n\n*The chart will be*\n*embedded in the*\n*worksheet. The chart will*\n*be active (selected) and*\n*you’ll see additional tabs*\n*on the ribbon for working*\n*with the chart…*\n\n Point to the chart, then \n\nclick to select it and drag \nthe chart so that it is \nunderneath the data, as \nshown \n\n Click in cell***A1***to deselect \n\n\nthe chart \n\n\n\n\n\n**Handy to Know…**\n When a chart gallery appears after you’ve \nused the***Insert chart***command, you can \npoint over each image in the gallery to see a \nLive Preview of the chart in the worksheet. \nThis will help you to select the right chart for \nyour needs. \n\n**For Your Reference…**\nTo***create a chart***from***scratch***: \n1. Select the range to chart \n2. Click on the***INSERT***tab, then click on the \nappropriate***Insert***command in the***Charts***\ngroup \n\n3. Click on the desired chart type", - "page_start": 46, - "page_end": 46, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "office-pdf.pdf", - "query": "What is the msodocexStructTypeArticle type value ?", - "target_page": 21, - "target_passage": "A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The**idNode**member specifies the ID of the node. This member may not have a value of \n\n**0**. A value of**-1**indicates that child nodes do not use the**idNodeParent**member to \n\nspecify this node as their parent. Instead, this node can be a parent only by enclosing \n\nchild nodes in the EMF. Multiple nodes can have a ID of**-1**. If the ID is not**-1**, the value is \n\nunique across the document. \n\nThe**nodetype**specifies the type of structure node. This member is equal to one of the \n\nvalues from the**MSODOCEXSTRUCTTYPE**enumeration type. The following table lists \n\nexamples of document structure node types. \n\nTable 7. Document structure node types \n\n\n \n \n \n \n [html]\n
Type ValueDescription
msodocexStructTypeParaA block of text within an article. Its parent node must be an article.
msodocexStructTypeFigureA graphical element ( for example, an image or collection of shapes ) that has a textual representation. The textual representation is the alternate text used for reading or searching the document.
msodocexStructTypeArticleA group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.
msodocexStructTypeHeadingA heading in the text.
msodocexStructTypeTableA block of text forming a table.
msodocexStructTypeTRA block of text forming a single row of a table.
msodocexStructTypeTDA block of text forming a single cell in a table row.
msodocexStructTypeTHA block of text forming a single header cell in a table row.
msodocexStructTypeListA block of text forming a list.
msodocexStructTypeListltemA block of text forming a list item.
msodocexStructTypeListBodyA block of text forming the body of a list item.
msodocexStructTypeDocumentA document.
msodocexStructTypePageA page in the document.
", - "page_start": 20, - "page_end": 20, - "source_file": "office-pdf.pdf" - }, - { - "text": "**shapeProperty**is for a msodocexStructTypeFigure where the content is a shape, \n\ntext box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY \n\nenumeration. \n\n**tableAttr**is the table cell attributes for a msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**idTableHeader**is the unique id for an msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**iTargetParentId**is the id of the node to reparent an msodocexStructTypeDiagram \n\nto. \n\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE \n\nノ**Expand table**\n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexLineBreakTypeNormalNormal line break.
msodocexLineBreakTypeManualManual line break.
msodocexLineBreakTypeEOPEnd of paragraph.
\n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexListTypeNoneNo bullets or numbering.
msodocexListTypeBulletDiscDisc - shaped bullets.
msodocexListTypeBulletCircleCircle - shaped bullets.
msodocexListTypeBulletSquareSquare - shaped bullets.
msodocexListTypeBulletDecimalDecimal numbering.
msodocexListTypeUpperRomanUppercase Roman numeral numbering.
msodocexListTypeLowerRomanLowercase Roman numberal numbering.
msodocexListTypeUpperAlphaUppercase alphabetic numbering.
msodocexListTypeLowerAlphaLowercase alphabetic numbering.
", - "page_start": 9, - "page_end": 9, - "source_file": "office-pdf.pdf" - }, - { - "text": "typedef struct_MsoDocexStructNode \n{ \n int idNode; \n MSODOCEXSTRUCTTYPE nodetype; \n WCHAR*pwchAltText; \n union \n { \n int iHeadingLevel; \n ULONG idPara; \n ULONG idDropCap; \n int iPage; \n WCHAR*pwchActualText; \n MSODOCEXLINEBREAKTYPE bt; \n int iListLevel; \n MSODOCEXLISTTYPE listType; \n ULONG idAtn; \n long cpLim; \n int shapeProperty; \n MsoDocexTableAttr tableAttr; \n WCHAR*idTableHeader; \n int iTargetParentId; \n }; \n} MSODOCEXSTRUCTNODE; \n\nThe**idNode**member specifies the ID of the node being passed in the call to \n\n**HrBeginStructNode**. This member may not have a value of**0**. A value of**-1**indicates that \n\nchild nodes do not use the*idNodeParent*parameter to specify this node as their parent. \n\nInstead, this node can be a parent only by enclosing child nodes in the EMF. Multiple \n\nnodes can have an ID of**-1**. If the ID is not**-1**, the value is unique across the document. \n\nThe embedded union at the end of the MSODOCEXSTRUCTNODE is interpreted \n\ndifferently depending on the type of node: \n\n**iHeadingLevel**is the heading level for an msodocexStructTypeHeading. \n\n**idPara**is the paragraph id for a P, TOCI, or ListBody. \n\n**idDropCap**is the id of an msodocexStructTypeDropCap. \n\n**iPage**is the page number for an msodocexStructTypePage. \n\n**bt**is the line break type for an msodocexStructTypeTextLine. \n\n**iListLevel**is the list level for an msodocexStructTypeList or \n\nmsodocexStructTypeListItem. \n\n**listType**is the list type for an msodocexStructTypeListItem. \n\n**idAtn**is the id of an msodocexStructTypeAnnotationBegin or \n\nmsodocexStructTypeAnnotationEnd. \n\n**cpLim**is used to determine the nesting order of tables within tables for an \n\nmsodocexStructTypeTable, msodocexStructTypeTOC, or \n\nmsodocexStructTypeListBody.", - "page_start": 8, - "page_end": 8, - "source_file": "office-pdf.pdf" - }, - { - "text": "The*metadatatype*parameter specifies the type of metadata represented by the string. \n\nThe*metadatatype*parameter must be one of the following values from the \n\nMSODOCEXMETADATA enumeration type. \n\nTable 8. Enumerated values of MSODOCEXMETADATA \n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexMetadataTitleThe title of the document.
msodocexMetadataAuthorThe author of the document
msodocexMetadataSubjectString that describes the subject matter of the document ( for example, business or science ).
msodocexMetadataKeywordsKeyword relevant to the document content.
msodocexMetadataCreatorThe creator of the document, possibly distinct from the author.
msodocexMetadataProducerThe producer of the document, possibly distinct from the author or creator.
msodocexMetadataCategoryString that describes the type of document ( for example, memo, article, or book ).
msodocexMetadataStatusStatus of the document. This field can reflect where the document is in the publication process ( for example, draft or final ).
msodocexMetadataCommentsMiscellaneous comments relevant to the document.
\n\nFor a given document, each metadata type can have only one string associated with it. \n\nSo, for example, if the document has multiple keywords, they are passed to the add-in \n\nas one concatenated string. \n\nThe*pwchValue*parameter specifies a Unicode string that contains the metadata itself. \n\nHow the add-in incorporates the text-string metadata into the exported document \n\ndepends on the implementation details of the export code and the type of fixed-format \n\nused in the exported document.", - "page_start": 34, - "page_end": 34, - "source_file": "office-pdf.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Type ValueDescription
msodocexStructTypeTOCA table of contents.
msodocexStructTypeTOCIAn item in a table of contents.
msodocexStructTypeExtLinkA link to an external resource.
msodocexStructTypeIntLinkA link to an internal resource.
msodocexStructTypeFootnoteA footnote.
msodocexStructTypeEndnoteAn endnote.
msodocexStructTypeTextboxA text box.
msodocexStructTypeHeaderA block of text forming a header.
msodocexStructTypeFooterA footer.
msodocexStructInlineShapeAn inline shape.
msodocexStructAnnotationAn annotation.
msodocexStructTypeSpanBlockA block of text.
msodocexStructTypeWorkbookA workbook.
msodocexStructTypeWorksheetA worksheet.
msodocexStructTypeMacrosheetA macrosheet.
msodocexStructTypeChartsheetA chartsheet.
msodocexStructTypeDialogsheetA dialogsheet.
msodocexStructTypeSlideA slide.
msodocexStructTypeChartA chart.
msodocexStructTypeDiagramA SmartArt diagram.
msodocexStructTypeBulletTextBuller text.
msodocexStructTypeTextLineA line of text.
msodocexStructTypeDropCapA drop cap.
msodocexStructTypeSectionA section.
msodocexStructTypeAnnotationBeginThe beginning of an annotation.
msodocexStructTypeAnnotationEndThe end of an annotation.
", - "page_start": 21, - "page_end": 21, - "source_file": "office-pdf.pdf" - }, - { - "text": "The collection of structure nodes within the document forms a tree; each node has a \n\nparent node and may also have sibling nodes. The**idNodeParent**and**iSortOrder**\n\nmembers describe the structure of this tree. Note that a child node may or may not \n\nappear between the**DocExComment_BeginStructNode**and \n\n**DocExComment_EndStructNode**structures of the parent node in the EMF. \n\nstruct DocExComment_BeginStructNode \n{ \n DWORD ident {}; \n DWORD iComment {}; \n int idNodeParent {}; \n int iSortOrder {}; \n MSODOCEXSTRUCTNODE desn; \n BOOL fContentNode {}; \n int cwchAltText {}; \n}; \n\nThe members of the**DocExComment_BeginStructNode**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentBeginStructNode. \n\n**idNodeParent**Specifies the ID of the parent node. A value of**0**specifies the root \n\nnode. A value of**-1**specifies the currently open structure node, that is, the \n\n*enclosing*structure node. \n\n**iSortOrder**Specifies the sort order of the structure node among its sibling nodes. \n\nThe sort order enables the add-in to order the content correctly in the exported \n\ndocument. \n\nNo two nodes can have the same sort order. However, the set of integers that \n\nconstitute the sort order do not need to be contiguous. \n\nA value of**-1**indicates that the sibling order is the same order in which the nodes \n\nappear in the EMF comments. Note that the order in which the content appears in \n\nthe EMF is not necessarily the order in which the content is consumed by a user of \n\nthe document.", - "page_start": 19, - "page_end": 19, - "source_file": "office-pdf.pdf" - }, - { - "text": "The*metadatatype*parameter specifies the type of metadata represented by the \n\n**FILETIME**structure. The*metadatatype*parameter must be one of the following values \n\nfrom the MSODOCEXMETADATA enumeration type. \n\nTable 9. Enumerated values of MSODOCEXMETADATA \n\nノ**Expand table**\n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexMetadataCreationDateThe creation date for the document.
msodocexMetadataModDateThe last - modified date for the document.
\n\nSYSTEMTIME st = { 0 }; \nWCHAR s[100]; \nFileTimeToSystemTime(pfiletime, &st); \nswprintf(s, 99, L\" %04d-%02d-%02dT%02d:%02d:%02dZ\", st.wYear % 10000, \n st.wMonth % 100, st.wDay % 100, st.wHour % 100, st.wMinute % 100, \n st.wSecond % 100);", - "page_start": 35, - "page_end": 35, - "source_file": "office-pdf.pdf" - }, - { - "text": "#define ARCCSXIT_FIELD_TYPE_INTEGER (ArcCSXitFieldType) 0x49 \n#define ARCCSXIT_FIELD_TYPE_SMALLINT (ArcCSXitFieldType) 0x4E \n#define ARCCSXIT_FIELD_TYPE_STRING (ArcCSXitFieldType) 0x53 \n\ntypedef ArcU8 ArcCSXitFieldTypeQual; \n#define ARCCSXIT_FIELD_TYPE_QUAL_BASE (ArcCSXitFieldTypeQual) 0x42 \n#define ARCCSXIT_FIELD_TYPE_QUAL_DATETIME (ArcCSXitFieldTypeQual) 0x43 \n#define ARCCSXIT_FIELD_TYPE_QUAL_DATE (ArcCSXitFieldTypeQual) 0x44 \n#define ARCCSXIT_FIELD_TYPE_QUAL_TIME (ArcCSXitFieldTypeQual) 0x54 \n#define ARCCSXIT_FIELD_TYPE_QUAL_TZ_DATETIME (ArcCSXitFieldTypeQual) 0x5A \n\ntypedef struct_ArcCSXitField \n{ \n char*db_name; \n ArcCSXitFieldType type; \n ArcCSXitFieldTypeQual qual; \n union \n { \n ArcI16 n; \n ArcI32 i; \n ArcI64 b; \n double d; \n char*str; \n ArcDateTime dt; \n ArcDecimal64 d64; \n ArcDecimal128 d128; \n } u; \n} ArcCSXitField; \n\ntypedef struct_ArcCSXitFieldU \n{ \n ArcChar*db_name; \n ArcCSXitFieldType type; \n ArcCSXitFieldTypeQual qual; \n union \n { \n ArcI16 n; \n ArcI32 i; \n ArcI64 b; \n double d; \n ArcChar*str; \n ArcDateTime dt; \n ArcDecimal64 d64; \n ArcDecimal128 d128; \n } u; \n} ArcCSXitFieldU; \n\ntypedef struct_ArcCSXitDocFields \n{ \n ArcI32 flds_num; \n ArcCSXitField*flds; \n} ArcCSXitDocFields; \n\n#define ARCCSXIT_DOCNAME_SIZE 11 \n\ntypedef struct_ArcCSXitDocHandle \n{ \n char nameÝARCCSXIT_DOCNAME_SIZE + 1¨; \n ArcU32 doc_off; \n ArcU32 doc_len;", - "page_start": 289, - "page_end": 289, - "source_file": "sg246915.pdf" - }, - { - "text": "The members of the**DocExComment_EndStructNode**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEndStructNode. \n\n**DocExComment_BeginTextRun**\n\nThe**DocExComment_BeginTextRun**structure identifies the language of a sequence of \n\ntext in the document and provides the Unicode code points for the text. \n\nAlthough some text-rendering EMF records use Unicode as the text representation, \n\nothers use the glyphs that are drawn on the screen, rather than the original source text. \n\nA glyph is the index of a given shape in the font, which can be different from font to \n\nfont. \n\nThere can be cases where several Unicode code points are combined into a single glyph \n\nor where a single Unicode code point is broken into multiple glyphs. Because the \n\nmapping from code points to glyphs is context-dependent, a user cannot text search or \n\ncopy/paste in a document that contains only glyphs. Therefore, Publisher sometimes \n\nprovides the Unicode text as well as the glyphs.", - "page_start": 23, - "page_end": 23, - "source_file": "office-pdf.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Type ValueDescription
msodocexStructTypeParaRTLAttrA block of text within an article with right - to - left layout.
msodocexStructTypeTableRTLAttrA block of text forming a table with right - to - left layout.
msodocexStructTypeHeadingRTLAttrA heading in the text with right - to - left layout.
msodocexStructTypeListItemRTLAttrA block of text forming a list item with right - to - left layout.
msodocexStructTypeParaUnannotatableAttrA block of text within an article that is not annotable.
msodocexStructTypeTHeadThe header row area in a table.
msodocexStructTypeTBodyThe body area in a table, i. e. the portion between the THead and TFoot.
msodocexStructTypeLabelA label.
msodocexStructTypeEquationAn equation.
msodocexStructTypeIntLinkNoteRefA footnote or endnote reference mark link.
msodocexStructTypeTFootThe footer row area in a table.
\n\n**fContentNode**Specifies whether a**DocExComment_EndStructNode**structure marks \n\nthe end of this structure node. If**fContentNode**is**true**, a \n\n**DocExComment_EndStructNode**structure closes off the content bounded by the node. \n\nIf this**fContentNode**has a**false**value, then the node does not bound any content. \n\nThe**fContentNode**member affects the interpretation of the parent ID value of \n\nsubsequent nodes. If**fContentNode**is**true**, nodes that are inserted between this \n\n**DocExComment_BeginStructNode**and a subsequent**DocExComment_EndStructNode**, \n\nand that have a parent ID of**-1**, are children of this node. However, if**fContentNode**is \n\n**true**, nodes inserted after this**DocExComment_BeginStructNode**, and that have a \n\nparent ID of**-1**, are not children of this node. They are children of the next-most-recently \n\nspecified node that has**fContentNode**equal to**false**. \n\nYou can nest document structure nodes to arbitrary depth. \n\n**cwchAltText**Specifies the number of Unicode characters in the block of alternate text \n\nthat follows the structure. This Unicode string specifies alternate text for the node (for \n\nexample, alternate text for an image).", - "page_start": 22, - "page_end": 22, - "source_file": "office-pdf.pdf" - } - ] - }, - { - "references": { - "source_file": "office-pdf.pdf", - "query": "What are vector colors ?", - "target_page": 29, - "target_passage": "Vector colors are any COLORREF values that the add-in receives from Publisher.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
Interceolor IDs in the EMF back to the extend color space, the add - in calls back to isher through the HrResolveColor method of the IMooDocExporterSite interface.add - in passes Publisher an interface pointer to an IDOCEXCOLOR interface as one
No parameters to HrResolveColor. Publisher takes the color IDs, also specified in theHrResolveColor, converts them to extended color ( RGB, CMYK, or spot color ), and
them back to the add - in through the methods in the IDOCEXCOR interface.Table
ctor Color and Recolored Imagesor colors are any COLORREF values that the add - in receives from Publisher. For
nple, text color, line stroke color, and color for metafile recolor. When colorping is enabled, Publisher uses a color ID for COLDRREF rather than a real RGB
r value. If Publisher provides the add - in an IMsoDockporterSite interface pointeralling the SetDocExporterSite method of the IMsoDocExporter interface, the add - in
Jid always call the IMsoDocExporterSite :: HrResolveColor method to convert theORREF to an extended color, which the add - in receives through the methods in the
CEXCOLOR interventionLooport vector color mapping, the add - in needs to do the following :
Implement class support for an IDOCEXCDLOR interface. The methods in thisinterface enable Publisher to pass extended color back to the add - in.
Cache the following color state values from the semantic records in the EMF.Set foreground color for recoloring. This is set through the
DocExComment_Colorlnfo structure.Set background color for recoloring. This is set through the
DocExComment_ColorInfo structure.Determine when color mapping is enabled. This is set through the
DocExComment ColorEnable structure.For a vector color, create an IDOCEXCOLOR interface with the color ID, so that
IDOCEXCOLOR :: GetUnresolvedRGB returns the color ID. The add - in should call theIMsoDocExporterSite :: HrResolveColor method with the IDOCEXCOLOR interface
", - "page_start": 28, - "page_end": 28, - "source_file": "office-pdf.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_7.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Admin***\nworksheet tab to select the \nworksheet \n\n Right-click on the worksheet \n\ntab to display the shortcut \nmenu, then point to***Tab***\n***colour***\n\n*This will display a palette of*\n*colour options…*\n\n Click on***Red***under \n***Standard colours***to apply \nthe colour to the tab \n\n Right-click on the \n\n***Maintenance***worksheet tab \nto display the shortcut menu, \nclick on***Tab colour***, then \nclick on***Blue***under \n***Standard colours***\n\n*Notice how the Admin*\n*worksheet tab colour is now*\n*a solid rather than a*\n*gradient…*\n\n Repeat either technique to \napply the following colours: \n\n***Shop***\n***IT*** ***Yellow***\n***Green***\n\n Click on the***Admin***\nworksheet tab to view the \nresults \n\n\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n To apply the same colour to two or more \n\nsheets at once, select them first. Hold down \n to select consecutive worksheets or \n to select non-consecutive \n\n\nhold down \nworksheets. \n\n**For Your Reference…**\nTo***change the colour***of a***worksheet tab***: \n\n1. Right-click on the worksheet tab to display \nthe shortcut menu \n\n2. Point to***Tab colour***to display a palette of \ncolour options \n\n3. Click on the desired colour", - "page_start": 13, - "page_end": 13, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "POSITIVE STATIC \nSTABILITY \n\n\n\n\n\n\nCREASED POSIT,VE \nTIC STABILITY \n\n\n\n\n\n\n\n\n\nNEUTRAL STATIC STABILITY \n\n\n\n\n\n\nNEGATIVE \nSTATIC STABILITY", - "page_start": 265, - "page_end": 265, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "typedef struct \n{ \n DWORD ident {}; \n DWORD iComment {}; \n COLORREF cmykAlt { 0 }; \n COLORREF rgbAlt { 0 }; \n float flTintMin {}; \n float flTintMax {}; \n char szSpotName[1]; \n} DocExComment_EPSColorSpotImage; \n\nThe members of the**DocExComment_EPSColorSpotImage**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSSpotImage. \n\n**cmykAlt**Specifies a CMYK color ID. \n\n**rgbAlt**Specifies an RGB color ID. \n\n**flTintMin**Specifies the minimum tint. \n\n**flTintMax**Specifies the maximum tint. \n\n**szSpotName[1]**Specifies a variable length, zero-terminated string that contains \n\nthe spot name. \n\n**Extended Color Support**\n\nTo support extended color spaces in Publisher, additional EMF semantic records and \n\ninterfaces are needed because EMF only supports RGB (red-green-black) colors. \n\nExtended color spaces include CMYK (cyan-magenta-yellow-black) and spot color space, \n\nwhich are commonly used in commercial printing. \n\nPublisher uses color mapping to represent extended colors in the document EMF. \n\nPublisher builds a color table for all colors used in the document and replaces actual \n\ncolors with color IDs in the EMF. The type for the color ID is**COLORREF**, which is the", - "page_start": 27, - "page_end": 27, - "source_file": "office-pdf.pdf" - }, - { - "text": "Figure 7.26. Airflow Separation (sheet 2 of 2)", - "page_start": 75, - "page_end": 75, - "source_file": "00-80T-80.pdf" - }, - { - "text": "You are prompted to insert the file to be imported, as shown in Figure 7-8. Browse for the file, \nselect it, and click**Import**. This scenario uses file type CSV because this format is the \ndownloaded format.", - "page_start": 194, - "page_end": 194, - "source_file": "sg248459.pdf" - }, - { - "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": " ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": " ", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "office-pdf.pdf", - "query": "What are msodocexMetadataComments ?", - "target_page": 35, - "target_passage": "Miscellaneous comments relevant to the document.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The*metadatatype*parameter specifies the type of metadata represented by the string. \n\nThe*metadatatype*parameter must be one of the following values from the \n\nMSODOCEXMETADATA enumeration type. \n\nTable 8. Enumerated values of MSODOCEXMETADATA \n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexMetadataTitleThe title of the document.
msodocexMetadataAuthorThe author of the document
msodocexMetadataSubjectString that describes the subject matter of the document ( for example, business or science ).
msodocexMetadataKeywordsKeyword relevant to the document content.
msodocexMetadataCreatorThe creator of the document, possibly distinct from the author.
msodocexMetadataProducerThe producer of the document, possibly distinct from the author or creator.
msodocexMetadataCategoryString that describes the type of document ( for example, memo, article, or book ).
msodocexMetadataStatusStatus of the document. This field can reflect where the document is in the publication process ( for example, draft or final ).
msodocexMetadataCommentsMiscellaneous comments relevant to the document.
\n\nFor a given document, each metadata type can have only one string associated with it. \n\nSo, for example, if the document has multiple keywords, they are passed to the add-in \n\nas one concatenated string. \n\nThe*pwchValue*parameter specifies a Unicode string that contains the metadata itself. \n\nHow the add-in incorporates the text-string metadata into the exported document \n\ndepends on the implementation details of the export code and the type of fixed-format \n\nused in the exported document.", - "page_start": 34, - "page_end": 34, - "source_file": "office-pdf.pdf" - }, - { - "text": "The*metadatatype*parameter specifies the type of metadata represented by the \n\n**FILETIME**structure. The*metadatatype*parameter must be one of the following values \n\nfrom the MSODOCEXMETADATA enumeration type. \n\nTable 9. Enumerated values of MSODOCEXMETADATA \n\nノ**Expand table**\n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexMetadataCreationDateThe creation date for the document.
msodocexMetadataModDateThe last - modified date for the document.
\n\nSYSTEMTIME st = { 0 }; \nWCHAR s[100]; \nFileTimeToSystemTime(pfiletime, &st); \nswprintf(s, 99, L\" %04d-%02d-%02dT%02d:%02d:%02dZ\", st.wYear % 10000, \n st.wMonth % 100, st.wDay % 100, st.wHour % 100, st.wMinute % 100, \n st.wSecond % 100);", - "page_start": 35, - "page_end": 35, - "source_file": "office-pdf.pdf" - }, - { - "text": "The members of the**DocExComment_EndStructNode**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEndStructNode. \n\n**DocExComment_BeginTextRun**\n\nThe**DocExComment_BeginTextRun**structure identifies the language of a sequence of \n\ntext in the document and provides the Unicode code points for the text. \n\nAlthough some text-rendering EMF records use Unicode as the text representation, \n\nothers use the glyphs that are drawn on the screen, rather than the original source text. \n\nA glyph is the index of a given shape in the font, which can be different from font to \n\nfont. \n\nThere can be cases where several Unicode code points are combined into a single glyph \n\nor where a single Unicode code point is broken into multiple glyphs. Because the \n\nmapping from code points to glyphs is context-dependent, a user cannot text search or \n\ncopy/paste in a document that contains only glyphs. Therefore, Publisher sometimes \n\nprovides the Unicode text as well as the glyphs.", - "page_start": 23, - "page_end": 23, - "source_file": "office-pdf.pdf" - }, - { - "text": "The members of the**DocExComment_EPSColor**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSColor. \n\n**colorInfo[]**Specifies the color information for the EPS file. The add-in should pass \n\nthis information to Publisher using the**IMsoDocExporterSite::SetEPSInfo**method. \n\n**DocExComment_EPSColorCMYKJPEG**\n\nThe**DocExComment_EPSColorCMYKJPEG**structure specifies the start, in the EMF, of a \n\nbinary object that is a CMYKJPEG file stream. For more information about this structure, \n\nsee the section Extended Color Support. \n\nThe members of the**DocExComment_EPSColorCMYKJPEG**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSCMYKJPEG;", - "page_start": 26, - "page_end": 26, - "source_file": "office-pdf.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "The members of the**DocExComment_BeginTextRun**structure are as follows: \n\n**Ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentBeginTextRun. \n\n**lcid**Specifies the LCID for the text sequence. \n\n**cGlyphIndex**Specifies the size of an array that follows this structure. This array \n\nimplements a glyph index table that maps Unicode code points in the actual text \n\nto the corresponding glyphs in the EMF. Each element of the array corresponds to \n\na code point in the text. The value of that element specifies the first glyph used to \n\nrender that code point in the EMF. Two or more adjacent code points may have the \n\nsame value in the array, which means that they both resolve to the same glyph. \n\nThe value can also be**0**, which means that this code point does not map to any \n\nglyph. \n\n**cwchActualText**Specifies the size of the sequence of Unicode code points that \n\nfollow the glyph index table. This is the text that a consumer of the document can \n\nuse for searching, copying/pasting, and accessibility. The value of this member can \n\nbe**0**, which means that no Unicode text is provided.", - "page_start": 24, - "page_end": 24, - "source_file": "office-pdf.pdf" - }, - { - "text": "**DocExComment_UnicodeForNextTextOut**\n\nThe**DocExComment_UnicodeForNextTextOut**structure functions similarly to the \n\n**DocExComment_BeginTextRun**and**DocExComment_EndTextRun**structures. However, \n\n**DocExComment_UnicodeForNextTextOut**specifies Unicode code points for only the \n\nfollowing EMF TextOut record, rather than for a block of EMF content bounded by begin \n\nand end structures. \n\nThe members of the**DocExComment_UnicodeForNextTextOut**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentUnicodeForNextTextOut. \n\n**cGlyphIndex**Specifies the size of an array that follows this structure. This array \n\nimplements a glyph index table that maps Unicode code points in the actual text \n\nto the corresponding glyphs in the EMF. Each element of the array corresponds to \n\na code point in the text. The value of that element specifies the first glyph used to \n\nrender that code point in the EMF. Two or more adjacent code points may have the \n\nsame value in the array, which means that they both resolve to the same glyph. \n\n**cwchActualText**Specifies the size of the sequence of Unicode code points that \n\nfollow the glyph index table. This is the text that a consumer of the document can \n\nuse for searching, copying/pasting, and accessibility.", - "page_start": 25, - "page_end": 25, - "source_file": "office-pdf.pdf" - }, - { - "text": "The collection of structure nodes within the document forms a tree; each node has a \n\nparent node and may also have sibling nodes. The**idNodeParent**and**iSortOrder**\n\nmembers describe the structure of this tree. Note that a child node may or may not \n\nappear between the**DocExComment_BeginStructNode**and \n\n**DocExComment_EndStructNode**structures of the parent node in the EMF. \n\nstruct DocExComment_BeginStructNode \n{ \n DWORD ident {}; \n DWORD iComment {}; \n int idNodeParent {}; \n int iSortOrder {}; \n MSODOCEXSTRUCTNODE desn; \n BOOL fContentNode {}; \n int cwchAltText {}; \n}; \n\nThe members of the**DocExComment_BeginStructNode**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentBeginStructNode. \n\n**idNodeParent**Specifies the ID of the parent node. A value of**0**specifies the root \n\nnode. A value of**-1**specifies the currently open structure node, that is, the \n\n*enclosing*structure node. \n\n**iSortOrder**Specifies the sort order of the structure node among its sibling nodes. \n\nThe sort order enables the add-in to order the content correctly in the exported \n\ndocument. \n\nNo two nodes can have the same sort order. However, the set of integers that \n\nconstitute the sort order do not need to be contiguous. \n\nA value of**-1**indicates that the sibling order is the same order in which the nodes \n\nappear in the EMF comments. Note that the order in which the content appears in \n\nthe EMF is not necessarily the order in which the content is consumed by a user of \n\nthe document.", - "page_start": 19, - "page_end": 19, - "source_file": "office-pdf.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "C++ \n\n\n \n \n \n \n [html]\n
Calcium - DocExComment_Color - Enable
DWORD
identified
DWORD
intervention
\n\nThe members of the**DocExComment_ColorEnable**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentColorMapEnable. \n\n**fEnable**Specifies whether color mapping is enabled for subsequent content. A \n\nvalue of**true**indicates that color mapping is enabled. A value of**false**indicates \n\nthat color mapping is disabled. \n\n**DocExComment_BeginStructNode**\n\nThe**DocExComment_BeginStructNode**structure marks the start of a document \n\nstructure node. Structure nodes serve one of two possible purposes: \n\nStructure nodes can identify the type of content they contain and specify the \n\nhierarchical relationship between that content and other content in the document. \n\nStructure nodes can specify alternate text for elements in the document. \n\nIf the**fContentNode**member has a**true**value, the**DocExComment_BeginStructNode**is \n\nfollowed later in the document by a**DocExComment_EndStructNode**. The \n\n**DocExComment_EndStructNode**marks the end of the content that is wrapped by the \n\ninformation in the**DocExComment_BeginStructNode**.", - "page_start": 18, - "page_end": 18, - "source_file": "office-pdf.pdf" - } - ] - }, - { - "references": { - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", - "query": "What are the total operating expenses of Wikimedia foundation in 2024 ?", - "target_page": 6, - "target_passage": "178,471,109", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. \n\n**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of \nmanagement, the outcome of the pending lawsuits will not materially affect operations or the financial \nposition of the Foundation. \n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the \nconsolidated financial statements were available to be issued, and determined there are no items to \ndisclose. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTable
TableTableTableTableTableTable
TableTableTableTableTableTable
TableTable18
", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net.", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
June 30.2024 and 2023Assets2024
2023
Current assets :Cash and cash equivalents$82.845.159
75.808.401Contributions receivable856.657
Short - term investments116.074.763
132.216.667Prepaid expenses and other current assets5.722.457
5.569.485Total current assets205.499.036
213.594.553Restricted cash1.428.542
1.396.717Long - term investments67.291.224
43.265.786Right of use asset - operating lease, net
1.821.174Property and equipment, net11.826.136
14.045.139Contributions receivable715.000
Total assets$
286.759.938274.123.369Liabilities and Net AssetsCurrent liabilities :
Accounts payable
$
4.009.5822.783.904Accrued expenses7.959.558
6.922.259Lease liability417.756
1.640.735Donations payable to Wikimedia Endowment525.607
5.274.448Other liabilities2.292.045
2.124.939Total current liabilities15.204.548
18.746.285Lease liability
405.748Total liabilities$
15.204.54819.152.033Net assets :Net assets without donor restrictions
265.859.067
249.088.663Net assets with donor restrictions5.696.323
5.882.673Total net assets271.555.390
254.971.336Total liabilities and net assets$
86.759.938274.123.369
", - "page_start": 4, - "page_end": 4, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. \n\nThe Foundation has evaluated the financial statement impact of positions taken or expected to be \ntaken in its tax returns. The Foundation is subject to income taxes on any net income that is derived \nfrom a trade or business, regularly carried on, and not in furtherance of the purposes for which it was \ngranted exemption. Net income from any unrelated trade or business, in the opinion of management, is \nnot material to the consolidated financial statements taken as a whole. \n\n***(d) Financial Statement Presentation***\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or \nabsence of donor-imposed restrictions in accordance with Accounting Standards Codification \n(ASC) Topic 958,*Not-for-Profit Entities*. \n\nNet assets without donor restrictions represent unrestricted resources available to support operations \nand also include previously temporarily restricted resources, which have become available for use by \nthe Foundation in accordance with the intentions of donors. \n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in \naccordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied \nand removed by the actions of the Foundation according to the terms of the contribution by the donor.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. \nPrograms comprise various initiatives that focus on (1) building the technological and operating platform \nthat enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, \ngrowing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in \nkey geographic areas, mobile application development, and bottom-up innovation, all of which support \nWikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for \nwhich the Foundation is reimbursed. The allocation between programs, general and administrative, and \nfundraising expenses is based on personnel and related costs and other operating expenses such as rent \nand office expenses using estimates of time spent or percentage of utilization by headcounts, as well as", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. \n\n**(7) Operating Leases**\n\nOur operating lease relates to the Foundation’s headquarters in San Francisco and has a non-cancelable \nremaining term of 3 months as of June 30, 2024. The discount rate is 2.9%, the risk-free rate based on \ndaily U.S. Treasury with a term comparable to the lease term. The lease provides the Foundation the \noption to extend the lease term for one additional period of five years. The Foundation determined during \nthe year ended June 30, 2024 not to renew the lease. Operating lease expense was $1,859,383 and \n$1,489,134 for the year ended June 30, 2024 and 2023, respectively. \n\nUndiscounted lease payments as of June 30, 2024 were as follows: \n\n**(8) Retirement Plan**\n\nThe Foundation offers a 401(k) plan (the Plan) to all of its employees residing in the United States. \nEmployees are eligible to participate in the Plan upon employment. The Foundation matches employee \ncontributions on a dollar-for-dollar basis up to 4% of the employee’s compensation. The Foundation \ncontributed $1,859,839 and $1,859,012 to the Plan for the years ended June 30, 2024 and 2023, \nrespectively.", - "page_start": 17, - "page_end": 17, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**2024** **2023**\n\nNet assets without donor restrictions: \n\nSupport and revenue: \n\nContributions of cash and other financial assets \nContributions of nonfinancial assets and services \nForeign currency losses \nOther income, net \nInvestment income, net \nRelease of net assets with donor restrictions \n\n$ \n\n168,212,977 \n263,476 \n(300,907) \n5,629,773 \n5,096,842 \n6,481,350 164,121,185 \n1,040,453 \n(94,868) \n3,824,240 \n3,002,929 \n4,732,654 \n\nTotal support and revenue 185,383,511 176,626,593 \n\nOperating expenses: \n\nSalaries and benefits \nAwards and grants \nInternet hosting \nIn-kind service expenses \nDonation processing expenses \nProfessional service expenses \nOther operating expenses \nTravel and conferences \nDepreciation and amortization 106,793,960 \n26,820,080 \n3,116,445 \n263,476 \n7,547,718 \n13,090,040 \n10,798,140 \n5,824,979 \n4,216,271 101,305,706 \n24,433,682 \n3,120,819 \n1,040,453 \n6,855,680 \n15,464,635 \n7,393,982 \n4,878,359 \n4,602,064 \n\nTotal operating expenses \n\nChange in net assets without donor restrictions \n\nfrom operating activities \n\nNonoperating activities: \n\nUnrealized gains on investments, net \n\nChange in net assets without donor restrictions \n\nNet assets with donor restrictions: \n\nContributions with donor restrictions \nNet assets released from restrictions \n\nIncrease (decrease) in net assets with donor \n\nrestrictions \n\nIncrease in net assets \n\nNet assets at beginning of year \n\nNet assets at end of year", - "page_start": 5, - "page_end": 5, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "and free to everyone in the world, the Foundation's cost related to this collaborative arrangement is \nincluded within awards and grants in the statement of activities. The amount included within awards \nand grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively. \n\n***(p) Use of Estimates***\n\nThe preparation of financial statements in conformity with U.S. generally accepted accounting \nprinciples requires management to make estimates and assumptions that affect the amounts reported \nin the consolidated financial statements and accompanying notes. Items subject to such estimates and \nassumptions include the investment valuations, useful lives of fixed assets, and the valuation of \ncontributed services. Accordingly, actual results could differ from those estimates. \n\n***(q) Reclassifications***\n\nCertain reclassifications have been made in the financial statements to conform 2023 information to the \n2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and \nlosses on investments separately from investment income, net. This resulted in a reclassification of \n$3,547,510 from investment income, net to unrealized gains on investments within the statement of \nactivities. The Foundation also had a change in accounting policy to no longer present the Wikimania \nevent as special event expense, net in the statement of activities. Revenue from registration sales is \nnow reported within other income, net, and expenses are reported within travel and conference \nexpenses. This resulted in a reclassification of $698,141 from special event expenses to travel and \nconference expenses in the statement of activities. \n\n**(2) Contributions Receivable**\n\nAs of June 30, 2024 and 2023, contributions receivable is $1,571,657 and $0, respectively, and represents \ncontributions receivable from two grants, as well as contributions receivable from payment processors.", - "page_start": 12, - "page_end": 12, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "4,216,271 \n203,233 \n(8,356,376) \n1,821,432 \n\n(1,571,657) \n(152,972) \n1,225,678 \n1,037,299 \n(1,666,935) \n(4,748,841) \n205,056 \n\n8,796,241 \n\n4,602,064 \n64,518 \n(2,276,210) \n1,404,875 \n\n700,000 \n(469,201) \n(483,402) \n1,224,690 \n(1,618,384) \n5,254,730 \n(65,560) \n\n23,957,924 \n\nCash flows from operating activities: \n\nIncrease in net assets \nAdjustments to reconcile increase in net assets to net cash \n\nprovided by operating activities: \n\nDepreciation and amortization \nLoss on disposal of equipment \nUnrealized and realized gains on investments, net \nRight of use asset - operating lease, net \nChanges in operating assets and liabilities: \n\nContributions receivable \nPrepaid expenses and other current assets \nAccounts payable \nAccrued expenses \nLease liability \nDonations payable to Wikimedia Endowment \nOther liabilities \n\nNet cash provided by operating activities \n\nCash flows from investing activities: \n\nPurchase of computer equipment and office furniture \nDevelopment of internal use software \nPurchase of investments \nProceeds from sales and maturities of investments \n\nNet cash provided by (used in) investing activities \n\nNet increase in cash, cash equivalents, and \n\nrestricted cash \n\nCash, cash equivalents, and restricted cash at beginning of year \n\nCash, cash equivalents, and restricted cash at end of year \n\nSupplemental cash flow disclosure: \n\nNoncash changes in exchange rate \nInitial recognition of right of use asset - operating lease \nInitial recognition of lease liability", - "page_start": 6, - "page_end": 6, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**Independent Auditors’ Report**\n\nThe Board of Trustees \nWikimedia Foundation, Inc: \n\n*Opinion*\n\nWe have audited the consolidated financial statements of Wikimedia Foundation, Inc and its subsidiary (the \nFoundation), which comprise the consolidated statements of financial position as of June 30, 2024 and 2023, \nand the related consolidated statements of activities, and cash flows for the years then ended, and the related \nnotes to the consolidated financial statements. \n\nIn our opinion, the accompanying consolidated financial statements present fairly, in all material respects, the \nfinancial position of the Foundation as of June 30, 2024 and 2023, and the results of its operations and its cash \nflows for the years then ended in accordance with U.S. generally accepted accounting principles. \n\n*Basis for Opinion*\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of \nAmerica (GAAS). Our responsibilities under those standards are further described in the Auditors’ \nResponsibilities for the Audit of the Consolidated Financial Statements section of our report. We are required to \nbe independent of the Foundation and to meet our other ethical responsibilities, in accordance with the relevant \nethical requirements relating to our audits. We believe that the audit evidence we have obtained is sufficient \nand appropriate to provide a basis for our audit opinion. \n\n*Responsibilities of Management for the Consolidated Financial Statements*\n\nManagement is responsible for the preparation and fair presentation of the consolidated financial statements in \naccordance with U.S. generally accepted accounting principles, and for the design, implementation, and \nmaintenance of internal control relevant to the preparation and fair presentation of consolidated financial \nstatements that are free from material misstatement, whether due to fraud or error. \n\nIn preparing the consolidated financial statements, management is required to evaluate whether there are \nconditions or events, considered in the aggregate, that raise substantial doubt about the Foundation’s ability to \ncontinue as a going concern for one year after the date that the consolidated financial statements are available \nto be issued. \n\n*Auditors’ Responsibilities for the Audit of the Consolidated Financial Statements*\n\nOur objectives are to obtain reasonable assurance about whether the consolidated financial statements as a \nwhole are free from material misstatement, whether due to fraud or error, and to issue an auditors’ report that \nincludes our opinion. Reasonable assurance is a high level of assurance but is not absolute assurance and \ntherefore is not a guarantee that an audit conducted in accordance with GAAS will always detect a material \nmisstatement when it exists. The risk of not detecting a material misstatement resulting from fraud is higher \nthan for one resulting from error, as fraud may involve collusion, forgery, intentional omissions, \nmisrepresentations, or the override of internal control. Misstatements are considered material if there is a \nsubstantial likelihood that, individually or in the aggregate, they would influence the judgment made by a \nreasonable user based on the consolidated financial statements.", - "page_start": 2, - "page_end": 2, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - } - ] - }, - { - "references": { - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", - "query": "What external events can affect Wikimedia Fundation in raising funds ?", - "target_page": 8, - "target_passage": "External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. \n\n**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of \nmanagement, the outcome of the pending lawsuits will not materially affect operations or the financial \nposition of the Foundation. \n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the \nconsolidated financial statements were available to be issued, and determined there are no items to \ndisclose. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTable
TableTableTableTableTableTable
TableTableTableTableTableTable
TableTable18
", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. \n\nThe Foundation has evaluated the financial statement impact of positions taken or expected to be \ntaken in its tax returns. The Foundation is subject to income taxes on any net income that is derived \nfrom a trade or business, regularly carried on, and not in furtherance of the purposes for which it was \ngranted exemption. Net income from any unrelated trade or business, in the opinion of management, is \nnot material to the consolidated financial statements taken as a whole. \n\n***(d) Financial Statement Presentation***\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or \nabsence of donor-imposed restrictions in accordance with Accounting Standards Codification \n(ASC) Topic 958,*Not-for-Profit Entities*. \n\nNet assets without donor restrictions represent unrestricted resources available to support operations \nand also include previously temporarily restricted resources, which have become available for use by \nthe Foundation in accordance with the intentions of donors. \n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in \naccordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied \nand removed by the actions of the Foundation according to the terms of the contribution by the donor.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
June 30.2024 and 2023Assets2024
2023
Current assets :Cash and cash equivalents$82.845.159
75.808.401Contributions receivable856.657
Short - term investments116.074.763
132.216.667Prepaid expenses and other current assets5.722.457
5.569.485Total current assets205.499.036
213.594.553Restricted cash1.428.542
1.396.717Long - term investments67.291.224
43.265.786Right of use asset - operating lease, net
1.821.174Property and equipment, net11.826.136
14.045.139Contributions receivable715.000
Total assets$
286.759.938274.123.369Liabilities and Net AssetsCurrent liabilities :
Accounts payable
$
4.009.5822.783.904Accrued expenses7.959.558
6.922.259Lease liability417.756
1.640.735Donations payable to Wikimedia Endowment525.607
5.274.448Other liabilities2.292.045
2.124.939Total current liabilities15.204.548
18.746.285Lease liability
405.748Total liabilities$
15.204.54819.152.033Net assets :Net assets without donor restrictions
265.859.067
249.088.663Net assets with donor restrictions5.696.323
5.882.673Total net assets271.555.390
254.971.336Total liabilities and net assets$
86.759.938274.123.369
", - "page_start": 4, - "page_end": 4, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net.", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. \nPrograms comprise various initiatives that focus on (1) building the technological and operating platform \nthat enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, \ngrowing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in \nkey geographic areas, mobile application development, and bottom-up innovation, all of which support \nWikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for \nwhich the Foundation is reimbursed. The allocation between programs, general and administrative, and \nfundraising expenses is based on personnel and related costs and other operating expenses such as rent \nand office expenses using estimates of time spent or percentage of utilization by headcounts, as well as", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "and free to everyone in the world, the Foundation's cost related to this collaborative arrangement is \nincluded within awards and grants in the statement of activities. The amount included within awards \nand grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively. \n\n***(p) Use of Estimates***\n\nThe preparation of financial statements in conformity with U.S. generally accepted accounting \nprinciples requires management to make estimates and assumptions that affect the amounts reported \nin the consolidated financial statements and accompanying notes. Items subject to such estimates and \nassumptions include the investment valuations, useful lives of fixed assets, and the valuation of \ncontributed services. Accordingly, actual results could differ from those estimates. \n\n***(q) Reclassifications***\n\nCertain reclassifications have been made in the financial statements to conform 2023 information to the \n2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and \nlosses on investments separately from investment income, net. This resulted in a reclassification of \n$3,547,510 from investment income, net to unrealized gains on investments within the statement of \nactivities. The Foundation also had a change in accounting policy to no longer present the Wikimania \nevent as special event expense, net in the statement of activities. Revenue from registration sales is \nnow reported within other income, net, and expenses are reported within travel and conference \nexpenses. This resulted in a reclassification of $698,141 from special event expenses to travel and \nconference expenses in the statement of activities. \n\n**(2) Contributions Receivable**\n\nAs of June 30, 2024 and 2023, contributions receivable is $1,571,657 and $0, respectively, and represents \ncontributions receivable from two grants, as well as contributions receivable from payment processors.", - "page_start": 12, - "page_end": 12, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "The Foundation has a program of awarding grants to support chapters, affiliates, user groups, and \nindividuals in projects that further the mission of the Foundation. Chapters are independent organizations \nthat share the goals of the Foundation and support the goals within a specified geographical region. In \naddition to this work, which is reflected above in the awards and grants line, an overwhelming majority of \nthe Foundation’s project activities are carried out by an international network of volunteers, whose activity \nis not reflected in the tables above.", - "page_start": 16, - "page_end": 16, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. \n\n**(7) Operating Leases**\n\nOur operating lease relates to the Foundation’s headquarters in San Francisco and has a non-cancelable \nremaining term of 3 months as of June 30, 2024. The discount rate is 2.9%, the risk-free rate based on \ndaily U.S. Treasury with a term comparable to the lease term. The lease provides the Foundation the \noption to extend the lease term for one additional period of five years. The Foundation determined during \nthe year ended June 30, 2024 not to renew the lease. Operating lease expense was $1,859,383 and \n$1,489,134 for the year ended June 30, 2024 and 2023, respectively. \n\nUndiscounted lease payments as of June 30, 2024 were as follows: \n\n**(8) Retirement Plan**\n\nThe Foundation offers a 401(k) plan (the Plan) to all of its employees residing in the United States. \nEmployees are eligible to participate in the Plan upon employment. The Foundation matches employee \ncontributions on a dollar-for-dollar basis up to 4% of the employee’s compensation. The Foundation \ncontributed $1,859,839 and $1,859,012 to the Plan for the years ended June 30, 2024 and 2023, \nrespectively.", - "page_start": 17, - "page_end": 17, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Social and political lands2.1. Wikileaks and the Open Data movement.
.... 52.2. Data Openness in EU
.... 62.3. Open Data in Latin America, Asia and Africa.
.... 8Emerging trends and issues related to Open Data...
. 113.1. Cost of not opening PSI is increasing
... 113.2. Creative, unforeseen uses of local Open Data increase.
... 123.3. Legal issues remain crucial
... 133.4. The price of digitization
... 143.5. The nature of Open Government and the relationship between citizens and Government
... 153.6. Clearer vision of the real risks and limits of Open Data
... 163.6. 1. Data alterations and financial sustainability.
... 173.6. 2. Real impact of data manipulation or misunderstanding.
... 173.6. 3. Unequal access.
... 193.6. 4. Lack of education to data
... 20S. fo. S. Lack of public interest
.... 213.6. 6. Unprepared Public Administrators...
... 223.7. The privacy problem.
... 223.8. Need to better define what is Public Data.
... 23Conclusion : seven Open Data strategy and best pra
. 274.1. Properly define and explain both Open Data and Public Data
... 274.2. Keep political issues separated by economics ones.
... 274.3. Keep past and future separate
... 284.4. Impose proper licensing and streamline procurement.
... 294.5. Educate citizens to understand and use data.
... 304.6. Focus on local, specific issues to raise interest for Open Data.
... 314.7. Involve NGOs, charities and business associations.
... 32
", - "page_start": 1, - "page_end": 1, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "**Independent Auditors’ Report**\n\nThe Board of Trustees \nWikimedia Foundation, Inc: \n\n*Opinion*\n\nWe have audited the consolidated financial statements of Wikimedia Foundation, Inc and its subsidiary (the \nFoundation), which comprise the consolidated statements of financial position as of June 30, 2024 and 2023, \nand the related consolidated statements of activities, and cash flows for the years then ended, and the related \nnotes to the consolidated financial statements. \n\nIn our opinion, the accompanying consolidated financial statements present fairly, in all material respects, the \nfinancial position of the Foundation as of June 30, 2024 and 2023, and the results of its operations and its cash \nflows for the years then ended in accordance with U.S. generally accepted accounting principles. \n\n*Basis for Opinion*\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of \nAmerica (GAAS). Our responsibilities under those standards are further described in the Auditors’ \nResponsibilities for the Audit of the Consolidated Financial Statements section of our report. We are required to \nbe independent of the Foundation and to meet our other ethical responsibilities, in accordance with the relevant \nethical requirements relating to our audits. We believe that the audit evidence we have obtained is sufficient \nand appropriate to provide a basis for our audit opinion. \n\n*Responsibilities of Management for the Consolidated Financial Statements*\n\nManagement is responsible for the preparation and fair presentation of the consolidated financial statements in \naccordance with U.S. generally accepted accounting principles, and for the design, implementation, and \nmaintenance of internal control relevant to the preparation and fair presentation of consolidated financial \nstatements that are free from material misstatement, whether due to fraud or error. \n\nIn preparing the consolidated financial statements, management is required to evaluate whether there are \nconditions or events, considered in the aggregate, that raise substantial doubt about the Foundation’s ability to \ncontinue as a going concern for one year after the date that the consolidated financial statements are available \nto be issued. \n\n*Auditors’ Responsibilities for the Audit of the Consolidated Financial Statements*\n\nOur objectives are to obtain reasonable assurance about whether the consolidated financial statements as a \nwhole are free from material misstatement, whether due to fraud or error, and to issue an auditors’ report that \nincludes our opinion. Reasonable assurance is a high level of assurance but is not absolute assurance and \ntherefore is not a guarantee that an audit conducted in accordance with GAAS will always detect a material \nmisstatement when it exists. The risk of not detecting a material misstatement resulting from fraud is higher \nthan for one resulting from error, as fraud may involve collusion, forgery, intentional omissions, \nmisrepresentations, or the override of internal control. Misstatements are considered material if there is a \nsubstantial likelihood that, individually or in the aggregate, they would influence the judgment made by a \nreasonable user based on the consolidated financial statements.", - "page_start": 2, - "page_end": 2, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - } - ] - }, - { - "references": { - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", - "query": "What include Wikimedia Fundation restricted cash ?", - "target_page": 9, - "target_passage": "Restricted cash includes standby letters of credit for (1) the Foundation’s headquarters office lease and (2) one of the Foundation’s Employer of Record responsible for administering compensation and benefits for non-US personnel.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. \n\nThe Foundation has evaluated the financial statement impact of positions taken or expected to be \ntaken in its tax returns. The Foundation is subject to income taxes on any net income that is derived \nfrom a trade or business, regularly carried on, and not in furtherance of the purposes for which it was \ngranted exemption. Net income from any unrelated trade or business, in the opinion of management, is \nnot material to the consolidated financial statements taken as a whole. \n\n***(d) Financial Statement Presentation***\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or \nabsence of donor-imposed restrictions in accordance with Accounting Standards Codification \n(ASC) Topic 958,*Not-for-Profit Entities*. \n\nNet assets without donor restrictions represent unrestricted resources available to support operations \nand also include previously temporarily restricted resources, which have become available for use by \nthe Foundation in accordance with the intentions of donors. \n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in \naccordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied \nand removed by the actions of the Foundation according to the terms of the contribution by the donor.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. \n\n**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of \nmanagement, the outcome of the pending lawsuits will not materially affect operations or the financial \nposition of the Foundation. \n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the \nconsolidated financial statements were available to be issued, and determined there are no items to \ndisclose. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTable
TableTableTableTableTableTable
TableTableTableTableTableTable
TableTable18
", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net.", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
June 30.2024 and 2023Assets2024
2023
Current assets :Cash and cash equivalents$82.845.159
75.808.401Contributions receivable856.657
Short - term investments116.074.763
132.216.667Prepaid expenses and other current assets5.722.457
5.569.485Total current assets205.499.036
213.594.553Restricted cash1.428.542
1.396.717Long - term investments67.291.224
43.265.786Right of use asset - operating lease, net
1.821.174Property and equipment, net11.826.136
14.045.139Contributions receivable715.000
Total assets$
286.759.938274.123.369Liabilities and Net AssetsCurrent liabilities :
Accounts payable
$
4.009.5822.783.904Accrued expenses7.959.558
6.922.259Lease liability417.756
1.640.735Donations payable to Wikimedia Endowment525.607
5.274.448Other liabilities2.292.045
2.124.939Total current liabilities15.204.548
18.746.285Lease liability
405.748Total liabilities$
15.204.54819.152.033Net assets :Net assets without donor restrictions
265.859.067
249.088.663Net assets with donor restrictions5.696.323
5.882.673Total net assets271.555.390
254.971.336Total liabilities and net assets$
86.759.938274.123.369
", - "page_start": 4, - "page_end": 4, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Once such stipulations are satisfied, the associated net assets are released from net assets with donor restrictions and recognized as net assets without donor restrictions.
Contributions received are recorded as net assets without donor restriction or net assets with donor restrictions depending on the existence and / or nature of any donor restrictions.
( e ) Cash and Cash EquivalentsThe Foundation manages is can through major hipsensia Indickiness, it, June 3.2014 and 2012, the foundary and 2012, the foundary and 2012, the foundary and 2012, the foundary and 2012, the foundary and 2013, the paperson and 2013, the foun
ΩRestricted CashRestricted cash includes standby letters of credit for ( 1 ) the Foundation ’ s headquarters office lease and ( 2 ) one of the Foundations Employee of Resociate responsible for administering compensation and benefits fore
( g ) Contributions ReceivableContributions receivable represent glit amounts due from rainous enfiles, which are occasionally directed at specific activities. Contitudions receivable due more than one year from the contribution data and discussived to present
Xh )Investments
The Foundation ' s policy regarding investments is to invest cash in short - term, intermediate - lerm, and long - term feed income, and equity instruments without assuming material undual roles to principal. Preservation of principal anThe Foundation presents its investment portfolios as short - term and long - term based on expectations
", - "page_start": 8, - "page_end": 8, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. \nPrograms comprise various initiatives that focus on (1) building the technological and operating platform \nthat enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, \ngrowing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in \nkey geographic areas, mobile application development, and bottom-up innovation, all of which support \nWikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for \nwhich the Foundation is reimbursed. The allocation between programs, general and administrative, and \nfundraising expenses is based on personnel and related costs and other operating expenses such as rent \nand office expenses using estimates of time spent or percentage of utilization by headcounts, as well as", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "and free to everyone in the world, the Foundation's cost related to this collaborative arrangement is \nincluded within awards and grants in the statement of activities. The amount included within awards \nand grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively. \n\n***(p) Use of Estimates***\n\nThe preparation of financial statements in conformity with U.S. generally accepted accounting \nprinciples requires management to make estimates and assumptions that affect the amounts reported \nin the consolidated financial statements and accompanying notes. Items subject to such estimates and \nassumptions include the investment valuations, useful lives of fixed assets, and the valuation of \ncontributed services. Accordingly, actual results could differ from those estimates. \n\n***(q) Reclassifications***\n\nCertain reclassifications have been made in the financial statements to conform 2023 information to the \n2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and \nlosses on investments separately from investment income, net. This resulted in a reclassification of \n$3,547,510 from investment income, net to unrealized gains on investments within the statement of \nactivities. The Foundation also had a change in accounting policy to no longer present the Wikimania \nevent as special event expense, net in the statement of activities. Revenue from registration sales is \nnow reported within other income, net, and expenses are reported within travel and conference \nexpenses. This resulted in a reclassification of $698,141 from special event expenses to travel and \nconference expenses in the statement of activities. \n\n**(2) Contributions Receivable**\n\nAs of June 30, 2024 and 2023, contributions receivable is $1,571,657 and $0, respectively, and represents \ncontributions receivable from two grants, as well as contributions receivable from payment processors.", - "page_start": 12, - "page_end": 12, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "4,216,271 \n203,233 \n(8,356,376) \n1,821,432 \n\n(1,571,657) \n(152,972) \n1,225,678 \n1,037,299 \n(1,666,935) \n(4,748,841) \n205,056 \n\n8,796,241 \n\n4,602,064 \n64,518 \n(2,276,210) \n1,404,875 \n\n700,000 \n(469,201) \n(483,402) \n1,224,690 \n(1,618,384) \n5,254,730 \n(65,560) \n\n23,957,924 \n\nCash flows from operating activities: \n\nIncrease in net assets \nAdjustments to reconcile increase in net assets to net cash \n\nprovided by operating activities: \n\nDepreciation and amortization \nLoss on disposal of equipment \nUnrealized and realized gains on investments, net \nRight of use asset - operating lease, net \nChanges in operating assets and liabilities: \n\nContributions receivable \nPrepaid expenses and other current assets \nAccounts payable \nAccrued expenses \nLease liability \nDonations payable to Wikimedia Endowment \nOther liabilities \n\nNet cash provided by operating activities \n\nCash flows from investing activities: \n\nPurchase of computer equipment and office furniture \nDevelopment of internal use software \nPurchase of investments \nProceeds from sales and maturities of investments \n\nNet cash provided by (used in) investing activities \n\nNet increase in cash, cash equivalents, and \n\nrestricted cash \n\nCash, cash equivalents, and restricted cash at beginning of year \n\nCash, cash equivalents, and restricted cash at end of year \n\nSupplemental cash flow disclosure: \n\nNoncash changes in exchange rate \nInitial recognition of right of use asset - operating lease \nInitial recognition of lease liability", - "page_start": 6, - "page_end": 6, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**2024** **2023**\n\nNet assets without donor restrictions: \n\nSupport and revenue: \n\nContributions of cash and other financial assets \nContributions of nonfinancial assets and services \nForeign currency losses \nOther income, net \nInvestment income, net \nRelease of net assets with donor restrictions \n\n$ \n\n168,212,977 \n263,476 \n(300,907) \n5,629,773 \n5,096,842 \n6,481,350 164,121,185 \n1,040,453 \n(94,868) \n3,824,240 \n3,002,929 \n4,732,654 \n\nTotal support and revenue 185,383,511 176,626,593 \n\nOperating expenses: \n\nSalaries and benefits \nAwards and grants \nInternet hosting \nIn-kind service expenses \nDonation processing expenses \nProfessional service expenses \nOther operating expenses \nTravel and conferences \nDepreciation and amortization 106,793,960 \n26,820,080 \n3,116,445 \n263,476 \n7,547,718 \n13,090,040 \n10,798,140 \n5,824,979 \n4,216,271 101,305,706 \n24,433,682 \n3,120,819 \n1,040,453 \n6,855,680 \n15,464,635 \n7,393,982 \n4,878,359 \n4,602,064 \n\nTotal operating expenses \n\nChange in net assets without donor restrictions \n\nfrom operating activities \n\nNonoperating activities: \n\nUnrealized gains on investments, net \n\nChange in net assets without donor restrictions \n\nNet assets with donor restrictions: \n\nContributions with donor restrictions \nNet assets released from restrictions \n\nIncrease (decrease) in net assets with donor \n\nrestrictions \n\nIncrease in net assets \n\nNet assets at beginning of year \n\nNet assets at end of year", - "page_start": 5, - "page_end": 5, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "At December 31, 2004, the Company had $237.0 million of restricted cash deposits and $38.7 million of \nrestricted marketable securities held as Ñnancial guarantees, including $119.0 million of restricted cash held \nfor capital expenditures under certain debt facilities, and $34.3 million and $38.7 million of restricted cash and \nrestricted marketable securities, respectively, pledged to regulatory agencies and governmental entities as \nÑnancial guarantees of the Company's performance related to its Ñnal capping, closure and post-closure \nobligations at its landÑlls. The Company's restricted marketable securities consist of mutual funds invested in \nshort-term investment grade securities, including mortgage-backed securities and U.S. Government obliga- \ntions. These securities are available for sale and, as a result, are stated at fair value based upon quoted market", - "page_start": 91, - "page_end": 91, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200471_en.pdf", - "query": "What is the price of the The Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", - "target_page": 8, - "target_passage": "£6.90", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
TheSpecial Educational Needs and Disability ( Coronavirus ) ( Amendment ) Regulations 2020
Made--
--28th April 2020
Laid before Parliament30th April 2020Coming into force
--1st May 2020
\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) \nand 135(2) and (3) of the Children and Families Act 2014(**a**) and sections 29(3) and 569(4) of the \nEducation Act 1996(**b**). \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \n\n(**a**) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16). \n(**b**) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and \nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education \n(Wales) Measure 2009. \n(**c**) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. \n\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 \n(‘the Personal Budgets Regulations 2014’). \n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as \nregulation 5 does in respect of the SEND Regulations 2014. \n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) \nRegulations 2015 (‘the Detained Persons Regulations 2015’). \n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to \nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal \nBudgets Regulations 2014 respectively. \n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax \ntime limits. \n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal \nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’). \n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to \nthose in regulations 5, 17 and 20. \n\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency \nmeasure and no significant impact on business, charities or voluntary bodies is foreseen. \n\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk. \n\n© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n\n \n \n \n \n [html]\n
Therapeutic and the participants with to expression
2A —( 1 ) Where the consuctive exception applies, any requirement in any of the regulations specified in paragraph ( 3 ) for action to be takes within a specified period of time or by a certain day is to be read instead as a requirement for such ac
( 2 ) The coronavimus exception apples where it is not reasonably practicable for a person to meet a requirement referred to in paragraph ( 1 ) for a reason relating to the incidence or transmission of coronavirus.
( 3 ) The following regulations are specified for the purposes of paragraphs ( 1 ) and ( 2 )—
( a ) regulation 15 ( 1 ) and ( 4 ) ( needs assessments which are not completed );
( b ) regulation 16 ( 2 ), ( 3 ) and ( 4 ) ( transfer of a kept EHC plan );
( c ) regulation I7 ( 1 ) and ( 2 ) ( restriction on disclosure of EHC plans );
( d ) regulation 19 ( requirement to consider mediation );
( e ) regulation 20 ( 1 ) and ( 2 ) ( where the appropriate person does not wish to or fails to pursue mediation );
( f ) regulation 21 ( mediation );
( g ) regulation 24 ( 1 ) and ( 3 ) ( mediation certificate under section 55 ( 5 ) of the Act );
( h ) regulation 27 ( 3 ) ( steps to be taken by a home authority );
( i ) regulation 29 ( 2 ) and ( 6 ) ( compliance with the orders of the First - tier Tribunal ); and
( j ) regulation 30 ( 3 ) and ( 6 ) ( unopposed appeals ).*.
21. In regulation 4 ( determination whether or not special educational provision may be necessary ), after paragraph ( 2 ) insert —
“( 3 ) The local authority need not comply with the time limit referred to in paragraph ( 1 ) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.”
22. In regulation 5 ( 4 ) ( decision whether or not to conduct a detained person ’ s EHC needs assessment )—
( a ) at the end of sub - paragraph ( b ) omit “ or ”; and
( b ) at the end of sub - paragraph ( c ) insert —
“, or
( d ) of a reason relating to the incidence or transmission of coronavirus *.
", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or���; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**10.**In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”. \n\n**11.**After regulation 18 (circumstances in which a local authority must review an EHC plan) \n\ninsert— \n\n“**Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.**—(1) It is not necessary for a local authority to review an EHC plan in accordance \nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the \nincidence or transmission of coronavirus. \n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as \n\nsoon as reasonably practicable.”. \n\n**12.**In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert— \n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3) \nand (4) if it is impractical to do so because of a reason relating to the incidence or \ntransmission of coronavirus.”. \n\n**13.**In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**14.**In regulation 45 (unopposed appeals), after paragraph (7) insert— \n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e) \napply.”. \n\n**Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.**The Special Educational Needs (Personal Budgets) Regulations 2014(**a**) are amended as \n\nfollows. \n\n**16.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**17.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time period due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, the requirement for the local authority \nto review the making and use of direct payments within the first three months of them being \nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read \ninstead as a requirement for such action to be taken as soon as reasonably practicable.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess \n\neducational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. \n\n**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "PART 6 \n\nFinal provisions \n\n**Review of need for requirements**\n\n**24.**The Secretary of State must review the need for the requirements imposed by these \n\nRegulations by 14th June 2021 and at least once every 28 days thereafter. \n\n**Expiry of Regulations**\n\n**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**26. Specified Director and Specified Executive Disclosures (continued)**", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Regulation 19(7)(b) to (d)**\n\n**15.**Breach of requirement under regulation 16(1), 17(1) or 18(1) (other operator offences), \n\n£2,000. \n\n**Regulation 19(13)**\n\n**16.**Breach of requirement under regulation 15 (operator records and information), £500. \n\n**Regulation 19(14)**\n\n**17.**Breach of regulation 19(14) (wilful obstruction of a person carrying out a function under \n\nthese Regulations)— \n\n(a) obstruction of a function relating to regulation 3— \n\n(i) in the case of the first fixed penalty notice, £500, \n(ii) in the case of the second fixed penalty notice, £1,000, \n(iii) in the case of the third fixed penalty notice, £2,000, \n(iv) in the case of the fourth and subsequent fixed penalty notices, £4,000, \n\nwith no account taken of any fixed penalty notices given before 4.00 a.m. on 18th January 2021; \n\n(b) obstruction of a function relating to regulation 4— \n\n(i) in the case of the first fixed penalty notice, £500, \n(ii) in the case of the second fixed penalty notice, £1,000, \n(iii) in the case of the third fixed penalty notice, £2,000, \n(iv) in the case of the fourth and subsequent fixed penalty notices, £4,000; \n\n(c) obstruction of a function relating to regulations 9 or 11 apart from regulation 11(3), \n\n£1,000; \n\n(d) obstruction of a function relating to regulation (11)(3) or in relation to regulation 10— \n\n(i) in the case of the first fixed penalty notice, £5,000, \n(ii) in the case of the second fixed penalty notice, £8,000, \n(iii) in the case of the third and subsequent fixed penalty notice, £10,000; \n\n(e) in any other case, £500. \n\n**18.**In determining how many fixed penalty notices a person (“P”) has received for the purposes \nof paragraph 8 (breach of requirement in regulation 9 to self-isolate etc), if P received more than \none fixed penalty notice for that offence before 2nd October 2020, only one of those notices may \nbe taken into account. \n\n**1.**—(1) The Health Protection (Notification) Regulations 2010(**a**) are amended as follows. \n(2) In regulation 4(3D)(b), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020” substitute “regulation 6 of the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) Regulations \n2021”.", - "page_start": 87, - "page_end": 87, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200471_en.pdf", - "query": "When come into force the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", - "target_page": 1, - "target_passage": "These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
TheSpecial Educational Needs and Disability ( Coronavirus ) ( Amendment ) Regulations 2020
Made--
--28th April 2020
Laid before Parliament30th April 2020Coming into force
--1st May 2020
\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) \nand 135(2) and (3) of the Children and Families Act 2014(**a**) and sections 29(3) and 569(4) of the \nEducation Act 1996(**b**). \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \n\n(**a**) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16). \n(**b**) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and \nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education \n(Wales) Measure 2009. \n(**c**) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. \n\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 \n(‘the Personal Budgets Regulations 2014’). \n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as \nregulation 5 does in respect of the SEND Regulations 2014. \n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) \nRegulations 2015 (‘the Detained Persons Regulations 2015’). \n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to \nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal \nBudgets Regulations 2014 respectively. \n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax \ntime limits. \n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal \nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’). \n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to \nthose in regulations 5, 17 and 20. \n\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency \nmeasure and no significant impact on business, charities or voluntary bodies is foreseen. \n\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk. \n\n© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n\n \n \n \n \n [html]\n
Therapeutic and the participants with to expression
2A —( 1 ) Where the consuctive exception applies, any requirement in any of the regulations specified in paragraph ( 3 ) for action to be takes within a specified period of time or by a certain day is to be read instead as a requirement for such ac
( 2 ) The coronavimus exception apples where it is not reasonably practicable for a person to meet a requirement referred to in paragraph ( 1 ) for a reason relating to the incidence or transmission of coronavirus.
( 3 ) The following regulations are specified for the purposes of paragraphs ( 1 ) and ( 2 )—
( a ) regulation 15 ( 1 ) and ( 4 ) ( needs assessments which are not completed );
( b ) regulation 16 ( 2 ), ( 3 ) and ( 4 ) ( transfer of a kept EHC plan );
( c ) regulation I7 ( 1 ) and ( 2 ) ( restriction on disclosure of EHC plans );
( d ) regulation 19 ( requirement to consider mediation );
( e ) regulation 20 ( 1 ) and ( 2 ) ( where the appropriate person does not wish to or fails to pursue mediation );
( f ) regulation 21 ( mediation );
( g ) regulation 24 ( 1 ) and ( 3 ) ( mediation certificate under section 55 ( 5 ) of the Act );
( h ) regulation 27 ( 3 ) ( steps to be taken by a home authority );
( i ) regulation 29 ( 2 ) and ( 6 ) ( compliance with the orders of the First - tier Tribunal ); and
( j ) regulation 30 ( 3 ) and ( 6 ) ( unopposed appeals ).*.
21. In regulation 4 ( determination whether or not special educational provision may be necessary ), after paragraph ( 2 ) insert —
“( 3 ) The local authority need not comply with the time limit referred to in paragraph ( 1 ) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.”
22. In regulation 5 ( 4 ) ( decision whether or not to conduct a detained person ’ s EHC needs assessment )—
( a ) at the end of sub - paragraph ( b ) omit “ or ”; and
( b ) at the end of sub - paragraph ( c ) insert —
“, or
( d ) of a reason relating to the incidence or transmission of coronavirus *.
", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**10.**In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”. \n\n**11.**After regulation 18 (circumstances in which a local authority must review an EHC plan) \n\ninsert— \n\n“**Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.**—(1) It is not necessary for a local authority to review an EHC plan in accordance \nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the \nincidence or transmission of coronavirus. \n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as \n\nsoon as reasonably practicable.”. \n\n**12.**In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert— \n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3) \nand (4) if it is impractical to do so because of a reason relating to the incidence or \ntransmission of coronavirus.”. \n\n**13.**In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**14.**In regulation 45 (unopposed appeals), after paragraph (7) insert— \n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e) \napply.”. \n\n**Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.**The Special Educational Needs (Personal Budgets) Regulations 2014(**a**) are amended as \n\nfollows. \n\n**16.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**17.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time period due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, the requirement for the local authority \nto review the making and use of direct payments within the first three months of them being \nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read \ninstead as a requirement for such action to be taken as soon as reasonably practicable.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess \n\neducational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. \n\n**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "PART 6 \n\nFinal provisions \n\n**Review of need for requirements**\n\n**24.**The Secretary of State must review the need for the requirements imposed by these \n\nRegulations by 14th June 2021 and at least once every 28 days thereafter. \n\n**Expiry of Regulations**\n\n**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. \n\n**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. \n\nSCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "\n \n \n \n \n [html]2021 No. 582PUBLIC HEALTH, ENGLANDThe Health Protection ( Coronavirus, International Travel and Operator Liability ) ( England ) Regulations 2021at 2.30 p. m. on 14th May 2021Coming into force-at 4.00 a. m. on 17th May 202132.33.4.5.6.7.8.91310.1711.1712.1913.\n
Made-
--
at 10.32 a. m. on 14th May 2021Laid before Parliament
-CONTENTS
PART 1Introductory1.Citation, commencement, extent and application
Interpretation and introduction of Schedules 1 to 4PART 2
Requirements on persons arriving in EnglandRequirement on passengers to provide information
5Requirement to possess notification of negative test result
6Requirements relating to tests
7Requirement to book and undertake tests
9Requirement to undertake workforce tests
10Test requirements : offshore installation workers
12Further requirements on arrivals from category 2 countries and territories
Further requirements on arrivals from category 3 countries or territoriesPART 3
EnforcementEnforcement of requirement to self - isolate
Power of entryPART 4
Requirements on operatorsPassenger information requirement
", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "sg248459.pdf", - "query": "Who is Daniel Casali ?", - "target_page": 12, - "target_passage": " Daniel Casali is a Thought Leader Information Technology Specialist working for 15 years at IBM with Power Systems, high-performance computing, big data, and storage. His role at IBM is to bring to reality solutions that address client’s needs by exploring new technologies for different workloads. He is also fascinated by real multicloud implementations, always trying to abstract and simplify the new challenges of the heterogeneous architectures that are intrinsic to this new consumption model, be that on-premises or in the public cloud. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Douglas J. Jacobson \nExecutive Vice President – \nAcquisitions and Divestitures", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "During climbing", - "page_start": 167, - "page_end": 167, - "source_file": "00-80T-80.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "W \nH \nO \n\nW \nE \n\nA \nR \nE", - "page_start": 24, - "page_end": 24, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "W \nH \nO \n\nW \nE \n\nA \nR \nE", - "page_start": 18, - "page_end": 18, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Dale noseworthy**\nVice president \ninvestor relations and \ncorporate planning \n**Jeremy Jackson**\nVice president \nmarketing **robert richardson**\nexecutive Vice president \n& chief Financial officer **Michael Mclean**\nVice president \nDevelopment **erin Cleveland**\nVice president \nFinance \n\n\n\nmanagement team", - "page_start": 5, - "page_end": 5, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "$ 6,346 $ 4,000 $ (2,346) \n(215) \n1,785 \n$ 8,346 $ 5,785 $ (2,561) \n$44,000 $154,112 $110,112 \n\n2,000", - "page_start": 89, - "page_end": 89, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": " ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "sg248459.pdf", - "query": "When does IBM close its acquisition of Red Hat ?", - "target_page": 20, - "target_passage": " On July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and open source technology", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "This publication describes how Red Hat and IBM can advance your cloud journey and speed \ngrowth and innovation for your business by using Red Hat OpenShift on IBM Power Systems. \n\n**Note:**Red Hat joins IBM as a distinct unit, preserving the independence and neutrality of \nRed Hat’s open source development heritage and unique development culture. Red Hat’s \nunwavering commitment to open source remains unchanged and it continues to offer \ncustomers choice and flexibility.", - "page_start": 20, - "page_end": 20, - "source_file": "sg248459.pdf" - }, - { - "text": "**1.1 Introduction**\n\nMost companies started or are contemplating their journey to cloud. Although in recent years \nthe adoption of cloud became much more common place, the scope of what a cloud is or can \nbe also increased. This broadening of possibilities unfortunately added confusion and can \nresult in companies being unsure of how their existing application estate can change to \nintegrate with the cloud model. \n\nAs such, doubts still exist around how to start and progress on this journey. It is also true that \nalthough people understand traditional enterprise applications and more modern \ncloud-hosted applications, the integration or co-existence of both can prove equally confusing \nand contradicting. \n\nRecent industry trends, combined with the new partnership between Red Hat and IBM, seek \nto bring some clarity to the landscape while providing new modernization opportunities for \nexisting enterprise applications and familiar environments. \n\nThe main focus of this IBM Redbooks publication relates to IBM Cloud Paks and Red Hat \nOpenShift, which is hosted on IBM Power Systems. Although individually much can be written \nabout either topic, the relationship this publication highlights is between Red Hat OpenShift \nand IBM Power Systems. \n\nWe show what Red Hat OpenShift brings to the IBM Power Systems platform specifically \ndiscuss how it can be deployed and added into existing familiar Power System environments, \nand the benefits that integration and co-existence can provide from an existing enterprise \napplication viewpoint. \n\nThis publication is a first volume in a planned multi-volume publication over the next 12 - 18 \nmonths. Within this initial volume, we explain the fundamental perspective (which is accurate \nas of the time of this writing) while providing pointers to future direction that will be discussed \nin future volumes. \n\n**Note:**This initial publication relates to Red Hat OpenShift 3.11, because this release was \nthe current OpenShift Container Platform (OCP) release for IBM Power Systems at the \ntime of this writing. IBM and Red Hat intend to deliver Red Hat OpenShift 4 for IBM \nPOWER® to accelerate agility for enterprise clients through integrated tooling and a \nfeature-rich Kubernetes container platform for cloud-native development on POWER9 and \nIBM POWER8® processor-based servers. \n\n**1.2 Red Hat and IBM**\n\nOn July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and \nopen source technology. \n\nThis acquisition puts Red Hat and IBM in a unique position to unlock the true value of hybrid \ncloud for your business. By combining the power and flexibility of Red Hat’s open hybrid cloud \ntechnologies with the scale and depth of IBM innovation and industry expertise, you now have \nthe tools to accelerate your cloud journey. \n\nIBM and Red Hat worked together for more than 20 years in making open source a \ncompetitive advantage for businesses on x86, IBM Power Systems, and IBM z Systems®. \nTogether, we are both on a mission to improve open source technology and help your \ncompanies capture the business value of the cloud.", - "page_start": 19, - "page_end": 19, - "source_file": "sg248459.pdf" - }, - { - "text": "**Trademarks**\n\nIBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines \nCorporation, registered in many jurisdictions worldwide. Other product and service names might be \ntrademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright \nand trademark information” at http://www.ibm.com/legal/copytrade.shtml \n\nThe following terms are trademarks or registered trademarks of International Business Machines Corporation, \nand might also be trademarks or registered trademarks in other countries. \n\n\n \n \n \n \n [html]\n
AIX ®IBM ZθRedbooks ®
Cognos ®IBM z Systems ®Redbooks ( logo ) 18 @ Θ
DB2 @OpenCAPITMSystemMirror ®
Guardium ®POWER ®Tivoli ®
IBM ®POWER88WebSphere ®
IBM CloudTMPOWER9TMXIV ®
IBM Cloud PakTMPowerHA ®z Systems ®
IBM ServicesTMPowerVM ®
IBM Spectrum ®QRadar ®
\n\nThe following terms are trademarks of other companies: \n\nThe registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive \nlicensee of Linus Torvalds, owner of the mark on a worldwide basis. \n\nWindows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other \ncountries, or both. \n\nJava, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its \naffiliates. \n\nAnsible, Gluster, JBoss, OpenShift, Red Hat, are trademarks or registered trademarks of Red Hat, Inc. or its \nsubsidiaries in the United States and other countries. \n\nUNIX is a registered trademark of The Open Group in the United States and other countries. \n\nVMware, and the VMware logo are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in \nthe United States and/or other jurisdictions. \n\nOther company, product, or service names may be trademarks or service marks of others.", - "page_start": 9, - "page_end": 9, - "source_file": "sg248459.pdf" - }, - { - "text": "**Chapter 5. Red Hat OpenShift installation**\n\n**planning and considerations**\n\nThis chapter describes the Red Hat OpenShift planning, considerations, and installation \nguidelines and includes the following topics: \n\n(cid:2) 5.1, “IBM Power Systems” on page 72 \n(cid:2) 5.2, “Red Hat OpenShift Container Platform 3.11 on IBM Power Systems” on page 77 \n(cid:2) 5.3, “Red Hat OpenShift Container Platform 3.11 on IBM PowerVC” on page 79", - "page_start": 86, - "page_end": 86, - "source_file": "sg248459.pdf" - }, - { - "text": "**Trademarks**\n\nIBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines \nCorporation in the United States, other countries, or both. These and other IBM trademarked terms are \nmarked on their first occurrence in this information with the appropriate symbol (® or ™), indicating US \nregistered or common law trademarks owned by IBM at the time this information was published. Such \ntrademarks may also be registered or common law trademarks in other countries. A current list of IBM \ntrademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml \n\nThe following terms are trademarks of the International Business Machines Corporation in the United States, \nother countries, or both: \n\n\n\n\n \n \n \n \n [html]\n
AIX @IMSTMRACF ®
CICS ®Language Environment ®Redbooks ®
DaejaTMLotus ®Redbooks ( logo ) 1 @ Θ @
DB2 @MVSTMSystem Storage ®
DB2 Universal DatabaseTMOMEGAMON ®System z ®
developerWorks ®OS / 390 ®SystemMirror ®
FileNet ®OS / 400 ®Tivoli ®
IBM ®Power SystemsTMWebSphere ®
IBM zTMPowerHA ®z SystemsTM
IBM z SystemsTMPrint Services FacilityTMz / OS ®
\n\nThe following terms are trademarks of other companies: \n\nAdobe, the Adobe logo, and the PostScript logo are either registered trademarks or trademarks of Adobe \nSystems Incorporated in the United States, and/or other countries. \n\nEvolution, and Inc. device are trademarks or registered trademarks of Kenexa, an IBM Company. \n\nLinux is a trademark of Linus Torvalds in the United States, other countries, or both. \n\nMicrosoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, \nother countries, or both. \n\nJava, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its \naffiliates. \n\nUNIX is a registered trademark of The Open Group in the United States and other countries. \n\nOther company, product, or service names may be trademarks or service marks of others.", - "page_start": 13, - "page_end": 13, - "source_file": "sg246915.pdf" - }, - { - "text": "2013 \nacquisition & \nDevelopment \nFacts \n$121M \n\nAcquisitions \nCompleted \n\n5.8% \n\nAverage Acquisition \nCapitalization Rate \n\n743 \n\nApartment Units \nAcquired", - "page_start": 14, - "page_end": 14, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**5.2 Red Hat OpenShift Container Platform 3.11 on IBM Power**\n**Systems**\n\nRed Hat OpenShift Container Platform 3.11 for Power Systems provides a secure, \nenterprise-grade platform for IBM Power Systems servers. It brings together industry-leading \ncontainer orchestration from Kubernetes, advanced application build and delivery automation, \nand Red Hat Enterprise Linux certified containers for IBM Power Systems. \n\nRed Hat OpenShift Container Platform 3.11 for Power Systems brings developers and IT \noperations together with a common platform. It provides applications, platforms, and services \nfor creating and delivering cloud-native apps and management so IT can ensure that the \nenvironment is secure and available. It also enables in-place (for example, on IBM POWER) \napplication modernization of existing enterprise applications by surrounding them with new \ncontainer technology. \n\nRed Hat OpenShift Container Platform 3.11 for Power Systems provides enterprises the \nsame functionality as the Red Hat OpenShift Container Platform offering on other platforms. \nKey features include: \n\n(cid:2) Self-service environment for application and development teams. \n\n(cid:2) Pluggable architecture that supports a choice of container runtimes, networking, storage, \nContinuous Integration/Continuous Deployment (CI-CD), and more. \n\n(cid:2) Ability to automate routine tasks for application teams. \n\n\n\nFigure 5-2 High-level view of the OpenShift Container Platform for IBM Power Systems \n\nFrom bare metal physical machines to virtualized infrastructure, or in private clouds, the \nOpenShift is supported anywhere that Red Hat Enterprise Linux is running, including all of the \nsupported virtualization platforms (PowerVM or RHEV) and private cloud (PowerVC).", - "page_start": 92, - "page_end": 92, - "source_file": "sg248459.pdf" - }, - { - "text": "**First Edition (March 2020)**\n\nThis edition applies to: \n\n(cid:2) Red Hat OpenShift Container Platform for Power Enterprise V3.11 \n(cid:2) Red Hat Enterprise Linux Server release V7.6 (Maipo) for ppc64le \n(cid:2) IBM Virtual I/O Server V3.1.1.0 \n(cid:2) IBM Cloud PowerVC Manager V1.4.3.1 \n(cid:2) Terraform V0.12.9 \n(cid:2) provider.null V2.1.2 \n(cid:2) provider.openstack V1.22.0 \n\n**© Copyright International Business Machines Corporation 2020. All rights reserved.**\nNote to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule \nContract with IBM Corp.", - "page_start": 3, - "page_end": 3, - "source_file": "sg248459.pdf" - }, - { - "text": "**Notices**\n\nThis information was developed for products and services offered in the U.S.A. \n\nIBM may not offer the products, services, or features discussed in this document in other countries. Consult \nyour local IBM representative for information on the products and services currently available in your area. Any \nreference to an IBM product, program, or service is not intended to state or imply that only that IBM product, \nprogram, or service may be used. Any functionally equivalent product, program, or service that does not \ninfringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to \nevaluate and verify the operation of any non-IBM product, program, or service. \n\nIBM may have patents or pending patent applications covering subject matter described in this document. The \nfurnishing of this document does not grant you any license to these patents. You can send license inquiries, in \nwriting, to: \n*IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.*\n\n**The following paragraph does not apply to the United Kingdom or any other country where such**\n**provisions are inconsistent with local law:**INTERNATIONAL BUSINESS MACHINES CORPORATION \nPROVIDES THIS PUBLICATION \"AS IS\" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR \nIMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, \nMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of \nexpress or implied warranties in certain transactions, therefore, this statement may not apply to you. \n\nThis information could include technical inaccuracies or typographical errors. Changes are periodically made \nto the information herein; these changes will be incorporated in new editions of the publication. IBM may make \nimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any time \nwithout notice. \n\nAny references in this information to non-IBM websites are provided for convenience only and do not in any \nmanner serve as an endorsement of those websites. The materials at those websites are not part of the \nmaterials for this IBM product and use of those websites is at your own risk. \n\nIBM may use or distribute any of the information you supply in any way it believes appropriate without incurring \nany obligation to you. \n\nAny performance data contained herein was determined in a controlled environment. Therefore, the results \nobtained in other operating environments may vary significantly. Some measurements may have been made \non development-level systems and there is no guarantee that these measurements will be the same on \ngenerally available systems. Furthermore, some measurements may have been estimated through \nextrapolation. Actual results may vary. Users of this document should verify the applicable data for their \nspecific environment. \n\nInformation concerning non-IBM products was obtained from the suppliers of those products, their published \nannouncements or other publicly available sources. IBM has not tested those products and cannot confirm the \naccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the \ncapabilities of non-IBM products should be addressed to the suppliers of those products. \n\nThis information contains examples of data and reports used in daily business operations. To illustrate them \nas completely as possible, the examples include the names of individuals, companies, brands, and products. \nAll of these names are fictitious and any similarity to the names and addresses used by an actual business \nenterprise is entirely coincidental. \n\nCOPYRIGHT LICENSE:", - "page_start": 12, - "page_end": 12, - "source_file": "sg246915.pdf" - }, - { - "text": "**Trademarks**\n\nIBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines \nCorporation, registered in many jurisdictions worldwide. Other product and service names might be \ntrademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright \nand trademark information” at http://www.ibm.com/legal/copytrade.shtml \n\nThe following terms are trademarks or registered trademarks of International Business Machines Corporation, \nand might also be trademarks or registered trademarks in other countries. \n\n\n \n \n \n \n [html]\n
AIX @IBM ®Insight ®
Concert ®IBM CloudTMPowerHA ®
DB2 @IBM FlashSystem ®Rational ®
Db2 @IBM SpectrumTMRational Team ConcertTM
DS4000 ®IBM Spectrum AccelerateTMReal - time CompressionTM
DS6000TMIBM Spectrum ControlTMRedbooks ®
DS8000 ®IBM Spectrum ProtectTMRedbooks ( logo ) 1 @ Θ @
Easy Tier ®IBM Spectrum ScaleTMStorwize ®
FlashCopy ®IBM Spectrum StorageTMSystem Storage ®
Global Technology Services ®IBM Spectrum VirtualizeTMTivoli ®
HyperSwap ®Informix ®XIV8
\n\nThe following terms are trademarks of other companies: \n\nSoftLayer, are trademarks or registered trademarks of SoftLayer, Inc., an IBM Company. \n\nITIL is a Registered Trade Mark of AXELOS Limited. \n\nLinux is a trademark of Linus Torvalds in the United States, other countries, or both. \n\nMicrosoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, \nother countries, or both. \n\nJava, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its \naffiliates. \n\nUNIX is a registered trademark of The Open Group in the United States and other countries. \n\nOther company, product, or service names may be trademarks or service marks of others.", - "page_start": 15, - "page_end": 15, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "sg248459.pdf", - "query": "What does an ITMS service provide ?", - "target_page": 30, - "target_passage": "An IT Service Management (ITSM) perspective can provide automation and a global management view, and incorporate the necessary software disciplines that are required to build a solid infrastructure for an enterprise, commercial or not. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**IT Service Management and orchestration**\nAn IT Service Management (ITSM) perspective can provide automation and a global \nmanagement view, and incorporate the necessary software disciplines that are required to \nbuild a solid infrastructure for an enterprise, commercial or not. \n\nThe missing point was the orchestration and the orchestration of all containers and resources \naround them. Many people think that orchestration and automation are the same thing, but \nthe orchestration is more complex. Automation often is discussed in the context of specific \ntasks, whereas orchestration refers to the automation of processes and workflows. \n\nOrchestration deals with the end-to-end process simplify the automation and the \nadministration across specific machines and diverse dependencies (see Figure 2-3). \nAutomation attempts to move people out of the equation whereas orchestration is not about \nrigid planning, but arranging and coordination of automated tasks, which ultimately results in \na consolidated process or workflow. Parts can be automated, but the decision is still \nhuman-centric; for example, the definition of which tasks must run, the order of the tasks, role \nassignments, permission, post-deployment, failure recovery, and scaling.", - "page_start": 29, - "page_end": 29, - "source_file": "sg248459.pdf" - }, - { - "text": "E u ronet Services Inc. and its subsidiaries (the “Company” or “Euronet”) is a provider of electronic financial solutions and transaction \np rocessing services to banks, financial institutions, and other companies. Euronet operates an automated teller machine (“ATM”) network in \nE u rope and the U.S., which serves banks and retail companies by accepting most international bankcards and pro p r i e t a ry cards issued by \nmember banks. Some of the ATMs also perf o rm certain deposit, sales or advertising functions. Euronet also provides ATM network \nmanagement outsourcing services to banks or companies with their own networks. Euronet sells integrated software solutions for electro n i c \npayment and financial transaction delivery systems worldwide. Its software comprises a suite of products including a core system, Integrated \nTransaction Management (“ITM”), and compatible modular software for ATM and POS network processing, electronic funds transfer \ni n t e rfaces, electronic funds transfer switch control, credit/debit card management and processing, and corporate cash management and \npersonal financial management access products.", - "page_start": 29, - "page_end": 29, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "You can read high level explanations of the core services here, and an example of how they interact \n\nwithin the context of an example microservice, or you can choose to skip ahead to the hands on \n\nworkshop that uses three common services to build a working microservice.", - "page_start": 33, - "page_end": 33, - "source_file": "serverless-core.pdf" - }, - { - "text": "**Notices**\n\nThis information was developed for products and services offered in the U.S.A. \n\nIBM may not offer the products, services, or features discussed in this document in other countries. Consult \nyour local IBM representative for information on the products and services currently available in your area. Any \nreference to an IBM product, program, or service is not intended to state or imply that only that IBM product, \nprogram, or service may be used. Any functionally equivalent product, program, or service that does not \ninfringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to \nevaluate and verify the operation of any non-IBM product, program, or service. \n\nIBM may have patents or pending patent applications covering subject matter described in this document. The \nfurnishing of this document does not grant you any license to these patents. You can send license inquiries, in \nwriting, to: \n*IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.*\n\n**The following paragraph does not apply to the United Kingdom or any other country where such**\n**provisions are inconsistent with local law:**INTERNATIONAL BUSINESS MACHINES CORPORATION \nPROVIDES THIS PUBLICATION \"AS IS\" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR \nIMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, \nMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of \nexpress or implied warranties in certain transactions, therefore, this statement may not apply to you. \n\nThis information could include technical inaccuracies or typographical errors. Changes are periodically made \nto the information herein; these changes will be incorporated in new editions of the publication. IBM may make \nimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any time \nwithout notice. \n\nAny references in this information to non-IBM websites are provided for convenience only and do not in any \nmanner serve as an endorsement of those websites. The materials at those websites are not part of the \nmaterials for this IBM product and use of those websites is at your own risk. \n\nIBM may use or distribute any of the information you supply in any way it believes appropriate without incurring \nany obligation to you. \n\nAny performance data contained herein was determined in a controlled environment. Therefore, the results \nobtained in other operating environments may vary significantly. Some measurements may have been made \non development-level systems and there is no guarantee that these measurements will be the same on \ngenerally available systems. Furthermore, some measurements may have been estimated through \nextrapolation. Actual results may vary. Users of this document should verify the applicable data for their \nspecific environment. \n\nInformation concerning non-IBM products was obtained from the suppliers of those products, their published \nannouncements or other publicly available sources. IBM has not tested those products and cannot confirm the \naccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the \ncapabilities of non-IBM products should be addressed to the suppliers of those products. \n\nThis information contains examples of data and reports used in daily business operations. To illustrate them \nas completely as possible, the examples include the names of individuals, companies, brands, and products. \nAll of these names are fictitious and any similarity to the names and addresses used by an actual business \nenterprise is entirely coincidental. \n\nCOPYRIGHT LICENSE:", - "page_start": 12, - "page_end": 12, - "source_file": "sg246915.pdf" - }, - { - "text": "**Note:**Starting with version 9 of ODWEK, additional functions were added to reset the \ninactivity timeout counter of a user session. This enhancement simplifies the design of \nconnection pooling and timeout scenarios. \n\nFor a connection pooling sample that covers the topics of thread safety, resource \nconsumption, and timeouts in detail, see Chapter 6, “Connection pooling and connection \nhandling”, in*IBM Content Manager OnDemand Web Enablement Kit Java APIs: The Basics*\n*and Beyond*, SG24-7646. \n\n**8.3.2 Content Management Interoperability Services**\n\nCMIS is an open standard for accessing content management repositories. It is an OASIS \nspecification and it is supported by various applications from different vendors, including IBM \n(with FileNet P8, Content Manager, and Content Manager OnDemand). \n\nCMIS provides a common access interface for searching, retrieving, and in the case of \ndocument management systems, modifying and deleting documents. It is a web services \ninterface that is implemented in either SOAP web services and REST (Atom) services. \n\nFor more information about CMIS, see the CMIS page on the OASIS website, the CMIS \noverview page at the IBM Enterprise Content Manager website, and the technical \ndocumentation that is available: \n\n(cid:2) https://www.oasis-open.org/committees/cmis/ \n\n(cid:2) http://www.ibm.com/software/ecm/cmis.html \n\n(cid:2)*Implementing Web Applications with CM Information Integrator for Content and*\n*OnDemand Web Enablement Kit*, SG24-6338 \n\n(cid:2) Content Management Interoperability Services for Content Manager OnDemand is \n\ninstalled as part of the IBM Content Navigator installation. For more information, see \n“Installing Content Navigator” on page 194. \n\nWhen you consider implementing your own software on CMIS, remember CMIS is used for \naccessing document management systems, but not necessarily high-volume report archives, \nsuch as Content Manager OnDemand. \n\nThe methodology of accessing documents is based on folders and subfolders with \ndocuments in it (such as in a file system) and partially emulated by Content Manager \nOnDemand with its different object model. The use of CMIS must be considered as an \nabstraction layer that might have an impact on throughput and feature exposure. Also, much \nof the CMIS API is not supported by Content Manager OnDemand (such as the storage and \ndeletion functions). \n\n**8.3.3 Other client-based API options**\n\nOther client-based API options include Windows ActiveX API, structured API on z/OS, server \ncommands, and XML Administration interface (ARSXML).", - "page_start": 227, - "page_end": 227, - "source_file": "sg246915.pdf" - }, - { - "text": "**SHENTEL SERVICE AREAS**", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**Notices**\n\nThis information was developed for products and services offered in the US. This material might be available \nfrom IBM in other languages. However, you may be required to own a copy of the product or product version in \nthat language in order to access it. \n\nIBM may not offer the products, services, or features discussed in this document in other countries. Consult \nyour local IBM representative for information on the products and services currently available in your area. Any \nreference to an IBM product, program, or service is not intended to state or imply that only that IBM product, \nprogram, or service may be used. Any functionally equivalent product, program, or service that does not \ninfringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to \nevaluate and verify the operation of any non-IBM product, program, or service. \n\nIBM may have patents or pending patent applications covering subject matter described in this document. The \nfurnishing of this document does not grant you any license to these patents. You can send license inquiries, in \nwriting, to: \nIBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US \n\nINTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” \nWITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED \nTO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A \nPARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in \ncertain transactions, therefore, this statement may not apply to you. \n\nThis information could include technical inaccuracies or typographical errors. Changes are periodically made \nto the information herein; these changes will be incorporated in new editions of the publication. IBM may make \nimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any time \nwithout notice. \n\nAny references in this information to non-IBM websites are provided for convenience only and do not in any \nmanner serve as an endorsement of those websites. The materials at those websites are not part of the \nmaterials for this IBM product and use of those websites is at your own risk. \n\nIBM may use or distribute any of the information you provide in any way it believes appropriate without \nincurring any obligation to you. \n\nThe performance data and client examples cited are presented for illustrative purposes only. Actual \nperformance results may vary depending on specific configurations and operating conditions. \n\nInformation concerning non-IBM products was obtained from the suppliers of those products, their published \nannouncements or other publicly available sources. IBM has not tested those products and cannot confirm the \naccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the \ncapabilities of non-IBM products should be addressed to the suppliers of those products. \n\nStatements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and \nrepresent goals and objectives only. \n\nThis information contains examples of data and reports used in daily business operations. To illustrate them \nas completely as possible, the examples include the names of individuals, companies, brands, and products. \nAll of these names are fictitious and any similarity to actual people or business enterprises is entirely \ncoincidental. \n\nCOPYRIGHT LICENSE:", - "page_start": 14, - "page_end": 14, - "source_file": "sg247938.pdf" - }, - { - "text": "**Notices**\n\nThis information was developed for products and services offered in the US. This material might be available \nfrom IBM in other languages. However, you may be required to own a copy of the product or product version in \nthat language in order to access it. \n\nIBM may not offer the products, services, or features discussed in this document in other countries. Consult \nyour local IBM representative for information on the products and services currently available in your area. Any \nreference to an IBM product, program, or service is not intended to state or imply that only that IBM product, \nprogram, or service may be used. Any functionally equivalent product, program, or service that does not \ninfringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to \nevaluate and verify the operation of any non-IBM product, program, or service. \n\nIBM may have patents or pending patent applications covering subject matter described in this document. The \nfurnishing of this document does not grant you any license to these patents. You can send license inquiries, in \nwriting, to: \nIBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US \n\nINTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” \nWITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED \nTO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A \nPARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in \ncertain transactions, therefore, this statement may not apply to you. \n\nThis information could include technical inaccuracies or typographical errors. Changes are periodically made \nto the information herein; these changes will be incorporated in new editions of the publication. IBM may make \nimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any time \nwithout notice. \n\nAny references in this information to non-IBM websites are provided for convenience only and do not in any \nmanner serve as an endorsement of those websites. The materials at those websites are not part of the \nmaterials for this IBM product and use of those websites is at your own risk. \n\nIBM may use or distribute any of the information you provide in any way it believes appropriate without \nincurring any obligation to you. \n\nThe performance data and client examples cited are presented for illustrative purposes only. Actual \nperformance results may vary depending on specific configurations and operating conditions. \n\nInformation concerning non-IBM products was obtained from the suppliers of those products, their published \nannouncements or other publicly available sources. IBM has not tested those products and cannot confirm the \naccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the \ncapabilities of non-IBM products should be addressed to the suppliers of those products. \n\nStatements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and \nrepresent goals and objectives only. \n\nThis information contains examples of data and reports used in daily business operations. To illustrate them \nas completely as possible, the examples include the names of individuals, companies, brands, and products. \nAll of these names are fictitious and any similarity to actual people or business enterprises is entirely \ncoincidental. \n\nCOPYRIGHT LICENSE:", - "page_start": 8, - "page_end": 8, - "source_file": "sg248459.pdf" - }, - { - "text": "**O f f e r i n g s**\n\n**N E T W O R K S E R V I C E S**\n\nEuronet’s Network Services division provides \ncomplete solutions for management and outsourcing \nof distribution channels and transaction processing. \nThese solutions include ATM networks, point-of-sale \n(POS) services and card management, as well as \naccess to all major payment gateways and mobile \noperators. \n\nATM, POS and card outsourcing \nEurope’s largest independent ATM owner \nEuronet transaction network - Europe \nDash transaction network - USA \nCakra transaction network - Asia Pacific \n\n**EFT A N D PAY M E N T S S O F T W A R E**\n\nATM management \nBill payment \nCredit card solutions \nDebit card management \nEMV support \nPOS and merchant management \nSwitching and settlement software \nTelephone banking \nEuronet’s suite of EFT and payment software offers \none of the most secure, seamlessly integrated, \nreal-time solutions for financial institutions. \nIntegration is essential for delivering data and \nelectronic transactions for multiple touchpoints, such \nas ATMs, POS devices, interactive voice response \n(IVR) systems, Internet and mobile devices. \n\n**M O B I L E O P E R AT O R S O L U T I O N S**\n\nBank account access \n(cid:1) Mobile phone recharge \n\nWith mobile phone ownership at an all time high, \nEuronet’s mobile operator solutions provide their \ncustomers easy access to payment options. Our \ntransactions expertise helps mobile operators supply \nconsumers with the convenience of any time, any \nplace transactions. \n\n\n\n\n\n**M- & E-COMMERCE SOLUTIONS**\n\nConsumers are expecting more personalized service \nthan ever before with instant access to financial \naccount information. Euronet’s Account Access \nand Event Messaging products meet these demands \nwith secure, efficient, integrated transaction and \ninformation delivery functions via mobile devices \nand the Internet. \n\nAccount access \nBill payment \nePOS \nEvent messaging service \nInternet banking \n\n**P R O F E S S I O N A L S E R V I C E S**\n\nDesign \nGap analysis \nImplementation \n\nEuronet Worldwide is uniquely qualified to offer \nprofessional consulting services because of our \nday-to-day expertise as a secure transaction \nprovider. Euronet’s Professional Services \nOrganization (PSO) supports institutions with \nEDGE, our proprietary, structured and phased \nmethodology for implementing solutions. \n(cid:1) Management \nPlanning \nPurchasing", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**2. Click on “Providing Data”, then on sub-menu “Practical Guide”**\n\nSystem displays a separate page with information on how to provide data to the Portal. This page \nmainly addresses the**suppliers**(harvested portals) of the data and metadata.", - "page_start": 10, - "page_end": 10, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - } - ] - }, - { - "references": { - "source_file": "Publicdomain.pdf", - "query": "What are the two distinct public domain tools support by Creative Commons ?", - "target_page": 1, - "target_passage": "Creative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. \n\nPublic domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright \n\nThe CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
\n\nWorks marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 \nInternational License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and \nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to \nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver \n(http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. \n\n\n\n“The Pillars of Creation” by \nJames Webb Space Telescope \nis licensed under CC BY 2.0.", - "page_start": 8, - "page_end": 8, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 \n\n See e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary \n16 \nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper \nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. \nAccessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, \nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?”*The Atlantic*, 18 Mar. \n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century- \navailable-as-ebooks/284486/. See also “Google Book Search Settlement and Access to Out of Print \nBooks.”*Google Public Policy Blog*, publicpolicy.googleblog.com/2009/06/google-book-search- \nsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class- \naction settlement between Google, the Authors Guild, and the Association of American Publishers). \nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying \nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at https:// \nweb.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ \ngoogle_final_approval_support.pdf. The Authors Guild and Association of American Publishers also \njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding \ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly \n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether \nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out- \nof-print works anyway — see this brief at https://web.archive.org/web/20130112060213/http:// \nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_of_law.pdf. \n\n In the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce \n\n17 \nworks and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These \nprovisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-of- \ncommerce works or other subject matter permanently in their collections\". The limitation to non- \ncommercial purposes means that works made available under these provisions would be of limited use \nin building a books data commons.", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "Publicdomain.pdf", - "query": "What is Creative Commons ?", - "target_page": 1, - "target_passage": " Creative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed1.pdf" - }, - { - "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. \n\nPublic domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright \n\nThe CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
\n\nWorks marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 \nInternational License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and \nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to \nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver \n(http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. \n\n\n\n“The Pillars of Creation” by \nJames Webb Space Telescope \nis licensed under CC BY 2.0.", - "page_start": 8, - "page_end": 8, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**About this**\n**Open Work**\n\n\"Kaleidoscope\" by \ndocoverachiever is \nlicensed under CC \nBY 2.0.", - "page_start": 0, - "page_end": 0, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - } - ] - }, - { - "references": { - "source_file": "Publicdomain.pdf", - "query": "How to apply the PDM to my work ?", - "target_page": 1, - "target_passage": "Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "3. You can enter the license key either by typing it, pasting it, or clicking the folder icon and \nuploading the license key file to the storage system that was downloaded from DSFA. In \nFigure 12-18, the sample key is entered. Click**Activate**.", - "page_start": 639, - "page_end": 639, - "source_file": "sg247938.pdf" - }, - { - "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. \n\nPublic domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright \n\nThe CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
\n\nWorks marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "**E-mail address**\nPlease provide a valid e-mail address that you check on a regular \nbasis, as we’ll be using this address to communicate with you \nthroughout your studies. \n**Occupation**\nRefers to your current job (if you are employed). If you are \nunemployed, you can simply write “unemployed” or “not applicable”. \n**Delivery address**\nRefers to the address at which you want your study material to be \ndelivered. The reason why we prefer you to select your work address \nis so that there will always be someone available to receive your \nstudy material, even if you are not there when the courier arrives.", - "page_start": 22, - "page_end": 22, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "11.Enter the contact details of the person to be contacted to resolve issues on the system. \n\nYou can choose to enter the contact information for a 24-hour operations desk. \nFigure 4-17 shows some details as an example only. Click**Apply and Next**.", - "page_start": 124, - "page_end": 124, - "source_file": "sg247938.pdf" - }, - { - "text": "**Navigate with ease**\nUse the sidebar to manage long or \ncomplex documents.", - "page_start": 0, - "page_end": 0, - "source_file": "Word QS.pdf" - }, - { - "text": "**2. Click on “Providing Data”, then on sub-menu “Practical Guide”**\n\nSystem displays a separate page with information on how to provide data to the Portal. This page \nmainly addresses the**suppliers**(harvested portals) of the data and metadata.", - "page_start": 10, - "page_end": 10, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "2. The second possiblity is a manual selection of a geographical area. The users first clicks on \nthe grey square and the map enlarges automatically. Then, the user clicks on the “Pencil” \nbutton and selects an area by drawing a rectangle over the desired location with the mouse \n(here: Spain). The filtering is applied by clicking on “Apply”.", - "page_start": 31, - "page_end": 31, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "***Figure 46. Completeness screen – Example***", - "page_start": 31, - "page_end": 31, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**A.7 Scaling the deployment**\n\nComplete the following steps: \n1. From the Application Console view, select**Applications**→**Deployments**. \n\n2. Select**app1**from the list of deployments, as shown in Figure A-19.", - "page_start": 229, - "page_end": 229, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia4.pdf", - "query": "Which rivers flow through Lyon?", - "target_page": 1, - "target_passage": "It is located at the confluence of the rivers Rhône and Saône, ", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]Population of Lyon ( metropolis ) ( 59 communes, within 2020 borders )\n
YearPgp2#%. p. a.YearPgp.#%. p. a.YearP. gp.#%. p. a.
1861418.5151906627.073+ 0.60 %19681.077.794+ 2.17 %
1866427.522+ 0.43 %1911629.931+ 0.09 %19751.153.402+ 0.98 %
1872426.552− 0.04 %1921659.007+ 0.45 %19821.138.718− 0.18 %
1876453.540+ 1.37 %1926691.446+ 0.97 %19901.166.797+ 0.30 %
1881493.778+ 1.66 %1931743.297+ 1.46 %19991.199.589+ 0.31 %
1886527.621+ 1.47 %1936738.220− 0.14 %20101.296.166+ 0.72 %
1891566.115+ 1.46 %1946746.062+ 0.11 %20151.370.678+ 1.12 %
1896600.881+ 1.21 %1954790.662+ 0.71 %20211.424.069+ 0.64 %
1901608.856+ 0.26 %1962947.569+ 2.34 %
", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "\n \n \n \n \n [html]Climate data for Lyon [ LYN ], elevation : 157 m ( 646 ht ), 1993 – 2020 normals, extremes 1920 – presentMonthJanFebMarAprMay\n
JunJulAugSepOctNovDecYearRecord high ° C (° F )19.1 ( 66.4 )21.9 ( 71.4 )26.0 ( 78.8 )30.1 ( 86.2 )34.2 ( 93.6 )
38.4 ( 101.1 )40.4 ( 104.7 )41.4 ( 106.5 )35.8 ( 96.4 )28.4 ( 83.1 )23.0 ( 73.4 )20.2 ( 68.4 )41.4 ( 106.5 )Mean daily maximum ° C (° F )7.1 ( 44.8 )9.0 ( 48.2 )13.8 ( 56.8 )17.4 ( 63.3 )21.5 ( 70.7 )
25.6 ( 78.1 )28.2 ( 82.8 )28.0 ( 82.4 )23.1 ( 73.6 )17.7 ( 63.9 )11.4 ( 52.5 )7.7 ( 45.9 )17.5 ( 63.5 )Daily mean ° C (° F )4.1 ( 39.4 )5.2 ( 41.4 )9.0 ( 48.2 )12.3 ( 54.1 )16.3 ( 61.3 )
20.3 ( 68.5 )22.6 ( 72.7 )22.3 ( 72.1 )17.9 ( 64.2 )13.7 ( 56.7 )8.1 ( 46.6 )4.8 ( 40.6 )13.0 ( 55.4 )Mean daily minimum ° C (° F )1.1 ( 34.0 )1.4 ( 34.5 )4.2 ( 39.6 )7.2 ( 45.0 )11.2 ( 52.2 )
15.0 ( 59.0 )17.0 ( 62.6 )16.6 ( 61.9 )12.8 ( 55.0 )9.6 ( 49.3 )4.9 ( 40.8 )2.0 ( 35.6 )8.6 ( 47.5 )Record low ° C (° F )− 23.0 (− 9.4 )− 22.5 (− 8.5 )− 10.5 ( 13.1 )− 4.4 ( 24.1 )− 3.8 ( 25.2 )
2.3 ( 36.1 )6.1 ( 43.0 )4.6 ( 40.3 )0.2 ( 32.4 )− 4.5 ( 23.9 )− 9.4 ( 15.1 )− 24.6 (− 12.3 )− 24.6 (− 12.3 )Average precipitation mm ( inches )49.8 ( 1.96 )41.6 ( 1.64 )49.4 ( 1.94 )68.9 ( 2.71 )80.9 ( 3.19 )
74.1 ( 2.92 )67.4 ( 2.65 )65.5 ( 2.58 )82.5 ( 3.25 )99.8 ( 3.93 )87.2 ( 3.43 )53.7 ( 2.11 )820.8 ( 32.31 )Average precipitation days (≥ 1.0 mm )8.17.98.49.010.3
8.57.57.27.39.99.49.2102.8Mean monthly sunshine hours71.1102.4173.7197.7223.8
256.5288.1263.1204.1131.478.958.72.049.5Source 1 : Meteo France [ 49 ]Source 2 : Meteo Lyon [ 4 ]
", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia4.pdf" - }, - { - "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu \n\n\n\n\n\n\n\n\n\n\n\n\n\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of \nan archbishopric whose holder bears the title of Primate of the Gauls. \nLyon became a major economic hub during the Renaissance. The city is \nrecognised for its cuisine and gastronomy, as well as historical and \narchitectural landmarks; as such, the districts of Old Lyon, the Fourvière \nhill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on \nthe UNESCO World Heritage List. Lyon was historically an important \narea for the production and weaving of silk. Lyon played a significant \nrole in the history of cinema since Auguste and Louis Lumière invented \nthe cinematograph there. The city is also known for its light festival, the \nFête des lumières, which begins every 8 December and lasts for four \ndays, earning Lyon the title of \"Capital of Lights\". \n\nis a major centre for banking, chemical, \nEconomically, Lyon \npharmaceutical and biotech industries. The city contains a significant \nsoftware industry with a particular focus on video games; in recent years \nit has fostered a growing local start-up sector.[17] The home of renowned \nuniversities and higher education schools, Lyon is the second-largest \nstudent city in France, with a university population of nearly 200,000 \nstudents within the Metropolis of Lyon.[18] Lyon hosts the international \nheadquarters of Interpol, the International Agency for Research on \nCancer, as well as Euronews. According to the Globalization and World \nRankings Research Institute, Lyon is considered a Beta city, as of \n2018.[19] It ranked second in France and 40th globally in Mercer's 2019 \nliveability rankings.[20] \n\nFlag \nCoat of arms \n\nMotto(s):*Avant, avant, Lion le melhor*\n(old Franco-Provençal for \"Forward, forward, \nLyon the best\")[a] \n*Virtute duce, comite fortuna*\n(\"With virtue as guide and fortune as \ncompanion\")[b] \n\n**Location of Lyon**", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "**Climate**\n\nLyon has a humid subtropical climate (Köppen:*Cfa*), bordering an oceanic climate \n(*Köppen*:*Cfb*, Trewartha:*Do*).[38] The mean temperature in Lyon in the coldest month \nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F). \nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter \nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13 \nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22 \nDecember 1938.[39]", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Lyon is served by the Eurolines intercity coach organisation. Its Lyon terminal is \nlocated at the city's Perrache railway station, which serves as an intermodal \ntransportation hub for tramways, local and regional trains and buses, the terminus of \nMetro line A, of the Tramway T2, the bicycle service Vélo'v, and taxis.[77] \n\n\n\n\n\nThe Transports en commun lyonnais (TCL), Lyon's public transit system, consisting \nof metro, tramways and buses, serves 62 communes of the Lyon metropolis.[78][79] \nThe metro network has four lines (A, B, C and D), 42 stations, and runs with a \nfrequency of up to a train every 2 minutes. There are eight Lyon tram lines since \nnovember 2020: T1 from*Debourg*in the south to*IUT-Feyssine*in the north, Tram T2 \nfrom*Hôtel de région Montrochet*to Saint-Priest in the south-east, Tram T3 from Part- \nDieu to Meyzieu, Tram T4 from 'Hôptial Feyzin Venissieux' to La Doua Gaston \nBerger. Tram T5 from Grange Blanche, in the south-east to Eurexpo in the south-west. \nTram T6 from Debourg, in the south to Hôpitaux Est-Pinel in the east. Tram T7 from \nVaux-en-Velin la soie, in the north-east to Décines – OL Vallée in the east.[79] And \nRhône Express tramline from Part-Dieu to Lyon–Saint-Exupéry Airport.[80][81] The \nLyon bus network consists of the Lyon trolleybus system, motorbuses, and coaches \nfor areas outside the centre. There are also two funicular lines from Vieux Lyon to \nSaint-Just and Fourvière. The ticketing system is relatively simple as the city has only \none public transport operator, the SYTRAL. \n\n\n\nThe public transit system was complemented in 2005 by*Vélo'v*, a bicycle network \nproviding a low-cost bicycle-hire service made up of 340 stations throughout the city. \nBorrowing a bicycle for less than 30 minutes is free. Free rental time can be extended \nfor another 30 minutes at any station. Lyon was the first city in France to introduce \nthis bicycle renting system. In 2011 the Auto'lib car rental service was introduced; it \nworks much the same way as the Velo'v but for cars. \n\nVelo'v, Ennemond Fousseret square \n(Old Lyon) \n\nThe average amount of time people spend commuting with public transit in Lyon on a \nweekday is 45 minutes. The average amount of time people wait at a stop or station \nfor public transit is 11 min, while 17% of riders wait for over 20 minutes on average \nevery day. The average distance people usually ride in a single trip with public transit \nis 4.7 km, while 4% travel for over 12 km in a single direction.[82] \n\n**International relations**\n\n\n \n \n \n \n [html]\n
Patientsis a pilot city of the Cou
StateStatistics
StateStatistics
TableControl
TableCarbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbi
", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia4.pdf" - }, - { - "text": "77. \"Eurolines - Lyon Tourist Office\" (https://en.visiterlyon.com/stay/access-come-and-move-in-lyon/transport-and- \ntransfers/eurolines).*en.visiterlyon.com*. Retrieved 28 January 2024. \n\n78. \"Le réseau TCL | TCL\" (https://www.tcl.fr/a-propos-de-tcl/le-reseau-tcl).*www.tcl.fr*. Retrieved 28 January 2024. \n79. \"Plan interactif - Carte de Lyon et ses environs | TCL\" (https://www.tcl.fr/se-deplacer/plan-interactif). \n*www.tcl.fr*. Retrieved 28 January 2024. \n\n80. \"Discover the service | Rhônexpress\" (https://www.rhonexpress.fr/en_GB/discover-the-service). \n*www.rhonexpress.fr*. Retrieved 28 January 2024. \n\n81. \"RhônExpress\" (https://www.railway-technology.com/projects/rhonexpress/).*Railway Technology*. Retrieved \n28 January 2024. \n\n82. \"Lyon Public Transportation Statistics\" (https://moovitapp.com/insights/en/Moovit_Insights_Public_Transit_Ind \nex_France_Lyon-3483). Global Public Transit Index by Moovit. Retrieved 19 June 2017. \n Material was \ncopied from this source, which is available under a Creative Commons Attribution 4.0 International License (ht \ntps://creativecommons.org/licenses/by/4.0/). \n\n83. Council of Europe (2011). \"Intercultural city: Lyon, France\" (http://www.coe.int/t/dg4/cultureheritage/culture/Citi \nes/lyon_en.asp).*coe.int*. Retrieved 22 May 2011. \n\n84. \"Jumelage\" (http://www.economie.grandlyon.com/tous-les-partenariats-internationaux-villes.html). \n*economie.grandlyon.com*(in French). Grand Lyon économie. Retrieved 14 November 2019. \n\n85. \"World Trade Center Saint Louis\" (https://worldtradecenter-stl.com/st-louis-sister-cities-program/lyon-france/). \n*worldtradecenter-stl.com*. World Trade Center Saint Louis. Retrieved 18 May 2020. \n\n**External links**\n\nOfficial website (http://www.lyon.fr)(in French) \nVisit Lyon, the official website for tourism in France (https://en.visiterlyon.com/) \nLyon’s English Language News and Information (https://thisislyon.fr/) \nRues de Lyon (https://www.ruesdelyon.net/) Streets, Places, Monuments (in French) \n\nOld maps of Lyon (http://historic-cities.huji.ac.il/france/lyon/lyon.html) Archived (https://web.archive.org/we \nb/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html) 16 January 2021 at the Wayback \nMachine, Historic cities site (http://historic-cities.huji.ac.il/historic_cities.html) Archived (https://web.archive. \norg/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html) 25 March 2022 at the Wayback \nMachine, The National Library of Israel \n\nRetrieved from \"https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203\"", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[html]Climate data for Lyon (≥ 3 %), elevation : 201 m, 1961 – 1990 normals and extremesMonthJanFebMarAprMayJunJulAugSepOctNovDecYearRecord high ° C (° F )16.3 ( 61.3 )21.4 ( 70.5 )25.7 ( 78.3 )28.0 ( 82.4 )29.4 ( 84.9 )34.4 ( 93.9 )39.8 ( 103.6 )37.1 ( 98.8 )33.8 ( 92.8 )28.4 ( 83.1 )22.6 ( 72.7 )20.2 ( 68.4 )39.8 ( 103.6 )Mean maximum ° C (° F )10.2 ( 50.4 )14.4 ( 57.9 )15.9 ( 60.6 )18.6 ( 65.5 )23.1 ( 73.6 )28.8 ( 83.8 )32.8 ( 91.0 )28.1 ( 82.6 )27.3 ( 81.1 )19.7 ( 67.5 )14.1 ( 57.4 )9.5 ( 49.1 )32.8 ( 91.0 )Mean daily maximum ° C (° F )6.1 ( 43.0 )8.2 ( 46.8 )11.6 ( 52.9 )15.2 ( 59.4 )19.1 ( 66.4 )22.9 ( 73.2 )26.1 ( 79.0 )26.0 ( 78.8 )22.4 ( 72.3 )17.1 ( 62.8 )10.0 ( 50.0 )6.4 ( 43.5 )15.9 ( 60.7 )Daily mean ° C (° F )3.0 ( 37.4 )4.9 ( 40.8 )7.4 ( 45.3 )10.2 ( 50.4 )14.0 ( 57.2 )17.6 ( 63.7 )20.6 ( 69.1 )20.0 ( 68.0 )17.1 ( 62.8 )12.7 ( 54.9 )6.7 ( 44.1 )3.9 ( 39.0 )11.5 ( 52.7 )Mean daily minimum ° C (° F )0.2 ( 32.4 )1.4 ( 34.5 )2.9 ( 37.2 )5.2 ( 41.4 )9.1 ( 48.4 )12.5 ( 54.5 )14.8 ( 58.6 )14.4 ( 57.9 )11.7 ( 53.1 )8.3 ( 46.9 )3.5 ( 38.3 )0.7 ( 33.3 )7.1 ( 44.7 )Mean minimum ° C (° F )− 7.0 ( 19.4 )− 4.7 ( 23.5 )− 1.4 ( 29.5 )3.2 ( 37.8 )7.6 ( 45.7 )10.9 ( 51.6 )13.1 ( 55.6 )12.9 ( 55.2 )8.1 ( 46.6 )4.5 ( 40.1 )1.0 ( 33.8 )− 4.7 ( 23.5 )− 7.0 ( 19.4 )Record low ° C (° F )− 23.0 (− 9.4 )− 19.3 (− 2.7 )− 10.5 ( 13.1 )− 3.2 ( 26.2 )− 0.3 ( 31.5 )3.6 ( 38.5 )6.1 ( 43.0 )5.2 ( 41.4 )1.9 ( 35.4 )− 3.2 ( 26.2 )− 7.1 ( 19.2 )− 16.0 ( 3.2 )− 23.0 (− 9.4 )Average precipitation mm ( inches )54.0 ( 2.13 )53.8 ( 2.12 )72.2 ( 2.84 )56.1 ( 2.21 )72.6 ( 2.86 )73.2 ( 2.88 )54.5 ( 2.15 )71.6 ( 2.82 )53.2 ( 2.09 )56.2 ( 2.21 )68.0 ( 2.68 )55.8 ( 2.20 )741.2 ( 29.19 )Average precipitation days (≥ 1.0 mm )10.49.39.79.610.98.26.88.27.38.58.99.8107.6Average snowy days5.53.92.51.10.00.00.00.00.00.02.04.619.6Average relative humidity (%)84807471727065707682848676Mean monthly sunshine hours62.689.8147.5184.2215.9250.9292.6259.0208.1134.375.355.41.975.6Percent possible", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Further down, in the current Saint-Vincent district, was the Gallic \nvillage of Condate, probably a simple hamlet of sailors or fishermen \nliving on the banks of the Saône.*Condate*is a Gallic word meaning \n\"confluence\", from which the Confluence district gets its name. \n\nIn Roman times the city was called*Caput Galliæ*, meaning \"capital of \nthe Gauls\". As an homage to this title, the Archbishop of Lyon is still \ncalled the Primate of Gaul. \n\nDuring the revolutionary period, Lyon was renamed*Commune-*\n*Affranchie*(\"Emancipated Commune\") on 12 October 1793 by a decree \nof the Convention Nationale. It resumed its name in 1794, after the end \nof the Terror. \n\nLyon is called*Liyon*in Franco-Provençal.[24] \n\n\n \n \n \n \n [html]Coordinates : 45 ° 46 ′ N 4 ° 50 ′ E\n
Countryh the Regionwere | MetropolisTh0EranceAuvergne - Rh0ne - AlpesLyon MetropolisLyon
Subdivisions — f the Government • Mayor ( 2020 – ulish9 arrondissements
Gregory Doucet [ g ] ( EELV )Area1have | • Urban ( 2020 [ 3 ])( hill - 1
47.87 km2 ( 18.48 sq mi ) 1.141.4 km2 ( 440.7 sq mi )4.605.8 km2 ( 1.778.3 sq mi )
• the • Radium ( 202.)• Rank • Density • the • Urban ( Jan. hose ≥ 02 : 1 %)• the520.7743rd in France11.000 / km2
( 28.000 / sq mi ) 1.702.9211.500 / km2 ( 3.900 / sq mi ) 2.308.818
\n\n**Ancient Lyon**", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia4.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
nd• Metro density
500 / km2 ( 1.300 / sq mi )Time zone • Summer ( DS )
UTC + 01 : 00 ( CET ) UTC + 02 : 00 ( CESTINSEE / Postal code
69123 ( https :// www. insee. fr / fr / statistiques / 14055997geo = COM - 69123 )/ 69001 - 69009
2012Elevation
\n\n**1**French Land Register data, which excludes \nlakes, ponds, glaciers > 1 km2 (0.386 sq mi or \n247 acres) and river estuaries. \n\n\n\n**Modern Lyon**\n\n**Timeline of Lyon**\n**Historical affiliations**\n\n Roman Empire (Gallia Lugdunensis), 43 \n\nBC-286 \n\nFernand Braudel \nremarked, \n\"Historians of Lyon are not \nthe bi- \nsufficiently aware of \npolarity between Paris and Lyon, \nwhich is a constant structure in \nFrench development...from \nthe \nlate Middle Ages to the Industrial \nRevolution\".[31] In the late 15th century, the fairs introduced by Italian \nmerchants made Lyon the economic counting house of France. Even the \n*Bourse*(treasury), built in 1749, resembled a public bazaar where \naccounts were settled in the open air. When international banking moved \nto Genoa, then Amsterdam, Lyon remained the banking centre of \nFrance. \n\n Western Roman Empire (Gallia \n\nLugdunensis), 286-411 \n\n Kingdom of the Burgundians, 411–534 \n Francia, 534–843 \n Middle Francia, 843–855 \n Lotharingia, 855–879 \n Lower Burgundy, 879-933 \n Kingdom of Arles, 933–1312 \n Kingdom of France (Lyonnais), 1312– \n\nThe Roman-era Theatre on the \nFourvière Hill \n\n1792 \n\nDuring the Renaissance, the city's development was driven by the silk \ntrade, which strengthened its ties to Italy. Italian influence on Lyon's \narchitecture is still visible among historic buildings.[32] In the late 1400s \nand 1500s Lyon was also a key centre of literary activity and book \npublishing, both of French writers (such as Maurice Scève, Antoine \nHeroet, and Louise Labé) and of Italians in exile (such as Luigi \nAlamanni and Gian Giorgio Trissino). \n\n\n\n French First Republic, 1792–1793 \n Counter-revolutionary, 1793 \n French First Republic, 1793–1804 \n First French Empire, 1804–1814 \n Kingdom of France, 1814–1815 \n First French Empire, 1815 \n Kingdom of France, 1815–1830 \n Kingdom of France, 1830–1848 \n French Second Republic, 1848–1852 \n Second French Empire, 1852–1870 \n French Third Republic, 1870–1940 \n Vichy France, 1940–1944 \n French Fourth Republic, 1944–1958 \n France, 1958–present \n\nIn 1572, Lyon was a scene of mass violence by Catholics against \nProtestant Huguenots in the St. Bartholomew's Day Massacre. Two \ncenturies later, Lyon was again convulsed by violence during the French \nRevolution, when the citizenry rose up against the National Convention \nand supported the Girondins. The city was besieged by Revolutionary armies for over \ntwo months before it surrendered in October 1793. Many buildings were destroyed, \nespecially around the Place Bellecour, and Jean-Marie Collot d'Herbois and Joseph \nFouché administered the execution of more than 2,000 people. The Convention \nordered that its name be changed to \"Liberated City\", and a plaque was erected that \nproclaimed \"Lyons made war on Liberty; Lyons no longer exists\". A decade later, \nNapoleon ordered the reconstruction of all the buildings demolished during that \nperiod. \nLyon under siege in 1793", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia4.pdf" - }, - { - "text": "2nd arrondissement: Cordeliers, Bellecour, Ainay, Perrache, Confluence, Sainte- \nBlandine \n3rd arrondissement: Guillotière (north), Préfecture, Part-Dieu, Villette, \nDauphiné/Sans Souci, Montchat, Grange Blanche (north), Monplaisir (north) \n4th arrondissement: Plateau de la Croix-Rousse, Serin \n5th arrondissement: Vieux Lyon (Saint-Paul, Saint-Jean, Saint-Georges), Saint-Just, \nSaint-Irénée,[44] Fourvière, Point du Jour, Ménival, Battières, Champvert (south) \n6th arrondissement: Brotteaux, Bellecombe, Parc de la Tête d'or, Cité Internationale \n7th arrondissement: Guillotière (south), Jean Macé, Gerland \n8th arrondissement: Monplaisir (south), Bachut, États-Unis, Grand Trou/Moulin à \nVent, Grange Blanche (south), Laënnec, Mermoz, Monplaisir-la-Plaine \n9th arrondissement: Vaise, Duchère, Rochecardon, St-Rambert-l'Île-Barbe, Gorge \nde Loup, Observance, Champvert (north) \n\nTo the west of the Saône, the fifth arrondissement covers the old city of Vieux Lyon, Fourvière hill and the \nplateau beyond. The 9th is immediately to the north, and stretches from Gorge de Loup, through Vaise to the \nneighbouring suburbs of Écully, Champagne-au-Mont-d'Or, Saint-Didier-au-Mont-d'Or, Saint-Cyr-au-Mont-d'Or \nand Collonges-au-Mont-d'Or. \nBetween the two rivers, on the Presqu'île, are the second, first, and fourth arrondissements. The second \nincludes most of the city centre, Bellecour and Perrache railway station, and reaches as far as the confluence \nof the two rivers. The first is directly to the north of the second and covers part of the city centre (including the \nHôtel de Ville) and the slopes of La Croix-Rousse. To the north of the Boulevard is the fourth arrondissement, \nwhich covers the Plateau of La Croix-Rousse, up to its boundary with the commune of Caluire-et-Cuire. \nTo the east of the Rhône, are the third, sixth, seventh, and eighth arrondissements.", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia4.pdf", - "query": "How big was Lyon's population in 2022? ", - "target_page": 2, - "target_passage": "Population (2022) 520,774", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]Population of Lyon ( metropolis ) ( 59 communes, within 2020 borders )\n
YearPgp2#%. p. a.YearPgp.#%. p. a.YearP. gp.#%. p. a.
1861418.5151906627.073+ 0.60 %19681.077.794+ 2.17 %
1866427.522+ 0.43 %1911629.931+ 0.09 %19751.153.402+ 0.98 %
1872426.552− 0.04 %1921659.007+ 0.45 %19821.138.718− 0.18 %
1876453.540+ 1.37 %1926691.446+ 0.97 %19901.166.797+ 0.30 %
1881493.778+ 1.66 %1931743.297+ 1.46 %19991.199.589+ 0.31 %
1886527.621+ 1.47 %1936738.220− 0.14 %20101.296.166+ 0.72 %
1891566.115+ 1.46 %1946746.062+ 0.11 %20151.370.678+ 1.12 %
1896600.881+ 1.21 %1954790.662+ 0.71 %20211.424.069+ 0.64 %
1901608.856+ 0.26 %1962947.569+ 2.34 %
", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "71. \"Statistiques locales - Métropole de Lyon : Intercommunalité-Métropole - Population municipale (historique \n\ndepuis 1876)\" (https://statistiques-locales.insee.fr/#c=indicator&i=pop_depuis_1876.pop&s=2021&selcodgeo= \n200046977&t=A01&view=map4). INSEE. Retrieved 12 July 2024. \n\n72. \"IMG1B - Population immigrée par sexe, âge et pays de naissance en 2020 − Recensement de la population \n\n– Résultats pour toutes les communes, départements, régions, intercommunalités... −Étrangers - Immigrés en \n2020 | Insee\" (https://www.insee.fr/fr/statistiques/7633127?sommaire=7633727&geo=COM-69123).", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia4.pdf" - }, - { - "text": "\n \n \n \n \n [html]Climate data for Lyon [ LYN ], elevation : 157 m ( 646 ht ), 1993 – 2020 normals, extremes 1920 – presentMonthJanFebMarAprMay\n
JunJulAugSepOctNovDecYearRecord high ° C (° F )19.1 ( 66.4 )21.9 ( 71.4 )26.0 ( 78.8 )30.1 ( 86.2 )34.2 ( 93.6 )
38.4 ( 101.1 )40.4 ( 104.7 )41.4 ( 106.5 )35.8 ( 96.4 )28.4 ( 83.1 )23.0 ( 73.4 )20.2 ( 68.4 )41.4 ( 106.5 )Mean daily maximum ° C (° F )7.1 ( 44.8 )9.0 ( 48.2 )13.8 ( 56.8 )17.4 ( 63.3 )21.5 ( 70.7 )
25.6 ( 78.1 )28.2 ( 82.8 )28.0 ( 82.4 )23.1 ( 73.6 )17.7 ( 63.9 )11.4 ( 52.5 )7.7 ( 45.9 )17.5 ( 63.5 )Daily mean ° C (° F )4.1 ( 39.4 )5.2 ( 41.4 )9.0 ( 48.2 )12.3 ( 54.1 )16.3 ( 61.3 )
20.3 ( 68.5 )22.6 ( 72.7 )22.3 ( 72.1 )17.9 ( 64.2 )13.7 ( 56.7 )8.1 ( 46.6 )4.8 ( 40.6 )13.0 ( 55.4 )Mean daily minimum ° C (° F )1.1 ( 34.0 )1.4 ( 34.5 )4.2 ( 39.6 )7.2 ( 45.0 )11.2 ( 52.2 )
15.0 ( 59.0 )17.0 ( 62.6 )16.6 ( 61.9 )12.8 ( 55.0 )9.6 ( 49.3 )4.9 ( 40.8 )2.0 ( 35.6 )8.6 ( 47.5 )Record low ° C (° F )− 23.0 (− 9.4 )− 22.5 (− 8.5 )− 10.5 ( 13.1 )− 4.4 ( 24.1 )− 3.8 ( 25.2 )
2.3 ( 36.1 )6.1 ( 43.0 )4.6 ( 40.3 )0.2 ( 32.4 )− 4.5 ( 23.9 )− 9.4 ( 15.1 )��� 24.6 (− 12.3 )− 24.6 (− 12.3 )Average precipitation mm ( inches )49.8 ( 1.96 )41.6 ( 1.64 )49.4 ( 1.94 )68.9 ( 2.71 )80.9 ( 3.19 )
74.1 ( 2.92 )67.4 ( 2.65 )65.5 ( 2.58 )82.5 ( 3.25 )99.8 ( 3.93 )87.2 ( 3.43 )53.7 ( 2.11 )820.8 ( 32.31 )Average precipitation days (≥ 1.0 mm )8.17.98.49.010.3
8.57.57.27.39.99.49.2102.8Mean monthly sunshine hours71.1102.4173.7197.7223.8
256.5288.1263.1204.1131.478.958.72.049.5Source 1 : Meteo France [ 49 ]Source 2 : Meteo Lyon [ 4 ]
", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia4.pdf" - }, - { - "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu \n\n\n\n\n\n\n\n\n\n\n\n\n\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of \nan archbishopric whose holder bears the title of Primate of the Gauls. \nLyon became a major economic hub during the Renaissance. The city is \nrecognised for its cuisine and gastronomy, as well as historical and \narchitectural landmarks; as such, the districts of Old Lyon, the Fourvière \nhill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on \nthe UNESCO World Heritage List. Lyon was historically an important \narea for the production and weaving of silk. Lyon played a significant \nrole in the history of cinema since Auguste and Louis Lumière invented \nthe cinematograph there. The city is also known for its light festival, the \nFête des lumières, which begins every 8 December and lasts for four \ndays, earning Lyon the title of \"Capital of Lights\". \n\nis a major centre for banking, chemical, \nEconomically, Lyon \npharmaceutical and biotech industries. The city contains a significant \nsoftware industry with a particular focus on video games; in recent years \nit has fostered a growing local start-up sector.[17] The home of renowned \nuniversities and higher education schools, Lyon is the second-largest \nstudent city in France, with a university population of nearly 200,000 \nstudents within the Metropolis of Lyon.[18] Lyon hosts the international \nheadquarters of Interpol, the International Agency for Research on \nCancer, as well as Euronews. According to the Globalization and World \nRankings Research Institute, Lyon is considered a Beta city, as of \n2018.[19] It ranked second in France and 40th globally in Mercer's 2019 \nliveability rankings.[20] \n\nFlag \nCoat of arms \n\nMotto(s):*Avant, avant, Lion le melhor*\n(old Franco-Provençal for \"Forward, forward, \nLyon the best\")[a] \n*Virtute duce, comite fortuna*\n(\"With virtue as guide and fortune as \ncompanion\")[b] \n\n**Location of Lyon**", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[html]Climate data for Lyon (≥ 3 %), elevation : 201 m, 1961 – 1990 normals and extremesMonthJanFebMarAprMayJunJulAugSepOctNovDecYearRecord high ° C (° F )16.3 ( 61.3 )21.4 ( 70.5 )25.7 ( 78.3 )28.0 ( 82.4 )29.4 ( 84.9 )34.4 ( 93.9 )39.8 ( 103.6 )37.1 ( 98.8 )33.8 ( 92.8 )28.4 ( 83.1 )22.6 ( 72.7 )20.2 ( 68.4 )39.8 ( 103.6 )Mean maximum ° C (° F )10.2 ( 50.4 )14.4 ( 57.9 )15.9 ( 60.6 )18.6 ( 65.5 )23.1 ( 73.6 )28.8 ( 83.8 )32.8 ( 91.0 )28.1 ( 82.6 )27.3 ( 81.1 )19.7 ( 67.5 )14.1 ( 57.4 )9.5 ( 49.1 )32.8 ( 91.0 )Mean daily maximum ° C (° F )6.1 ( 43.0 )8.2 ( 46.8 )11.6 ( 52.9 )15.2 ( 59.4 )19.1 ( 66.4 )22.9 ( 73.2 )26.1 ( 79.0 )26.0 ( 78.8 )22.4 ( 72.3 )17.1 ( 62.8 )10.0 ( 50.0 )6.4 ( 43.5 )15.9 ( 60.7 )Daily mean ° C (° F )3.0 ( 37.4 )4.9 ( 40.8 )7.4 ( 45.3 )10.2 ( 50.4 )14.0 ( 57.2 )17.6 ( 63.7 )20.6 ( 69.1 )20.0 ( 68.0 )17.1 ( 62.8 )12.7 ( 54.9 )6.7 ( 44.1 )3.9 ( 39.0 )11.5 ( 52.7 )Mean daily minimum ° C (° F )0.2 ( 32.4 )1.4 ( 34.5 )2.9 ( 37.2 )5.2 ( 41.4 )9.1 ( 48.4 )12.5 ( 54.5 )14.8 ( 58.6 )14.4 ( 57.9 )11.7 ( 53.1 )8.3 ( 46.9 )3.5 ( 38.3 )0.7 ( 33.3 )7.1 ( 44.7 )Mean minimum ° C (° F )− 7.0 ( 19.4 )− 4.7 ( 23.5 )− 1.4 ( 29.5 )3.2 ( 37.8 )7.6 ( 45.7 )10.9 ( 51.6 )13.1 ( 55.6 )12.9 ( 55.2 )8.1 ( 46.6 )4.5 ( 40.1 )1.0 ( 33.8 )− 4.7 ( 23.5 )− 7.0 ( 19.4 )Record low ° C (° F )− 23.0 (− 9.4 )− 19.3 (− 2.7 )− 10.5 ( 13.1 )− 3.2 ( 26.2 )− 0.3 ( 31.5 )3.6 ( 38.5 )6.1 ( 43.0 )5.2 ( 41.4 )1.9 ( 35.4 )− 3.2 ( 26.2 )− 7.1 ( 19.2 )− 16.0 ( 3.2 )− 23.0 (− 9.4 )Average precipitation mm ( inches )54.0 ( 2.13 )53.8 ( 2.12 )72.2 ( 2.84 )56.1 ( 2.21 )72.6 ( 2.86 )73.2 ( 2.88 )54.5 ( 2.15 )71.6 ( 2.82 )53.2 ( 2.09 )56.2 ( 2.21 )68.0 ( 2.68 )55.8 ( 2.20 )741.2 ( 29.19 )Average precipitation days (≥ 1.0 mm )10.49.39.79.610.98.26.88.27.38.58.99.8107.6Average snowy days5.53.92.51.10.00.00.00.00.00.02.04.619.6Average relative humidity (%)84807471727065707682848676Mean monthly sunshine hours62.689.8147.5184.2215.9250.9292.6259.0208.1134.375.355.41.975.6Percent possible", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Lyon is also home to the Lyon Hockey Club, an ice hockey team that competes in \nFrance's national ice hockey league. The Patinoire Charlemagne is the seat of Club \ndes Sports de Glace de Lyon, the club of Olympic ice dancing champions Marina \nAnissina and Gwendal Peizerat, and world champions Isabelle Delobel and Olivier \nShoenfelder.[65] Lyon-Villeurbanne also has a basketball team, ASVEL, that plays at \nthe Astroballe arena. \n\n\n\n**Street art**\n\nSince 2000, Birdy Kids, a group of graffiti artists from the city, has decorated several \nrandom buildings and walls along the Lyon ring road. In 2012, the artist collective \nwas chosen to represent the city as its cultural ambassadors.[66] \n\n**Demographics**\n\nThe population of the city (commune) of Lyon proper was 522,250 at the January 2021 census.[15] As of 2011, 14% of its \npopulation was born outside Metropolitan France.[67] \n\n\n \n \n \n \n [html]Population of Lyon ( commune ) ( within 2020 borders )\n
YearPgp :±% p. a.YearPgp.±%. p. a.YearPgp :±% b. a.
1801101.7601876344.513+ 1.33 %1946464.104+ 0.02 %
1806114.643+ 2.41 %1881378.581+ 1.84 %1954475.343+ 0.29 %
1821149.611+ 1.79 %1886404.172+ 1.45 %1962535.746+ 1.54 %
1831182.668+ 2.02 %1891440.315+ 1.78 %1968527.800− 0.25 %
1836198.683+ 1.60 %1896468.311+ 1.25 %1975456.716− 2.06 %
1841206.670+ 0.79 %1901461.687− 0.29 %1982413.095− 1.42 %
1846238.466+ 2.86 %1906474.652+ 0.56 %1990415.487+ 0.07 %
1851259.220+ 1.68 %1911462.248− 0.53 %1999445.452+ 0.78 %
1856293.743+ 2.66 %1921462.446+ 0.00 %2010484.344+ 0.78 %
1861320.326+ 1.72 %1926463.125+ 0.03 %2015513.275+ 1.17 %
1866325.219+ 0.30 %1931463.647+ 0.02 %2021522.250+ 0.29 %
1872324.590− 0.03 %1936463.061− 0.03 %
\n\nThe city of Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected \nmetropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021.[16]", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "All figures come from population censuses. Figures from 1911 to 1936 (incl.) are computed using the redressed figures for the \ncommune of Lyon calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at \nthe time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and \nremain the 2nd largest city of France ahead of Marseille).[68] The 1906 figure is computed using the figure for the commune of \nLyon published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate \nwas smaller than 10,000. \nSource: EHESS[70] and INSEE[71] \n\n**Foreign-born**\n\n\n\n\n\n\n \n \n \n \n [html]\n
EducationCountry of birthPopulation ( 2020 )
Universities and tertiary educationMinimum Algeria14.779
| Morocco5.245p - value
4.879|| |||| taly3.351
< underline > Intervention 3.068Spain
2.064JHTDR Congo1.520
China1.429Cameroon
1.364< underline > I < underline >< underline >< underline >< underline >< underline >< underline >< underline >< underline >< underline > I < underline > I < und1.198
TableCasesENS Lyon : Rene Descartes campus
andTableSpecimens
", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[html]7. NSEE : “ Stabistiques locales - Lysn Airefattraction dex villes ZIDD - Population municipale 2012 ” ( https :// transfortax btlopse / stockes. insees Microdicatorsfuracodesis. dexis. across & oralizodoxodoxyrolizol, 2 ) RittleistB. Wells, John C. ( 2008 ), Longman Prorunciation Dictionary ( 3rd ed.). Longman. ( SEN 978 - 14058 - 8128 - 3.3. \" Lyons \" ( https :// web. archive. org / web / 2000.224440 / 00ps :// www. lexico. com / definition / lyons ). Lexico UKEnglish Dictionary. Ostocol Unswercip ( Press. Archived from the original : ( Ntz / hww. lexxo. combdefrolione / LycenseDl : 2ones, Dainel ( 2012 ), Roach, Peter, Setter, Bane : Esling, John ( eds.), Cambridge English Pronouncing Dictionary ( 20th ed.), Cambridge University Press. ISBN ITF0 - 3 - 52L - 3525 - 65.1.1. \" Lyon \" ( https :// www. merian = webster. com / dictionary / Lyon ). Merriam - Webster. com Dictionary. Merriam - Webster. Retrieved R August 2013 ).L2. \" Lyons \" ( https :// www. collinodictionary. comilamplemplempletgloh / lycrol. Collins. English Dictionary. HarperCollins. Retrieved 8 August 2018.3. ‘ Beaf3 ’: Relera ’, ‘ Marges ( Roonges unginal - assistandina odicationalscellular - recerum / prilom - care, dyselated user - rapidemicrobial ), abertic clinical, abetylate ( HSB ), per - RED ( GlathGD - ALC ( Label16 ), and Clabella ( SHS14. https :// about - france. com / tourism / main - towns - cities. htmSS 1 NSEE : “ Qualitationales locales : Lysn : Commune, Pspulation maricipale 2012 [ Mtps :// totalstiques - locales. insee. Hirboco - 452.509.5797799.1774.1038370c - midicalol - spop depuls_ 33703. poplace - 202. Δbelcodopro - t93. chiSLT “ Statistiques locales ARItropole do Lysn. Intercommunatile 2012. Propulation municipale ZED2 ” ( https :// statistics logaet - locales. mteet himbon = 45.699.57779.37274_127378.33355778.52778.52920100catorsfuragoga deps27. Types entrepreneursiting, Lysn company, Investal Lysn – Greader Lysnr1 “ Ofteps :// weds. antihive. cognitive. drug / leds / DEDEDEDEDEDEDEDEDEDITID : twwo business, presertivent combined dysplants ( support lysteneurothineum32. “ Cleasement ZEGSB deex willes eludantes les plus importantes en France ” [ Mips :// www. investirimg. hisctualite sictassement ≥ 0.24 - des + silles + studantes - les - its - splus + importantese en - hance. Mij. www. investiriming. It. FLYGaWC - The World According to GaWC - ZILEF ( https :// www. Boro. ac. uk / gaswchwchorotid2028. htmf ). www. Boro. ac. uk.2D. ‘ Quality of Living Chy Ranking I Mercer ’ ( https :// mobilityeschange. mercer. com / hsights / saility - d - living - carkings ), mobilityeschange. mercet. com.22. Mailhes, Francpic, Frist, Cyrile, Flapini, Jeaun - Louis ( 2022 ) Less Miscellaneies desc. des. Lysmnaies [ https :// poutan. frister ], editions du poutan.22. Lysn, child vient ton non? a ( https :// www. lefigans. hflangue - hancaise / expressions - francaises / 2017033030700 > 2327020304497FG0001L3 - 5001451501901.011.0129.01301.0131.0129.001.0131.012.002.001.01332.002.003.0Z3. Pokomy, Julius ( 25th ), Indogermanicches Eymologisches Wotenboth ( in German ), French & Earopean Publications, Inc.24. Stch, Domenico ( 2003 ), Dictionnaire francoprovengal - francais et francais - francairoprovencal ( in French ), Le Carrie, p 120.1 ( SBN 5T0 - 290825025 ).25. Cassius Dis, Roman History, Book 46 : Lepidus and Lucias Plancus [...] Itounded the town called Lugudunum, now known as LugdunumZ6. Louis, Jaucout de chevalier ( DTS5 ), “ Lyon ”, Encyclopedia of Diderot & d ’ Alembert – Collaborative Translation Project. hdf. 2027 / spo. did2222.0000.1259 ( https :// hdl.", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia4.pdf" - }, - { - "text": "**Climate**\n\nLyon has a humid subtropical climate (Köppen:*Cfa*), bordering an oceanic climate \n(*Köppen*:*Cfb*, Trewartha:*Do*).[38] The mean temperature in Lyon in the coldest month \nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F). \nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter \nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13 \nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22 \nDecember 1938.[39]", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia4.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
nd• Metro density
500 / km2 ( 1.300 / sq mi )Time zone • Summer ( DS )
UTC + 01 : 00 ( CET ) UTC + 02 : 00 ( CESTINSEE / Postal code
69123 ( https :// www. insee. fr / fr / statistiques / 14055997geo = COM - 69123 )/ 69001 - 69009
2012Elevation
\n\n**1**French Land Register data, which excludes \nlakes, ponds, glaciers > 1 km2 (0.386 sq mi or \n247 acres) and river estuaries. \n\n\n\n**Modern Lyon**\n\n**Timeline of Lyon**\n**Historical affiliations**\n\n Roman Empire (Gallia Lugdunensis), 43 \n\nBC-286 \n\nFernand Braudel \nremarked, \n\"Historians of Lyon are not \nthe bi- \nsufficiently aware of \npolarity between Paris and Lyon, \nwhich is a constant structure in \nFrench development...from \nthe \nlate Middle Ages to the Industrial \nRevolution\".[31] In the late 15th century, the fairs introduced by Italian \nmerchants made Lyon the economic counting house of France. Even the \n*Bourse*(treasury), built in 1749, resembled a public bazaar where \naccounts were settled in the open air. When international banking moved \nto Genoa, then Amsterdam, Lyon remained the banking centre of \nFrance. \n\n Western Roman Empire (Gallia \n\nLugdunensis), 286-411 \n\n Kingdom of the Burgundians, 411–534 \n Francia, 534–843 \n Middle Francia, 843–855 \n Lotharingia, 855–879 \n Lower Burgundy, 879-933 \n Kingdom of Arles, 933–1312 \n Kingdom of France (Lyonnais), 1312– \n\nThe Roman-era Theatre on the \nFourvière Hill \n\n1792 \n\nDuring the Renaissance, the city's development was driven by the silk \ntrade, which strengthened its ties to Italy. Italian influence on Lyon's \narchitecture is still visible among historic buildings.[32] In the late 1400s \nand 1500s Lyon was also a key centre of literary activity and book \npublishing, both of French writers (such as Maurice Scève, Antoine \nHeroet, and Louise Labé) and of Italians in exile (such as Luigi \nAlamanni and Gian Giorgio Trissino). \n\n\n\n French First Republic, 1792–1793 \n Counter-revolutionary, 1793 \n French First Republic, 1793–1804 \n First French Empire, 1804–1814 \n Kingdom of France, 1814–1815 \n First French Empire, 1815 \n Kingdom of France, 1815–1830 \n Kingdom of France, 1830–1848 \n French Second Republic, 1848–1852 \n Second French Empire, 1852–1870 \n French Third Republic, 1870–1940 \n Vichy France, 1940–1944 \n French Fourth Republic, 1944–1958 \n France, 1958–present \n\nIn 1572, Lyon was a scene of mass violence by Catholics against \nProtestant Huguenots in the St. Bartholomew's Day Massacre. Two \ncenturies later, Lyon was again convulsed by violence during the French \nRevolution, when the citizenry rose up against the National Convention \nand supported the Girondins. The city was besieged by Revolutionary armies for over \ntwo months before it surrendered in October 1793. Many buildings were destroyed, \nespecially around the Place Bellecour, and Jean-Marie Collot d'Herbois and Joseph \nFouché administered the execution of more than 2,000 people. The Convention \nordered that its name be changed to \"Liberated City\", and a plaque was erected that \nproclaimed \"Lyons made war on Liberty; Lyons no longer exists\". A decade later, \nNapoleon ordered the reconstruction of all the buildings demolished during that \nperiod. \nLyon under siege in 1793", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia4.pdf", - "query": "What is the climate in Lyon ?", - "target_page": 5, - "target_passage": " Lyon has a humid subtropical climate ( Köppen: Cfa), bordering an oceanic climate (Köppen: Cfb, Trewartha: Do).", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Climate**\n\nLyon has a humid subtropical climate (Köppen:*Cfa*), bordering an oceanic climate \n(*Köppen*:*Cfb*, Trewartha:*Do*).[38] The mean temperature in Lyon in the coldest month \nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F). \nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter \nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13 \nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22 \nDecember 1938.[39]", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia4.pdf" - }, - { - "text": "\n \n \n \n \n [html]Climate data for Lyon [ LYN ], elevation : 157 m ( 646 ht ), 1993 – 2020 normals, extremes 1920 – presentMonthJanFebMarAprMay\n
JunJulAugSepOctNovDecYearRecord high ° C (° F )19.1 ( 66.4 )21.9 ( 71.4 )26.0 ( 78.8 )30.1 ( 86.2 )34.2 ( 93.6 )
38.4 ( 101.1 )40.4 ( 104.7 )41.4 ( 106.5 )35.8 ( 96.4 )28.4 ( 83.1 )23.0 ( 73.4 )20.2 ( 68.4 )41.4 ( 106.5 )Mean daily maximum ° C (° F )7.1 ( 44.8 )9.0 ( 48.2 )13.8 ( 56.8 )17.4 ( 63.3 )21.5 ( 70.7 )
25.6 ( 78.1 )28.2 ( 82.8 )28.0 ( 82.4 )23.1 ( 73.6 )17.7 ( 63.9 )11.4 ( 52.5 )7.7 ( 45.9 )17.5 ( 63.5 )Daily mean ° C (° F )4.1 ( 39.4 )5.2 ( 41.4 )9.0 ( 48.2 )12.3 ( 54.1 )16.3 ( 61.3 )
20.3 ( 68.5 )22.6 ( 72.7 )22.3 ( 72.1 )17.9 ( 64.2 )13.7 ( 56.7 )8.1 ( 46.6 )4.8 ( 40.6 )13.0 ( 55.4 )Mean daily minimum ° C (° F )1.1 ( 34.0 )1.4 ( 34.5 )4.2 ( 39.6 )7.2 ( 45.0 )11.2 ( 52.2 )
15.0 ( 59.0 )17.0 ( 62.6 )16.6 ( 61.9 )12.8 ( 55.0 )9.6 ( 49.3 )4.9 ( 40.8 )2.0 ( 35.6 )8.6 ( 47.5 )Record low ° C (° F )− 23.0 (− 9.4 )− 22.5 (− 8.5 )− 10.5 ( 13.1 )− 4.4 ( 24.1 )− 3.8 ( 25.2 )
2.3 ( 36.1 )6.1 ( 43.0 )4.6 ( 40.3 )0.2 ( 32.4 )− 4.5 ( 23.9 )− 9.4 ( 15.1 )− 24.6 (− 12.3 )− 24.6 (− 12.3 )Average precipitation mm ( inches )49.8 ( 1.96 )41.6 ( 1.64 )49.4 ( 1.94 )68.9 ( 2.71 )80.9 ( 3.19 )
74.1 ( 2.92 )67.4 ( 2.65 )65.5 ( 2.58 )82.5 ( 3.25 )99.8 ( 3.93 )87.2 ( 3.43 )53.7 ( 2.11 )820.8 ( 32.31 )Average precipitation days (≥ 1.0 mm )8.17.98.49.010.3
8.57.57.27.39.99.49.2102.8Mean monthly sunshine hours71.1102.4173.7197.7223.8
256.5288.1263.1204.1131.478.958.72.049.5Source 1 : Meteo France [ 49 ]Source 2 : Meteo Lyon [ 4 ]
", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[html]Climate data for Lyon (≥ 3 %), elevation : 201 m, 1961 – 1990 normals and extremesMonthJanFebMarAprMayJunJulAugSepOctNovDecYearRecord high ° C (° F )16.3 ( 61.3 )21.4 ( 70.5 )25.7 ( 78.3 )28.0 ( 82.4 )29.4 ( 84.9 )34.4 ( 93.9 )39.8 ( 103.6 )37.1 ( 98.8 )33.8 ( 92.8 )28.4 ( 83.1 )22.6 ( 72.7 )20.2 ( 68.4 )39.8 ( 103.6 )Mean maximum ° C (° F )10.2 ( 50.4 )14.4 ( 57.9 )15.9 ( 60.6 )18.6 ( 65.5 )23.1 ( 73.6 )28.8 ( 83.8 )32.8 ( 91.0 )28.1 ( 82.6 )27.3 ( 81.1 )19.7 ( 67.5 )14.1 ( 57.4 )9.5 ( 49.1 )32.8 ( 91.0 )Mean daily maximum ° C (° F )6.1 ( 43.0 )8.2 ( 46.8 )11.6 ( 52.9 )15.2 ( 59.4 )19.1 ( 66.4 )22.9 ( 73.2 )26.1 ( 79.0 )26.0 ( 78.8 )22.4 ( 72.3 )17.1 ( 62.8 )10.0 ( 50.0 )6.4 ( 43.5 )15.9 ( 60.7 )Daily mean ° C (° F )3.0 ( 37.4 )4.9 ( 40.8 )7.4 ( 45.3 )10.2 ( 50.4 )14.0 ( 57.2 )17.6 ( 63.7 )20.6 ( 69.1 )20.0 ( 68.0 )17.1 ( 62.8 )12.7 ( 54.9 )6.7 ( 44.1 )3.9 ( 39.0 )11.5 ( 52.7 )Mean daily minimum ° C (° F )0.2 ( 32.4 )1.4 ( 34.5 )2.9 ( 37.2 )5.2 ( 41.4 )9.1 ( 48.4 )12.5 ( 54.5 )14.8 ( 58.6 )14.4 ( 57.9 )11.7 ( 53.1 )8.3 ( 46.9 )3.5 ( 38.3 )0.7 ( 33.3 )7.1 ( 44.7 )Mean minimum ° C (° F )− 7.0 ( 19.4 )− 4.7 ( 23.5 )− 1.4 ( 29.5 )3.2 ( 37.8 )7.6 ( 45.7 )10.9 ( 51.6 )13.1 ( 55.6 )12.9 ( 55.2 )8.1 ( 46.6 )4.5 ( 40.1 )1.0 ( 33.8 )− 4.7 ( 23.5 )− 7.0 ( 19.4 )Record low ° C (° F )− 23.0 (− 9.4 )− 19.3 (− 2.7 )− 10.5 ( 13.1 )− 3.2 ( 26.2 )− 0.3 ( 31.5 )3.6 ( 38.5 )6.1 ( 43.0 )5.2 ( 41.4 )1.9 ( 35.4 )− 3.2 ( 26.2 )− 7.1 ( 19.2 )− 16.0 ( 3.2 )− 23.0 (− 9.4 )Average precipitation mm ( inches )54.0 ( 2.13 )53.8 ( 2.12 )72.2 ( 2.84 )56.1 ( 2.21 )72.6 ( 2.86 )73.2 ( 2.88 )54.5 ( 2.15 )71.6 ( 2.82 )53.2 ( 2.09 )56.2 ( 2.21 )68.0 ( 2.68 )55.8 ( 2.20 )741.2 ( 29.19 )Average precipitation days (≥ 1.0 mm )10.49.39.79.610.98.26.88.27.38.58.99.8107.6Average snowy days5.53.92.51.10.00.00.00.00.00.02.04.619.6Average relative humidity (%)84807471727065707682848676Mean monthly sunshine hours62.689.8147.5184.2215.9250.9292.6259.0208.1134.375.355.41.975.6Percent possible", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia4.pdf" - }, - { - "text": "\n \n \n \n \n [html]Population of Lyon ( metropolis ) ( 59 communes, within 2020 borders )\n
YearPgp2#%. p. a.YearPgp.#%. p. a.YearP. gp.#%. p. a.
1861418.5151906627.073+ 0.60 %19681.077.794+ 2.17 %
1866427.522+ 0.43 %1911629.931+ 0.09 %19751.153.402+ 0.98 %
1872426.552− 0.04 %1921659.007+ 0.45 %19821.138.718− 0.18 %
1876453.540+ 1.37 %1926691.446+ 0.97 %19901.166.797+ 0.30 %
1881493.778+ 1.66 %1931743.297+ 1.46 %19991.199.589+ 0.31 %
1886527.621+ 1.47 %1936738.220− 0.14 %20101.296.166+ 0.72 %
1891566.115+ 1.46 %1946746.062+ 0.11 %20151.370.678+ 1.12 %
1896600.881+ 1.21 %1954790.662+ 0.71 %20211.424.069+ 0.64 %
1901608.856+ 0.26 %1962947.569+ 2.34 %
", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - }, - { - "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu \n\n\n\n\n\n\n\n\n\n\n\n\n\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of \nan archbishopric whose holder bears the title of Primate of the Gauls. \nLyon became a major economic hub during the Renaissance. The city is \nrecognised for its cuisine and gastronomy, as well as historical and \narchitectural landmarks; as such, the districts of Old Lyon, the Fourvière \nhill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on \nthe UNESCO World Heritage List. Lyon was historically an important \narea for the production and weaving of silk. Lyon played a significant \nrole in the history of cinema since Auguste and Louis Lumière invented \nthe cinematograph there. The city is also known for its light festival, the \nFête des lumières, which begins every 8 December and lasts for four \ndays, earning Lyon the title of \"Capital of Lights\". \n\nis a major centre for banking, chemical, \nEconomically, Lyon \npharmaceutical and biotech industries. The city contains a significant \nsoftware industry with a particular focus on video games; in recent years \nit has fostered a growing local start-up sector.[17] The home of renowned \nuniversities and higher education schools, Lyon is the second-largest \nstudent city in France, with a university population of nearly 200,000 \nstudents within the Metropolis of Lyon.[18] Lyon hosts the international \nheadquarters of Interpol, the International Agency for Research on \nCancer, as well as Euronews. According to the Globalization and World \nRankings Research Institute, Lyon is considered a Beta city, as of \n2018.[19] It ranked second in France and 40th globally in Mercer's 2019 \nliveability rankings.[20] \n\nFlag \nCoat of arms \n\nMotto(s):*Avant, avant, Lion le melhor*\n(old Franco-Provençal for \"Forward, forward, \nLyon the best\")[a] \n*Virtute duce, comite fortuna*\n(\"With virtue as guide and fortune as \ncompanion\")[b] \n\n**Location of Lyon**", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "31. Braudel 1984 p. 327 \n32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde \nLyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01 \n150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011 \n50.htm) on 19 January 2011. Retrieved 3 April 2011. \n\n33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli \nsh_1).*Chrd.lyon.fr*. 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) \non 24 January 2011. Retrieved 21 December 2017. \n\n34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal. \n\ncom/article/273644).*Digitaljournal.com*. \n\n35. (in French) Georges Duby (ed),*Histoire de la France : Dynasties et révolutions, de 1348 à 1852*(vol. 2), \nLarousse, 1999 p. 53 ISBN 2-03-505047-2 \n\n36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g \netting-around/local-transport). Lonely Planet. Retrieved 2 February 2017. \n\n37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/).*unesco.org*. UNESCO World Heritage Centre. \nRetrieved 31 July 2015. \n\n38. Gregory, Stanley. “Climatic Classification and Climatic Change (Klimaklassifikation Und Klimaänderung) (http \ns://www.jstor.org/stable/25636095).”*Erdkunde*, vol. 8, no. 4, 1954, pp. 246–252.*JSTOR.*\n\n39. \"Données climatiques de la station de Lyon: Relevés de 2016 – Lyon\" (https://web.archive.org/web/20161004", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia4.pdf" - }, - { - "text": "1,600,000 m2 (17,222,256.67 sq ft) of office space and services and more than 55,000 jobs.[48]*Cité Internationale*, created \nby the architect Renzo Piano is located in the border of the Parc de la Tête d'Or in the 6th arrondissement. The worldwide \nheadquarters of Interpol is located there. The district of*Confluence*, in the south of the historic centre, is a new pole of \neconomical and cultural development. \n\nTourism is an important part of the Lyon economy, with one billion euros in 2007 and 3.5 million hotel-nights in 2006 \nprovided by non-residents. Approximately 60% of tourists visit for business, with the rest for leisure. In January 2009, Lyon \nranked first in France for hostels business. The festivals most important for attracting tourists are the*Fête des lumières*, the \n*Nuits de Fourvière*every summer, the*Biennale d'art contemporain*and the*Nuits Sonores*. \n\n**Culture**\n\nSince the Middle Ages, the region residents have spoken several dialects of Franco- \nProvençal. The Lyonnais dialect was replaced by the French language as the \nimportance of the city grew. However some \"frenchified\" Franco-Provençal words \ncan also be heard in the French of the Lyonnais, who call their little boys and girls \n\"gones\" and \"fenottes\" for example.[49] \n\n\n\nThe Lumière brothers pioneered cinema in the town in 1895. The Institut \nLumière, built as Auguste Lumiere's house, and a fascinating piece of \narchitecture in its own right, holds many of their first inventions and other \nearly cinematic and photographic artifacts. \n8 December each year is marked by the Festival of Lights (la Fête des \nlumières), a celebration of thanks to the Virgin Mary, who purportedly \nsaved the city from a deadly plague in the Middle Ages. During the event, \nthe local population places candles (*luminions*) at their windows and the city of Lyon organizes large-scale \nlight shows onto the sides of important Lyonnais monuments, such as the medieval Cathédrale St-Jean. \nThe Saint Francis of Sales church is famous for its large and unaltered Cavaillé-Coll pipe organ, attracting \naudiences from around the world. \nThe Opéra Nouvel (New Opera House) is the home of the Opéra National de Lyon. The original opera house \nwas re-designed by the distinguished French architect Jean Nouvel between 1985 and 1993 and is named \nafter him. \nLyon is also the French capital of \"*trompe l'œil*\" walls, a very ancient tradition. Many are to be seen around the \ncity. This old tradition is now finding a contemporary expression, for example in the art of Guillaume \nBottazzi.[50][51] \nThe Brothers of the Sacred Heart, a Roman Catholic congregation that operates schools in Europe and North \nAmerica, was founded in Lyon in 1821. \nThe African Museum of Lyon is one of the oldest museums situated in Lyon.[52] \nThe Museum of Resistance and Deportation looks at the various individuals prominent in the Resistance \nmovement in World War II. The building is strongly linked to Klaus Barbie. Lyon sees itself as the centre of the \nFrench resistance and many members were shot in Place Bellecour in the town centre. The exhibition is \nlargely a series of , mini-biographies of those involved. \nLyon is a pilot city of the Council of Europe and the European Commission Intercultural cities program. \n\nGuignol, created in the early 19th \nC., associated with the silk-workers \n\n**UNESCO World Heritage Site**\n\nThe historic site of Lyon was designated a UNESCO World Heritage Site in 1998. In its designation, UNESCO cited the \n\"exceptional testimony to the continuity of urban settlement over more than two millennia on a site of great commercial and \nstrategic significance.\"[37] The specific regions comprising the historic site include the Roman district and Fourvière, the \nRenaissance district (Vieux Lyon), the silk district (slopes of Croix-Rousse), and the Presqu'île, which features architecture \nfrom the 12th century to modern times.[53]", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia4.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
nd• Metro density
500 / km2 ( 1.300 / sq mi )Time zone • Summer ( DS )
UTC + 01 : 00 ( CET ) UTC + 02 : 00 ( CESTINSEE / Postal code
69123 ( https :// www. insee. fr / fr / statistiques / 14055997geo = COM - 69123 )/ 69001 - 69009
2012Elevation
\n\n**1**French Land Register data, which excludes \nlakes, ponds, glaciers > 1 km2 (0.386 sq mi or \n247 acres) and river estuaries. \n\n\n\n**Modern Lyon**\n\n**Timeline of Lyon**\n**Historical affiliations**\n\n Roman Empire (Gallia Lugdunensis), 43 \n\nBC-286 \n\nFernand Braudel \nremarked, \n\"Historians of Lyon are not \nthe bi- \nsufficiently aware of \npolarity between Paris and Lyon, \nwhich is a constant structure in \nFrench development...from \nthe \nlate Middle Ages to the Industrial \nRevolution\".[31] In the late 15th century, the fairs introduced by Italian \nmerchants made Lyon the economic counting house of France. Even the \n*Bourse*(treasury), built in 1749, resembled a public bazaar where \naccounts were settled in the open air. When international banking moved \nto Genoa, then Amsterdam, Lyon remained the banking centre of \nFrance. \n\n Western Roman Empire (Gallia \n\nLugdunensis), 286-411 \n\n Kingdom of the Burgundians, 411–534 \n Francia, 534–843 \n Middle Francia, 843–855 \n Lotharingia, 855–879 \n Lower Burgundy, 879-933 \n Kingdom of Arles, 933–1312 \n Kingdom of France (Lyonnais), 1312– \n\nThe Roman-era Theatre on the \nFourvière Hill \n\n1792 \n\nDuring the Renaissance, the city's development was driven by the silk \ntrade, which strengthened its ties to Italy. Italian influence on Lyon's \narchitecture is still visible among historic buildings.[32] In the late 1400s \nand 1500s Lyon was also a key centre of literary activity and book \npublishing, both of French writers (such as Maurice Scève, Antoine \nHeroet, and Louise Labé) and of Italians in exile (such as Luigi \nAlamanni and Gian Giorgio Trissino). \n\n\n\n French First Republic, 1792–1793 \n Counter-revolutionary, 1793 \n French First Republic, 1793–1804 \n First French Empire, 1804–1814 \n Kingdom of France, 1814–1815 \n First French Empire, 1815 \n Kingdom of France, 1815–1830 \n Kingdom of France, 1830–1848 \n French Second Republic, 1848–1852 \n Second French Empire, 1852–1870 \n French Third Republic, 1870–1940 \n Vichy France, 1940–1944 \n French Fourth Republic, 1944–1958 \n France, 1958–present \n\nIn 1572, Lyon was a scene of mass violence by Catholics against \nProtestant Huguenots in the St. Bartholomew's Day Massacre. Two \ncenturies later, Lyon was again convulsed by violence during the French \nRevolution, when the citizenry rose up against the National Convention \nand supported the Girondins. The city was besieged by Revolutionary armies for over \ntwo months before it surrendered in October 1793. Many buildings were destroyed, \nespecially around the Place Bellecour, and Jean-Marie Collot d'Herbois and Joseph \nFouché administered the execution of more than 2,000 people. The Convention \nordered that its name be changed to \"Liberated City\", and a plaque was erected that \nproclaimed \"Lyons made war on Liberty; Lyons no longer exists\". A decade later, \nNapoleon ordered the reconstruction of all the buildings demolished during that \nperiod. \nLyon under siege in 1793", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Lyon is served by the Eurolines intercity coach organisation. Its Lyon terminal is \nlocated at the city's Perrache railway station, which serves as an intermodal \ntransportation hub for tramways, local and regional trains and buses, the terminus of \nMetro line A, of the Tramway T2, the bicycle service Vélo'v, and taxis.[77] \n\n\n\n\n\nThe Transports en commun lyonnais (TCL), Lyon's public transit system, consisting \nof metro, tramways and buses, serves 62 communes of the Lyon metropolis.[78][79] \nThe metro network has four lines (A, B, C and D), 42 stations, and runs with a \nfrequency of up to a train every 2 minutes. There are eight Lyon tram lines since \nnovember 2020: T1 from*Debourg*in the south to*IUT-Feyssine*in the north, Tram T2 \nfrom*Hôtel de région Montrochet*to Saint-Priest in the south-east, Tram T3 from Part- \nDieu to Meyzieu, Tram T4 from 'Hôptial Feyzin Venissieux' to La Doua Gaston \nBerger. Tram T5 from Grange Blanche, in the south-east to Eurexpo in the south-west. \nTram T6 from Debourg, in the south to Hôpitaux Est-Pinel in the east. Tram T7 from \nVaux-en-Velin la soie, in the north-east to Décines – OL Vallée in the east.[79] And \nRhône Express tramline from Part-Dieu to Lyon–Saint-Exupéry Airport.[80][81] The \nLyon bus network consists of the Lyon trolleybus system, motorbuses, and coaches \nfor areas outside the centre. There are also two funicular lines from Vieux Lyon to \nSaint-Just and Fourvière. The ticketing system is relatively simple as the city has only \none public transport operator, the SYTRAL. \n\n\n\nThe public transit system was complemented in 2005 by*Vélo'v*, a bicycle network \nproviding a low-cost bicycle-hire service made up of 340 stations throughout the city. \nBorrowing a bicycle for less than 30 minutes is free. Free rental time can be extended \nfor another 30 minutes at any station. Lyon was the first city in France to introduce \nthis bicycle renting system. In 2011 the Auto'lib car rental service was introduced; it \nworks much the same way as the Velo'v but for cars. \n\nVelo'v, Ennemond Fousseret square \n(Old Lyon) \n\nThe average amount of time people spend commuting with public transit in Lyon on a \nweekday is 45 minutes. The average amount of time people wait at a stop or station \nfor public transit is 11 min, while 17% of riders wait for over 20 minutes on average \nevery day. The average distance people usually ride in a single trip with public transit \nis 4.7 km, while 4% travel for over 12 km in a single direction.[82] \n\n**International relations**\n\n\n \n \n \n \n [html]\n
Patientsis a pilot city of the Cou
StateStatistics
StateStatistics
TableControl
TableCarbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbonation of carbi
", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Lyon is also home to the Lyon Hockey Club, an ice hockey team that competes in \nFrance's national ice hockey league. The Patinoire Charlemagne is the seat of Club \ndes Sports de Glace de Lyon, the club of Olympic ice dancing champions Marina \nAnissina and Gwendal Peizerat, and world champions Isabelle Delobel and Olivier \nShoenfelder.[65] Lyon-Villeurbanne also has a basketball team, ASVEL, that plays at \nthe Astroballe arena. \n\n\n\n**Street art**\n\nSince 2000, Birdy Kids, a group of graffiti artists from the city, has decorated several \nrandom buildings and walls along the Lyon ring road. In 2012, the artist collective \nwas chosen to represent the city as its cultural ambassadors.[66] \n\n**Demographics**\n\nThe population of the city (commune) of Lyon proper was 522,250 at the January 2021 census.[15] As of 2011, 14% of its \npopulation was born outside Metropolitan France.[67] \n\n\n \n \n \n \n [html]Population of Lyon ( commune ) ( within 2020 borders )\n
YearPgp :±% p. a.YearPgp.±%. p. a.YearPgp :±% b. a.
1801101.7601876344.513+ 1.33 %1946464.104+ 0.02 %
1806114.643+ 2.41 %1881378.581+ 1.84 %1954475.343+ 0.29 %
1821149.611+ 1.79 %1886404.172+ 1.45 %1962535.746+ 1.54 %
1831182.668+ 2.02 %1891440.315+ 1.78 %1968527.800− 0.25 %
1836198.683+ 1.60 %1896468.311+ 1.25 %1975456.716− 2.06 %
1841206.670+ 0.79 %1901461.687− 0.29 %1982413.095− 1.42 %
1846238.466+ 2.86 %1906474.652+ 0.56 %1990415.487+ 0.07 %
1851259.220+ 1.68 %1911462.248− 0.53 %1999445.452+ 0.78 %
1856293.743+ 2.66 %1921462.446+ 0.00 %2010484.344+ 0.78 %
1861320.326+ 1.72 %1926463.125+ 0.03 %2015513.275+ 1.17 %
1866325.219+ 0.30 %1931463.647+ 0.02 %2021522.250+ 0.29 %
1872324.590− 0.03 %1936463.061− 0.03 %
\n\nThe city of Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected \nmetropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021.[16]", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210538_en.pdf", - "query": " What should do the rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided ?", - "target_page": 2, - "target_passage": "ensure that the register is kept in that church or chapel, and (b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. \n\n**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. \n\n**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. \n\n\n \n \n \n \n [html]\n
Given under my hand on 29th April 2021Abi Tierney Registrar GeneralAbi Tremey Registrat GeneralTable
", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— \n\n(**a**) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by \nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently \nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic \nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act \n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also \ninserted subsection (1A). \n(**b**) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to \nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15). \n(**c**) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. \n\n\n \n \n \n \n [html]\n
Regulators ∗∗ migrets ’ equivalents than 10 min ks / μg / ml ; total vial status ; wivece provided under regulation 2A full impact assessment has not been produced for this instrument because no, or no significant,
Employees virus granus, patients vs. voluntary Accord in roluncoccines.
\n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "**Test providers**\n\n**3.**—(1) A test provider complies with this paragraph where— \n\n(a) they provide appropriate tests in a single end-to-end testing service (whether or not they \narrange with another person (“X”) for X to provide one or more elements of the service \non their behalf); \n\n(b) they have made a declaration to the Department of Health and Social Care that they meet \nthe minimum standards for private sector-provided testing at https://support-covid-19- \ntesting.dhsc.gov.uk/PrivateSectorSelfDeclaration; \n\n(c) in relation to a test which requires laboratory processing— \n\n(i) the person responsible for the taking of samples meets the relevant requirements for \naccreditation to ISO standard 15189 or ISO/IEC standard 17025, in respect of the \ntaking of samples, and \n\n(ii) the laboratory used by the test provider for the processing of samples meets the \nrelevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard \n17025, in respect of the processing of samples; \n\n(d) in relation to a point of care test, they meet the relevant requirements for accreditation to \nISO standard 15189 and ISO standard 22870(**a**); \n\n(e) a registered medical practitioner has oversight and approval of medical practices \n\nundertaken by the test provider, and responsibility for reporting medical issues; \n\n(f) \n\nthey have an effective system of clinical governance in place which includes appropriate \nstandard operating procedures in relation to the carrying out of appropriate tests; \n\n(g) a registered clinical scientist has oversight of clinical practices undertaken by the test \nprovider, and responsibility for reporting clinical issues; \n\n(h) they have systems in place to identify any adverse incidents or quality control issues in \nrelation to appropriate tests and be able to report them as soon as reasonably practicable \nto the Secretary of State; \n\n(i) \n\nthey administer or provide an appropriate test to P, on or after the fifth day after the day \non which P arrived in England having received the information required by paragraph \n4(b) and (c) (as appropriate); and \n\n(j) \n\nif they arrange with another person (“X”) for X to carry out any element of the single \nend-to-end testing service on their behalf, the test provider ensures that X complies with \nany of paragraphs (c) to (i) and 5(2), (3) and (5) as is relevant to the carrying out of that \nelement. \n\n(2) For the purposes of sub-paragraph (1)— \n\n(a) “point of care test” means a test processed outside a laboratory environment; \n(b) “registered clinical scientist” means a person registered as a clinical scientist with the \nHealth and Care Professions Council pursuant to article 5 of the Health Professions Order \n2001(**b**); \n\n(c) “single end-to-end testing service” means a service which comprises accepting the \nbooking from the person to be tested, collecting and processing the sample to be tested, \ncarrying out genomic sequencing and providing the test result to P. \n\n(3) For the purposes of sub-paragraph (1)(c) and (d), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where that person, or in the case of \na laboratory where the person who is the operator of the laboratory— \n\n(a) has made a valid application for accreditation to UKAS (“stage one”); and \n\n(b) complies with the requirements of sub-paragraph (4) where relevant. \n\n(4) The requirements of this sub-paragraph are that— \n\n(a) in the case of a person who completed stage one— \n\n(i) before 15th December 2020 and who is carrying out a test after 18th January 2021, \n(ii) on or after 15th December 2020 and who is carrying out a test after whichever is the \n\nlater of— \n(aa) 18th January 2021, and \n(bb) the date four weeks after the date on which they completed stage one, \n\nthey have complied with the requirements published by UKAS in relation to accreditation \nto that standard at http://www.ukas.com/C19-Stage2-UKAS-Appraisal (“stage two”),", - "page_start": 69, - "page_end": 69, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(1) The High Court shall have jurisdiction to hear and determine any question \n\nwhether- \n(a) \n\nany person has been validly elected as an Elected Member of the National \nAssembly or the seat of any such Member has become vacant; \nany person has been validly elected as Speaker of the Assembly or, having \nbeen so elected, has vacated the office of Speaker. \n\n(2) Any question whether any person has been validly elected as a Specially \n\nElected Member of the National Assembly or whether the seat of any such Member has \nbecome vacant shall be determined by the Speaker. \n\n(3) Parliament may make provision with respect to- \n\nthe persons who may apply to the High Court for the determination of any \nquestion under this section; \nthe circumstances and manner in which the conditions upon which any such \napplication may be made; and \nthe powers, practice and procedure of the High Court in relation to any such \napplication. \n**70. Clerk of the Assembly**\n\n(a) \n\n(b) \n\n(c) \n\n(1) There shall be a Clerk of the National Assembly and an Assistant Clerk of the \n\nNational Assembly and their offices shall be offices in the public service. \n\n(2) There shall be such other offices in the department of the Clerk of the \nAssembly as may be prescribed by resolution of the National Assembly and such offices \nshall be offices in the public service. \n\n**PART II**\n**General Provisions Relating to Procedure in National Assembly (ss 71-76)**\n\n**71. Oaths to be taken by Speaker and Members**\n\nThe Speaker, before assuming the duties of his or her office, and every Member \nof the National Assembly before taking his or her seat therein, shall take and subscribe \nbefore the Assembly the oath of allegiance. \n**72. Presiding in Assembly**\n\nThere shall preside at any sitting of the National Assembly- \n\n(a) \n(b) \n(c) \n\nthe Speaker; \nin the absence of the Speaker, the Deputy Speaker; or \nin the absence of the Speaker and the Deputy Speaker, such Member of the \nAssembly (not being the President or Vice-President or a Minister or Assistant \nMinister) as the Assembly may elect for that sitting. \n\n**73. Quorum in Assembly**\n\nIf objection is taken by any Member of the National Assembly present that there \n\nare present in the Assembly (besides the person presiding) less than one third of the \nMembers of the Assembly and, after such interval as may be prescribed in the rules of \nprocedure of the Assembly, the person presiding ascertains that the number of Members \npresent is less than one third, he or she shall thereupon adjourn the Assembly. \n**74. Voting in Assembly**\n\n(1) Save as otherwise provided in this Constitution, any question proposed for \ndecision in the National Assembly shall be determined by a majority of the votes of the \nMembers present and voting. \n\n(2) ... \n(3) The person presiding in the National Assembly shall have neither an original \n\nvote nor a casting vote and if upon any question before the Assembly the votes are \nequally divided the motion shall be lost. \n**75. Unqualified persons sitting or voting**\n\nAny person who sits or votes in the National Assembly knowing or having", - "page_start": 33, - "page_end": 33, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "[html]bankrupt under any law in force in any part of the Commonwealth and has notbeen discharged, or has made a composition with his or her creditors and has not paid his or her debts in full, or( b )he or she has been convicted of any offence involving dishonesty in any country.( 7 ) A person appointed a member of the Commission shall not enter upon theduties of the office of Commissioner until he or she has taken and subscribed the oath ofallegiance and such cath for the due execution of his or her office as may be prescribed by an Act of Parliament.( 8 ) The Commission shall regulate its own procedure and proceedings.( 9 ) The Chairman shall preside over all proceedings, and in his or her absence,the legal practitioner referred to in subsection ( 1 )( b ) shall preoide over the proceedings. ( 10 ) The quorum shall be four members, one of whom shall be the Chairman orthe said legal practitioner.( 11 ) All issues shall be decided by the decision of the majority of the memberspresent and voting.( 12 ) The Commission shall be responsible for -( a )the conduct and supervision of elections of the Elected Members of the National Assembly and members of a local authority, and conduct of a referendum :( b )giving instructions and directions to the Secretary of the Commission appointed under section 66 in regard to the exercise of his or her functions under the electoral law prescribed by an Act of Parliament :( c )ensuring that elections are conducted efficiently, properly, freely and fairly ; and( d )performing such ather functions as may be prescribed by an Act of Parliament.( 13 ) The Commission shall on the completion of any election conducted by it,submit a report on the exercise of its functions under the preceding provisions of this section to the Minister for the time being responsible for matters relating to suchelections, and that Minister shall, not later than seven days after the National Assembly first meets after he or she has received the report, lay it before the National Assembly.66. Appointment of Secretary to Independent Electoral Commission ( 1 ) There shall be a Secretary to the Independent Electoral Commission reIo in section 65A ( in this section referred to as “ the Secretary ”). ( 2 ) The Secretary shall be appointed by the President.( 3 ) The functions of the Secretary shall, subject to the directions and supervisionof the Independent Electoral Commission, be to exercise general supervision over theregistration of voters for elections of -( a )the Elected Members of the National Assembly ; and( b )the members of any local authority,and over the conduct of such elections.( 4 ) A person shall not be qualified to be appointed as Secretary to theIndependent Electoral Commission if -( a )he or she is not a citizen of Botswana ;( b )he or she has been declared insolvent or adjudged or otherwise declared bankrupt under any law in force in any part of the Commonwealth and has notbeen discharged, or has made a composition with his or her creditors and has not paid his or her debts in full ; or( c )he or she has been convicted of any offence involving dishonesty in any country.(", - "page_start": 30, - "page_end": 30, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "or her functions.( 5 ) Where the Vice - President is performing the functions of the office of Presidentin accordance with section 35 or 36 of this Constitution he or she may appoint a person.", - "page_start": 20, - "page_end": 20, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "from among the Members of the Assembly, to perform the functions of the office of Vice- \nPresident and any person so appointed may discharge those functions accordingly: \n\nProvided that a person appointed under this subsection shall cease to perform \n\nthe functions of the office of Vice-President- \n\n(i) \n(ii) \n\nif his or her appointment is revoked by the Vice-President; \nif he or she ceases to be a Member of the Assembly otherwise than by reason \nof a dissolution of Parliament; or \nif the Vice-President ceases to perform the functions of the office of President. \n(6) In this section references to Members of the Assembly shall, in the event of \n\n (iii) \n\nParliament being dissolved, be construed as references to those persons who \nimmediately before the dissolution were Members of the Assembly. \n**40. Salary and allowances of President**\n\n(1) The President shall receive such salary and allowances as may be prescribed \nby resolution of the National Assembly, which shall be a charge on the general revenues \nof the Republic. \n\n(2) The salary and allowances of the President shall not be altered to his or her \n\ndisadvantage during his or her period of office. \n\n(3) A person who has held the office of President shall receive such pension or, \n\nupon the expiration of his or her term of office, such gratuity as may be prescribed by \nresolution of the National Assembly, which shall be a charge on the Consolidated Fund. \n**41. Protection of President in respect of legal proceedings**\n\n(1) Whilst any person holds or performs the functions of the office of President no \n\ncriminal proceedings shall be instituted or continued against him or her in respect of \nanything done or omitted to be done by him or her either in his or her official capacity or \nin his or her private capacity and no civil proceedings shall be instituted or continued in \nrespect of which relief is claimed against him or her in respect of anything done or \nomitted to be done in his or her private capacity. \n\n(2) Where provision is made by law limiting the time within which proceedings of \nany description may be brought against any person, the term of any person in the office \nof President shall not be taken into account in calculating any period of time prescribed \nby that law which determines whether any such proceedings as are mentioned in \nsubsection (1) of this section may be brought against that person. \n\n**PART II**\n**The Cabinet (ss 42-46)**\n\n**42. Ministers and Assistant Ministers**\n\n(1) There shall be such offices of Minister of the Government (not exceeding six \n\nor such other number as Parliament may from time to time provide) as may be \nestablished by Parliament or, subject to the provisions of any Act of Parliament, by the \nPresident. \n\n(2) There shall be such offices of Assistant Minister (not exceeding three or such \n\nnumber as Parliament may from time to time provide) as may be established by \nParliament or, subject to the provisions of any Act of Parliament, by the President. \n\n(3) Appointments to the office of Minister or Assistant Minister shall be made by \n\nthe President from among Members of the National Assembly: \n\nProvided that- \n\n(i) not more than four persons may be appointed as Minister or Assistant Minister \nfrom amongst persons who are not Members of the Assembly but are qualified \nfor election as such; and \nif occasion arises for making an appointment to the office of a Minister or an \nAssistant Minister while Parliament is dissolved a person who was a Member of \nthe Assembly before the dissolution may be appointed as a Minister or an \n\n(ii)", - "page_start": 21, - "page_end": 21, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "(d) to visit a person (“D”) whom P reasonably believes is dying, and where P is a member of \nD’s household or a close family member or friend of D; \n\n(e) to attend the funeral of a member of P’s household or a close family member; \n(f) \n\nin other exceptional circumstances such as— \n(i) to seek medical assistance where this is required urgently or on the advice of a \nregistered medical practitioner including to access services from dentists, opticians, \naudiologists, chiropodists, chiropractors, osteopaths and other medical and health \npractitioners, including services relating to mental health, \n\n(ii) to access critical public services including social services or services provided to \nvictims (such as victims of crime), \n\n(iii) to avoid injury or illness or to escape risk of harm, \n(iv) to access veterinary services where this is required urgently or on the advice of a \n\nveterinary surgeon. \n\n(2) P may only leave or be outside of the place where P is self-isolating in reliance on the \n\ngrounds mentioned in sub-paragraph (1)(c), (d) or (e)— \n\n(a) if P has been given prior permission by a person authorised by the Secretary of State for \n\nthis purpose; \n\n(b) if P complies with any reasonable requirements imposed by the person so authorised in \n\nrelation to the exercise, the visit to the person or attendance at the funeral. \n\n**Meaning of “place”**\n\n**14.**For the purposes of this Schedule the place referred to in paragraphs 8 to 13 means the room \nin the designated accommodation where P is staying and, if connected to the room where P is \nstaying, the room of any person referred to in paragraph 11(a) (travelling companion), including \nany balcony, and does not include the communal areas or any garden, yard, passage, stair, garage, \nouthouse or appurtenance of the accommodation in which the place is situated. \n\n**Designations**\n\n**15.**The Secretary of State must designate for the purposes of this Schedule— \n\n(a) accommodation; \n(b) transportation to the designated accommodation, \n\nand must publish details of the designations in such manner as appears to the Secretary of State to \nbe appropriate. \n\n**Duties where P is a child**\n\n**16.**If P is a child— \n\n(a) any person who has custody or charge of P when P is travelling to England must ensure, \nso far as is reasonably practicable, that P complies with the obligations in paragraphs 5 \nand 6; \n\n(b) any person who has custody or charge of P during P’s period of self-isolation must \nensure, so far as is reasonably practicable, that P self-isolates in accordance with this \nSchedule. \n\n**Person caring for P**\n\n\n \n \n \n \n [html]\n
1 /. A person may reside in the place withere P 18 assistance P reasonably requires by reason of —Fesight purposed pressure to mis scientification
( a ) P beirPercentage
( b ) any disability of P ’ s,
TableTable
", - "page_start": 77, - "page_end": 77, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**1.**—(1) A person (“P”), other than a person described in sub-paragraph (2), who is— \n\n(a) a member of a diplomatic mission in the United Kingdom; \n(b) a member of a consular post in the United Kingdom; \n(c) an officer or servant of an international organisation; \n(d) employed by an international organisation as an expert or on a mission; \n(e) a representative to an international organisation; \n(f) a representative at an international or United Kingdom conference who is granted \nprivileges and immunities in the United Kingdom; \n\n(g) a member of the official staff of a representative to an international organisation, or of a \n\nperson falling within paragraph (f); \n\n(h) described in paragraph (a) or (b) who is passing through the United Kingdom to \ncommence or continue their functions at a diplomatic mission or consular post in another \ncountry or territory, or to return to the country of their nationality; \n\n(i) a representative of a foreign country or territory travelling to the United Kingdom to \n\nconduct official business with the United Kingdom; \n\n(j) a representative of the government of a British overseas territory; \n(k) a diplomatic courier or a consular courier; \n(l) a member of the family forming part of the household of a person falling within any of \n\nparagraphs (a) to (k). \n(2) A person (“P”) where— \n\n(a) P either— \n\n(i) travelled to the United Kingdom for the purpose of attending or facilitating a G7 \nevent, and P is in England for the purpose of attending or facilitating a G7 event or \nof travelling in order to leave England, or \n\n(ii) travelled to the United Kingdom for another purpose, and after their arrival in \n\nEngland is attending, facilitating, or travelling to or from a G7 event; \n(b) P has been invited by Her Majesty’s Government to attend or facilitate the event; \n(c) the relevant person has provided written confirmation to the relevant Department that P \nwill comply with the health protocols for the event; and \n\n(d) the relevant Department has provided written confirmation to the relevant person that P is \n\na person described in this sub-paragraph. \n\n(3) The conditions referred to in regulation 9(15)(a)(i) (persons who are not required to comply \n\nwith regulation 9) are that— \n\n(a) the relevant head of the mission, consular post, international organisation, or conference, \noffice representing a foreign territory in the United Kingdom or a Governor of a British \noverseas territory (as the case may be), or a person acting on their authority, confirms in \nwriting to the Foreign, Commonwealth and Development Office that— \n(i) P is required to undertake work which is essential to the functioning of the mission, \nconsular post, international organisation, conference, or office, or to undertake work \nwhich is essential to the foreign country represented by the mission or consular post, \nthe foreign territory represented by the office or the British overseas territory, and \n\n(ii) that work cannot be undertaken whilst P is complying with regulation 9; and", - "page_start": 33, - "page_end": 33, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "tesla_form_10q.pdf", - "query": "What are Tesla's total liabilities and equity in 2024?", - "target_page": 5, - "target_passage": "119,852", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "Tesla, Inc. \n\nConsolidated Statements of Comprehensive Income \n(in millions) \n(unaudited) \n\nThree Months Ended September 30, \n\n2024 2023 \n\nNet income \nOther comprehensive income (loss): \n\n$ 2,183 $ 1,878 $ \n\nForeign currency translation adjustment \nUnrealized net gain on investments, net of tax \nNet loss realized and included in net income 445 \n8 \n— (289) \n7 \n— \n\n2,636 1,596 \n\nComprehensive income \nLess: Comprehensive income (loss) attributable to \nnoncontrolling interests and redeemable \nnoncontrolling interests in subsidiaries \nComprehensive income attributable to common \nstockholders \n$", - "page_start": 7, - "page_end": 7, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Certain Investigations and Other Matters \n\nWe regularly receive requests for information, including subpoenas, from regulators and governmental authorities such \nas the National Highway Traffic Safety Administration, the National Transportation Safety Board, the Securities and Exchange \nCommission (“SEC”), the Department of Justice (“DOJ”), and various local, state, federal, and international agencies. The \nongoing requests for information include topics such as operations, technology (e.g., vehicle functionality, vehicle incidents, \nAutopilot and FSD Capability), compliance, finance, data privacy, and other matters related to Tesla’s business, its personnel, \nand related parties. We routinely cooperate with such formal and informal requests for information, investigations, and other \ninquiries. To our knowledge no government agency in any ongoing investigation has concluded that any wrongdoing occurred. \nWe cannot predict the outcome or impact of any ongoing matters. Should the government decide to pursue an enforcement \naction, there exists the possibility of a material adverse impact on our business, results of operation, prospects, cash flows, \nfinancial position or brand. \n\nWe are also subject to various other legal proceedings, risks and claims that arise from the normal course of business \n\nactivities. For example, during the second quarter of 2023, a foreign news outlet reported that it obtained certain \nmisappropriated data including, purportedly non-public Tesla business and personal information. Tesla has made notifications \nto potentially affected individuals (current and former employees) and regulatory authorities and we are working with certain \nlaw enforcement and other authorities. On August 5, 2023, a putative class action was filed in the United States District Court \nfor the Northern District of California, purportedly on behalf of all U.S. individuals impacted by the data incident, followed by \nseveral additional lawsuits, that each assert claims under various state laws and seeks monetary damages and other relief. If an \nunfavorable ruling or development were to occur in these or other possible legal proceedings, risks and claims, there exists the \npossibility of a material adverse impact on our business, results of operations, prospects, cash flows, financial position or brand. \n\nAssets \n\nCurrent assets \n\nCash and cash equivalents \n\nAccounts receivable, net \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDeferred revenue, net of current portion \n\nDebt and finance leases, net of current portion \n\nTotal liabilities", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Tesla, Inc. \n\nNotes to Consolidated Financial Statements \n\n(unaudited) \n\nNote 1 – Overview & Summary of Significant Accounting Policies \n\nOverview \n\nTesla, Inc. (“Tesla”, the “Company”, “we”, “us” or “our”) was incorporated in the State of Delaware on July 1, 2003 and \nconverted to a Texas corporation on June 13, 2024. \n\nUnaudited Interim Financial Statements \n\nThe consolidated financial statements, including the consolidated balance sheet as of September 30, 2024, the \nconsolidated statements of operations, the consolidated statements of comprehensive income, the consolidated statements of \nredeemable noncontrolling interests and equity for the three and nine months ended September 30, 2024 and 2023, and the \nconsolidated statements of cash flows for the nine months ended September 30, 2024 and 2023, as well as other information \ndisclosed in the accompanying notes, are unaudited. The consolidated balance sheet as of December 31, 2023 was derived from \nthe audited consolidated financial statements as of that date. The interim consolidated financial statements and the \naccompanying notes should be read in conjunction with the annual consolidated financial statements and the accompanying \nnotes contained in our Annual Report on Form 10-K for the year ended December 31, 2023. \n\nThe interim consolidated financial statements and the accompanying notes have been prepared on the same basis as the \n\nannual consolidated financial statements and, in the opinion of management, reflect all adjustments, which include only normal \nrecurring adjustments, necessary for a fair statement of the results of operations for the periods presented. The consolidated \nresults of operations for any interim period are not necessarily indicative of the results to be expected for the full year or for any \nother future years or interim periods. \n\n\n \n \n \n \n [html]20242023\n
2024202318.831$
18.582$53.821$57.879739554
2.0711.3572.2281.416
6.6164.1882.7902.166
7.6866.15324.58822.718
70.19469.577446489
1.3801.620148143
40940925.182$
23.350$71.983$71.606
\n\nAutomotive Segment \n\nAutomotive Sales \n\nDeferred revenue related to the access to our Full Self Driving (Supervised) (“FSD”) Capability features and their \nongoing maintenance, internet connectivity, free Supercharging programs and over-the-air software updates primarily on \nautomotive sales amounted to $3.61 billion and $3.54 billion as of September 30, 2024 and December 31, 2023, respectively. \n\n10", - "page_start": 12, - "page_end": 12, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "TESLA, INC. \n\nFORM 10-Q FOR THE QUARTER ENDED SEPTEMBER 30, 2024 \n\nINDEX \n\nPART I. FINANCIAL INFORMATION \n\nItem 1. Financial Statements \n\nConsolidated Balance Sheets \n\nConsolidated Statements of Operations \n\nConsolidated Statements of Comprehensive Income \n\nConsolidated Statements of Redeemable Noncontrolling Interests and Equity \n\nConsolidated Statements of Cash Flows \n\nNotes to Consolidated Financial Statements \n\nItem 2. Management's Discussion and Analysis of Financial Condition and Results of Operations \n\nItem 3. Quantitative and Qualitative Disclosures about Market Risk \n\nItem 4. Controls and Procedures \n\nPART II. OTHER INFORMATION \n\nItem 1. Legal Proceedings \n\nItem 1A. Risk Factors \n\nItem 2. Unregistered Sales of Equity Securities and Use of Proceeds \n\nItem 3. Defaults Upon Senior Securities \n\nItem 4. Mine Safety Disclosures \n\nItem 5. Other Information \n\nItem 6. Exhibits", - "page_start": 2, - "page_end": 2, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "On March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern \n\nDistrict of California. Several similar complaints were also filed in the same court and these cases have now all been \nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and \nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla \ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended \ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on \nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second \nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration \norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the \nConsolidated Second Amended Complaint.", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Assets \n\nCurrent assets \n\nCash and cash equivalents \n\nShort-term investments \n\nAccounts receivable, net \n\nInventory \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nProperty, plant and equipment, net \n\nOperating lease right-of-use assets \n\nDigital assets, net \n\nIntangible assets, net \n\nGoodwill \n\nDeferred tax assets \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccounts payable \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDebt and finance leases, net of current portion \n\nDeferred revenue, net of current portion \n\nOther long-term liabilities \n\nTotal liabilities \n\nCommitments and contingencies (Note 10) \n\nRedeemable noncontrolling interests in subsidiaries \n\nEquity \n\nStockholders’ equity \n\nPreferred stock; $0.001 par value; 100 shares authorized; no shares issued and outstanding \n\noutstanding as of September 30, 2024 and December 31, 2023, respectively \n\nAdditional paid-in capital \n\nAccumulated other comprehensive loss \n\nRetained earnings \n\nTotal stockholders’ equity \n\nNoncontrolling interests in subsidiaries \n\nTotal liabilities and equity \n\n\n \n \n \n \n [html]September 30.2024December 31.2023\n
$18.111$16.398
15.53712.696
3.3133.508
14.53013.626
4.8883.388
56.37949.616
5.3805.989
5.0405.229
36.11629.725
4.8674.180
184184
158178
253253
6.4866.733
4.9894.531
$119.852$106.618
$14.654$14.431
10.6019.080
3.0312.864
2.2912.373
30.57728.748
5.4052.857
3.3503.251
9.8108.153
49.14243.009
70242
", - "page_start": 4, - "page_end": 4, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "class actions and other consumer claims that allege, among other things, purported defects and misrepresentations related to our \nproducts and services. For example, on September 14, 2022, a proposed class action was filed against Tesla, Inc. and related \nentities in the U.S. District Court for the Northern District of California, alleging various claims about the Company’s driver \nassistance technology systems under state and federal law. This case was later consolidated with several other proposed class \nactions, and a Consolidated Amended Complaint was filed on October 28, 2022, which seeks damages and other relief on \nbehalf of all persons who purchased or leased from Tesla between January 1, 2016, to the present. On October 5, 2022, a \nproposed class action complaint was filed in the U.S. District Court for the Eastern District of New York asserting similar state \nand federal law claims against the same defendants. On September 30, 2023, the Court dismissed this action with leave to \namend the complaint. On November 20, 2023, the plaintiff moved to amend the complaint, which Tesla opposed. On August 8, \n2024, the Court denied the plaintiff’s motion for leave to file an amended complaint and entered judgment for Tesla. On \nSeptember 5, 2024, the plaintiff filed a notice of appeal to United States Court of Appeals for the Second Circuit. On March 22, \n2023, the plaintiffs in the Northern District of California consolidated action filed a motion for a preliminary injunction to order \nTesla to (1) cease using the term “Full Self-Driving Capability” (FSD Capability), (2) cease the sale and activation of FSD \nCapability and deactivate FSD Capability on Tesla vehicles, and (3) provide certain notices to consumers about proposed court- \nfindings about the accuracy of the use of the terms Autopilot and FSD Capability. Tesla opposed the motion. On September 30, \n2023, the Court denied the request for a preliminary injunction, compelled four of five plaintiffs to arbitration, and dismissed \nthe claims of the fifth plaintiff with leave to amend the complaint. On October 31, 2023, the remaining plaintiff in the Northern \nDistrict of California action filed an amended complaint, which Tesla moved to dismiss, and on May 15, 2024, the Court \ngranted in part and denied in part Tesla’s motion. On October 2, 2023, a similar proposed class action was filed in San Diego \nCounty Superior Court in California. Tesla subsequently removed the San Diego County case to federal court and on January 8, \n2024, the federal court granted Tesla’s motion to transfer the case to the U.S. District Court for the Northern District of \nCalifornia. Tesla moved to compel arbitration, which the plaintiff did not oppose, and on June 27, 2024, the Court stayed the \ncase pending arbitration. \n\nOn February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California \n\nagainst Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants \nmade material misrepresentations and omissions about the Company’s Autopilot and FSD Capability technologies and seeks \nmoney damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, \n2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On \nNovember 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla’s motion \nto dismiss without prejudice. \n\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Results of Operations \n\nRevenues \n\nThree Months Ended \nSeptember 30, \n\n2024 2023 (Dollars in millions) \n\nAutomotive sales $ 18,831 $ \n\nAutomotive regulatory credits 739 \n\n446 Automotive leasing \n\nTotal automotive revenues 20,016 \n\n2,790 Services and other \n\nTotal automotive & services and other \nsegment revenue 22,806 21,791 \n\nEnergy generation and storage segment \n2,376 1,559 revenue \n\n$ 25,182 $ 23,350 $ 1,832 \nTotal revenues \n\nNine Months Ended \nSeptember 30, Change Change \n\n$ % 2024 2023 $ % \n\n18,582 $ 249 \n\n1 % $ 53,821 $ 57,879 $ \n33 % \n\n(4,058) (7)% \n\n185 714 53 % 554 2,071 1,357 \n\n(43) (240) 489 1,380 1,620 (9)% (15)% \n\n19,625 391 2 % 57,272 60,856 (3,584) (6)% \n\n624 1,533 2,166 7,686 6,153 29 % 25 % \n\n1,015 5 % 64,958 67,009 (2,051) (3)% \n\n817 7,025 4,597 2,428 52 % 53 % \n\n8 % $ 71,983 $ 71,606 $ \n377 \n1 % \n\nAutomotive & Services and Other Segment \n\nAutomotive sales revenue increased $249 million, or 1%, in the three months ended September 30, 2024 as compared to \nthe three months ended September 30, 2023, due to an increase of approximately 23,000 combined Model 3 and Model Y cash \ndeliveries and an increase of 8,000 deliveries of other models primarily due to our production ramp of Cybertruck. \nAdditionally, we recognized $326 million of FSD revenue for Cybertruck and certain features such as Actually Smart Summon \nin the third quarter of 2024. The increases were partially offset by lower average selling price on our vehicles driven by overall \nprice reductions and attractive financing options provided year over year as well as mix. \n\nAutomotive sales revenue decreased $4.06 billion, or 7%, in the nine months ended September 30, 2024 as compared to \nthe nine months ended September 30, 2023, primarily due to lower average selling price on our vehicles driven by overall price \nreductions and attractive financing options provided year over year as well as mix. Additionally, there was a decrease of \napproximately 17,000 combined Model 3 and Model Y cash deliveries partially due to the early phase of the production ramp \nof the updated Model 3 at our Fremont factory. The decreases were partially offset by an increase of approximately 19,000 \ndeliveries of other models primarily due to our production ramp of Cybertruck and an increase in FSD revenue compared to the \nprior period, as discussed above. \n\nAutomotive regulatory credits revenue increased $185 million, or 33%, in the three months ended September 30, 2024 \nas compared to the three months ended September 30, 2023. Automotive regulatory credits revenue increased $714 million, or \n53%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. These \nincreases were driven by demand for credits in North America as other automobile manufacturers scale back on their battery \nelectric vehicle plans. \n\nAutomotive leasing revenue decreased $43 million, or 9%, in the three months ended September 30, 2024 as compared \n\nto the three months ended September 30, 2023. Automotive leasing revenue decreased $240 million, or 15%, in the nine \nmonths ended September 30, 2024 as compared to the nine months ended September 30, 2023. The decreases were primarily \ndue to lower direct sales-type leasing deliveries and a decrease in lease buyouts. \n\nServices and other revenue increased $624 million, or 29%, in the three months ended September 30, 2024 as compared \nto the three months ended September 30, 2023. Services and other revenue increased $1.53 billion, or 25%, in the nine months \nended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases were primarily due to \nincreases in non-warranty maintenance services and collision revenue, used vehicle revenue, paid Supercharging revenue, \ninsurance services revenue and part sales revenue. \n\nEnergy Generation and Storage Segment", - "page_start": 35, - "page_end": 35, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "ITEM 2. MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF \nOPERATIONS \n\nThe following discussion and analysis should be read in conjunction with the consolidated financial statements and the \nrelated notes included elsewhere in this Quarterly Report on Form 10-Q. \n\nOverview \n\nOur mission is to accelerate the world’s transition to sustainable energy. We design, develop, manufacture, lease and sell \n\nhigh-performance fully electric vehicles, solar energy generation systems and energy storage products. We also offer \nmaintenance, installation, operation, charging, insurance, financial and other services related to our products. Additionally, we \nare increasingly focused on products and services based on AI, robotics and automation. \n\nIn 2024, we produced approximately 1,314,000 consumer vehicles and delivered approximately 1,294,000 consumer \n\nvehicles through the third quarter. We are focused on profitable growth, including by leveraging existing factories and \nproduction lines to introduce new and more affordable products, further improving and deploying our FSD capabilities, \nincluding through our planned robotaxi product, reducing costs, increasing vehicle production, utilized capacity and delivery \ncapabilities, improving and developing our vehicles and battery technologies, vertically integrating and localizing our supply \nchain, and expanding our global infrastructure, including our service and charging infrastructure. \n\nIn 2024, we deployed 20.41 GWh of energy storage products through the third quarter. We are focused on ramping the \nproduction and increasing the market penetration of our energy storage products. \n\nDuring the three and nine months ended September 30, 2024, we recognized total revenues of $25.18 billion and \n$71.98 billion, respectively, representing increases of $1.83 billion and $377 million, respectively, compared to the same \nperiods in the prior year. During the three and nine months ended September 30, 2024, our net income attributable to common \nstockholders was $2.17 billion and $4.77 billion, respectively, representing an increase of $314 million and a decrease of $2.30 \nbillion, respectively, compared to the same periods in the prior year. We continue to ramp production and build and optimize \nour manufacturing capacity, expand our operations while focusing on further cost reductions and operational efficiencies to \nenable increased deliveries and deployments of our products, and invest in research and development to accelerate our AI, \nsoftware, and fleet-based profits for further revenue growth. \n\nWe ended the third quarter of 2024 with $33.65 billion in cash and cash equivalents and investments, representing an \n\nincrease of $4.55 billion from the end of 2023. Our cash flows provided by operating activities were $10.11 billion during the \nnine months ended September 30, 2024, compared to $8.89 billion during the same period ended September 30, 2023, \nrepresenting an increase of $1.22 billion. Capital expenditures amounted to $8.56 billion during the nine months ended \nSeptember 30, 2024, compared to $6.59 billion during the same period ended September 30, 2023, representing an increase of \n$1.96 billion. Overall growth has allowed our business to generally fund itself, and we will continue investing in a number of \ncapital-intensive projects and research and development in upcoming periods. \n\nManagement Opportunities, Challenges and Uncertainties and 2024 Outlook \n\nAutomotive—Production \n\nThe following is a summary of the status of production of each of our announced vehicle models in production and \nunder development, as of the date of this Quarterly Report on Form 10-Q:", - "page_start": 31, - "page_end": 31, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "On June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western \nDistrict of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims \nfor breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and \ngender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified \ndamages payable to Tesla, and attorneys’ fees. On July 22, 2022, the Court consolidated the two cases and on September 6, \n2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on \nSeptember 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2, \n2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the \ndefendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to \namend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr. \nMusk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint.", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "tesla_form_10q.pdf", - "query": "Where was Tesla incorporated? ", - "target_page": 13, - "target_passage": "State of Delaware", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Tesla, Inc. \n\nNotes to Consolidated Financial Statements \n\n(unaudited) \n\nNote 1 – Overview & Summary of Significant Accounting Policies \n\nOverview \n\nTesla, Inc. (“Tesla”, the “Company”, “we”, “us” or “our”) was incorporated in the State of Delaware on July 1, 2003 and \nconverted to a Texas corporation on June 13, 2024. \n\nUnaudited Interim Financial Statements \n\nThe consolidated financial statements, including the consolidated balance sheet as of September 30, 2024, the \nconsolidated statements of operations, the consolidated statements of comprehensive income, the consolidated statements of \nredeemable noncontrolling interests and equity for the three and nine months ended September 30, 2024 and 2023, and the \nconsolidated statements of cash flows for the nine months ended September 30, 2024 and 2023, as well as other information \ndisclosed in the accompanying notes, are unaudited. The consolidated balance sheet as of December 31, 2023 was derived from \nthe audited consolidated financial statements as of that date. The interim consolidated financial statements and the \naccompanying notes should be read in conjunction with the annual consolidated financial statements and the accompanying \nnotes contained in our Annual Report on Form 10-K for the year ended December 31, 2023. \n\nThe interim consolidated financial statements and the accompanying notes have been prepared on the same basis as the \n\nannual consolidated financial statements and, in the opinion of management, reflect all adjustments, which include only normal \nrecurring adjustments, necessary for a fair statement of the results of operations for the periods presented. The consolidated \nresults of operations for any interim period are not necessarily indicative of the results to be expected for the full year or for any \nother future years or interim periods. \n\n\n \n \n \n \n [html]20242023\n
2024202318.831$
18.582$53.821$57.879739554
2.0711.3572.2281.416
6.6164.1882.7902.166
7.6866.15324.58822.718
70.19469.577446489
1.3801.620148143
40940925.182$
23.350$71.983$71.606
\n\nAutomotive Segment \n\nAutomotive Sales \n\nDeferred revenue related to the access to our Full Self Driving (Supervised) (“FSD”) Capability features and their \nongoing maintenance, internet connectivity, free Supercharging programs and over-the-air software updates primarily on \nautomotive sales amounted to $3.61 billion and $3.54 billion as of September 30, 2024 and December 31, 2023, respectively. \n\n10", - "page_start": 12, - "page_end": 12, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "SIGNATURES \n\nPursuant to the requirements of Section 13 or 15(d) the Securities Exchange Act of 1934, the registrant has duly \ncaused this report to be signed on its behalf by the undersigned, thereunto duly authorized. \n\nTesla, Inc.", - "page_start": 48, - "page_end": 48, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Certain Investigations and Other Matters \n\nWe regularly receive requests for information, including subpoenas, from regulators and governmental authorities such \nas the National Highway Traffic Safety Administration, the National Transportation Safety Board, the Securities and Exchange \nCommission (“SEC”), the Department of Justice (“DOJ”), and various local, state, federal, and international agencies. The \nongoing requests for information include topics such as operations, technology (e.g., vehicle functionality, vehicle incidents, \nAutopilot and FSD Capability), compliance, finance, data privacy, and other matters related to Tesla’s business, its personnel, \nand related parties. We routinely cooperate with such formal and informal requests for information, investigations, and other \ninquiries. To our knowledge no government agency in any ongoing investigation has concluded that any wrongdoing occurred. \nWe cannot predict the outcome or impact of any ongoing matters. Should the government decide to pursue an enforcement \naction, there exists the possibility of a material adverse impact on our business, results of operation, prospects, cash flows, \nfinancial position or brand. \n\nWe are also subject to various other legal proceedings, risks and claims that arise from the normal course of business \n\nactivities. For example, during the second quarter of 2023, a foreign news outlet reported that it obtained certain \nmisappropriated data including, purportedly non-public Tesla business and personal information. Tesla has made notifications \nto potentially affected individuals (current and former employees) and regulatory authorities and we are working with certain \nlaw enforcement and other authorities. On August 5, 2023, a putative class action was filed in the United States District Court \nfor the Northern District of California, purportedly on behalf of all U.S. individuals impacted by the data incident, followed by \nseveral additional lawsuits, that each assert claims under various state laws and seeks monetary damages and other relief. If an \nunfavorable ruling or development were to occur in these or other possible legal proceedings, risks and claims, there exists the \npossibility of a material adverse impact on our business, results of operations, prospects, cash flows, financial position or brand. \n\nAssets \n\nCurrent assets \n\nCash and cash equivalents \n\nAccounts receivable, net \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDeferred revenue, net of current portion \n\nDebt and finance leases, net of current portion \n\nTotal liabilities", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Between October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery, \n\npurportedly on behalf of Tesla, against Mr. Musk and the members of Tesla’s board of directors, as constituted at relevant \ntimes, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits \nchallenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have \nbeen stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the \nU.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla \nboard of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in \nthe above-referenced consolidated purported stockholder class action.", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "UNITED STATES \nSECURITIES AND EXCHANGE COMMISSION \nWashington, D.C. 20549 \nFORM 10-Q \n\n(Mark One) \nx QUARTERLY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF \n1934 \n\nFor the quarterly period ended September 30, 2024 \nOR \no TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF \n1934 \n\nFor the transition period from__ ____ ___to__ ____ ___\n\nCommission File Number: 001-34756 \n\nTesla, Inc. \n\n(Exact name of registrant as specified in its charter) \n\nTexas 91-2197729 \n\n(State or other jurisdiction of \nincorporation or organization) (I.R.S. Employer \nIdentification No.) \n\n1 Tesla Road \nAustin, Texas \n(Address of principal executive offices) 78725 \n(Zip Code) \n\n(512) 516-8177 \n(Registrant’s telephone number, including area code) \nSecurities registered pursuant to Section 12(b) of the Act: \n\n\n \n \n \n \n [html]\n
Intle of each classTrading Symbol ( s )Name of each exchange on which registered
Common stockTSLAThe Nasdaq Global Select Market
\n\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of \n\n1934 (“Exchange Act”) during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been \nsubject to such filing requirements for the past 90 days. Yes x No o \n\nIndicate by check mark whether the registrant has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 \n\nof Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit such files). \nYes x No o \n\nIndicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, a smaller reporting company, or \n\nan emerging growth company. See the definitions of “large accelerated filer,” “accelerated filer,” “smaller reporting company” and “emerging growth \ncompany” in Rule 12b-2 of the Exchange Act: \n\nx Accelerated filer \n\no Smaller reporting company \n\no \n\nIf an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised \nfinancial accounting standards provided pursuant to Section 13(a) of the Exchange Act. o \nIndicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act). Yes o No x \nAs of October 18, 2024, there were 3,210,059,659 shares of the registrant’s common stock outstanding.", - "page_start": 0, - "page_end": 0, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Tesla, Inc. \n\nConsolidated Statements of Comprehensive Income \n(in millions) \n(unaudited) \n\nThree Months Ended September 30, \n\n2024 2023 \n\nNet income \nOther comprehensive income (loss): \n\n$ 2,183 $ 1,878 $ \n\nForeign currency translation adjustment \nUnrealized net gain on investments, net of tax \nNet loss realized and included in net income 445 \n8 \n— (289) \n7 \n— \n\n2,636 1,596 \n\nComprehensive income \nLess: Comprehensive income (loss) attributable to \nnoncontrolling interests and redeemable \nnoncontrolling interests in subsidiaries \nComprehensive income attributable to common \nstockholders \n$", - "page_start": 7, - "page_end": 7, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "class actions and other consumer claims that allege, among other things, purported defects and misrepresentations related to our \nproducts and services. For example, on September 14, 2022, a proposed class action was filed against Tesla, Inc. and related \nentities in the U.S. District Court for the Northern District of California, alleging various claims about the Company’s driver \nassistance technology systems under state and federal law. This case was later consolidated with several other proposed class \nactions, and a Consolidated Amended Complaint was filed on October 28, 2022, which seeks damages and other relief on \nbehalf of all persons who purchased or leased from Tesla between January 1, 2016, to the present. On October 5, 2022, a \nproposed class action complaint was filed in the U.S. District Court for the Eastern District of New York asserting similar state \nand federal law claims against the same defendants. On September 30, 2023, the Court dismissed this action with leave to \namend the complaint. On November 20, 2023, the plaintiff moved to amend the complaint, which Tesla opposed. On August 8, \n2024, the Court denied the plaintiff’s motion for leave to file an amended complaint and entered judgment for Tesla. On \nSeptember 5, 2024, the plaintiff filed a notice of appeal to United States Court of Appeals for the Second Circuit. On March 22, \n2023, the plaintiffs in the Northern District of California consolidated action filed a motion for a preliminary injunction to order \nTesla to (1) cease using the term “Full Self-Driving Capability” (FSD Capability), (2) cease the sale and activation of FSD \nCapability and deactivate FSD Capability on Tesla vehicles, and (3) provide certain notices to consumers about proposed court- \nfindings about the accuracy of the use of the terms Autopilot and FSD Capability. Tesla opposed the motion. On September 30, \n2023, the Court denied the request for a preliminary injunction, compelled four of five plaintiffs to arbitration, and dismissed \nthe claims of the fifth plaintiff with leave to amend the complaint. On October 31, 2023, the remaining plaintiff in the Northern \nDistrict of California action filed an amended complaint, which Tesla moved to dismiss, and on May 15, 2024, the Court \ngranted in part and denied in part Tesla’s motion. On October 2, 2023, a similar proposed class action was filed in San Diego \nCounty Superior Court in California. Tesla subsequently removed the San Diego County case to federal court and on January 8, \n2024, the federal court granted Tesla’s motion to transfer the case to the U.S. District Court for the Northern District of \nCalifornia. Tesla moved to compel arbitration, which the plaintiff did not oppose, and on June 27, 2024, the Court stayed the \ncase pending arbitration. \n\nOn February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California \n\nagainst Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants \nmade material misrepresentations and omissions about the Company’s Autopilot and FSD Capability technologies and seeks \nmoney damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, \n2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On \nNovember 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla’s motion \nto dismiss without prejudice. \n\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "**ITEM 2. PROPERTIES**\n\nOur corporate headquarters is located in Ft. Lauderdale, Florida in leased premises. As of December 31, \n2004, we operated approximately 6,100 collection vehicles. Certain of our property and equipment are subject \nto operating leases or liens securing payment of portions of our indebtedness. We also lease certain of our \noÇces and equipment. We believe that our facilities are suÇcient for our current needs.", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "On March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern \n\nDistrict of California. Several similar complaints were also filed in the same court and these cases have now all been \nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and \nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla \ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended \ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on \nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second \nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration \norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the \nConsolidated Second Amended Complaint.", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "tesla_form_10q.pdf", - "query": "What is the reason for the increase in Tesla's tax rate from 2023 to 2024?", - "target_page": 26, - "target_passage": " increase in our effective tax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in the mix of our jurisdictional earnings", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Tesla, Inc. \n\nConsolidated Statements of Comprehensive Income \n(in millions) \n(unaudited) \n\nThree Months Ended September 30, \n\n2024 2023 \n\nNet income \nOther comprehensive income (loss): \n\n$ 2,183 $ 1,878 $ \n\nForeign currency translation adjustment \nUnrealized net gain on investments, net of tax \nNet loss realized and included in net income 445 \n8 \n— (289) \n7 \n— \n\n2,636 1,596 \n\nComprehensive income \nLess: Comprehensive income (loss) attributable to \nnoncontrolling interests and redeemable \nnoncontrolling interests in subsidiaries \nComprehensive income attributable to common \nstockholders \n$", - "page_start": 7, - "page_end": 7, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "On March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern \n\nDistrict of California. Several similar complaints were also filed in the same court and these cases have now all been \nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and \nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla \ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended \ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on \nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second \nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration \norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the \nConsolidated Second Amended Complaint.", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "We are focused on growing our manufacturing capacity, which includes capacity for manufacturing newer vehicle \nmodels such as our Cybertruck, Tesla Semi and future vehicles utilizing aspects of our next generation platform, and ramping \nthe production at our Gigafactories to their installed production capacities as well as increasing production rate and efficiency \nat our current factories. The next phase of production growth will depend on the continued ramp at our factories and be initiated \nby advances in autonomy and the introduction of new products, including those built on our next generation vehicle platform, \nas well as our ability to add to our available sources of battery cell supply by manufacturing our own cells that we are \ndeveloping to have high-volume output, lower capital and production costs and longer range. Our goals are to improve vehicle \nperformance, decrease production costs and increase affordability and customer awareness. \n\nThese plans are subject to uncertainties inherent in establishing and ramping manufacturing operations, which may be \n\nexacerbated by new product and manufacturing technologies we introduce, the number of concurrent international projects, any \nindustry-wide component constraints, labor shortages and any future impact from events outside of our control. For example, \nduring the first quarter of 2024, we experienced a sequential decline in production volumes partially caused by the early phase \nof the production ramp of the updated Model 3 at our Fremont factory, and factory shutdowns at Gigafactory Berlin- \nBrandenburg resulting from shipping diversions caused by the Red Sea conflict and an arson attack. Moreover, we have set \nambitious technological targets with our plans for battery cells as well as for iterative manufacturing and design improvements \nfor our vehicles with each new factory. \n\nAutomotive—Demand, Sales, Deliveries and Infrastructure \n\nOur cost reduction efforts, cost innovation strategies, and additional localized procurement and manufacturing are key to \n\nour vehicles’ affordability and have allowed us to competitively price our vehicles. We will also continue to generate demand \nby improving our vehicles’ performance and functionality, including through product offerings and features based on artificial \nintelligence such as Autopilot, FSD (Supervised), and other software, and delivering new vehicles and vehicle options. In \naddition, we have been increasing awareness, and expanding our vehicle financing programs, including attractive leasing terms \nfor our customers. Moreover, we expect to continue to benefit from ongoing electrification of the automotive sector and \nincreasing environmental regulations and initiatives.", - "page_start": 33, - "page_end": 33, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Cost of automotive sales revenue increased $87 million, or 1%, in the three months ended September 30, 2024 as \ncompared to the three months ended September 30, 2023 due to the increases in deliveries year over year as discussed above, \npartially offset by a decrease in the average combined cost per unit of our vehicles primarily from lower raw material costs, \nfreight and duties as well as mix. \n\nCost of automotive sales revenue decreased $2.32 billion, or 5%, in the nine months ended September 30, 2024 as \ncompared to the nine months ended September 30, 2023 due to a decrease in the average combined cost per unit of our vehicles \nprimarily from lower raw material costs, freight and duties as well as mix, in addition to the volume changes in deliveries year \nover year as discussed above. The decreases were partially offset by higher costs for Cybertruck and the updated Model 3 at our \nFremont factory as a result of the temporary under-utilization of manufacturing capacity as production ramps. \n\nCost of automotive leasing revenue decreased $54 million, or 18%, in the three months ended September 30, 2024 as \n\ncompared to the three months ended September 30, 2023. Cost of automotive leasing revenue decreased $211 million, or 22%, \nin the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The decreases were \nprimarily due to a decrease in direct sales-type leasing cost of revenue driven by lower deliveries and a decrease in our direct \noperating lease cost of revenue driven by lower lease payoffs compared to the prior periods. \n\nCost of services and other revenue increased $507 million, or 25%, in the three months ended September 30, 2024 as \n\ncompared to the three months ended September 30, 2023. Cost of services and other revenue increased $1.47 billion, or 26%, in \nthe nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases were \nprimarily due to volume increases in used vehicle sales, insurance services, paid Supercharging, non-warranty maintenance \nservices and collision and part sales. \n\n30", - "page_start": 37, - "page_end": 37, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Certain Investigations and Other Matters \n\nWe regularly receive requests for information, including subpoenas, from regulators and governmental authorities such \nas the National Highway Traffic Safety Administration, the National Transportation Safety Board, the Securities and Exchange \nCommission (“SEC”), the Department of Justice (“DOJ”), and various local, state, federal, and international agencies. The \nongoing requests for information include topics such as operations, technology (e.g., vehicle functionality, vehicle incidents, \nAutopilot and FSD Capability), compliance, finance, data privacy, and other matters related to Tesla’s business, its personnel, \nand related parties. We routinely cooperate with such formal and informal requests for information, investigations, and other \ninquiries. To our knowledge no government agency in any ongoing investigation has concluded that any wrongdoing occurred. \nWe cannot predict the outcome or impact of any ongoing matters. Should the government decide to pursue an enforcement \naction, there exists the possibility of a material adverse impact on our business, results of operation, prospects, cash flows, \nfinancial position or brand. \n\nWe are also subject to various other legal proceedings, risks and claims that arise from the normal course of business \n\nactivities. For example, during the second quarter of 2023, a foreign news outlet reported that it obtained certain \nmisappropriated data including, purportedly non-public Tesla business and personal information. Tesla has made notifications \nto potentially affected individuals (current and former employees) and regulatory authorities and we are working with certain \nlaw enforcement and other authorities. On August 5, 2023, a putative class action was filed in the United States District Court \nfor the Northern District of California, purportedly on behalf of all U.S. individuals impacted by the data incident, followed by \nseveral additional lawsuits, that each assert claims under various state laws and seeks monetary damages and other relief. If an \nunfavorable ruling or development were to occur in these or other possible legal proceedings, risks and claims, there exists the \npossibility of a material adverse impact on our business, results of operations, prospects, cash flows, financial position or brand. \n\nAssets \n\nCurrent assets \n\nCash and cash equivalents \n\nAccounts receivable, net \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDeferred revenue, net of current portion \n\nDebt and finance leases, net of current portion \n\nTotal liabilities", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Tesla, Inc. \n\nNotes to Consolidated Financial Statements \n\n(unaudited) \n\nNote 1 – Overview & Summary of Significant Accounting Policies \n\nOverview \n\nTesla, Inc. (“Tesla”, the “Company”, “we”, “us” or “our”) was incorporated in the State of Delaware on July 1, 2003 and \nconverted to a Texas corporation on June 13, 2024. \n\nUnaudited Interim Financial Statements \n\nThe consolidated financial statements, including the consolidated balance sheet as of September 30, 2024, the \nconsolidated statements of operations, the consolidated statements of comprehensive income, the consolidated statements of \nredeemable noncontrolling interests and equity for the three and nine months ended September 30, 2024 and 2023, and the \nconsolidated statements of cash flows for the nine months ended September 30, 2024 and 2023, as well as other information \ndisclosed in the accompanying notes, are unaudited. The consolidated balance sheet as of December 31, 2023 was derived from \nthe audited consolidated financial statements as of that date. The interim consolidated financial statements and the \naccompanying notes should be read in conjunction with the annual consolidated financial statements and the accompanying \nnotes contained in our Annual Report on Form 10-K for the year ended December 31, 2023. \n\nThe interim consolidated financial statements and the accompanying notes have been prepared on the same basis as the \n\nannual consolidated financial statements and, in the opinion of management, reflect all adjustments, which include only normal \nrecurring adjustments, necessary for a fair statement of the results of operations for the periods presented. The consolidated \nresults of operations for any interim period are not necessarily indicative of the results to be expected for the full year or for any \nother future years or interim periods. \n\n\n \n \n \n \n [html]20242023\n
2024202318.831$
18.582$53.821$57.879739554
2.0711.3572.2281.416
6.6164.1882.7902.166
7.6866.15324.58822.718
70.19469.577446489
1.3801.620148143
40940925.182$
23.350$71.983$71.606
\n\nAutomotive Segment \n\nAutomotive Sales \n\nDeferred revenue related to the access to our Full Self Driving (Supervised) (“FSD”) Capability features and their \nongoing maintenance, internet connectivity, free Supercharging programs and over-the-air software updates primarily on \nautomotive sales amounted to $3.61 billion and $3.54 billion as of September 30, 2024 and December 31, 2023, respectively. \n\n10", - "page_start": 12, - "page_end": 12, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Results of Operations \n\nRevenues \n\nThree Months Ended \nSeptember 30, \n\n2024 2023 (Dollars in millions) \n\nAutomotive sales $ 18,831 $ \n\nAutomotive regulatory credits 739 \n\n446 Automotive leasing \n\nTotal automotive revenues 20,016 \n\n2,790 Services and other \n\nTotal automotive & services and other \nsegment revenue 22,806 21,791 \n\nEnergy generation and storage segment \n2,376 1,559 revenue \n\n$ 25,182 $ 23,350 $ 1,832 \nTotal revenues \n\nNine Months Ended \nSeptember 30, Change Change \n\n$ % 2024 2023 $ % \n\n18,582 $ 249 \n\n1 % $ 53,821 $ 57,879 $ \n33 % \n\n(4,058) (7)% \n\n185 714 53 % 554 2,071 1,357 \n\n(43) (240) 489 1,380 1,620 (9)% (15)% \n\n19,625 391 2 % 57,272 60,856 (3,584) (6)% \n\n624 1,533 2,166 7,686 6,153 29 % 25 % \n\n1,015 5 % 64,958 67,009 (2,051) (3)% \n\n817 7,025 4,597 2,428 52 % 53 % \n\n8 % $ 71,983 $ 71,606 $ \n377 \n1 % \n\nAutomotive & Services and Other Segment \n\nAutomotive sales revenue increased $249 million, or 1%, in the three months ended September 30, 2024 as compared to \nthe three months ended September 30, 2023, due to an increase of approximately 23,000 combined Model 3 and Model Y cash \ndeliveries and an increase of 8,000 deliveries of other models primarily due to our production ramp of Cybertruck. \nAdditionally, we recognized $326 million of FSD revenue for Cybertruck and certain features such as Actually Smart Summon \nin the third quarter of 2024. The increases were partially offset by lower average selling price on our vehicles driven by overall \nprice reductions and attractive financing options provided year over year as well as mix. \n\nAutomotive sales revenue decreased $4.06 billion, or 7%, in the nine months ended September 30, 2024 as compared to \nthe nine months ended September 30, 2023, primarily due to lower average selling price on our vehicles driven by overall price \nreductions and attractive financing options provided year over year as well as mix. Additionally, there was a decrease of \napproximately 17,000 combined Model 3 and Model Y cash deliveries partially due to the early phase of the production ramp \nof the updated Model 3 at our Fremont factory. The decreases were partially offset by an increase of approximately 19,000 \ndeliveries of other models primarily due to our production ramp of Cybertruck and an increase in FSD revenue compared to the \nprior period, as discussed above. \n\nAutomotive regulatory credits revenue increased $185 million, or 33%, in the three months ended September 30, 2024 \nas compared to the three months ended September 30, 2023. Automotive regulatory credits revenue increased $714 million, or \n53%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. These \nincreases were driven by demand for credits in North America as other automobile manufacturers scale back on their battery \nelectric vehicle plans. \n\nAutomotive leasing revenue decreased $43 million, or 9%, in the three months ended September 30, 2024 as compared \n\nto the three months ended September 30, 2023. Automotive leasing revenue decreased $240 million, or 15%, in the nine \nmonths ended September 30, 2024 as compared to the nine months ended September 30, 2023. The decreases were primarily \ndue to lower direct sales-type leasing deliveries and a decrease in lease buyouts. \n\nServices and other revenue increased $624 million, or 29%, in the three months ended September 30, 2024 as compared \nto the three months ended September 30, 2023. Services and other revenue increased $1.53 billion, or 25%, in the nine months \nended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases were primarily due to \nincreases in non-warranty maintenance services and collision revenue, used vehicle revenue, paid Supercharging revenue, \ninsurance services revenue and part sales revenue. \n\nEnergy Generation and Storage Segment", - "page_start": 35, - "page_end": 35, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "class actions and other consumer claims that allege, among other things, purported defects and misrepresentations related to our \nproducts and services. For example, on September 14, 2022, a proposed class action was filed against Tesla, Inc. and related \nentities in the U.S. District Court for the Northern District of California, alleging various claims about the Company’s driver \nassistance technology systems under state and federal law. This case was later consolidated with several other proposed class \nactions, and a Consolidated Amended Complaint was filed on October 28, 2022, which seeks damages and other relief on \nbehalf of all persons who purchased or leased from Tesla between January 1, 2016, to the present. On October 5, 2022, a \nproposed class action complaint was filed in the U.S. District Court for the Eastern District of New York asserting similar state \nand federal law claims against the same defendants. On September 30, 2023, the Court dismissed this action with leave to \namend the complaint. On November 20, 2023, the plaintiff moved to amend the complaint, which Tesla opposed. On August 8, \n2024, the Court denied the plaintiff’s motion for leave to file an amended complaint and entered judgment for Tesla. On \nSeptember 5, 2024, the plaintiff filed a notice of appeal to United States Court of Appeals for the Second Circuit. On March 22, \n2023, the plaintiffs in the Northern District of California consolidated action filed a motion for a preliminary injunction to order \nTesla to (1) cease using the term “Full Self-Driving Capability” (FSD Capability), (2) cease the sale and activation of FSD \nCapability and deactivate FSD Capability on Tesla vehicles, and (3) provide certain notices to consumers about proposed court- \nfindings about the accuracy of the use of the terms Autopilot and FSD Capability. Tesla opposed the motion. On September 30, \n2023, the Court denied the request for a preliminary injunction, compelled four of five plaintiffs to arbitration, and dismissed \nthe claims of the fifth plaintiff with leave to amend the complaint. On October 31, 2023, the remaining plaintiff in the Northern \nDistrict of California action filed an amended complaint, which Tesla moved to dismiss, and on May 15, 2024, the Court \ngranted in part and denied in part Tesla’s motion. On October 2, 2023, a similar proposed class action was filed in San Diego \nCounty Superior Court in California. Tesla subsequently removed the San Diego County case to federal court and on January 8, \n2024, the federal court granted Tesla’s motion to transfer the case to the U.S. District Court for the Northern District of \nCalifornia. Tesla moved to compel arbitration, which the plaintiff did not oppose, and on June 27, 2024, the Court stayed the \ncase pending arbitration. \n\nOn February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California \n\nagainst Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants \nmade material misrepresentations and omissions about the Company’s Autopilot and FSD Capability technologies and seeks \nmoney damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, \n2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On \nNovember 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla’s motion \nto dismiss without prejudice. \n\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Our provision for income taxes increased by $434 million in the three months ended September 30, 2024 and increased \nby $652 million in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30, \n2023, respectively. Our effective tax rate increased from 8% to 22% in the three months ended September 30, 2024 and \nincreased from 10% to 23% in the nine months ended September 30, 2024 as compared to the three and nine months ended \nSeptember 30, 2023, respectively. These increases are primarily due to the impact of releasing the valuation allowance on our \nU.S. deferred tax assets in the fourth quarter of 2023 and changes in mix of jurisdictional earnings. \n\nSee Note 9, Income Taxes, to the consolidated financial statements included elsewhere in this Quarterly Report on Form \n10-Q for further details. \n\nLiquidity and Capital Resources \n\nWe expect to continue to generate net positive operating cash flow as we have done in the last five fiscal years. The cash \n\nwe generate from our core operations enables us to fund ongoing operations and production, our research and development \nprojects for new products and technologies including our proprietary battery cells, additional manufacturing ramps at existing \nmanufacturing facilities, the construction of future factories, and the continued expansion of our retail and service locations, \nbody shops, Mobile Service fleet, Supercharger, including to support NACS, energy product installation capabilities and \nautonomy and other artificial intelligence enabled products. \n\nIn addition, because a large portion of our future expenditures will be to fund our growth, we expect that if needed we \n\nwill be able to adjust our capital and operating expenditures by operating segment. For example, if our near-term manufacturing \noperations decrease in scale or ramp more slowly than expected, including due to global economic or business conditions, we \nmay choose to correspondingly slow the pace of our capital expenditures. Finally, we continually evaluate our cash needs and \nmay decide it is best to raise additional capital or seek alternative financing sources to fund the rapid growth of our business, \nincluding through drawdowns on existing or new debt facilities or financing funds. Conversely, we may also from time to time \ndetermine that it is in our best interests to voluntarily repay certain indebtedness early. \n\nAccordingly, we believe that our current sources of funds will provide us with adequate liquidity during the 12-month \nperiod following September 30, 2024, as well as in the long-term. \n\nSee the sections below for more details regarding the material requirements for cash in our business and our sources of \nliquidity to meet such needs. \n\nMaterial Cash Requirements \n\nFrom time to time in the ordinary course of business, we enter into agreements with vendors for the purchase of \ncomponents and raw materials to be used in the manufacture of our products. However, due to contractual terms, variability in \nthe precise growth curves of our development and production ramps, and opportunities to renegotiate pricing, we generally do \nnot have binding and enforceable purchase orders under such contracts beyond the short-term, and the timing and magnitude of \npurchase orders beyond such period is difficult to accurately project.", - "page_start": 42, - "page_end": 42, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Selling, General and Administrative Expense \n\nThree Months Ended \nSeptember 30, Nine Months Ended \nSeptember 30, Change \n\n2024 2023 $ % 2024 2023 \n\n$ 1,186 $ 1,253 $ (67) (5)% $ 3,837 $ 3,520 $ 317 \n\n5 % 5 % 5 % 5 %", - "page_start": 39, - "page_end": 39, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0764.pdf", - "query": "Which is the first candidate for experimenting the case of electrons interacting with a single boson mode?", - "target_page": 6, - "target_passage": "The primary candidate for such mode is an optical phonon", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "15 \n\nF. Marsiglio for many discussions concerning the infrared \nconductivity and optical integrals and thank A. Boris, E. \nvan Heumen, J. Hirsch, and F. Marsiglio for the com- \nments on the manuscript. The work was supported by \nnsf-dmr 0906953. \n\nWe would like to thank M. Norman, Tom Timusk, \nDmitri Basov, Chris Homes, Nicole Bontemps, Andres \nSantander-Syro, Ricardo Lobo, Dirk van der Marel, A. \nBoris, E. van Heumen, A. B. Kuzmenko, L. Benfato, and \n\n1 R. Kubo, J. Phys. Soc. Jpn 12, 570(1957). \n2 R.A. Ferrrel and R.E. Glover, Phys. Rev.109, 1398 (1958). \n3 M. Tinkham and R.A. Ferrrel, Phys. Rev. Lett. 2, 331 \n(1959), M. Tinkham, Introduction to Superconductivity \n(McGraw-Hill, New York, 1975). \n\nand Phys. Rev. B 62, 15131 (2000). \n\n24 A. Toschi, M. Capone, M. Ortolani, P. Calvani, S. Lupi \nand C. Castellani, Phys. Rev. Lett. 95, 097002 (2005). \n25 F. Marsiglio, F. Carbone, A. Kuzmenko and D. van der \nMarel, Phys. Rev. B 74, 174516 (2006). \n26 L. Benfatto, S. G. Sharapov, N. Andrenacci and H. Beck, \nPhys. Rev. B 71, 104511 (2005). \n\n4 J. Hirsch, Physica C 199, 305 (1992). \n5 D. N. Basov and T. Timusk, Rev. Mod. Phys. 77, 721 \n(2005); A. V. Puchkov, D. N. Basov and T. Timusk, J. \nPhys. Cond. Matter 8, 10049 (1996). \n27 D. van der Marel, H.J.A. Molegraaf, C. Presura, and I. \nSantoso, Concepts in Electron Correlations, edited by A. \nHewson and V. Zlatic (Kluwer, 2003) \n\n6 C. M. Varma et al, Phys. Rev. Lett. 63, 1996 (1989). \n7 D. N. Basov, S. I. Woods, A. S. Katz, E. J. Singley, R. C. \nDynes, M. Xu, D. G. Hinks, C. C. Homes and M. Strongin, \nScience 283, 49 (1999). \n\n28 L. Benfatto, J.P. Carbotte and F. Marsiglio, Phys. Rev. B \n74, 155115 (2006) \n\n29 F. Marsiglio, Phys. Rev. B 73, 064507(2006). \n30 M.R. Norman and C. P´epin, Phys. Rev. B 66, 100506(R) \n\n8 H.J.A Molegraaf, C. Presura, D. van der Marel, P.H. Kess, \nM. Li, Science 295, 2239 (2002); A. B. Kuzmenko, H. J. A. \nMolegraaf, F. Carbone and D. van der Marel, Phys. Rev. \nB 72, 144503 (2005). \n\n(2002). \n\n31 J. Fink et al., Phys. Rev. B 74, 165102(R) (2006). \n32 M. Eschrig, Adv. Phys. 55, 47-183 (2006) \n33 M.R. Norman and A.V. Chubukov, Phys. Rev. B 73, \n\n9 A. F. Santander-Syro, R. P. S. M. Lobo, N. Bontemps, Z. \nKonstantinovic, Z. Z. Li and H. Raffy, Europhys. Lett. 62, \n568 (2003); \n140501(R)(2006). \n\n34 A.E. Karakozov and E.G. Maksimov, cond-mat/0511185, \nA. E. Karakozov, E. G. Maksimov and O. V. Dolgov, Solid \nState Comm. 124, 119 (2002); A. E. Karakozov and E. G. \nMaksimov, ibid. 139, 80 (2006). 10 A. V. Boris, N. N. Kovaleva, O. V. Dolgov, T. Holden, \nC. T. Lin, B. Keimer and C. Bernhard, Science 304, 708 \n(2004). \n11 G. Deutscher, A. F. Santander-Syro and N. Bontemps, \n\n35 see e.g., P. B. Allen, Phys. Rev. B 3, 305 (1971); S. V. \nShulga, O. V. Dolgov and E. G. Maksimov, Physica C \n178, 266 (1991). \nPhys. Rev. B 72, 092504 (2005). \n\n36 A. A. Abriskov and L. P. Gor’kov, JETP 35, 1090 (1959), \n\n12 F. Carbone, A. B. Kuzmenko, H. J. A. Molegraaf, E. van \nHeumen, V. Lukovac, F. Marsiglio, D. van der Marel, K. \nHaule, G. Kotliar, H. Berger, S. Courjault, P. H. Kes and \nM. Li, Phys. Rev. B 74, 064510 (2006). \n\nSang Boo Nam, Phys. Rev. 156, 470 (1967). \n37 Theory of superconductivity, Schrieffer, (W. A. Benjamin \n13 C. C. Homes, S. V. Dordevic, D. A. Bonn, R. Liang and Inc., New York 1964). \n38 M.R. Norman, M. Randeria, H. Ding, and J.C. Cam- \n\nW. N. Hardy, Phys. Rev. B 69, 024514 (2004). \n14 J. Hwanget al, Phys. Rev. B 73, 014508 (2006). \n15 E. van Heumen, R. Lortz, A. B. Kuzmenko, F. Carbone, \nD. van der Marel, X. Zhao, G. Yu, Y. Cho, N. Barisic, M. \nGreven, C. C. Homes and S. V. Dordevic, Phys. Rev. B \n75, 054522 (2007). \n\npuzano, Phys. Rev. B 52, 615 (1995). \n\n39 Z.X. Shen and D.S. Dessau, Phys. Rep. 253, 1(1995), \nJ. C. Campuzano, M. R. Norman, and M. Randeria, \n“Superconductivity”(Vol-1), 923-992, Springer (2008). \n40 A. V. Chubukov, Ar. Abanov, and D. N. Basov, Phys. Rev. \n\n16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003).", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "∼ \n\nIn this Subsection we regard each four-spin cluster \nas a tetrahedron, and consider possible optical phonon \nmodes(distortions) and their couplings to the spin sys- \ntem. The basic idea is that the intra-cluster Heisen- \nberg coupling Jcluster can linearly depend on the dis- \ntance between physical spins. Therefore certain distor- \ntions of the tetrahedron couple to certain linear combi- \nSm. Integrating out phonon modes will \nnations of Sℓ · \nthen generate high order spin interactions. This idea has \nbeen extensively studied and applied to several magnetic \nmaterials28–34. More details can be found in a recent \nreview by Tchernyshyov and Chern35. And we will fre- \nquently use their notations. In this Subsection we will \nuse the representation (5) for τ z. \n\nIV. GENERATE THE HIGH ORDER PHYSICAL \nSPIN INTERACTIONS BY PERTURBATIVE \nEXPANSION. \n\nOne major drawback of the present construction is that \nit involves high order interactions of physical spins[see \n(8) and (9)], thus is ‘unnatural’. In this Section we will \nmake compromises between exact solvability and natu- \nralness. We consider two clusters j and k and try to \ngenerate the Jx,y,z interactions in (7) from perturbation \nseries expansion of more natural(lower order) physical \nspin interactions. Two different approaches for this pur- \npose will be laid out in the following two Subsections. In \nSubsection IV A we will consider the two clusters as two \ntetrahedra, and couple the spin system to certain opti- \ncal phonons, further coupling between the phonon modes \n\nConsider first a single tetrahedron with four spins \n1, . . . , 4. The general distortions of this tetrahedron can \nbe classified by their symmetry (see for example Ref.35). \nOnly two tetragonal to orthorhombic distortion modes, \nQE \n2 (illustrated in FIG. 3), couple to the pseudo- \nspins defined in Section II. A complete analysis of all \nmodes is given in Appendix A. The coupling is of the \n\n1 and QE", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has \nbeen proposed38. system. And convert them to pseudo-spin notation in \nthe physical spin singlet sector. \n\nOur model (8) is achieved at second order of the per- \nturbation series. Higher order terms become trunca- \ntion errors but may be controlled by small parameters \nλx,y,z/Jcluster \n\nConsider a general small distortion of the tetrahedron, \nthe spin Hamiltonian becomes \n\nJx,y,z| \n′ \nSℓ)2 + J Hcluster, SL = (Jcluster/2)( \nδrℓm(Sℓ · \nSm) \n∼ p| \nX \nℓ X \nℓ \nQE \n2k \nλy QE \n2j · \n\nQE \n\nλx QE \nQE \n1k \nHSL = \n1j · \nX \ncluster \n\n+ \nX \ny−links \n\nλz QE \n1jQE 1kQE \n2k \n+ \n2j · \nX \nz−links \n\n1j is the generalized coordinate for the QE \n2j, QE 1k, QE \n\n− \n\nHamiltonian HSL explicitly written as, \n\nk \n2 \nJ ′(QE \n\nk \n2 \n1j)2 + \n(QE Hcluster j, SL =Hcluster j + \n\n√3 \n2 \n2jτ y 1jτ x \nQE \nj ), \nj − − \n\nwhere k > 0 is the elastic constant for these phonon \nmodes, J ′ is the spin-lattice coupling constant, QE \n1j and \nQE \n1 and QE \n2j are the generalized coordinates of the QE \n2 \ndistortion modes of cluster j, Hcluster j is (2). As al- \nready noted in Ref.35, this model does not really break \nthe pseudo-spin rotation symmetry of a single cluster. \n\nwhere QE \n1 mode \non cluster j, and QE \n2k are similarly defined; \n(4Jx,yk2)/(3J ′2) and λz = (16Jzk4)/(9J ′4); the \nλx,y = \nsingle cluster spin-lattice Hamiltonian Hcluster, SL is (13). \nCollect the results above we have the spin-lattice \n\nNow we put two clusters j and k together, and in- \nclude a perturbation λ Hperturbation to the optical phonon \nHamiltonian, \n\nHjk,SL =Hcluster j, SL + Hcluster k, SL \n+ λ Hperturbation[QE \n1j, QE 2j, QE 1k, QE \n2k] \n\nk \n2 k \n2 \nh(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 + \n1j)2 + 2j)2 \n(QE (QE \nX \ncluster j \n\nSj1 Sj4 + Sj2 Sj3 + Sj2 \n\nSj4 + Sj1 \n√12 \n\nSj3 2Sj1 Sj2 2Sj3 Sj4 \n+ J ′ \n(cid:16)QE \n· · · · − · − · \n1j \n\nSj2 Sj4 + Sj1 Sj3 Sj1 Sj4 Sj2 Sj3 \n+ QE \n2j \n· · \n− \n2 \n· − · \n(cid:17)i \n\n4Jxk2 \n3J ′2 QE \n1j · 4Jyk2 \n3J ′2 QE \n2j · 16Jzk4 \n9J ′4 QE \nQE \n2k + \n1k − X 2j · − X \nX \nz−links x−links y−links \n\nThe single cluster spin-lattice Hamiltonian [first three \nlines in (14)] is quite natural. However we need some harmonic(on x- and y-links of honeycomb lattice) and an- \nharmonic coupling (on z-links) between optical phonon", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0266.pdf" - }, - { - "text": "Another note to take is that it is not necessary to have \nsuch a highly symmetric cluster Hamiltonian (2). The \nmappings to pseudo-spin-1/2 should work as long as the \nground states of the cluster Hamiltonian are the two-fold \ndegenerate singlets. One generalization, which conforms \nthe symmetry of the lattice in FIG. 2, is to have \n\nHcluster = (Jcluster/2)(r \n\n4 \n3 3 \n\n1 2 \n2 \n(a) (b) \n\n3 \n4 \n3 2 3 \n\nQE \n2 \n\n2 \n1 4 1 \n1 (a) (b) (c) \n\nIllustration of the tetragonal to orthorhombic \nFIG. 3: \nQE \n2 (bottom) distortion modes. (a) Perspective \nview of the tetrahedron. 1, . . . , 4 label the spins. Arrows in- \ndicate the motion of each spin under the distortion mode. (b) \nTop view of (a). (c)(d) Side view of (a). \n\n1 (top) and QE \n\nS1 + S2 + S3 + S4)2 (11) \n\n· \nwith Jcluster > 0 and 0 < r < 3. However this is not \nconvenient for later discussions and will not be used. \n\nWe briefly describe some of the properties of (8). Its \nlow energy states are entirely in the space that each of the \nclusters is a physical spin singlet (called cluster singlet \nsubspace hereafter). Therefore physical spin correlations \nare strictly confined within each cluster. The excitations \ncarrying physical spin are gapped, and their dynamics \nare ‘trivial’ in the sense that they do not move from one \ncluster to another. But there are non-trivial low energy \nphysical spin singlet excitations, described by the pseudo- \nspins defined above. The correlations of the pseudo-spins \ncan be mapped to correlations of their corresponding \nphysical spin observables (the inverse mappings are not \nunique, c.f. TABLE I). For example τ x,y correlations \nbecome certain dimer-dimer correlations, τ z correlation \nbecomes chirality-chirality correlation, or four-dimer cor- \nrelation. It will be interesting to see the corresponding \npicture of the exotic excitations in the Kitaev model, e.g. \nthe Majorana fermion and the Ising vortex. However this \nwill be deferred to future studies. \n\nof the two clusters can generate at lowest order the de- \nsired high order spin interactions. In Subsection IV B we \nwill introduce certain magnetic, e.g. Heisenberg-type, in- \nteractions between physical spins of different clusters, at \nlowest order(second order) of perturbation theory the de- \nsired high order spin interactions can be achieved. These \napproaches involve truncation errors in the perturbation \nseries, thus the mapping to low energy effect Hamilto- \nnian will no longer be exact. However the error intro- \nduced may be controlled by small expansion parameters. \nIn this Section we denote the physical spins on cluster \nj(k) as j1, . . . , j4 (k1, . . . , k4), and denote pseudo-spins \non cluster j(k) as ~τj (~τk). \n\nIt is tempting to call this as an exactly solved spin liq- \nuid with spin gap ( \nJcluster), an extremely short-range \nresonating valence bond(RVB) state, from a model with \nspin rotation and time reversal symmetry. However it \nshould be noted that the unit cell of this model contains \nan even number of spin-1/2 moments (so does the orig- \ninal Kitaev model) which does not satisfy the stringent \ndefinition of spin liquid requiring odd number of elec- \ntrons per unit cell. Several parent Hamiltonians of spin \nliquids have already been constructed. See for example, \nRef.24–27. \n\n∼", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" - }, - { - "text": "10 \n\nout first deriving the normal state self-energy microscop- \nically (this is what we will do in the next section). The \nresults of the calculations for the modified MFLI model \nare presented in Figs. 15 and 16. We clearly see that the \nbehavior is now different and ∆WK < 0 for all Γ. This \nis the same behavior as we previously found in BCSI \nand EB models. So we argue that the ‘unconventional’ \nbehavior exhibited by the original MFLI model is most \nlikely the manifestation of a particular modeling incon- \nsistency. Still, Ref. 30 made a valid point that the fact \nthat quasiparticles behave more close to free fermions in \na SCS than in a NS, and this effect tends to reverse the \nsigns of ∆WK and of the kinetic energy 43. It just hap- \npens that in a modified MFLI model the optical integral \nis still larger in the NS. \n\nWe now turn to a more microscopic model- the CB \nmodel. The model describes fermions interacting by ex- \nchanging soft, overdamped collective bosons in a partic- \nular, near-critical, spin or charge channel31,44,45. This \ninteraction is responsible for the normal state self-energy \nand also gives rise to a superconductivity. A peculiar \nfeature of the CB model is that the propagator of a col- \nlective boson changes below Tc because this boson is not \nan independent degree of freedom (as in EB model) but \nis made out of low-energy fermions which are affected by \nsuperconductivity32. \n\n0 \n\nFIG. 15: Top – σ(ω) in the NS and the SCS in the ‘corrected’ \nMFLI model with the feedback from SC on the quasiparticle \n√−ω2+∆2 . In the SCS σ \ndamping: iΓ term transforms into \nnow begins at Ω = 2∆. The parameters are same as in Fig. \n10. Bottom – the behavior of Kubo sum with Γ. Observe \nthat W (ωc) in the NS is larger than in the SCS. \n\nΓ \n\n) \n10 \nc \nω \n( \n\nS \nN \nW \n− \n) \nc \n0 ω \n( \n\nC \nS \nW \n∆ W \nK \n\n−10 \n0.2 \n0.4 \nω \n in eV \nc \n0.6 0.8 \n\nFIG. 16: Evolution of the difference of the optical integrals \nbetween the SCS and the NS with the upper cut-off ωc for \nthe “corrected” MFLI model. Now ∆W (ωc) is negative above \nsome frequency. Parameters are same as in the Fig 15. \n\nThe most relevant point for our discussion is that this \nmodel contains the physics which we identified above as \na source of a potential sign change of ∆WK . Namely, \nat strong coupling the fermionic self-energy in the NS \nis large because there exists strong scattering between \nlow-energy fermions mediated by low-energy collective \nbosons. In the SCS, the density of low-energy fermions \ndrops and a continuum collective excitations becomes \ngaped. Both effects reduce fermionic damping and lead \nto the increase of WK in a SCS. If this increase exceeds a \nconventional loss of WK due to a gap opening, the total \n∆WK may become positive. \n\nThe CB model has been applied numerous times to the \ncuprates, most often under the assumption that near- \ncritical collective excitations are spin fluctuations with \nmomenta near Q = (π, π). This version of a CB bo- \nson is commonly known as a spin-fermion model. This \nmodel yields dx2 \ny2 superconductivity and explains in a \nquantitative way a number of measured electronic fea- \ntures of the cuprates, in particular the near-absence of \nthe quasiparticle peak in the NS of optimally doped and \nunderdoped cuprates39 and the peak-dip-hump structure \nin the ARPES profile in the SCS31,32,46,47. In our analy- \nsis we assume that a CB is a spin fluctuation. \n\n− \n\nmodel, where WK is larger in the NS for all Γ (see Fig. \nIn other words, the original MFLI model does not \n4). \nhave the BCSI theory as its limiting case. \n\nWe modified the MFLI model is a minimal way by \nΓ \nchanging the damping term in a SCS to \nω2+∆2 to be \nconsistent with BCSI model. We still use Eq. (18) for \nthe MFL term simply because this term was introduced \nin the NS on phenomenological grounds and there is no \nway to guess how it gets modified in the SCS state with- \n\n√ \n−", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0764.pdf" - }, - { - "text": "11 \n\nhigh-energy fermions and is an input for the low-energy \ntheory. Below we follow Refs. 31,33 and assume that \nthe momentum dependence of a collective boson is flat \nnear (π, π). The self energy within such model has been \nworked out consistently in Ref. 31,33. \nIn the normal \nstate \n\na SCS a gapless continuum described by Eq. (20) trans- \nforms into a gaped continuum, with a gap about 2∆ and \na resonance at ω = ω0 < 2∆, where for a d−wave gap we \ndefine ∆ as a maximum of a d−wave gap. \nThe spin susceptibility near (π, π) in a superconductor \ncan generally be written up as \n\nχQ \n1 − i Π(Ω) \nωsf \nω2 \nω2 1 \n2 \nχ(q ∼ Q, Ω) = (21) \nΣ′′(ω) = − λnωsf log 1 + \nsf ! \n\nω \nωsf \nΣ′(ω) = −λnωsf arctan \n\nwhere Π is evaluated by adding up the bubbles made \nout of two normal and two anomalous Green’s functions. \nBelow 2∆, Π(Ω) is real (∼ Ω2/∆ for small Ω), and the \nresonance emerges at Ω = ω0 at which Π(ω0) = ωsf . At \nfrequencies larger than 2∆, Π(Ω) has an imaginary part, \nand this gives rise to a gaped continuum in χ(Ω). \n\n(19) \n\nwhere λn is the spin-fermion coupling constant, and ωsf \nis a typical spin relaxation frequency of overdamped spin \ncollective excitations with a propagator \nThe imaginary part of the spin susceptibility around \n\nthe resonance frequency ω0 is31 \n\nχQ \n1 − i Ω \nωsf \nχ(q ∼ Q, Ω) = (20) \n\nπZoω0 \n2 \n\n′′ \nχ (q, Ω) = δ(Ω − ω0) (22) \n\nwhere χQ is the uniform static susceptibility. If we use \nOrnstein-Zernike form of χ(q) and use either Eliashberg \n45 or FLEX computational schemes48, we get rather sim- \nilar behavior of Σ as a function of frequency and rather \nsimilar behavior of optical integrals. \n\nwhere Zo ∼ 2 ωsf χ0/ ∂Π \n∂ω \n\n. The imaginary part \n| \nof the spin susceptibility describing a gaped continuum \nexists for for Ω ≥ 2∆ and is \n\nΩ=ω0 \n\nThe collective nature of spin fluctuations is reflected in \nthe fact that the coupling λ and the bosonic frequency \nωsf are related: λ scales as ξ2, where ξ is the bosonic \nmass (the distance to a bosonic instability), and ωsf ∝ \n2 (see Ref. 49). For a flat χ(q ∼ Q) the product λωsf \nξ− \ndoes not depend on ξ and is the overall dimensional scale \nfor boson-mediated interactions. \n\n′′ \nχ (q, Ω) = Im \n1 − 1 \nωsf \n\" \n\n(cid:0) \n\nχ0 \nπ∆2 \nΩ + i π \n≈ Im \n1 − 1 \nωsf 2 Ω \" # \n\n(cid:1) \nIn Eq. (23) D(x) = K1(x) \nK2(x) \n, and K1(x) and K2(x) \nare Elliptic integrals of first and second kind. The real \npart of χ is obtained by Kramers-Kr¨onig transform of the \nimaginary part. \n\n(cid:0) \n− \nx \n\nχ0 \n4∆2 \nΩ D( 4∆2 \n\nΩ2 ) + iΩK2(1 − 4∆2 \nΩ2 ) \n(cid:1) \n\n# \n\nfor Ω >> 2∆ (23) \n\nIn the SCS fermionic excitations acquire a gap. This \ngap affects fermionic self-energy in two ways: directly, via \nthe change of the dispersion of an intermediate boson in \nthe exchange process involving a CB, and indirectly, via \nthe change of the propagator of a CB. We remind our- \nselves that the dynamics of a CB comes from a particle- \nhole bubble which is indeed affected by ∆. \n\nSubstituting Eq 6 for χ(q, Ω) into the formula for the \nself-energy one obtains Σ′′(ω) in a SCS state as a sum of \ntwo terms31 The effect of a d−wave pairing gap on a CB has been \ndiscussed in a number of papers, most recently in31. In \n\nπZo \n2 \n\nω + ωo \nΣ′′A(ω) = \nλnωo Re \n(ω + ωo)2 − ∆2 ! \n\ncomes from the interaction with the resonance and \np \n\n2 \n1 − 4∆ \nx2 x \nωsf \n\nK2 \n2 \n(cid:16) \n+ \n\nE \n\nω + x \n(ω + x)2 − ∆2 \n\n| | \nΣ′′B(ω) = −λn \ndx Re \n\n(cid:17) \nK2 \n\n1 − 4∆2 \nxωsf \nh \n\n4∆2 \nx2 1 − 4∆2 \nx2 x \nωsf \n2∆ \nD \nZ \n\np \n(cid:1)i \nh \n(cid:1)i (cid:0) (cid:0) \n\ncomes from the interaction with the gaped continuum. The real part of Σ is obtained by Kramers-Kr¨onig trans-", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0764.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0764.pdf", - "query": "What was the optical integral analysis proposed by Norman and Pépin?", - "target_page": 8, - "target_passage": "a phenomenological model for the self energy which fits normal state scattering rate measure- ments by ARPES", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "4 \n\nan energy of interband transitions, which is roughly 2eV . \nThis would be consistent with Refs. 8,9. \njust list the formulas that we used in our computations. \nThe conductivity σ(Ω) and the optical integral W (ωc) \nare given by (see for example Ref. 35). \n\nWe begin with formulating our calculational basis in \nthe next section. Then we take up the four cases and \nconsider in each case the extent to which the Kubo sum is \nsatisfied up to the order of bandwidth and the functional \nform and the sign of ∆W (ωc). The last section presents \nour conclusions. \n\nΠ′′(Ω) \nΩ \n= − \n\nωc ωc \n\nΠ′′(Ω) \nΩ π \n2 \nW (ωc) = σ′(Ω) dΩ = − dΩ + Π′(0) \n\n0 \nZ \n0+ \nZ \nII. OPTICAL INTEGRAL IN NORMAL AND \nSUPERCONDUCTING STATES \n(7b) \n\nThe generic formalism of the computation of the op- \ntical conductivity and the optical integral has been dis- \ncussed several times in the literature21–23,26,29 and we where ‘X ′’ and ‘X ′′’ stand for real and imaginary parts \nof X. We will restrict with T = 0. The polarization \noperator Π(Ω) is (see Ref. 36) \n\nG(iω, ~k)G(iω + iΩ, ~k) + F (iω, ~k)F (iω + iΩ, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ(iΩ) = T \n\nω \nX \n1 \nπ \n\nX~k \n(cid:16) \n0 \n\nG′′(ω, ~k)G′′(ω + Ω, ~k) + F ′′(ω, ~k)F ′′(ω + Ω, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′′(Ω) = − dω \nΩ \nZ \nX~k \n(cid:16) \n− \n\n1 \nπ2 nF (y) − nF (x) \ny − x \n\n′ ′ \n\nG′′(x, ~k)G′′(y, ~k) + F ′′(x, ~k)F ′′(y, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′(Ω) = dx dy \n\nZ Z \nX~k \n(cid:16) \n\n′ denotes the principal value of the integral, \n~k,(N is the number of lat- \ntice sites), nF (x) is the Fermi function which is a step \nP \nP \nfunction at zero temperature, G and F are the normal \nand anomalous Greens functions. given by37 \n\nwhere \n~k is understood to be 1 \nThe 2 is due to the trace over spin indices. We show the \ndistribution functions in the NS and SCS under different \ncircumstances in Fig 2. \nN \nR \n\nThe ~k-summation is done over first Brillouin zone for a \n2-D lattice with a 62x62 grid. The frequency integrals are \ndone analytically wherever possible, otherwise performed \nusing Simpson’s rule for all regular parts. Contributions \nfrom the poles are computed separately using Cauchy’s \ntheorem. For comparison, in all four cases we also calcu- \nd2k = dΩkdǫkνǫk,Ωk \nlated FGT sum rule by replacing \nand keeping ν constant. We remind that the FGT is \nthe result when one assumes that the integral in W (ωc) \npredominantly comes from a narrow region around the \nFermi surface. \n\n1 \nω − Σ(k, ω) − ε~k + iδ \nZk,ωω + ε~k \nk,ω) − ε2 \n~k \n+ iδsgn(ω) \n(9b) \n\nZk,ω∆k,ω \nk,ω) − ε2 \n~k \n\nF (ω, ~k) = \nZ 2 \nk,ω(ω2 − ∆2 \n\n+ iδsgn(ω) \n(9c) \n\nWe will first use Eq 3 and compute WK in NS and SCS. \nThis will tell us about the magnitude of ∆W (ωc = ∞). \nWe next compute the conductivity σ(ω) using the equa- \ntions listed above, find W (ωc) and ∆W (ωc) and compare \n∆f (ωc) and ∆WK. \n\nwhere Zk,ω = 1 − Σ(k,ω) \n, and ∆k,ω, is the SC gap. Fol- \nlowing earlier works31,33, we assume that the fermionic \nself-energy Σ(k, ω) predominantly depends on frequency \nand approximate Σ(k, ω) ≈ Σ(ω) and also neglect the \nfrequency dependence of the gap, i.e., approximate ∆k,ω \nby a d−wave ∆k. The lattice dispersion ��~k is taken from \nRef. 38. To calculate WK , one has to evaluate the Kubo \nterm in Eq.3 wherein the distribution function n~k, is cal- \nculated from \n\nFor simplicity and also for comparisons with earlier \nstudies, for BCSI, EB, and MFLI models we assumed \nthat the gap is just a constant along the FS. For CB \nmodel, we used a d−wave gap and included into consid- \neration the fact that, if a CB is a spin fluctuation, its \npropagator develops a resonance when the pairing gap is \nd−wave. \n(10)", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0764.pdf" - }, - { - "text": "addressing the issue of the optical sum rule in the c−axis7 \nand in-plane conductivities 8–16 in overdoped, optimally \ndoped, and underdoped cuprates. The experimental re- \nsults demonstrated, above all, outstanding achievements \nof experimental abilities as these groups managed to de- \ntect the value of the optical integral with the accuracy \nof a fraction of a percent. The analysis of the change \nof the optical integral between normal and SCS is even \nmore complex because one has to (i) extend NS data to \nT < Tc and (ii) measure superfluid density with the same \naccuracy as the optical integral itself. \n\nThe analysis of the optical integral showed that in over- \ndoped cuprates it definitely decreases below Tc, in con- \nsistency with the expectations at weak coupling11. For \nunderdoped cuprates, all experimental groups agree that \na relative change of the optical integral below Tc gets \nmuch smaller. There is no agreement yet about the sign \nof the change of the optical integral : Molegraaf et al.8 \nand Santander-Syro et al.9 argued that the optical inte- \ngral increases below Tc, while Boris et al.10 argued that \nit decreases. \n\nin a given band is compensated by an appropriate change \nof the spectral weight in other bands such that the total \nspectral weight, integrated over all bands, is conserved, \nas in Eq. \n(1). Still, non-conservation of the spectral \nweight within a given band is an interesting phenomenon \nas the degree of non-conservation is an indicator of rele- \nvant energy scales in the problem. Indeed, when relevant \nenergy scales are much smaller than the Fermi energy, \ni.e., changes in the conductivity are confined to a near \nvicinity of a Fermi surface (FS), one can expand εk near \nkF as εk = vF (k − kF ) + (k − kF )2/(2mB) + O(k − kF )3 \nand obtain ∇2 \nε~k ≈ 1/mB [this approximation is equiv- \n~kx \nalent to approximating the density of states (DOS) by a \nconstant]. Then WK becomes πne2/(2mB) which does \nnot depend on temperature. The scale of the tempera- \nture dependence of WK is then an indicator how far in \nenergy the changes in conductivity extend when, e.g., a \nsystem evolves from a normal metal to a superconductor. \nBecause relevant energy scales increase with the interac- \ntion strength, the temperature dependence of WK is also \nan indirect indicator of whether a system is in a weak, \nintermediate, or strong coupling regime. \n\nTheoretical analysis of these results21,22,25,28,30 added \none more degree of complexity to the issue. It is tempt- \ning to analyze the temperature dependence of WK and \nrelate it to the observed behavior of the optical integral, \nand some earlier works25,28,30 followed this route. In the \nexperiments, however, optical conductivity is integrated \nonly up to a certain frequency ωc, and the quantity which \nis actually measured is \n\nIn a conventional BCS superconductor the only rele- \nvant scales are the superconducting gap ∆ and the impu- \nrity scattering rate Γ. Both are generally much smaller \nthan the Fermi energy, so the optical integral should be \nalmost T -independent, i.e., the spectral weight lost in a \nsuperconducting state at low frequencies because of gap \nopening is completely recovered by the zero-frequency δ- \nfunction. \nIn a clean limit, the weight which goes into \na δ−function is recovered within frequencies up to 4∆. \nThis is the essence of FGT sum rule 2,3. In a dirty limit, \nthis scale is larger, O(Γ), but still WK is T -independent \nand there was no “violation of sum rule”.", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0764.pdf" - }, - { - "text": "15 \n\nF. Marsiglio for many discussions concerning the infrared \nconductivity and optical integrals and thank A. Boris, E. \nvan Heumen, J. Hirsch, and F. Marsiglio for the com- \nments on the manuscript. The work was supported by \nnsf-dmr 0906953. \n\nWe would like to thank M. Norman, Tom Timusk, \nDmitri Basov, Chris Homes, Nicole Bontemps, Andres \nSantander-Syro, Ricardo Lobo, Dirk van der Marel, A. \nBoris, E. van Heumen, A. B. Kuzmenko, L. Benfato, and \n\n1 R. Kubo, J. Phys. Soc. Jpn 12, 570(1957). \n2 R.A. Ferrrel and R.E. Glover, Phys. Rev.109, 1398 (1958). \n3 M. Tinkham and R.A. Ferrrel, Phys. Rev. Lett. 2, 331 \n(1959), M. Tinkham, Introduction to Superconductivity \n(McGraw-Hill, New York, 1975). \n\nand Phys. Rev. B 62, 15131 (2000). \n\n24 A. Toschi, M. Capone, M. Ortolani, P. Calvani, S. Lupi \nand C. Castellani, Phys. Rev. Lett. 95, 097002 (2005). \n25 F. Marsiglio, F. Carbone, A. Kuzmenko and D. van der \nMarel, Phys. Rev. B 74, 174516 (2006). \n26 L. Benfatto, S. G. Sharapov, N. Andrenacci and H. Beck, \nPhys. Rev. B 71, 104511 (2005). \n\n4 J. Hirsch, Physica C 199, 305 (1992). \n5 D. N. Basov and T. Timusk, Rev. Mod. Phys. 77, 721 \n(2005); A. V. Puchkov, D. N. Basov and T. Timusk, J. \nPhys. Cond. Matter 8, 10049 (1996). \n27 D. van der Marel, H.J.A. Molegraaf, C. Presura, and I. \nSantoso, Concepts in Electron Correlations, edited by A. \nHewson and V. Zlatic (Kluwer, 2003) \n\n6 C. M. Varma et al, Phys. Rev. Lett. 63, 1996 (1989). \n7 D. N. Basov, S. I. Woods, A. S. Katz, E. J. Singley, R. C. \nDynes, M. Xu, D. G. Hinks, C. C. Homes and M. Strongin, \nScience 283, 49 (1999). \n\n28 L. Benfatto, J.P. Carbotte and F. Marsiglio, Phys. Rev. B \n74, 155115 (2006) \n\n29 F. Marsiglio, Phys. Rev. B 73, 064507(2006). \n30 M.R. Norman and C. P´epin, Phys. Rev. B 66, 100506(R) \n\n8 H.J.A Molegraaf, C. Presura, D. van der Marel, P.H. Kess, \nM. Li, Science 295, 2239 (2002); A. B. Kuzmenko, H. J. A. \nMolegraaf, F. Carbone and D. van der Marel, Phys. Rev. \nB 72, 144503 (2005). \n\n(2002). \n\n31 J. Fink et al., Phys. Rev. B 74, 165102(R) (2006). \n32 M. Eschrig, Adv. Phys. 55, 47-183 (2006) \n33 M.R. Norman and A.V. Chubukov, Phys. Rev. B 73, \n\n9 A. F. Santander-Syro, R. P. S. M. Lobo, N. Bontemps, Z. \nKonstantinovic, Z. Z. Li and H. Raffy, Europhys. Lett. 62, \n568 (2003); \n140501(R)(2006). \n\n34 A.E. Karakozov and E.G. Maksimov, cond-mat/0511185, \nA. E. Karakozov, E. G. Maksimov and O. V. Dolgov, Solid \nState Comm. 124, 119 (2002); A. E. Karakozov and E. G. \nMaksimov, ibid. 139, 80 (2006). 10 A. V. Boris, N. N. Kovaleva, O. V. Dolgov, T. Holden, \nC. T. Lin, B. Keimer and C. Bernhard, Science 304, 708 \n(2004). \n11 G. Deutscher, A. F. Santander-Syro and N. Bontemps, \n\n35 see e.g., P. B. Allen, Phys. Rev. B 3, 305 (1971); S. V. \nShulga, O. V. Dolgov and E. G. Maksimov, Physica C \n178, 266 (1991). \nPhys. Rev. B 72, 092504 (2005). \n\n36 A. A. Abriskov and L. P. Gor’kov, JETP 35, 1090 (1959), \n\n12 F. Carbone, A. B. Kuzmenko, H. J. A. Molegraaf, E. van \nHeumen, V. Lukovac, F. Marsiglio, D. van der Marel, K. \nHaule, G. Kotliar, H. Berger, S. Courjault, P. H. Kes and \nM. Li, Phys. Rev. B 74, 064510 (2006). \n\nSang Boo Nam, Phys. Rev. 156, 470 (1967). \n37 Theory of superconductivity, Schrieffer, (W. A. Benjamin \n13 C. C. Homes, S. V. Dordevic, D. A. Bonn, R. Liang and Inc., New York 1964). \n38 M.R. Norman, M. Randeria, H. Ding, and J.C. Cam- \n\nW. N. Hardy, Phys. Rev. B 69, 024514 (2004). \n14 J. Hwanget al, Phys. Rev. B 73, 014508 (2006). \n15 E. van Heumen, R. Lortz, A. B. Kuzmenko, F. Carbone, \nD. van der Marel, X. Zhao, G. Yu, Y. Cho, N. Barisic, M. \nGreven, C. C. Homes and S. V. Dordevic, Phys. Rev. B \n75, 054522 (2007). \n\npuzano, Phys. Rev. B 52, 615 (1995). \n\n39 Z.X. Shen and D.S. Dessau, Phys. Rep. 253, 1(1995), \nJ. C. Campuzano, M. R. Norman, and M. Randeria, \n“Superconductivity”(Vol-1), 923-992, Springer (2008). \n40 A. V. Chubukov, Ar. Abanov, and D. N. Basov, Phys. Rev. \n\n16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003).", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "in determining \n\nThe natural distribution of lift along the \nspan of a wing provides a basis for appreciating \nthe effect of area distribution and taper along \nis \nthe span. If the elliptical lift distribution \n\n74", - "page_start": 91, - "page_end": 91, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0764.pdf" - }, - { - "text": "∞ \n\nIn our work, we perform direct numerical calculations \nof optical integrals at T = 0 for a lattice dispersion ex- \ntracted from ARPES of the cuprates. The goal of our \nwork is two-fold. First, we perform calculations of the \noptical integral in the NS and analyze how rapidly W (ωc) \napproaches WK , in other words we check how much of \nthe Kubo sum is recovered up to the scale of the band- \nwidth. Second, we analyze the difference between optical \n\nWe also found that for all models except for the origi- \nnal version of the MFLI model the optical weight at the \nhighest frequencies is greater in the NS than in the SCS \n(i.e., ∆W < 0). This observation is consistent with the \nfindings of Abanov and Chubukov32, Benfatto et. al.28, \nand Karakozov and Maksimov34. \nIn the original ver- \nsion of the MFLI model30 the spectral weight in SCS \nwas found to be greater than in the NS (∆W > 0). We \nshow that the behavior of ∆W (ωc) in this model cru- \ncially depends on how the fermionic self-energy modeled \nto fit ARPES data in a NS is modified when a system \nbecomes a superconductor and can be of either sign. We \nalso found, however, that ωc at which ∆W becomes neg- \native rapidly increases with the coupling strength and at \nstrong coupling becomes comparable to the bandwidth. \nIn the CB model, which, we believe, is most appropriate \nfor the application to the cuprates, ∆WK = ∆W (∞) is \nquite small, and at strong coupling a negative ∆W (ωc) \nup to ωc ∼ 1eV is nearly compensated by the optical \nintegral between ωc and “infinity”, which, in practice, is", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0764.pdf" - }, - { - "text": "κ \n*B*1 +*B*2) # \n˜*Nbss*= . \n\n*R*(*B*0 − \n\nA detailed analysis about the stability of the steady-state can \nbe found such as in [28]. In this paper, we assume the steady- \nstate solution is stable. \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] *D*= *DS T*+*DRam*[2 \n− \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)]. *D* [2 (12) \n\nwhere Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − \n\nFrom the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*\n\n(δϕ2)ω \n\n(κ/2 + γ*ab*)2 \n*I*0ω2[(κ/2 + γ*ab*)2 + ω2] \n≈ \n+ 2*R*[(*A*0 +*B*0) + (*A*2 +*B*2)] \n+*Rp*[(*C*0 − *C*∗0)2 + (*C*1 − *C*∗1)2 + (*C*2 − \n*C*∗2)2] \n. \n} \n(9) \n\nSince the time τ and*T*is much shorter than the time scale \nof the atomic dampings, we can neglect the dampings when \ncalculate*Ai*,*Bi*,*Ci*. By using \n\nΩ*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 −", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" - }, - { - "text": "Optical Integral and Sum Rule Violation \n\nSaurabh Maiti, Andrey V. Chubukov \nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA \n(Dated: November 9, 2018) \n\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in \nthe cuprates. We compute conductivities, optical integrals W , and ∆W between superconducting \nand normal states for 2-D systems with lattice dispersion typical of the cuprates for four different \nmodels – a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a \ncollective boson model with a feedback from superconductivity on a collective boson. The goal of \nthe paper is two-fold. First, we analyze the dependence of W on the upper cut-off (ωc) placed on \nthe optical integral because in experiments W is measured up to frequencies of order bandwidth. \nFor a BCS model, the Kubo sum rule is almost fully reproduced at ωc equal to the bandwidth. But \nfor other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for \n∆W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign \nof ∆W . In all models we studied ∆W is positive at small ωc, then crosses zero and approaches a \nnegative value at large ωc, i.e. the optical integral in a superconductor is smaller than in a normal \nstate. The point of zero crossing, however, increases with the interaction strength and in a collective \nboson model becomes comparable to the bandwidth at strong coupling. We argue that this model \nexhibits the behavior consistent with that in the cuprates. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n3 \n1 \n\n] \nl \ne \n- \nr \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nthe spectral weight under the δ-functional piece of the \nconductivity in the superconducting state. \n\nI. INTRODUCTION \n\nIn practice, the integration up to an infinite frequency \nis hardly possible, and more relevant issue for practical \napplications is whether a sum rule is satisfied, at least ap- \nproximately, for a situation when there is a single electron \nband which crosses the Fermi level and is well separated \nfrom other bands. Kubo considered this case in the same \npaper of 1957 and derived the expression for the “band”, \nor Kubo sum rule \n\nThe analysis of sum rules for optical conductivity has a \nlong history. Kubo, in an extensive paper1 in 1957, used \na general formalism of a statistical theory of irreversible \nprocesses to investigate the behavior of the conductivity \nin electronic systems. For a system of interacting elec- \ntrons, he derived the expression for the integral of the real \npart of a (complex) electric conductivity σ(Ω) and found \nthat it is independent on the nature of the interactions \nand reduces to \n′ \n∞ \n‘ \n\nπe2 \n2N \n∇2 \n~kx \nRe σ(Ω) dΩ = WK = \nε~k n~k \n(3) \n∞ \n(1) \n0 \nZ \nX~k \n\n2 \nv \n4 \n6 \n7 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nne2 \nm π \n2 \nRe σ(Ω) dΩ = \n\n0 \nZ \n\nHere n is the density of the electrons in the system and \nm is the bare mass of the electron. This expression is \nexact provided that the integration extends truly up to \ninfinity, and its derivation uses the obvious fact that at \nenergies higher than the total bandwidth of a solid, elec- \ntrons behave as free particles. \n\nThe independence of the r.h.s. of Eq. (1) on temper- \nature and the state of a solid (e.g., a normal or a super- \nconducting state – henceforth referred to as NS and SCS \nrespectively) implies that, while the functional form of \nσ(Ω) changes with, e.g., temperature, the total spectral \nweight is conserved and only gets redistributed between \ndifferent frequencies as temperature changes. This con- \nservation of the total weight of σ(Ω) is generally called a \nsum rule.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "π \n\n1 \nK Z \n0 \nMHM = dqzS(~q) (5) \n\nwhere S(~q), with ~q = (0, 0, qz), is the structure factor24 \n(i.e. the Fourier transform of the spin correlation func- \ntion) along the z-direction of the film, while the normal- \nization factor K is the structure factor integral at T = 0. \nAlthough the use of the last observable can be seen as a \nsuitable and elegant way to overcome the intrinsic diffi- \nculties met in defining a correct helical order parameter, \nfree of any undue external bias (as the wave-vector Qz", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0510.pdf" - }, - { - "text": "where n~k is the electronic distribution function and ε~k is \nthe band dispersion. Prime in the upper limit of the inte- \ngration has the practical implication that the upper limit \nis much larger than the bandwidth of a given band which \ncrosses the Fermi level, but smaller than the frequencies \nof interband transitions. Interactions with external ob- \njects, e.g., phonons or impurities, and interactions be- \ntween fermions are indirectly present in the distribution \nfunction which is expressed via the full fermionic Green’s \nm G(~k, ωm). For ǫk = k2/2m, \nfunction as n~k = T \nε~k = 1/m, WK = πne2/(2m), and Kubo sum rule \n∇2 \n~kx \nreduces to Eq. (1). In general, however, ε~k is a lattice \ndispersion, and Eqs. (1) and (3) are different. Most im- \nportant, WK in Eq. (3) generally depends on T and on \nthe state of the system because of n~k. In this situation, \nthe temperature evolution of the optical integral does not \nreduce to a simple redistribution of the spectral weight \n– the whole spectral weight inside the conduction band \nchanges with T . This issue was first studied in detail by \nHirsch 4 who introduced the now-frequently-used nota- \ntion “violation of the conductivity sum rule”. \n\nP \n\nOne particular case, studied in detail for conventional \nsuperconductors, \nis the redistribution of the spectral \nweight between normal and superconducting states. This \nis known as Ferrel-Glover-Tinkham (FGT) sum rule:2,3 \n\nπnse2 \n2m \n\n∞ \nRe σN S(Ω) = (2) \n0+ 0+ \nZ Z \n\nIn reality, as already pointed out by Hirsch, there is no \ntrue violation as the change of the total spectral weight where ns is the superfluid density, and πnse2/(2m) is", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0764.pdf", - "query": "What is the Ferrel-Glover-Tinkham sum rule?", - "target_page": 1, - "target_passage": "the redistribution of the spectral weight between normal and superconducting state", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "where n~k is the electronic distribution function and ε~k is \nthe band dispersion. Prime in the upper limit of the inte- \ngration has the practical implication that the upper limit \nis much larger than the bandwidth of a given band which \ncrosses the Fermi level, but smaller than the frequencies \nof interband transitions. Interactions with external ob- \njects, e.g., phonons or impurities, and interactions be- \ntween fermions are indirectly present in the distribution \nfunction which is expressed via the full fermionic Green’s \nm G(~k, ωm). For ǫk = k2/2m, \nfunction as n~k = T \nε~k = 1/m, WK = πne2/(2m), and Kubo sum rule \n∇2 \n~kx \nreduces to Eq. (1). In general, however, ε~k is a lattice \ndispersion, and Eqs. (1) and (3) are different. Most im- \nportant, WK in Eq. (3) generally depends on T and on \nthe state of the system because of n~k. In this situation, \nthe temperature evolution of the optical integral does not \nreduce to a simple redistribution of the spectral weight \n– the whole spectral weight inside the conduction band \nchanges with T . This issue was first studied in detail by \nHirsch 4 who introduced the now-frequently-used nota- \ntion “violation of the conductivity sum rule”. \n\nP \n\nOne particular case, studied in detail for conventional \nsuperconductors, \nis the redistribution of the spectral \nweight between normal and superconducting states. This \nis known as Ferrel-Glover-Tinkham (FGT) sum rule:2,3 \n\nπnse2 \n2m \n\n∞ \nRe σN S(Ω) = (2) \n0+ 0+ \nZ Z \n\nIn reality, as already pointed out by Hirsch, there is no \ntrue violation as the change of the total spectral weight where ns is the superfluid density, and πnse2/(2m) is", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Control2013≥ 85 %.Additionsgro199.|18|Asiab**2|
\n\n\n \n \n \n \n [html]\n
ABB23 )LS - 5**a2†*311 *aa2n.nF,1.21.2817alj.= 8F.II.3daF2in1.µla†*a.287n =.cdf2a**a1n.17|2.ii1.
", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "e \ng \na \nr \ne \nv \na \ne \nt \na \nr \n\nt \ns \ne \nr \ne \nt \nn \ni \nd \ne \nt \nh \ng \ni \ne \nW \n\nr \ne \np \nt \ne \ne \nh \ns \ns \na \n$ \n\n7 \n7 \n9 \n0 \n0 \n0 9 \n0 \n2 \n6 \n1 \n7 \n\n4 \n1 \n8 \n\n4 \n8 \n1 \n1 \n1 \n\n4 \n8 \n1 \n, , , , , \n\n8 \n2 \n4 \n1 \n6 \n1 \n6 \n, , , \n3 2 \n\n6 \n0 \n2 0 \n0 \n3 7 \n9 \n8 0 \n0 \n0 \n– \n6 \n7 \n2 \n\n9 \n7 \n6 \n1 \n6 \n8 \n\n, , , , , , \n\n4 \n4 \n8 \n1 \n9 \n1 \n5 \n3 \n0 \n4 \n7 0 \n0 \n5 \n6 \n4 \n9 \n5 \n, , , , \n6 \n1 \n\n3 \n2 \n0 \n– \n\n9 \n0 \n2 \n6 \n1 \n7 4 \n1 \n8 \n8 \n2 \n4 \n\n– \n\n, , , \n\n5 \n4 \n1 \n3 \n, , \n2 \n\n2 \n8 \n7 \n7 \n5 \n9 \n\n6 \n0 \n2 0 \n0 \n3 \n– – – \n6 \n7 \n2 \n, , , , \n\n4 \n4 \n8 \n1 \n9 \n1 \n5 4 \n9 \n5 \n, , \n2 \n\n: \ns \n\nw \no \nl \nl \no \nf \ns \na \n\ne \nr \na \n\n0 \n0 \n0 \n2 \n\ne \nn \nu \nJ \n\ng \nn \ni \ny \nr \nr \na \nc \n\n0 \n3 \nt \na \n\ne \nc \nn \na \nl \na \nb \nt \nn \nu \no \nm \na \n\ns \na \n\nl \na \nt \no \nT \n\ns \ne \ni \nt \ni \nl \ni \nb \na \ni \nl \n\ng \nn \ni \nr \na \ne \nb \n\nl \na \ni \nc \nn \na \nn \ni \nf \n\nt \ns \ne \nr \ne \nt \nn \ni \nn \no \nN \n\n$ \n\nd \nn \na \n\ns \nt \ne \ns \ns \na \n\nl \na \ni \nc \nn \na \nn \ni \nf \n5 $ : \nf \no \nn \ni \n\nr \ne \nv \nO \ns \ne \nt \na \nr \n\nt \ns \ne \nr \ne \nt \nn \ni \n\ns \nt \nn \ne \nm \nu \nr \nt \ns \nn \ni \n\n5 \n0 \n3 \n, \n5 \n8 \n1 \n, \n1 \n\n– – \n\n5 \n0 \n3 \n, \n5 \n8 \n1 \n, \n1 \n\n– – – \n\nl \na \ni \nc \nn \na \nn \ni \nf \n\ng \nn \ni \nr \na \ne \nb \n\n0 \n0 \n0 \n, \n0 \n0 \n5 \n, \n6 0 \n0 \n0 \n, \n0 \n0 \n5 \n, \n6 \n\nt \ns \ne \nr \ne \nt \nn \ni \n- \nn \no \nn \nr \no \nf \n\ns \nt \nn \ne \nm \ne \nl \nt \ni \nt \nn \ne \n\ny \nt \ni \nl \ni \nb \na \ni \nl \n**s**\n**e**\n**i**\n**t**\n**i**\n**l**\n**i**\n**b**\n**a**\n**i**\n**L**\n\nr \ne \nh \nt \no \n\n**s**\n**e**\n**i**\n**t**\n**i**\n**l**\n**i**\n**b**\n**a**\n**i**\n**L**\nd \ne \nr \nu \nc \ne \ns \n\nd \nn \na \n\n**s**\n**t**\n**e**\n**s**\n**s**\n**A**\n\n- \n\ne \nl \nb \na \nc \ni \nl \np \np \na \n\n**l**\n**a**\n**i**\n**c**\n**n**\n**a**\n**n**\n**i**\n**F**\nt \no \nn \n\ng \nn \ni \nr \nu \nt \na \nm \ne \nt \na \nr \ns \nr \na \ne \ny \n5 \n\ne \nv \ni \nt \nc \ne \nf \nf \ne \n\no \nt \n\nt \ns \ne \nr \ne \nt \nn \ni \n\n$ \n1 \n\nr \ne \nv \nO \ne \nh \nt \nd \ne \nx \ni \nF \nd \nn \na \ns \ns \ne \nl \n\ns \nk \ns \ni \nr \nr \no \n$ \n\nr \na \ne \ny \ne \nt \na \nr \n1 \n\nt \ns \ne \nr \ne \nt \nn \ni \ne \nt \na \nr \n\nt \ns \ne \nr \ne \nt \nn \ni \n\no \nt \n\ne \nr \nu \ns \no \np \nx \ne \n\n$ \n\ng \nn \ni \nt \na \no \nl \nF \n\ns \n’ \ny \nt \ni \nt \nn \ne \n\n**k**\n**s**\n**i**\n**R**\n**e**\n**t**\n**a**\n**R**\n\ns \nt \nn \ne \nm \nu \nr \nt \ns \nn \nI \n\nl \na \ni \nc \nn \na \nn \ni \nF \n\n4 \n8 \n1 \n, \n1 \n1 \n\n– – – \n\n4 \n8 \n1 \n, \n1 \n1 \n\n**)**\n**d**\n**e**\n**u**\n**n**\n**i**\n**t**\n**n**\n**o**\n**c**\n**(**\n\n**S**\n**T**\n**N**\n**E**\n**M**\n**U**\n**R**\n**T**\n**S**\n**N**\ns \ne \ni \nt \nr \na \np \n\n**s**\n**t**\n**e**\n**s**\n**s**\n**A**\n\n**I**\n\n**L**\n**A**\n**I**\n**C**\n**N**\n**A**\n**N**\n**I**\n**F**\n\nc \ni \nm \no \nn \no \nc \ne \nd \ne \nt \na \nl \ne \nr \ns \nr \no \nt \nb \ne \nd \ns \nr \no \nt \nb \ne \nd \n\n**l**\n**a**\n**i**\n**c**\n**n**\n**a**\n**n**\n**i**\n**F**\n**l**\n**a**\n**i**\n**c**\n**n**\n**a**\n**n**\n**i**\n**F**\n**t**\n**s**\n**e**\n**r**\n**e**\n**t**\n**n**\n**I**\n\n- \n\nr \ne \nh \nt \nO s \nn \na \no \nL e \nd \na \nr \nT \ne \nh \nT \nh \ns \na \nC \n\n**l**\n**a**\n**t**\n**o**\n**T** **.**\n**9**\n**2** **)**\n**b**\n**(** **)**\n**i**\n**(**\n\ns \nr \no \nt \ni \nd \ne \nr \nc \ns \nr \no \nt \ni \nd \ne \nr \nc \ne \ns \na \nh \nc \nr \nu \np \n\ne \nl \nb \na \ny \na \np \nn \na \no \nL \n\n- \nn \na \no \nl \n\ne \ne \ny \no \nl \np \nm \nE **l**\n**a**\n**i**\n**c**\n**n**\n**a**\n**n**\n**i**\n**F** s \nl \na \nu \nr \nc \nc \na s \nn \no \ns \nr \ne \np r \ne \nh \nt \nO e \nd \na \nr \nT k \nn \na \nB \ne \nr \ni \nH \n\n**l**\n**a**\n**t**\n**o**\n**T** : \na \n/ \nN **)**\n**i**\n**i**\n**(**", - "page_start": 62, - "page_end": 62, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "The issue of sum rule attracted substantial interest in \nthe studies of high Tc cuprates5–18,21–26 in which pairing \nis without doubts a strong coupling phenomenon. From a \ntheoretical perspective, the interest in this issue was orig- \ninally triggered by a similarity between WK and the ki- \nε~kn~k.18–20 For a model with a sim- \nnetic energy K = 2 \nple tight binding cosine dispersion εk ∝ (cos kx + cos ky), \nd2 ε~k \n∼ −ε~k and WK = −K. For a more complex dis- \nd k2 \nx \npersion there is no exact relation between WK and K, \nbut several groups argued 17,27,28 that WK can still be \nregarded as a good monitor for the changes in the kinetic \nenergy. Now, in a BCS superconductor, kinetic energy \nincreases below Tc because nk extends to higher frequen- \ncies (see Fig.2). At strong coupling, K not necessary \nincreases because of opposite trend associated with the \nfermions are more mobile in the \nfermionic self-energy: \nSCS due to less space for scattering at low energies than \nthey are in the NS. Model calculations show that above \nsome coupling strength, the kinetic energy decreases be- \n29. While, as we said, there is no one-to-one cor- \nlow Tc \nrespondence between K and WK, it is still likely that, \nwhen K decreases, WK increases. \n\nP \n\nωc \nW (ωc) = Re σ(Ω) dΩ = WK + f (ωc) \n\n0 \nZ ′ \n′ \n∞ \nf (ωc) = − Re σ(Ω) dΩ (4) \nωc \nZ \n\nThe Kubo formula, Eq. (3) is obtained assuming that \nthe second part is negligible. This is not guaranteed, \nhowever, as typical ωc ∼ 1 − 2eV are comparable to the \nbandwidth. \nThe differential sum rule ∆W is also a sum of two \nterms \n\n∆W (ωc) = ∆WK + ∆f (ωc) (5) \n\nwhere ∆WK is the variation of the r.h.s. of Eq. 3, \nand ∆f (ωc) is the variation of the cutoff term. Because \nconductivity changes with T at all frequencies, ∆f (ωc) \nalso varies with temperature. It then becomes the issue \nwhether the experimentally observed ∆W (ωc) is predom- \ninantly due to “intrinsic” ∆WK, or to ∆f (ωc). [A third \npossibility is non-applicability of the Kubo formula be- \ncause of the close proximity of other bands, but we will \nnot dwell on this.] \n\nFor the NS, previous works21,22 on particular models \nfor the cuprates indicated that the origin of the temper- \nature dependence of W (ωc) is likely the T dependence \nof the cutoff term f (ωc). Specifically, Norman et. al.22 \napproximated a fermionic DOS by a constant (in which", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0764.pdf" - }, - { - "text": ",. n \n\n\n,:,j \n,-g # I", - "page_start": 20, - "page_end": 20, - "source_file": "00-80T-80.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Capital loses in Canada that can be applied against future capital gains$ 43
$44Tax losses in foreign jurisdictions that expire between 2023
and 20331734
Deductible temporary differences in foreign jurisdictions3245
$ 92$ 123
\n\nthe reversal, and the reversal", - "page_start": 109, - "page_end": 109, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]ConsolidatedCompany\n
Note
2000199920001999$
$$$FOR OR PAIDParameters
1.072.0971.072.097n
Mean ( SD )5.814.3545.303.0532.111.1922.641.785
2.716.2094.077.295428.814
231.7465.590
11.18411.18476.382
76.382273.866
3.430.0734.325.81576.38276.382
4.181.9761.580.792508.851347.496
TS163.077173.829
", - "page_start": 47, - "page_end": 47, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "loss$( 3.00 )$( 2.03 )$( 1.87 )8( 0.64 )8( 15.18 )", - "page_start": 14, - "page_end": 14, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "TYPICAL GUILD-UP 0F tzci~m~ENTs \n\n\n\n,-WING+ FUSELAGE \n\nWING ONLY/. \n\n\n\n- - \n\n- \n\n\n\nC.G. @ 30% MAC \n\n\n\n\nEFFECT OF C.G. WsITION \n\n\n\n50% MAC \n\n\n\n40% MAC (NEUTRAL pOlNn \n---", - "page_start": 277, - "page_end": 277, - "source_file": "00-80T-80.pdf" - }, - { - "text": "$ ( 8 , 1 2 0 ) $ ( 2 1 , 3 6 5 ) $( 1 8 , 8 7 8 ) $ ( 4 8 , 3 6 3 ) \n\n3 , 6 5 2. \n1 , 6 8 2. \n1 , 1 0 0. \n— $ 4 6 , 1 0 4. \n3 0 , 5 3 4. \n7 , 9 6 1. \n7 7 8. \n\n$ 9 , 4 3 3. \n9 6 8. \n2 , 2 1 5. \n1 1 , 1 9 0 $ 5 , 3 5 3. \n1 5 5. \n2 0 8. \n—. $ 6 0 , 8 9 0. \n3 1 , 6 5 7. \n1 0 , 3 8 4. \n1 1 , 9 6 8. \n\n\n \n \n \n \n [html]Network ServicesEurope\n
Network ServicesProposedCorporateCentralWestern
PatientsPatientsSolutionsServicesTotalEurope
Total( in thousnns )Total Revermes812.664TableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
TableTableTableTableTableTableTableTable
", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_EEFT_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0266.pdf", - "query": "What does Kitaev show about spin- 1/2 model?", - "target_page": 1, - "target_passage": "spin- 1/2 model can be mapped to a model with one Majo- rana fermion per site coupled to Ising gauge fields on the links", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Great efforts have been invested to better understand \nthe properties of the Kitaev model. For example, sev- \neral groups have pointed out that the fractionalized Ma- \njorana fermion excitations may be understood from the \nmore familiar Jordan-Wigner transformation of 1D spin \nsystems2,3. The analogy between the non-Abelian Ising \nvortices and vortices in p + ip superconductors has been \nraised in serveral works4–7. Exact diagonalization has \nbeen used to study the Kitaev model on small lattices8. \nAnd perturbative expansion methods have been devel- \noped to study the gapped phases of the Kitaev-type \nmodels9. \nKitaev’s exactly solvable spin-1/2 honeycomb lattice \nmodel1 (noted as the Kitaev model hereafter) has in- \nspired great interest since its debut, due to its exact \nsolvability, fractionalized excitations, and the potential Many generalizations of the Kitaev model have been", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "2Sj · \n\nIII. REALIZATION OF THE KITAEV MODEL. \n+ ω2 + ω \n| ↓↑↑↓i | ↓↑↓↑i \n\n+ ω2 \n| ↑↓↑↓i(cid:17) \n\nIn this Section we will use directly the results of the \nprevious Section to write down a Hamiltonian whose low \nenergy sector is described by the Kitaev model. The \nHamiltonian will be constructed on the physical spin lat- \ntice illustrated in FIG. 2. \nIn this Section we will use \nj, k to label four-spin clusters (pseudo-spin-1/2 sites), the \nphysical spins in cluster j are labeled as Sj1, . . . , Sj4. \nApply the mappings developed in Section II, we have \n\n1 \n√6 (cid:16)| ↓↓↑↑i \nτ z = P34 1 = \n| − i \n\n+ + ω \n| ↑↑↓↓i | ↑↓↓↑i \nτ z = +1 = \n\n| \nτ z = \n\ni \n\nτ z = +1 \n\nand similarly P34 \n. Therefore P34 \n= \ni \ni \nis just τ x in the physical singlet sector. A complete list \nof all permutation operators is given in TABLE I. We \ncan choose the following representation of τ x and τ y, \n\n1 \n| − | \n\nthe desired Hamiltonian in short notation, \n\nτ x = P12 = 2S1 \nτ y = (P13 \n\nS2 + 1/2 \n· \n(4) \nJxτ x \nj τ x \nk \nH = Hcluster \nP14)/√3 = (2/√3)S1 (S3 S4) \nX \ncluster \n− X \n− · − \n\nx−links \nJyτ y \nj τ y \nJzτ z \nj τ z \nk \nk − X − X \ny−links z−links \n\n(7) \n\nMany other representations are possible as well, because \nseveral physical spin interactions may correspond to the \nsame pseudo-spin interaction in the physical singlet sec- \ntor, and we will take advantage of this later. \n\nwhere j, k label the honeycomb lattice sites thus the four- \nspin clusters, Hcluster is given by (2), τ x,y,z should be \nreplaced by the corresponding physical spin operators in \n(4) and (5) or (6), or some other equivalent representa- \ntions of personal preference. \n\nFor τ z we can use τ z = iτ xτ y, where i is the imagi- \n− \nnary unit, \n\ni(2/√3)(2S1 S2 + 1/2)S1 (S3 S4) \n− · · −", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "The exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil- \ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low \nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series \nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and \ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model \nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet \nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre- \nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this \nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2 \nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the \nhigh order spin interactions from more natural couplings, which involves perturbative expansions \nthus breaks the exact mapping, although in a controlled manner. \n\nto realize non-Abelian anyons. The model simply reads \n\nJyτ y \nj τ y \nJxτ x \nj τ x \nHKitaev = \nk − X \nk \n− X \nx−links y−links \n\nJzτ z j τ z \nk \n− X \nz−links \n\n(1) \n\n0 \n1 \n0 \n2 \n\ny \na \nM \n4 \n\n] \nl \ne \n- \nr \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n2 \nv \n6 \n6 \n2 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nwhere τ x,y,z are Pauli matrices, and x, y, z-links are de- \nfined in FIG. 1. It was shown by Kitaev1 that this spin- \n1/2 model can be mapped to a model with one Majo- \nrana fermion per site coupled to Ising gauge fields on the \nlinks. And as the Ising gauge flux has no fluctuation, the \nmodel can be regarded as, under each gauge flux config- \nuration, a free Majorana fermion problem. The ground \nstate is achieved in the sector of zero gauge flux through \neach hexagon. The Majorana fermions in this sector have \nDirac-like gapless dispersion resembling that of graphene, \nas long as \nsatisfy the triangular rela- \nJz| \ntion, sum of any two of them is greater than the third \none1. It was further proposed by Kitaev1 that opening of \nfermion gap by magnetic field can give the Ising vortices \nnon-Abelian anyonic statistics, because the Ising vortex \nwill carry a zero-energy Majorana mode, although mag- \nnetic field destroys the exact solvability. \n\nJx| \n, \nJy| \n, and \n| | | \n\n\n \n \n \n \n [html]\n
II. Formulation of the Pseudo - spin - 1 / 2 from Four - spin Cluster.III. Realization of the Kitaev Model.
3IV. Generate the High Order Physical Spin
Interactions by Perturbative Expansion. A. Generate the High Order Terms by Coupli5
to Optical Pluonon.5
B. Generate the High Order Terms by Magnetic Interactions between Clusters.τ
V. Conclusions.8
Acknowledgments8
A. Coupling between Distortions of a Tetrahedron and the Pseudo - spins8
B. Derivation of the Terms Generated by Second Order Perturbation of Inter - cluste Magnetic Interactions9
References10
", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "x x \ny y \nz z z \nx x x x \ny y y \nz z z z \nx x x x \ny y y \nz z z z \nx x x \ny y y \n\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled \nand open circles indicate two sublattices. x, y, z label the links \nalong three different directions used in (1). \n\nderived as well. There have been several proposals to \nopen the fermion gap for the non-Abelian phase without \nspoiling exact solvability4,6. And many generalizations \nto other(even 3D) lattices have been developed in the \nlast few years10–16. All these efforts have significantly \nenriched our knowledge of exactly solvable models and \nquantum phases of matter. \n\nFIG. 2: Left: the physical spin lattice for the model (8). The \ndash circles are honeycomb lattice sites, each of which is ac- \ntually a cluster of four physical spins. The dash straight lines \nare honeycomb lattice bonds, with their type x, y, z labeled. \nThe interaction between clusters connected by x, y, z bonds \nare the Jx,y,z terms in (8) or (9) respectively. Note this is not \nthe 3-12 lattice used in Ref.9,10. Right: enlarged picture of \nthe clusters with the four physical spins labeled as 1, . . . , 4. \nThick solid bonds within one cluster have large antiferromag- \nnetic Heisenberg coupling Jcluster. \n\nHowever, in the original Kitaev model and its later \ngeneralizations in the form of spin models, spin rotation \nsymmetry is explicitly broken. This makes them harder \nto realize in solid state systems. There are many pro- \nposals to realized the Kitaev model in more controllable \nin cold atom optical lattices17,18, or in \nsituations, e.g. \nsuperconducting circuits19. But it is still desirable for \ntheoretical curiosity and practical purposes to realize the \nKitaev-type models in spin rotation invariant systems. \n\ntion III the Kitaev model will be explicitly constructed \nusing this formalism, and some properties of this con- \nstruction will be discussed. In Section IV we will discuss \ntwo possible ways to generate the high order spin in- \nteractions involved in the construction of Section III by \nperturbative expansions. Conclusions and outlook will \nbe summarized in Section V. \n\nIn this paper we realize the Kitaev honeycomb lattice \nmodel as the low energy Hamiltonian for a spin rotation \ninvariant system. The trick is not to use the physical spin \nas the spin in the Kitaev model, instead the spin-1/2 in \nKitaev model is from some emergent two-fold degener- \nate low energy states in the elementary unit of physical \nsystem. This type of idea has been explored recently by \nJackeli and Khaliullin20, in which the spin-1/2 in the Ki- \ntaev model is the low energy Kramers doublet created by \nstrong spin-orbit coupling of t2g orbitals. In the model \npresented below, the Hilbert space of spin-1/2 in the Ki- \ntaev model is actually the two dimensional spin singlet \nsector of four antiferromagnetically coupled spin-1/2 mo- \nments, and the role of spin-1/2 operators(Pauli matrices) \nin the Kitaev model is replaced by certain combinations \nSℓ)] between the \nof Sj · \nfour spins. \n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2 \nFROM FOUR-SPIN CLUSTER. \n\nIn this Section we will construct the pseudo-spin-1/2 \nfrom a cluster of four physical spins, and map the phys- \nical spin operators to pseudo-spin operators. The map- \nping constructed here will be used in later Sections to \nconstruct the effective Kitaev model. In this Section we \nwill work entirely within the four-spin cluster, all unspec- \nified physical spin subscripts take values 1, . . . , 4. \n\nSk [or the spin-chirality Sj · (Sk × \n\nConsider a cluster of four spin-1/2 moments(called \nphysical spins hereafter), \nlabeled by S1,...,4, antiferro- \nmagnetically coupled to each other (see the right bot- \ntom part of FIG. 2). The Hamiltonian within the clus- \nter(up to a constant) is simply the Heisenberg antiferro- \nmagnetic(AFM) interactions,", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 H = Jz (16/9)[Sj2 (Sj3 Sj4)][Sk2 (Sk3 Sk4)] \nX \nj \n− X · × · × \nz−links \n\nJx (2Sj1 Sj2 + 1/2)(2Sk1 Sk2 + 1/2) Jy (4/3)[Sj1 (Sj3 Sj4)][Sk1 (Sk3 Sk4)] \n− X − X · · · − · − \nx−links y−links \n\n(8) \n\n(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 H = \nX \nj \n\nJx (2Sj1 Sj2 + 1/2)(2Sk1 Sk2 + 1/2) Jy (4/3)[Sj1 (Sj3 Sj4)][Sk1 (Sk3 Sk4)] \n− X − X · · · − · − \nx−links y−links \n\nJz ( 4/3)(2Sj3 Sj4 + 1/2)[Sj1 (Sj3 Sj4)](2Sk3 Sk4 + 1/2)[Sk1 (Sk3 Sk4)] \n− X − · · − · · − \nz−links \n\n(9) \n\nin terms of physical spins S, has full \nspin rotation symmetry and time-reversal symmetry. A \npseudo-magnetic field term \n~τj term can also be \nincluded under this mapping, however the resulting Ki- \ntaev model with magnetic field is not exactly solvable. \nIt is quite curious that such a formidably looking Hamil- \ntonian (8), with biquadratic and six-spin(or eight-spin) \nterms, has an exactly solvable low energy sector. \n\nThis model, \n\n~h \nPj · \n\nNote that the original Kitaev model (1) has three- \nfold rotation symmetry around a honeycomb lattice site, \ncombined with a three-fold rotation in pseudo-spin space \n(cyclic permutation of τ x, τ y, τ z). This is not apparent \nin our model (8) in terms of physical spins, under the \ncurrent representation of τ x,y,z. We can remedy this by \nusing a different set of pseudo-spin Pauli matrices τ ′x,y,z \nin (7), \n\n′x = \nτ \nτ ′y = \n′z = 1/3τ z + \n1/3τ z \n1/3τ z 2/3τ x, \n1/6τ x + \n1/6τ x \n\np \n\n1/2τ y, \n1/2τ y \np \nτ \np \n− p − p \n\nWith proper representation choice, they have a symmet- \nric form in terms of physical spins, \n\n′x = \nτ \nτ ′y = \nτ ′z = (4/3)S4 (S2 S3) + 2/3(2S1 S4 + 1/2) \n\nWe emphasize that because the first intra-cluster term \nPcluster Hcluster commutes with the latter Kitaev terms \nindependent of the representation used, the Kitaev model \nis realized as the exact low energy Hamiltonian of this \nmodel without truncation errors of perturbation theories, \n/Jcluster)2 or higher order terms will \nnamely no ( \n| \nbe generated under the projection to low energy clus- \nter singlet space. This is unlike, for example, the t/U \nexpansion of the half-filled Hubbard model22,23, where \nat lowest t2/U order the effective Hamiltonian is the \nHeisenberg model, but higher order terms (t4/U 3 etc.) \nshould in principle still be included in the low energy ef- \nfective Hamiltonian for any finite t/U . Similar compari- \nson can be made to the perturbative expansion studies of \nthe Kitaev-type models by Vidal et al.9, where the low \nenergy effective Hamiltonians were obtained in certian \nanisotropic (strong bond/triangle) limits. Although the \nspirit of this work, namely projection to low energy sec- \ntor, is the same as all previous perturbative approaches \nto effective Hamiltonians. \n\nJx,y,z| \n\n(4/3)S2 (S3 S4) + 2/3(2S1 S2 + 1/2) \np \n− · × · \n(4/3)S3 (S4 S2) + 2/3(2S1 S3 + 1/2) \np \n− · × · \n\np \n− · × · \n(10) \n\nSo the symmetry mentioned above can be realized by a \nthree-fold rotation of the honeycomb lattice, with a cyclic \npermutation of S2, S3 and S4 in each cluster. This is in \nfact the three-fold rotation symmetry of the physical spin \nlattice illustrated in FIG. 2. However this more symmet- \nric representation will not be used in later part of this \npaper.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0266.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
physical spinpseudo - spin
P12, and P34τ - r
P13, and P24−( 1 / 2 ) τ = + ( γ / 3 / 2 ) r - y
Pl4, and P28−( 1 / 2 ) 72 − ( V3 / 2 ) τW
\n\n1 \n√6 (cid:16)| ↓↓↑↑i \n\nz z \n−τ \n+ ωτ + ω \n| ↓↑↓↑i | ↓↑↑↓i \nz z \n−τ \n+ ωτ + + ω \n\n3 \n\nJcluster limit. So only the singlet sector remains in low \nenergy. \n\nThe singlet sector is then treated as a pseudo-spin-1/2 \nHilbert space. From now on we denote the pseudo-spin- \n1/2 operators as T = (1/2)~τ , with ~τ the Pauli matri- \nces. It is convenient to choose the following basis of the \npseudo-spin \n\nTABLE I: Correspondence between physical spin operators \nand pseudo-spin operators in the physical spin singlet sector of \nthe four antiferromagnetically coupled physical spins. Pjk = \n2Sj \nSℓ) \nare spin-chirality operators. Note that several physical spin \noperators may correspond to the same pseudo-spin operator. \n\nτ z = 1 = \n| ± i \n\n| ↑↓↓↑i(cid:17) \n(3) \n| ↑↑↓↓i | ↑↓↑↓i \n\nwhere ω = e2πi/3 is the complex cubic root of unity, \nand other states on the right-hand-side(RHS) are \n| ↓↓↑↑i \nbasis states of the four-spin system, in terms of Sz quan- \ntum numbers of physical spins 1, . . . , 4 in sequential or- \nder. This pseudo-spin representation has been used by \nHarris et al. to study magnetic ordering in pyrochlore \nantiferromagnets21. \n\nHowever there is another simpler representation of τ z, \nSℓ). Ex- \nby the spin-chirality operator χjkℓ = Sj · \nS4) is \nplicit calculation shows that the effect of S2 \n(√3/4)τ z in the physical singlet sector. This can also \n− \nS3, S2 \nbe proved by using the commutation relation [S2 \n· \nS4). A complete list of all chirality \nS4] = iS2 \noperators is given in TABLE I. Therefore we can choose \nanother representation of τ z, \n\n(Sk × \n(S3 \n· × \n\n· \n\nWe now consider the effect of Heisenberg-type inter- \nSk inside the physical singlet sector. Note \nactions Sj · \nSk within the cluster commutes with \nthat since any Sj · \nthe cluster Hamiltonian Hcluster (2), their action do not \nmix physical spin singlet states with states of other total \nphysical spin. This property is also true for the spin- \nchirality operator used later. So the pseudo-spin Hamil- \ntonian constructed below will be exact low energy Hamil- \ntonian, without truncation errors in typical perturbation \nseries expansions. \n\nτ z = χ234/(√3/4) = (4/√3)S2 (S3 S4) (6) \n\n− \nThe above representations of τ x,y,z are all invariant under \nglobal spin rotation of the physical spins. \n\n− · × \n\nWith the machinery of equations (4), (5), and (6), it \nwill be straightforward to construct various pseudo-spin- \n1/2 Hamiltonians on various lattices, of the Kitaev vari- \nety and beyond, as the exact low energy effective Hamil- \ntonian of certain spin-1/2 models with spin-rotation sym- \nmetry. In these constructions a pseudo-spin lattice site \nactually represents a cluster of four spin-1/2 moments. It is simpler to consider the permutation operators \nSk + 1/2, which just exchange the states \n= k). \nPjk ≡ \nof the two physical spin-1/2 moments j and k (j \nAs an example we consider the action of P34, \n\n2Sj · \n\nIII. REALIZATION OF THE KITAEV MODEL. \n+ ω2 + ω \n| ↓↑↑↓i | ↓↑↓↑i \n\n+ ω2 \n| ↑↓↑↓i(cid:17)", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has \nbeen proposed38. system. And convert them to pseudo-spin notation in \nthe physical spin singlet sector. \n\nOur model (8) is achieved at second order of the per- \nturbation series. Higher order terms become trunca- \ntion errors but may be controlled by small parameters \nλx,y,z/Jcluster \n\nConsider a general small distortion of the tetrahedron, \nthe spin Hamiltonian becomes \n\nJx,y,z| \n′ \nSℓ)2 + J Hcluster, SL = (Jcluster/2)( \nδrℓm(Sℓ · \nSm) \n∼ p| \nX \nℓ X \nℓ \nQE \n2k \nλy QE \n2j · \n\nQE \n\nλx QE \nQE \n1k \nHSL = \n1j · \nX \ncluster \n\n+ \nX \ny−links \n\nλz QE \n1jQE 1kQE \n2k \n+ \n2j · \nX \nz−links \n\n1j is the generalized coordinate for the QE \n2j, QE 1k, QE \n\n− \n\nHamiltonian HSL explicitly written as, \n\nk \n2 \nJ ′(QE \n\nk \n2 \n1j)2 + \n(QE Hcluster j, SL =Hcluster j + \n\n√3 \n2 \n2jτ y 1jτ x \nQE \nj ), \nj − − \n\nwhere k > 0 is the elastic constant for these phonon \nmodes, J ′ is the spin-lattice coupling constant, QE \n1j and \nQE \n1 and QE \n2j are the generalized coordinates of the QE \n2 \ndistortion modes of cluster j, Hcluster j is (2). As al- \nready noted in Ref.35, this model does not really break \nthe pseudo-spin rotation symmetry of a single cluster. \n\nwhere QE \n1 mode \non cluster j, and QE \n2k are similarly defined; \n(4Jx,yk2)/(3J ′2) and λz = (16Jzk4)/(9J ′4); the \nλx,y = \nsingle cluster spin-lattice Hamiltonian Hcluster, SL is (13). \nCollect the results above we have the spin-lattice \n\nNow we put two clusters j and k together, and in- \nclude a perturbation λ Hperturbation to the optical phonon \nHamiltonian, \n\nHjk,SL =Hcluster j, SL + Hcluster k, SL \n+ λ Hperturbation[QE \n1j, QE 2j, QE 1k, QE \n2k] \n\nk \n2 k \n2 \nh(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 + \n1j)2 + 2j)2 \n(QE (QE \nX \ncluster j \n\nSj1 Sj4 + Sj2 Sj3 + Sj2 \n\nSj4 + Sj1 \n√12 \n\nSj3 2Sj1 Sj2 2Sj3 Sj4 \n+ J ′ \n(cid:16)QE \n· · · · − · − · \n1j \n\nSj2 Sj4 + Sj1 Sj3 Sj1 Sj4 Sj2 Sj3 \n+ QE \n2j \n· · \n− \n2 \n· − · \n(cid:17)i \n\n4Jxk2 \n3J ′2 QE \n1j · 4Jyk2 \n3J ′2 QE \n2j · 16Jzk4 \n9J ′4 QE \nQE \n2k + \n1k − X 2j · − X \nX \nz−links x−links y−links \n\nThe single cluster spin-lattice Hamiltonian [first three \nlines in (14)] is quite natural. However we need some harmonic(on x- and y-links of honeycomb lattice) and an- \nharmonic coupling (on z-links) between optical phonon", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0266.pdf" - }, - { - "text": "Another note to take is that it is not necessary to have \nsuch a highly symmetric cluster Hamiltonian (2). The \nmappings to pseudo-spin-1/2 should work as long as the \nground states of the cluster Hamiltonian are the two-fold \ndegenerate singlets. One generalization, which conforms \nthe symmetry of the lattice in FIG. 2, is to have \n\nHcluster = (Jcluster/2)(r \n\n4 \n3 3 \n\n1 2 \n2 \n(a) (b) \n\n3 \n4 \n3 2 3 \n\nQE \n2 \n\n2 \n1 4 1 \n1 (a) (b) (c) \n\nIllustration of the tetragonal to orthorhombic \nFIG. 3: \nQE \n2 (bottom) distortion modes. (a) Perspective \nview of the tetrahedron. 1, . . . , 4 label the spins. Arrows in- \ndicate the motion of each spin under the distortion mode. (b) \nTop view of (a). (c)(d) Side view of (a). \n\n1 (top) and QE \n\nS1 + S2 + S3 + S4)2 (11) \n\n· \nwith Jcluster > 0 and 0 < r < 3. However this is not \nconvenient for later discussions and will not be used. \n\nWe briefly describe some of the properties of (8). Its \nlow energy states are entirely in the space that each of the \nclusters is a physical spin singlet (called cluster singlet \nsubspace hereafter). Therefore physical spin correlations \nare strictly confined within each cluster. The excitations \ncarrying physical spin are gapped, and their dynamics \nare ‘trivial’ in the sense that they do not move from one \ncluster to another. But there are non-trivial low energy \nphysical spin singlet excitations, described by the pseudo- \nspins defined above. The correlations of the pseudo-spins \ncan be mapped to correlations of their corresponding \nphysical spin observables (the inverse mappings are not \nunique, c.f. TABLE I). For example τ x,y correlations \nbecome certain dimer-dimer correlations, τ z correlation \nbecomes chirality-chirality correlation, or four-dimer cor- \nrelation. It will be interesting to see the corresponding \npicture of the exotic excitations in the Kitaev model, e.g. \nthe Majorana fermion and the Ising vortex. However this \nwill be deferred to future studies. \n\nof the two clusters can generate at lowest order the de- \nsired high order spin interactions. In Subsection IV B we \nwill introduce certain magnetic, e.g. Heisenberg-type, in- \nteractions between physical spins of different clusters, at \nlowest order(second order) of perturbation theory the de- \nsired high order spin interactions can be achieved. These \napproaches involve truncation errors in the perturbation \nseries, thus the mapping to low energy effect Hamilto- \nnian will no longer be exact. However the error intro- \nduced may be controlled by small expansion parameters. \nIn this Section we denote the physical spins on cluster \nj(k) as j1, . . . , j4 (k1, . . . , k4), and denote pseudo-spins \non cluster j(k) as ~τj (~τk). \n\nIt is tempting to call this as an exactly solved spin liq- \nuid with spin gap ( \nJcluster), an extremely short-range \nresonating valence bond(RVB) state, from a model with \nspin rotation and time reversal symmetry. However it \nshould be noted that the unit cell of this model contains \nan even number of spin-1/2 moments (so does the orig- \ninal Kitaev model) which does not satisfy the stringent \ndefinition of spin liquid requiring odd number of elec- \ntrons per unit cell. Several parent Hamiltonians of spin \nliquids have already been constructed. See for example, \nRef.24–27. \n\n∼", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "One major drawback of the model to be presented is \nthat it contains high order spin interactions(involves up \nto six or eight spins), thus is still unnatural. However it \nopens the possibility to realize exotic (exactly solvable) \nmodels from spin-1/2 Hamiltonian with spin rotation in- \nvariant interactions. We will discuss two possible routes \nto reduce this artificialness through controlled perturba- \ntive expansions, by coupling to optical phonons or by \nmagnetic couplings between the elementary units. \n\nHcluster = (Jcluster/2) (S1 + S2 + S3 + S4)2 (2) \n\nThe energy levels should be apparent from this form: \none group of spin-2 quintets with energy 3Jcluster, three \ngroups of spin-1 triplets with energy Jcluster, and two spin \nsinglets with energy zero. We will consider large positive The outline of this paper is as follows. In Section II \nwe will lay out the pseudo-spin-1/2 construction. In Sec-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0266.pdf", - "query": "How can fractionalised Majorana fermion excitations be understood?", - "target_page": 1, - "target_passage": "from the more familiar Jordan-Wigner transformation of 1D spin systems", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Great efforts have been invested to better understand \nthe properties of the Kitaev model. For example, sev- \neral groups have pointed out that the fractionalized Ma- \njorana fermion excitations may be understood from the \nmore familiar Jordan-Wigner transformation of 1D spin \nsystems2,3. The analogy between the non-Abelian Ising \nvortices and vortices in p + ip superconductors has been \nraised in serveral works4–7. Exact diagonalization has \nbeen used to study the Kitaev model on small lattices8. \nAnd perturbative expansion methods have been devel- \noped to study the gapped phases of the Kitaev-type \nmodels9. \nKitaev’s exactly solvable spin-1/2 honeycomb lattice \nmodel1 (noted as the Kitaev model hereafter) has in- \nspired great interest since its debut, due to its exact \nsolvability, fractionalized excitations, and the potential Many generalizations of the Kitaev model have been", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "11 \n\nhigh-energy fermions and is an input for the low-energy \ntheory. Below we follow Refs. 31,33 and assume that \nthe momentum dependence of a collective boson is flat \nnear (π, π). The self energy within such model has been \nworked out consistently in Ref. 31,33. \nIn the normal \nstate \n\na SCS a gapless continuum described by Eq. (20) trans- \nforms into a gaped continuum, with a gap about 2∆ and \na resonance at ω = ω0 < 2∆, where for a d−wave gap we \ndefine ∆ as a maximum of a d−wave gap. \nThe spin susceptibility near (π, π) in a superconductor \ncan generally be written up as \n\nχQ \n1 − i Π(Ω) \nωsf \nω2 \nω2 1 \n2 \nχ(q ∼ Q, Ω) = (21) \nΣ′′(ω) = − λnωsf log 1 + \nsf ! \n\nω \nωsf \nΣ′(ω) = −λnωsf arctan \n\nwhere Π is evaluated by adding up the bubbles made \nout of two normal and two anomalous Green’s functions. \nBelow 2∆, Π(Ω) is real (∼ Ω2/∆ for small Ω), and the \nresonance emerges at Ω = ω0 at which Π(ω0) = ωsf . At \nfrequencies larger than 2∆, Π(Ω) has an imaginary part, \nand this gives rise to a gaped continuum in χ(Ω). \n\n(19) \n\nwhere λn is the spin-fermion coupling constant, and ωsf \nis a typical spin relaxation frequency of overdamped spin \ncollective excitations with a propagator \nThe imaginary part of the spin susceptibility around \n\nthe resonance frequency ω0 is31 \n\nχQ \n1 − i Ω \nωsf \nχ(q ∼ Q, Ω) = (20) \n\nπZoω0 \n2 \n\n′′ \nχ (q, Ω) = δ(Ω − ω0) (22) \n\nwhere χQ is the uniform static susceptibility. If we use \nOrnstein-Zernike form of χ(q) and use either Eliashberg \n45 or FLEX computational schemes48, we get rather sim- \nilar behavior of Σ as a function of frequency and rather \nsimilar behavior of optical integrals. \n\nwhere Zo ∼ 2 ωsf χ0/ ∂Π \n∂ω \n\n. The imaginary part \n| \nof the spin susceptibility describing a gaped continuum \nexists for for Ω ≥ 2∆ and is \n\nΩ=ω0 \n\nThe collective nature of spin fluctuations is reflected in \nthe fact that the coupling λ and the bosonic frequency \nωsf are related: λ scales as ξ2, where ξ is the bosonic \nmass (the distance to a bosonic instability), and ωsf ∝ \n2 (see Ref. 49). For a flat χ(q ∼ Q) the product λωsf \nξ− \ndoes not depend on ξ and is the overall dimensional scale \nfor boson-mediated interactions. \n\n′′ \nχ (q, Ω) = Im \n1 − 1 \nωsf \n\" \n\n(cid:0) \n\nχ0 \nπ∆2 \nΩ + i π \n≈ Im \n1 − 1 \nωsf 2 Ω \" # \n\n(cid:1) \nIn Eq. (23) D(x) = K1(x) \nK2(x) \n, and K1(x) and K2(x) \nare Elliptic integrals of first and second kind. The real \npart of χ is obtained by Kramers-Kr¨onig transform of the \nimaginary part. \n\n(cid:0) \n− \nx \n\nχ0 \n4∆2 \nΩ D( 4∆2 \n\nΩ2 ) + iΩK2(1 − 4∆2 \nΩ2 ) \n(cid:1) \n\n# \n\nfor Ω >> 2∆ (23) \n\nIn the SCS fermionic excitations acquire a gap. This \ngap affects fermionic self-energy in two ways: directly, via \nthe change of the dispersion of an intermediate boson in \nthe exchange process involving a CB, and indirectly, via \nthe change of the propagator of a CB. We remind our- \nselves that the dynamics of a CB comes from a particle- \nhole bubble which is indeed affected by ∆. \n\nSubstituting Eq 6 for χ(q, Ω) into the formula for the \nself-energy one obtains Σ′′(ω) in a SCS state as a sum of \ntwo terms31 The effect of a d−wave pairing gap on a CB has been \ndiscussed in a number of papers, most recently in31. In \n\nπZo \n2 \n\nω + ωo \nΣ′′A(ω) = \nλnωo Re \n(ω + ωo)2 − ∆2 ! \n\ncomes from the interaction with the resonance and \np \n\n2 \n1 − 4∆ \nx2 x \nωsf \n\nK2 \n2 \n(cid:16) \n+ \n\nE \n\nω + x \n(ω + x)2 − ∆2 \n\n| | \nΣ′′B(ω) = −λn \ndx Re \n\n(cid:17) \nK2 \n\n1 − 4∆2 \nxωsf \nh \n\n4∆2 \nx2 1 − 4∆2 \nx2 x \nωsf \n2∆ \nD \nZ \n\np \n(cid:1)i \nh \n(cid:1)i (cid:0) (cid:0) \n\ncomes from the interaction with the gaped continuum. The real part of Σ is obtained by Kramers-Kr¨onig trans-", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0764.pdf" - }, - { - "text": "Another note to take is that it is not necessary to have \nsuch a highly symmetric cluster Hamiltonian (2). The \nmappings to pseudo-spin-1/2 should work as long as the \nground states of the cluster Hamiltonian are the two-fold \ndegenerate singlets. One generalization, which conforms \nthe symmetry of the lattice in FIG. 2, is to have \n\nHcluster = (Jcluster/2)(r \n\n4 \n3 3 \n\n1 2 \n2 \n(a) (b) \n\n3 \n4 \n3 2 3 \n\nQE \n2 \n\n2 \n1 4 1 \n1 (a) (b) (c) \n\nIllustration of the tetragonal to orthorhombic \nFIG. 3: \nQE \n2 (bottom) distortion modes. (a) Perspective \nview of the tetrahedron. 1, . . . , 4 label the spins. Arrows in- \ndicate the motion of each spin under the distortion mode. (b) \nTop view of (a). (c)(d) Side view of (a). \n\n1 (top) and QE \n\nS1 + S2 + S3 + S4)2 (11) \n\n· \nwith Jcluster > 0 and 0 < r < 3. However this is not \nconvenient for later discussions and will not be used. \n\nWe briefly describe some of the properties of (8). Its \nlow energy states are entirely in the space that each of the \nclusters is a physical spin singlet (called cluster singlet \nsubspace hereafter). Therefore physical spin correlations \nare strictly confined within each cluster. The excitations \ncarrying physical spin are gapped, and their dynamics \nare ‘trivial’ in the sense that they do not move from one \ncluster to another. But there are non-trivial low energy \nphysical spin singlet excitations, described by the pseudo- \nspins defined above. The correlations of the pseudo-spins \ncan be mapped to correlations of their corresponding \nphysical spin observables (the inverse mappings are not \nunique, c.f. TABLE I). For example τ x,y correlations \nbecome certain dimer-dimer correlations, τ z correlation \nbecomes chirality-chirality correlation, or four-dimer cor- \nrelation. It will be interesting to see the corresponding \npicture of the exotic excitations in the Kitaev model, e.g. \nthe Majorana fermion and the Ising vortex. However this \nwill be deferred to future studies. \n\nof the two clusters can generate at lowest order the de- \nsired high order spin interactions. In Subsection IV B we \nwill introduce certain magnetic, e.g. Heisenberg-type, in- \nteractions between physical spins of different clusters, at \nlowest order(second order) of perturbation theory the de- \nsired high order spin interactions can be achieved. These \napproaches involve truncation errors in the perturbation \nseries, thus the mapping to low energy effect Hamilto- \nnian will no longer be exact. However the error intro- \nduced may be controlled by small expansion parameters. \nIn this Section we denote the physical spins on cluster \nj(k) as j1, . . . , j4 (k1, . . . , k4), and denote pseudo-spins \non cluster j(k) as ~τj (~τk). \n\nIt is tempting to call this as an exactly solved spin liq- \nuid with spin gap ( \nJcluster), an extremely short-range \nresonating valence bond(RVB) state, from a model with \nspin rotation and time reversal symmetry. However it \nshould be noted that the unit cell of this model contains \nan even number of spin-1/2 moments (so does the orig- \ninal Kitaev model) which does not satisfy the stringent \ndefinition of spin liquid requiring odd number of elec- \ntrons per unit cell. Several parent Hamiltonians of spin \nliquids have already been constructed. See for example, \nRef.24–27. \n\n∼", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "**References**\n\nJ. G. Mangum, and M. S. Yun (2007), vol. 375 \nof Astronomical Society of the Pacific Conference \nSeries, p. 234. \n\n[6] S. E. Healey, R. W. Romani, G. Cotter, P. F. \nMichelson, E. F. Schlafly, A. C. S. Readhead, \nP. Giommi, S. Chaty, I. A. Grenier, and L. C. \nWeintraub, ApJS 175, 97 (2008). \n\n[7] A. A. Abdo, M. Ackermann, M. Ajello, W. B. At- \nwood, M. Axelsson, L. Baldini, J. Ballet, G. Bar- \nbiellini, D. Bastieri, B. M. Baughman, et al., ApJ \n700, 597 (2009). \n\n[8] T. Hovatta, E. Nieppola, M. Tornikoski, E. Val- \ntaoja, M. F. Aller, and H. D. Aller, A&A 485, 51 \n(2008). \n\n[1] M. Sikora and G. Madejski, in American Insti- \ntute of Physics Conference Series, edited by F. A. \nAharonian and H. J. V¨olk (2001), vol. 558 of \nAmerican Institute of Physics Conference Series, \npp. 275–288. \n\n[2] M. Sikora, in Blazar Demographics and Physics, \nedited by P. Padovani and C. M. Urry (2001), vol. \n227 of Astronomical Society of the Pacific Con- \nference Series, pp. 95–104. \n\n[3] J. A. Stevens, S. J. Litchfield, E. I. Robson, D. H. \nHughes, W. K. Gear, H. Terasranta, E. Valtaoja, \nand M. Tornikoski, ApJ 437, 91 (1994). \n[4] P. T. P. Ho, J. M. Moran, and K. Y. Lo, ApJl [9] B. C. Kelly, J. Bechtold, and A. Siemiginowska, \n616, L1 (2004). ApJ 698, 895 (2009). \n[10] M. Sikora, R. Moderski, and G. M. Madejski, ApJ \n675, 71 (2008). \n\n[5] M. A. Gurwell, A. B. Peck, S. R. Hostler, M. R. \nDarrah, and C. A. Katz, in From Z-Machines to \nALMA: (Sub)Millimeter Spectroscopy of Galax- \nies, edited by A. J. Baker, J. Glenn, A. I. Harris,", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" - }, - { - "text": "The exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil- \ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low \nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series \nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and \ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model \nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet \nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre- \nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this \nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2 \nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the \nhigh order spin interactions from more natural couplings, which involves perturbative expansions \nthus breaks the exact mapping, although in a controlled manner. \n\nto realize non-Abelian anyons. The model simply reads \n\nJyτ y \nj τ y \nJxτ x \nj τ x \nHKitaev = \nk − X \nk \n− X \nx−links y−links \n\nJzτ z j τ z \nk \n− X \nz−links \n\n(1) \n\n0 \n1 \n0 \n2 \n\ny \na \nM \n4 \n\n] \nl \ne \n- \nr \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n2 \nv \n6 \n6 \n2 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nwhere τ x,y,z are Pauli matrices, and x, y, z-links are de- \nfined in FIG. 1. It was shown by Kitaev1 that this spin- \n1/2 model can be mapped to a model with one Majo- \nrana fermion per site coupled to Ising gauge fields on the \nlinks. And as the Ising gauge flux has no fluctuation, the \nmodel can be regarded as, under each gauge flux config- \nuration, a free Majorana fermion problem. The ground \nstate is achieved in the sector of zero gauge flux through \neach hexagon. The Majorana fermions in this sector have \nDirac-like gapless dispersion resembling that of graphene, \nas long as \nsatisfy the triangular rela- \nJz| \ntion, sum of any two of them is greater than the third \none1. It was further proposed by Kitaev1 that opening of \nfermion gap by magnetic field can give the Ising vortices \nnon-Abelian anyonic statistics, because the Ising vortex \nwill carry a zero-energy Majorana mode, although mag- \nnetic field destroys the exact solvability. \n\nJx| \n, \nJy| \n, and \n| | | \n\n\n \n \n \n \n [html]\n
II. Formulation of the Pseudo - spin - 1 / 2 from Four - spin Cluster.III. Realization of the Kitaev Model.
3IV. Generate the High Order Physical Spin
Interactions by Perturbative Expansion. A. Generate the High Order Terms by Coupli5
to Optical Pluonon.5
B. Generate the High Order Terms by Magnetic Interactions between Clusters.τ
V. Conclusions.8
Acknowledgments8
A. Coupling between Distortions of a Tetrahedron and the Pseudo - spins8
B. Derivation of the Terms Generated by Second Order Perturbation of Inter - cluste Magnetic Interactions9
References10
", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has \nbeen proposed38. system. And convert them to pseudo-spin notation in \nthe physical spin singlet sector. \n\nOur model (8) is achieved at second order of the per- \nturbation series. Higher order terms become trunca- \ntion errors but may be controlled by small parameters \nλx,y,z/Jcluster \n\nConsider a general small distortion of the tetrahedron, \nthe spin Hamiltonian becomes \n\nJx,y,z| \n′ \nSℓ)2 + J Hcluster, SL = (Jcluster/2)( \nδrℓm(Sℓ · \nSm) \n∼ p| \nX \nℓ X \nℓ \n− · × · × \n\nSpin rotation symmetry again helps to separate the terms \nj τ z \nτ z \nk . \nfor cluster j and k, and we get \n· \nThe other cross term r λ2 \nSj4)(1 \n(Sk3 \nHcluster j − \n\n+ λyHperturbation y \nX \ny−links \n\n− \nPjkSk2 \nHcluster k]−1(1 \n+ λzHperturbation z \n\n− \n× \nX \nz−links \n\n(r λ2)/(32Jcluster) \n(Sj3 \n· \n× \n− Pjk)Sj2 \nPjk)[0 \nSk4) \n− · \nPjk gives the same result. \nIn summary the second order perturbation from λ[Sj2 \n· \n(Sj3 Sj4) + r Sk2 (Sj3 Sj4)] is \n\nwhere Hcluster j are given by (2), λx,y,z Hperturbation x,y,z \nare given above. Plug in relevant equations we get (16) \nin Subsection IV B. \n\n× · \n\n× \nλ2 \n32Jcluster r λ2 \n16Jcluster · \nk + r2 τ x τ z \nj τ z \n(τ x \nk + \nj − − − \n\n1 Alexei Kitaev, Ann. Phys. (N.Y.) 321, 2 (2006). \n2 Xiao-Yong Feng, Guang-Ming Zhang, Tao Xiang, Phys. \nRev. Lett. 98, 087204 (2007). \n\n(2009). \n14 Congjun Wu, Daniel Arovas, Hsiang-Hsuan Hung, Phys. \nRev. B 79, 134427 (2009). \n3 Han-Dong Chen, Zohar Nussinov, J. Phys. A: Math. \n15 Shinsei Ryu, Phys. Rev. B 79, 075124 (2009). \n16 G. Baskaran, G. Santhosh, R. Shankar, arXiv:0908.1614 Theor. 41, 075001 (2008). \n4 Dung-Hai Lee, Guang-Ming Zhang, Tao Xiang, Phys. Rev. (2009). \n17 L.-M. Duan, E. Demler, M. D. Lukin, Phys. Rev. Lett. 91, Lett. 99, 196805 (2007). \n\n5 Yue Yu, Nucl. Phys. B 799, 345 (2008). \n6 Yue Yu, Ziqiang Wang, Europhys. Lett. 84, 57002 (2008). \n7 G. Kells, J. K. Slingerland, J. Vala, Phys. Rev. B 80, \n\n090402 (2003). \n18 A. Micheli, G. K. Brennen, P. Zoller, Nature Physics 2, \n\n341 (2006). \n19 J. Q. You, Xiao-Feng Shi, Xuedong Hu, Franco Nori, Phys. 125415 (2009). \n8 Han-Dong Chen, B. Wang, S. Das Sarma, arXiv:0906.0017 Rev. B 81, 014505 (2010). \n20 G. Jackeli, G. Khaliullin, Phys. Rev. Lett. 102, 017205 (2009). \n\n9 K.P. Schmidt, S. Dusuel, and J. Vidal, Phys. Rev. Lett. \n100, 057208 (2008); J. Vidal, K.P. Schmidt, and S. Dusuel, \nPhys. Rev. B 78, 245121 (2008); S. Dusuel, K.P. Schmidt, \nJ. Vidal, and R.L. Zaffino, Phys. Rev. B 78, 125102 (2008). \n10 Hong Yao, Steven A. Kivelson, Phys. Rev. Lett. 99, 247203 \n\n(2009). \n21 A. B. Harris, A. J. Berlinsky, C. Bruder, J. Appl. Phys. \n69, 5200 (1991). \n22 K. A. Chao, J. Spa lek, A. M. Ole´s, Phys. Rev. B 18, 3453", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0266.pdf" - }, - { - "text": "modified MFLI models. It is interesting that this holds \ndespite the fact that for large λ CB model displays the \nphysics one apparently needs to reverse the sign of ∆WK \n– the absence of the quasiparticle peak in the NS and its \nemergence in the SCS accompanied by the dip and the \nhump at larger energies. The absence of coherent quasi- \nparticle in the NS at large λ is also apparent form Fig \n21 where we show the normal state distribution functions \nfor two different λ. For large λ the jump (which indicates \nthe presence of quasiparticles) virtually disappears. \n\nconsistent with earlier calculation of the kinetic energy \nfor Ornstein-Zernike form of the spin susceptibility43. \n\nWe clearly see that the increase of the zero crossing \nfrequency of ∆W (ωc) at a truly strong coupling is cor- \nrelated with the non-BCS behavior of δKE. At the same \ntime, the behavior of δW (ωc) is obviously not driven by \nthe kinetic energy as eventually δW (ωc) changes sign and \nbecome negative. Rather, the increase in the frequency \nrange where ∆W (ωc) remains positive and non-BCS be- \nhavior of δKE are two indications of the same effect that \nfermions are incoherent in the NS but acquire coherence \nin the SCS. \n\nOn a more careful look, we found that indifference of \nδW (ωc) to the increase of λ is merely the consequence of \nthe fact that above we kept λωsf constant. Indeed, at \nsmall frequencies, fermionic self-energy in the NS is Σ′ = \nλω, Σ” = λ2ω2/(λωsf ), and both Σ′ and Σ′′ increase \nwith λ if we keep λωsf constant. But at frequencies larger \nthan ωsf , which we actually probe by ∆W (ωc), the self- \nenergy essentially depends only on λωsf , and increasing λ \nbut keeping λωsf constant does not bring us closer to the \nphysics associated with the recovery of electron coherence \nin the SCS. To detect this physics, we need to see how \nthings evolve when we increase λωsf above the scale of \n∆ , i.e., consider a truly strong coupling when not only \nλ ≫ 1 but also the normal state ΣN S(ω ≥ ∆) >> ∆. \n\nIn this work we analyzed the behavior of optical in- \nωc \no σ(ω)dω and Kubo sum rules in \ntegrals W (ωc) ∝ \nthe normal and superconducting states of interacting \nfermionic systems on a lattice. Our key goal was to \nunderstand what sets the sign of ∆WK = ∆W (∞) be- \ntween the normal and superconducting states and what \nis the behavior of W (ωc) and ∆W (ωc) at finite ωc. In a \nweak coupling BCS superconductor, ∆W (ωc) is positive \nat ωc < 2∆ due to a contribution from superfluid den- \nsity, but becomes negative at larger ωc, and approach a \nnegative value of ∆WK. Our study was motivated by fas- \ncinating optical experiments on the cuprates7–10. In over- \ndoped cuprates, there is clear indication11 that ∆W (ωc) \nbecomes negative above a few ∆, consistent with BCS \nbehavior. In underdoped cuprates, two groups argued8,9 \nthat ∆W integrated up to the bandwidth remains posi- \ntive, while the other group argued10 that it is negative. \nThe reasoning why ∆WK may potentially change sign \nat strong coupling involves the correlation between −WK \nand the kinetic energy. \nIn the BCS limit, kinetic en- \nergy obviously increases in a SCS because of gap opening, \nhence −WK increases, and ∆WK is negative. At strong \ncoupling, there is a counter effect – fermions become more \nmobile in a SCS due to a smaller self-energy. \n\nR", - "page_start": 13, - "page_end": 13, - "source_file": "1001.0764.pdf" - }, - { - "text": "**(a)**\n1 \n*TN*(8) = 92(2)K \n\n90K \n91K \n92K \n93K \n94K \n95K \n\n*e*\n*P*\n0.5 \n\n0 \n-140 -139 -138 -137 -136 -135 -134 -133 -132 -131 \n*e*\n**(b)**\n\n129K \n130K \n131K \n132K \n133K \n134K \n\n*TC*(8) = 133.3(3)K \n0.4 \n*e*\n*P*\n0.2 \n\n0 \n-94 -92 -90 -88 \n-86 \n*e*\n-84 -82 -80 -78 \n\nFIG. 10: (colors online) Equilibrium probability distribution \nof the energy for the thickness n = 8 for some temperatures \naround TN (8), (a), and TC(8), (b), respectively. \n\nopposite magnetization. We can thus confidently assert \nthat, regardless of the underlying lattice structure, by \ndecreasing the number of the out-of-plane interactions, \nfor thicknesses close to the helical bulk pitch, the block \n\nAs a final issue we address the problem of the order \nof the transitions observed at TN (n) and TC(n), respec- \ntively. In particular, we focus our attention to the thick- \nness ranges where the chiral order parameter is relevant, \nregions i) and ii) as defined at the beginning of \ni.e. \nthis Section. In Fig. 10 the equilibrium probability dis- \ntribution of the energy for temperatures around TN (8) \n(Fig. 10a) and TC(8) (Fig. 10b) is plotted: \nfor both \ntemperatures, no double peak structure is observed, so \nthat we have no direct indication for a first order tran- \nsition even if, according to precedent studies of Loison \nand Diep17,18, the presence of a first-order transition at \nTN (n), cannot be completely excluded, as it could reveal \nitself only when the lateral dimension L are much larger \nthan the largest correlation length. The same conclusion \nabout the order of transition is reached for any other in- \nvestigated film thickness, as the energy probability distri- \nbution shape does not qualitatively change. This findings \nagree with the results we got in previous MC simulations \ndiscussed in Ref. 15, so that we may conclude that the \norder of the observed transitions is not affected by the \nrange of interactions. \n\n1 Frustrated spin Systems, edited by H. T. Diep (World Sci- 134420 (2009). \n\n16 J. Bohr D. Gibbs, J. D. Axe, D. E. Moncton, K. L. \nD’Amico, C. F. Majkrzak, J. Kwo, M. Hong, C. L. Chien, \nand J. Jensen, Physica B 159, 93 (1989). \n17 H. T. Diep, Phys. Rev. B 39, 397 (1989). \n18 D. Loison, Physica A 275, 207 (2000). \n19 N. Metropolis, et al., J. Chem. Phys. 21, 1087 (1953). \n20 F. R. Brown and T. J. Woch, Phys. Rev. Lett. 58, 2394 \n\nentific, 2004). \n\n2 H. Kawamura, J. Phys.: Cond. Matt. 10, 4707 (1998). \n3 T. Kimura et al., Nature (London) 426, 55 (2003). \n4 F. Cinti et al., Phys. Rev. Lett. 100, 057203 (2008). \n5 J.H. Park, S. Onoda, N. Nagaosa, and J. H. Han, Phys. \nRev. Lett. 101, 167202 (2008), and references therein. \n6 S. W. Cheong and M. Mostovoy, Nature Materials (Lon- \n\ndon) 6, 13 (2007). (1987). \n7 Minhyea Lee, W. Kang, Y. Onose, Y. Tokura, and N. P. \n\n21 D. P. Landau, and K. Binder, A Guide to Monte Carlo \nSimulation in Statistical Physics, Cambridge University \nPress, Cambridge (2000). \nOng, Phys. Rev. Lett. 102, 186601 (2009) \n\n8 P. Pedrazzini et al., Phys. Rev. Lett. 98, 047204 (2007). \n9 H. Kawamura and M. S. Li, Phys. Rev. Lett. 87, 187204 \n22 M. E.J. Newman, and G. T. Barkema, Monte Carlo Meth- \nods in Statistical Physics, Clarendon Press, Oxford (1999). (2001). \n\n10 P. J. Jensen, and A. R. Mackintosh, Rere Earth Mag- \nnetism (Structure and Excitations), Clarendon Press, Ox- \nford (1991). \n11 S. Konings, C. Schuessler-Langeheine, H. Ott, E. Weschke, \n\n23 B. Efron, The Annals of Statistics 7, 1 (1979). \n24 P. M. Chaikin, T. C. Lubensky Principles of condensed \nmatter physics, Cambridge University Press, New York \n(1995). \n25 K. Binder, Z. Phys. B 43, 119 (1981). K. Binder, Phys. E. Schierle, J. B. Goedkoop, arXiv 0707.2765v2 \n12 P.J. Jensen, and K.H. Bennemann, Surface Science Re- Rev. Lett. 47, 693 (1981). \n\n26 Such observable has been obtained from instantaneous \nevaluation of the structure factor during the stochastic \nprocess, and subsequently statistically analyzed as all the \nother macroscopic quantities.", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0266.pdf", - "query": "What happens when the spin-rotation symmetry is explicitly broken?", - "target_page": 2, - "target_passage": "makes them harder to realize in solid state systems", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "+ \n4 \n(cid:8) Jz| · \nJcluster \nSj2 \n(cid:2) \n(Sk3 Sk4) + sgn(Jz)Sk2 (Sj3 Sj4) \nJz| \n(Sj3 Sj4 + Sk3 \nX \nz−links \np| (cid:3) − | · × · × · \n\nIn (16), we have been able to reduce the four spin in- \nteractions in (8) to inter-cluster Heisenberg interactions, \nand the six-spin interactions in (8) to inter-cluster spin- \nchirality interactions. The inter-cluster Heisenberg cou- \nplings in Hperturbation x,y may be easier to arrange. The inter-cluster spin-chirality coupling in Hperturbation z ex- \nplicitly breaks time reversal symmetry and is probably \nharder to implement in solid state systems. However \nspin-chirality order may have important consequences \nin frustrated magnets36,37, and a realization of spin-", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0266.pdf" - }, - { - "text": "λz Hperturbation, z \n\n=λz[Sj2 \nJz| \n\n(Sk3 Sk4) + sgn(Jz) Sk2 (Sj3 Sj4)] \n\n· \n(Sj3 × \nSj4 + Sk3 \n· · × \nSk4) \n− | · · \n\nthis term becomes \n\nλ2 \n6Jcluster · \n(λ2)/(32Jcluster) \n\n− \n\n= \n− · − \n\nAnother second order perturbation term r2λ2 \n\nPjkSk2 \n· \nHcluster k]−1(1 \n− \nPjk can be computed in the similar \nτ x \nj ). \nSj4)(1 \n(Sj3 \n− Pjk)[0 \n× \n(Sj3 \nSj4) \nPjk)Sk2 \n× \nway and gives the result Hcluster j − \n(r2 λ2)/(32Jcluster) (2 \n− \nFor one of the cross term \n· − \n\nJz| \nwith λz = 4 \nJcluster, r = sgn(Jz) is the sign of Jz. \nThe last term on the right-hand-side is to cancel the non- \ntrivial terms (r2 τ x \nz/(32Jcluster) from the second \norder perturbation of the first term. Up to second order \nperturbation this will produce \n\nr λ2 \nPjkSj2 \n[0 \n− \n− Pjk)Sk2 \n(1 \n\nJzτ z \nj τ z k interactions. \n\n× \n× \n− \n(Sj3 \nPjk × \n\nFinally we have been able to reduce the high order \ninteractions to at most three spin terms, the Hamiltonian \nHmagnetic is Hcluster k]−1(1 \n− \n\np| \n\nk )λ2 j + τ x \n\n(Sk3 \nSk4)(1 \n× \n· \nHcluster k]−1 \nHcluster j − \nSj4) \n· \nWe can use the previous argument for both cluster j and \nk, so (1 \n−Pjk) can be \n−PAB)[0 \n2Jcluster)−1. This term becomes \nreplace by c-number ( \n\n− Pjk) \n\nHcluster j − \n− \n\nr λ2 \nHmagnetic = Hcluster j + \n2Jcluster Pjk[Sj2 \n(Sk3 Sk4)][Sk2 (Sj3 Sj3)] \nPjk. \nX \nj X \nx−links \n− · × · × \n\nSpin rotation symmetry again helps to separate the terms \nj τ z \nτ z \nk . \nfor cluster j and k, and we get \n· \nThe other cross term r λ2 \nSj4)(1 \n(Sk3 \nHcluster j − \n\n+ λyHperturbation y \nX \ny−links \n\n− \nPjkSk2 \nHcluster k]−1(1 \n+ λzHperturbation z \n\n− \n× \nX \nz−links \n\n(r λ2)/(32Jcluster) \n(Sj3 \n· \n× \n− Pjk)Sj2 \nPjk)[0 \nSk4) \n− · \nPjk gives the same result. \nIn summary the second order perturbation from λ[Sj2 \n· \n(Sj3 Sj4) + r Sk2 (Sj3 Sj4)] is \n\nwhere Hcluster j are given by (2), λx,y,z Hperturbation x,y,z \nare given above. Plug in relevant equations we get (16) \nin Subsection IV B. \n\n× · \n\n× \nλ2 \n32Jcluster r λ2 \n16Jcluster · \nk + r2 τ x τ z \nj τ z \n(τ x \nk + \nj − − − \n\n1 Alexei Kitaev, Ann. Phys. (N.Y.) 321, 2 (2006). \n2 Xiao-Yong Feng, Guang-Ming Zhang, Tao Xiang, Phys. \nRev. Lett. 98, 087204 (2007). \n\n(2009). \n14 Congjun Wu, Daniel Arovas, Hsiang-Hsuan Hung, Phys. \nRev. B 79, 134427 (2009). \n3 Han-Dong Chen, Zohar Nussinov, J. Phys. A: Math. \n15 Shinsei Ryu, Phys. Rev. B 79, 075124 (2009). \n16 G. Baskaran, G. Santhosh, R. Shankar, arXiv:0908.1614 Theor. 41, 075001 (2008). \n4 Dung-Hai Lee, Guang-Ming Zhang, Tao Xiang, Phys. Rev. (2009). \n17 L.-M. Duan, E. Demler, M. D. Lukin, Phys. Rev. Lett. 91, Lett. 99, 196805 (2007). \n\n5 Yue Yu, Nucl. Phys. B 799, 345 (2008). \n6 Yue Yu, Ziqiang Wang, Europhys. Lett. 84, 57002 (2008). \n7 G. Kells, J. K. Slingerland, J. Vala, Phys. Rev. B 80, \n\n090402 (2003). \n18 A. Micheli, G. K. Brennen, P. Zoller, Nature Physics 2, \n\n341 (2006). \n19 J. Q. You, Xiao-Feng Shi, Xuedong Hu, Franco Nori, Phys. 125415 (2009). \n8 Han-Dong Chen, B. Wang, S. Das Sarma, arXiv:0906.0017 Rev. B 81, 014505 (2010). \n20 G. Jackeli, G. Khaliullin, Phys. Rev. Lett. 102, 017205 (2009). \n\n9 K.P. Schmidt, S. Dusuel, and J. Vidal, Phys. Rev. Lett. \n100, 057208 (2008); J. Vidal, K.P. Schmidt, and S. Dusuel, \nPhys. Rev. B 78, 245121 (2008); S. Dusuel, K.P. Schmidt, \nJ. Vidal, and R.L. Zaffino, Phys. Rev. B 78, 125102 (2008). \n10 Hong Yao, Steven A. Kivelson, Phys. Rev. Lett. 99, 247203 \n\n(2009). \n21 A. B. Harris, A. J. Berlinsky, C. Bruder, J. Appl. Phys. \n69, 5200 (1991). \n22 K. A. Chao, J. Spa lek, A. M. Ole´s, Phys. Rev. B 18, 3453", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0266.pdf" - }, - { - "text": "Appendix A: Coupling between Distortions of a \nTetrahedron and the Pseudo-spins \n\nIn this Appendix we reproduce from Ref.35 the cou- \nplings of all tetrahedron distortion modes to the spin \n\n· − · \n\nNow we can use TABLE I to convert the above cou- \nIt is easy to see that f A and \nplings into pseudo-spin. \nf T2 \n1,2,3 are all zero when converted to pseudo-spins, namely \nprojected to the physical spin singlet sector. But f E \n1 = \n(√3/2)τ x \n2P34)/(4√3) = \n(P14 +P23 +P24 +P13 \n− \nand f E \nP23)/4 = (√3/2)τ y. This \n2 = (P24 + P13 \n− \nhas already been noted by Tchernyshyov et al.28, only \nthe E modes can lift the degeneracy of the physical spin \nsinglet ground states of the tetrahedron. Therefore the \ngeneral spin lattice coupling is the form of (12) given in \nthe main text. \n\n2P12 \nP14 \n− \n− \n\n−", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "Similarly considering the following perturbation on y- \n\nlinks, λ Hperturbation = λ[Sj1 \n− \n· \nSj4)]. Following similar procedures we get the second \norder perturbation from this term \n\n(Sk3 Sk4) + r Sk1 (Sj3 \n− · \n\nIn this Appendix we derive the second order pertur- \nbations of inter-cluster Heisenberg and spin-chirality in- \nteractions. The results can then be used to construct \n(16). \nλ2 \n6Jcluster h \n+ 2r \n\n9 + 9r2 \n8 − \n\nPjk[Sj1 \n(Sj3 \n\nSj4)][Sk1 \n− \nSk4 + r2 Sj3 \n\n(Sk3 Sk4)] \nPjk \n\n· \nPjk(Sk3 \n· \n9 + 9r2 \n8 \nPjk(Sk3 \n\n· \n\n− \nPjki \n(3/2) Sj4) \n− \n\n· \nj τ y \n\n· \n\nλ2 \n6Jcluster h \n(3/2) \n\n+ 2r (3/4)τ y = \nk \n− \n\nSk4 + r2 Sj3 Sj4) \nPjki \n\nFirst consider the perturbation λ Hperturbation = λ[Sj1 \n· \nSk1 + r(Sj2 \nSk2)], where r is a real number to be tuned \nlater. Due to the fact mentioned in Subsection IV B, \nthe action of Hperturbation on any cluster singlet state \nwill produce a state with total spin-1 for both cluster j \nand k. Thus the first order perturbation in (15) van- \nishes. And the second order perturbation term can be \nHcluster j − \n− Pjk)[0 \ngreatly simplified: operator (1 \nHcluster k]−1(1 \n− Pjk) can be replaced by a c-number \n2Jcluster)−1. Therefore the perturbation up to second \n( \n− \norder is \n\n− \nSo we can choose \nthe last intra-cluster Sk3 \nfirst order perturbation. \n· \n(r λ2)/(4Jcluster) = \nSk4 + r2 Sj3 \n\n· \n\nJy, and include \nSj4 term in the \n− \n− \n· · \n\nTherefore we can choose the following perturbation on \ny-links (not unique), \n\nλy Hperturbation, y \n\nSk1 + sgn(Jy) \nSj4 + Sk3 (Sj3 \nSk4) · \n(Sj3 \n· \n· − | \n\n· \nJy| · | \n\nλ2 \n\n2Jcluster Pjk(Hperturbation)2 \nThis is true for other perturbations considered later in \nthis Appendix. The cluster j and cluster k parts can be \nseparated, this term then becomes (a, b = x, y, z), \n\nPjk − \n\n=λy[Sj1 \nJy| \nJcluster, r = sgn(Jy) is the sign of Jy. \n4 \nwith λy = \np \nj τ z \nThe τ z \nk term is again more difficult to get. We use \nthe representation of τ z by spin-chirality (6). And con- \nsider the following perturbation \n\n(cid:2)PjSa \n2Jcluster X \na,b \nj2Pj · PkSa \nj1Sb \nPjSa \nj2Pj · PkSa \nj2Sb \nPjSa \njℓSb \nPjSa \nPj(Sjℓ · \nThen use the fact that \nSjm) \nPj by spin rotation symmetry, the perturbation be- \ncomes \n\nj1Pj · PkSa \nk1Sb \nk2Sb \n\nk1Pk − \n\nHperturbation = Sj2 (Sj3 Sj4) + r Sk2 (Sj3 Sj4) \n· · × \n\n+ 2r \n+ r2 \n\nk2Pk \nk2Pk(cid:3) \njmPj = δab(1/3) \nλ2 \n· \n\nλ2 \n6Jcluster h \nλ2 \n6Jcluster h 9 + 9r2 \n16 \n9 + 9r2 \n16 \n\n+ 2r \n\nPjk(Sj1 \nj τ x \n\nSj2)(Sk1 Sk2) \n· · \n\n+ (r/2)τ x r/2 \nk − \n\nr \nPjk(Sj1 \nSj2 + Sk1 Sk2) \nPjki. − · · \n\n(r λ2)/(12Jcluster) = \nSj2 + Sk1 \nSo we can choose \nthe last intra-cluster Sj1 \norder perturbation. \nJx, and include \nSk2 term in the first \n− − \n· · \n\n× \nThe first order term in (15) vanishes due to the same \nreason as before. There are four terms in the second \norder perturbation. The first one is \nPjkSj2 \n[0 \n− \n− Pjk)Sj2 \n(1 \n\n(Sk3 \n× \nHcluster j − \nSk4)(1 \n− Pjk) \nHcluster k]−1 \nSk4) \n× \n× \n(Sk3 \nPjk \n\n· \nFor the cluster j part we can use the same arguments \nas before, the Hcluster j can be replaced by a c-number \nJcluster. For the cluster k part, consider the fact that \nSk4], \nSk3 \nthe action of Sk3 \nSk4 on physical singlet states of k will \nalso only produce spin-1 state. So we can replace the \nHcluster k in the denominator by a c-number Jcluster as \nwell. Use spin rotation symmetry to separate the j and \nk parts, this term simplifies to \n\n× \nPjki − \n\n= \n− \n\nλ2 \nThe perturbation on x-links is then (not unique), \nSj2 \nPj · Pk(Sk3 \nSk4) (Sk3 Sk4) \nPk. · × · × \nSk2)] \n· \n\nλx Hperturbation, x =λx[Sj1 \n\nSk1 + sgn(Jx) \nSj2 + Sk1 (Sj2 \n· \nSk2) \n· \nJx(Sj1 \n− · · \n\n12 \np \n\nj τ x \n\n6Jcluster PjSj2 \nUse (S)2 = 3/4 and \n\n− \n\n(Sk3 \n\nSk4) \n× \nk3Sb \n(Sa (Sk3 \nk3Sb Sk4) \nk3Sb \nSa · \nk4Sa \n× \nk4 −", - "page_start": 8, - "page_end": 8, - "source_file": "1001.0266.pdf" - }, - { - "text": "(2009). \n21 A. B. Harris, A. J. Berlinsky, C. Bruder, J. Appl. Phys. \n69, 5200 (1991). \n22 K. A. Chao, J. Spa lek, A. M. Ole´s, Phys. Rev. B 18, 3453 \n\n(1978). \n23 A. H. MacDonald, S. M. Girvin, D. Yoshioka, Phys. Rev. (2007). \n11 S. Yang, D. L. Zhou, C. P. Sun, Phys. Rev. B 76, B 37, 9753 (1988). \n24 J. T. Chayes, L. Chayes, S. A. Kivelson, Commun. Math. 180404(R) (2007). \n12 Hong Yao, Shou-Cheng Zhang, Steven A. Kivelson, Phys. Phys. 123, 53 (1989). \n25 C. D. Batista, S. A. Trugman, Phys. Rev. Lett. 93, 217202 Rev. Lett. 102, 217202 (2009). \n13 Zohar Nussinov, Gerardo Ortiz, Phys. Rev. B 79, 214440 (2004).", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0266.pdf" - }, - { - "text": "One major drawback of the model to be presented is \nthat it contains high order spin interactions(involves up \nto six or eight spins), thus is still unnatural. However it \nopens the possibility to realize exotic (exactly solvable) \nmodels from spin-1/2 Hamiltonian with spin rotation in- \nvariant interactions. We will discuss two possible routes \nto reduce this artificialness through controlled perturba- \ntive expansions, by coupling to optical phonons or by \nmagnetic couplings between the elementary units. \n\nHcluster = (Jcluster/2) (S1 + S2 + S3 + S4)2 (2) \n\nThe energy levels should be apparent from this form: \none group of spin-2 quintets with energy 3Jcluster, three \ngroups of spin-1 triplets with energy Jcluster, and two spin \nsinglets with energy zero. We will consider large positive The outline of this paper is as follows. In Section II \nwe will lay out the pseudo-spin-1/2 construction. In Sec-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "form \n\nJ ′(QE \n1 f E 1 + QE 2 f E \n2 ) \n\nwhere J ′ is the derivative of Heisenberg coupling Jcluster \nbetween two spins ℓ and m with respect to their distance \nrℓm, J ′ = dJcluster/drℓm; QE \n1,2 are the generalized coor- \ndinates of these two modes; and the functions f E \n1,2 are \n\nwhere λ (in fact λ/k) is the expansion parameter. \nConsider the perturbation Hperturbation = QE \n\nQE \n1k, \n1j · \nwhich means a coupling between the QE \n1 distortion \nmodes of the two tetrahedra. Integrate out the optical \nphonons, at lowest non-trivial order, it produces a term \n(3 J ′2 λ)/(4 k2) τ x \nτ x \nk . This can be seen by minimizing \nj · \nseparately the two cluster Hamiltonians with respect to \n1 = (√3 J ′)/(2 k)τ x, then plug this \nQE \ninto the perturbation term. Thus we have produced the \n(3 J ′2 λ)/(4 k2). \nJx term in the Kitaev model with Jx = \nQE \n2k \nτ y \nk at lowest non-trivial \n\n1 , which gives QE \n\n− \nSimilarly the perturbation Hperturbation = QE \n2j · \n\nwill generate (3 J ′2 λ)/(4 k2) τ y \nj · \n(3 J ′2 λ)/(4 k2). \norder. So we can make Jy = \n− \nτ z \nk coupling is more difficult to get. We \nj τ y \nτ x \nk . By the above reasoning, we \nj · \n2j · \nIt will produce at lowest non-trivial or- \nk . Thus we have Jz = \nj τ y \nj · \nk τ y \nτ x \n\nf E \n2 = (1/2)(S2 \nf E \n1 = \n\nS4 + S1 S3 S1 S4 S2 S3), \n\n· \n1/12(S1 · \nS4 + S2 · \nS3 + S2 \n− \n· \nS4 + S1 \n− \nS3 \np \n· \n2S1 · \n2S3 · \nS4). \n· \nS2 \n\n− \n· \nAccording to TABLE I we have f E \n2 = (√3/2)τ y. Then the coupling becomes \nf E \n\n· − \n\nThe τ z \nj · \ntreat it as \nneed an anharmonic coupling Hperturbation = QE \nQE \nder (9 J ′4 λ)/(16 k4) τ x \n(9 J ′4 λ)/(16 k4). \n\n(√3/2)τ x and \n1 = \n− \nk τ y \nτ x \n\nis [equation (1.8) in Ref.35], \n\nFinally we have made up a spin-lattice model HSL, \nSm interaction for physical spins, \nwhich involves only Sℓ · \n2j)2 \n(QE \n\n(13) \nHcluster, SL + \n\nX \nx−links \nQE \n2k \nλy QE \n2j · \n\nQE \n\nλx QE \nQE \n1k \nHSL = \n1j · \nX \ncluster \n\n+ \nX \ny−links \n\nλz QE \n1jQE 1kQE \n2k \n+ \n2j · \nX \nz−links \n\n1j is the generalized coordinate for the QE \n2j, QE 1k, QE \n\n− \n\nHamiltonian HSL explicitly written as, \n\nk \n2 \nJ ′(QE \n\nk \n2 \n1j)2 + \n(QE Hcluster j, SL =Hcluster j + \n\n√3 \n2 \n2jτ y 1jτ x \nQE \nj ), \nj − − \n\nwhere k > 0 is the elastic constant for these phonon \nmodes, J ′ is the spin-lattice coupling constant, QE \n1j and \nQE \n1 and QE \n2j are the generalized coordinates of the QE \n2 \ndistortion modes of cluster j, Hcluster j is (2). As al- \nready noted in Ref.35, this model does not really break \nthe pseudo-spin rotation symmetry of a single cluster. \n\nwhere QE \n1 mode \non cluster j, and QE \n2k are similarly defined; \n(4Jx,yk2)/(3J ′2) and λz = (16Jzk4)/(9J ′4); the \nλx,y = \nsingle cluster spin-lattice Hamiltonian Hcluster, SL is (13). \nCollect the results above we have the spin-lattice \n\nNow we put two clusters j and k together, and in- \nclude a perturbation λ Hperturbation to the optical phonon \nHamiltonian, \n\nHjk,SL =Hcluster j, SL + Hcluster k, SL \n+ λ Hperturbation[QE \n1j, QE 2j, QE 1k, QE \n2k] \n\nk \n2 k \n2 \nh(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 + \n1j)2 + 2j)2 \n(QE (QE \nX \ncluster j \n\nSj1 Sj4 + Sj2 Sj3 + Sj2 \n\nSj4 + Sj1 \n√12 \n\nSj3 2Sj1 Sj2 2Sj3 Sj4 \n+ J ′ \n(cid:16)QE \n· · · · − · − · \n1j \n\nSj2 Sj4 + Sj1 Sj3 Sj1 Sj4 Sj2 Sj3 \n+ QE \n2j \n· · \n− \n2 \n· − · \n(cid:17)i \n\n4Jxk2 \n3J ′2 QE \n1j · 4Jyk2 \n3J ′2 QE \n2j · 16Jzk4 \n9J ′4 QE \nQE \n2k + \n1k − X 2j · − X \nX \nz−links x−links y−links \n\nThe single cluster spin-lattice Hamiltonian [first three \nlines in (14)] is quite natural. However we need some harmonic(on x- and y-links of honeycomb lattice) and an- \nharmonic coupling (on z-links) between optical phonon", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0266.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "Another note to take is that it is not necessary to have \nsuch a highly symmetric cluster Hamiltonian (2). The \nmappings to pseudo-spin-1/2 should work as long as the \nground states of the cluster Hamiltonian are the two-fold \ndegenerate singlets. One generalization, which conforms \nthe symmetry of the lattice in FIG. 2, is to have \n\nHcluster = (Jcluster/2)(r \n\n4 \n3 3 \n\n1 2 \n2 \n(a) (b) \n\n3 \n4 \n3 2 3 \n\nQE \n2 \n\n2 \n1 4 1 \n1 (a) (b) (c) \n\nIllustration of the tetragonal to orthorhombic \nFIG. 3: \nQE \n2 (bottom) distortion modes. (a) Perspective \nview of the tetrahedron. 1, . . . , 4 label the spins. Arrows in- \ndicate the motion of each spin under the distortion mode. (b) \nTop view of (a). (c)(d) Side view of (a). \n\n1 (top) and QE \n\nS1 + S2 + S3 + S4)2 (11) \n\n· \nwith Jcluster > 0 and 0 < r < 3. However this is not \nconvenient for later discussions and will not be used. \n\nWe briefly describe some of the properties of (8). Its \nlow energy states are entirely in the space that each of the \nclusters is a physical spin singlet (called cluster singlet \nsubspace hereafter). Therefore physical spin correlations \nare strictly confined within each cluster. The excitations \ncarrying physical spin are gapped, and their dynamics \nare ‘trivial’ in the sense that they do not move from one \ncluster to another. But there are non-trivial low energy \nphysical spin singlet excitations, described by the pseudo- \nspins defined above. The correlations of the pseudo-spins \ncan be mapped to correlations of their corresponding \nphysical spin observables (the inverse mappings are not \nunique, c.f. TABLE I). For example τ x,y correlations \nbecome certain dimer-dimer correlations, τ z correlation \nbecomes chirality-chirality correlation, or four-dimer cor- \nrelation. It will be interesting to see the corresponding \npicture of the exotic excitations in the Kitaev model, e.g. \nthe Majorana fermion and the Ising vortex. However this \nwill be deferred to future studies. \n\nof the two clusters can generate at lowest order the de- \nsired high order spin interactions. In Subsection IV B we \nwill introduce certain magnetic, e.g. Heisenberg-type, in- \nteractions between physical spins of different clusters, at \nlowest order(second order) of perturbation theory the de- \nsired high order spin interactions can be achieved. These \napproaches involve truncation errors in the perturbation \nseries, thus the mapping to low energy effect Hamilto- \nnian will no longer be exact. However the error intro- \nduced may be controlled by small expansion parameters. \nIn this Section we denote the physical spins on cluster \nj(k) as j1, . . . , j4 (k1, . . . , k4), and denote pseudo-spins \non cluster j(k) as ~τj (~τk). \n\nIt is tempting to call this as an exactly solved spin liq- \nuid with spin gap ( \nJcluster), an extremely short-range \nresonating valence bond(RVB) state, from a model with \nspin rotation and time reversal symmetry. However it \nshould be noted that the unit cell of this model contains \nan even number of spin-1/2 moments (so does the orig- \ninal Kitaev model) which does not satisfy the stringent \ndefinition of spin liquid requiring odd number of elec- \ntrons per unit cell. Several parent Hamiltonians of spin \nliquids have already been constructed. See for example, \nRef.24–27. \n\n∼", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "basic-english-language-skills.PDF", - "query": "What is the Oxbridge Academy email?", - "target_page": 59, - "target_passage": "Email: info@oxbridgeacademy.co.za", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "SEND YOUR REGISTRATION FORM \n\nSend your registration form to the \nregistrations office at Oxbridge Academy via \none of the following channels: \n\nFax: \nPost: \nE-mail: registrar@oxbridgeacademy.co.za \n086 262 5550 \nPO Box 12723, Die Boord, 7613", - "page_start": 26, - "page_end": 26, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Applying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a \ndaunting experience. Not only do you need to choose a course, but you \nalso need to make sure that you: \n• meet the entry requirements \n• meet the deadlines \n• \n• \n• fill in the forms correctly \nsend the forms to the right address \ninclude all the necessary attachments \n\nTo make the college registration process easier for you, we’ve compiled a \ncomprehensive guide on how to register at Oxbridge Academy \n(www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general \ntips that will be relevant to the application and registration processes at \nother colleges. \n\n**There are 4 steps you need to follow when you want to**\n**register as a student at Oxbridge Academy:**\n\n**1.**Select Your Course \n\n**2.** Fill in Your Student Details \n\n**3.**Select Your Delivery Option \n\n**4.** Pay Your Registration Fee and Send in Your Form", - "page_start": 20, - "page_end": 20, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Depending on which course you study, you will either be assessed \nby means of written assignments, or through a combination of \nwritten assignments and exams. Assignments not only help to \ndeepen your understanding of the work, but they often also count \ntoward your final mark. \n\nIf you are an Oxbridge Academy student, we’d like you to know \nthat we are here to help you every step of the way, and that we will \ngive you the opportunity to resubmit your assignments if you don’t \nachieve a pass mark the first time around.", - "page_start": 36, - "page_end": 36, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "With our head office in Stellenbosch in the Western Cape, we cater to our \nstudents’ needs by recruiting industry-expert tutors to provide academic \nassistance via telephone and e-mail, as well as by designing our study \nmaterial in such a way that it is clear, simple, and easy for our students \nto understand. \n\nWe are registered with the Department of Higher Education and Training as a Private College in terms of Section \n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070. \n\n*Developed for Oxbridge Academy*", - "page_start": 58, - "page_end": 58, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Different courses have different registration fees. Please check the course \nfees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to \nfind out how much you need to pay to register for your chosen course, and \npay this amount using the banking details provided at the bottom of the \nregistration form. Remember to attach your proof of payment. \n\nIf you are under the age of 18, your parent or guardian will need to sign \nthis section of the form to state that they are aware of your registration \nwith Oxbridge Academy, and that they do not have any objections. If you \nare unemployed, you will need a guarantor to sign this section of the \nform. Your parent or guarantor will be held responsible if you miss any of \nyour payments in relation to your course fees.", - "page_start": 25, - "page_end": 25, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "You can find the course name and course code for your chosen course on \nthe relevant detailed course information page on our website. Have a look \nat the example in the screenshot below (the course name and course code \nare circled in red): \n\n\n\nPlease make sure to check the accreditation status of your chosen course. \nSome of our courses are non-credit bearing skills development courses, \nwhich are neither accredited by external bodies nor registered on the NQF. \nPlease go to our website:*oxbridgeacademy.co.za*for more \nabout our skills development courses. \n\ninformation", - "page_start": 21, - "page_end": 21, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "In today’s working environment, it is almost guaranteed that \nyou will be required to communicate with colleagues via e-mail \non a regular basis. And due to the large number of e-mails we \nnow send and receive each day, proper e-mail etiquette is \nmore important than ever.", - "page_start": 51, - "page_end": 51, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "1. Read (and follow) the instructions carefully. \nIf you are an Oxbridge Academy student, the general assignment \nguidelines will be provided in your “Success” Study Guide. Specific \ninstructions will also be included at the beginning of each of your \nassignments. \n\n2. Read the questions carefully. \nMake sure you understand what is being asked of you, so that you \nfocus on answering the right questions, instead of providing irrelevant \ninformation. \n\n3. Remember that presentation is important. \nNeatness, spelling, and the structure of your assignment will all count \ntoward the mark that you receive for your assignment. \n\n4. \nto the assignment questions. \nBut make sure to use your own words – don’t just copy. You need to show \nthe person marking your assignment that you have developed a sound \nunderstanding of the subject. \n\nUse your course material and other external sources to find answers \n\n5. When you use external resources, remember to reference them \nproperly, and to include them in a bibliography. \nIf you don’t, you may be guilty of plagiarism (www.oxforddictionaries. \ncom/definition/english/plagiarism), which is a serious offence. \n\n6. \nown words when you formulate your answers. \n\nAlways hand in your own work, and make sure that you use your", - "page_start": 37, - "page_end": 37, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "If you have any questions about your course work, you are always \nwelcome to approach your tutors for help. Just remember that your \ntutors cannot guess what your needs are: you will have to make \ncontact with your tutors and communicate your questions clearly if \nyou want to get the assistance that you need. \n\n\n\n**Use a relevant and descriptive subject line.**\nThis way, your tutor will immediately know what your e-mail is \nabout, and he or she will be more likely to open it. A good subject \nline might read as follows: “Enquiry regarding Assignment 1 for \nSafety Management 101” \n\n**Be polite, and use an appropriate form of address.**\nAlways start your e-mail with an appropriate form of address, \nsuch as “Hello Mr/Ms …” and sign it off with your full name and \nstudent number. This will help to give your message a friendly, yet \nprofessional tone. \n\n\n \n \n \n \n [html]\n
Makethat yControlill he, able tTableTableTableTablevalueStateTableTableStatementAge ( years )TableTable1.2010StateTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 33, - "page_end": 33, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "sg247938.pdf", - "query": "When is it necessary to use a host multipathing driver for load balancing?", - "target_page": 340, - "target_passage": "For load balancing and access redundancy on the host side, the use of a host multipathing driver is required in the following situations: Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize system nodes Protection from a host HBA failure (if two HBAs are in use) Protection from fabric failures if the host is connected through two HBAs to two separate fabrics Provide load balancing across the host HBA", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Figure 3-4 Overview of four-path host zoning \n\nWhen possible, use the minimum number of paths that are necessary to achieve a sufficient \nlevel of redundancy. For the Storwize V7000 environment, no more than four paths per I/O \nGroup are required to accomplish this layout. \n\nAll paths must be managed by the multipath driver on the host side. Make sure that the \nmultipath driver on each server can handle the number of paths required to access all \nvolumes mapped to the host. \n\nFor hosts that use four HBAs/ports with eight connections to an I/O Group, use the zoning \nschema that is shown in Figure 3-5 on page 57. You can combine this schema with the \nprevious four-path zoning schema.", - "page_start": 77, - "page_end": 77, - "source_file": "sg247938.pdf" - }, - { - "text": "**8.1 Host attachment overview**\n\nThe IBM Storwize V7000 system supports a wide range of host types (both IBM and \nnon-IBM). This feature makes it possible to consolidate storage in an open systems \nenvironment into a common pool of storage. Then, you can use and manage the storage pool \nmore efficiently as a single entity from a central point on the storage area network (SAN). \n\nThe ability to consolidate storage for attached open systems hosts provides the following \nbenefits: \n\n(cid:2) Easier storage management \n(cid:2) Increased utilization rate of the installed storage capacity \n(cid:2) Advanced Copy Services functions offered across storage systems from separate vendors \n(cid:2) Only one multipath driver is required for attached hosts \n\nHosts can be connected to Storwize V7000 system using any of the following protocols: \n\n(cid:2) Fibre Channel (FC) \n(cid:2) Fibre Channel over Ethernet (FCoE) \n(cid:2) Internet Small Computer System Interface (iSCSI) \n(cid:2) iSCSI Extensions over RDMA (iSER) \n(cid:2) Non-Volatile Memory Express (NVMe) \n\nHosts that connect to the Storwize V7000 system by using fabric switches that use FC or \nFCoE protocol must be zoned correctly, as described in 3.6, “SAN configuration planning” on \npage 50. \n\nHosts that connect to the Storwize V7000 system with iSCSI protocol must be configured \ncorrectly, as described in Chapter 3, “Planning” on page 43. \n\n**Note:**Certain host operating systems can be directly connected to the Storwize V7000 \nsystem without the need for FC fabric switches. For more information, see this page of the \nIBM System Storage Interoperation Center (SSIC). \n\nFor load balancing and access redundancy on the host side, the use of a host multipathing \ndriver is required in the following situations: \n\n(cid:2) Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize \nsystem nodes \n\n(cid:2) Protection from a host HBA failure (if two HBAs are in use) \n\n(cid:2) Protection from fabric failures if the host is connected through two HBAs to two separate \nfabrics \n\n(cid:2) Provide load balancing across the host HBAs \n\nFor more information about various host operating systems and versions that are supported \nby IBM Storwize V7000, see this page of the IBM System Storage Interoperation Center \n(SSIC). \n\nFor more information about how to attach various supported host operating systems to IBM \nStorwize V7000, see IBM Knowledge Center.", - "page_start": 339, - "page_end": 339, - "source_file": "sg247938.pdf" - }, - { - "text": "Figure 3-5 Overview of eight-path host zoning \n\nFor more information, see Chapter 8, “Hosts” on page 317. \n\n**3.6.6 Zoning considerations for Metro Mirror and Global Mirror**\n\nThe SAN configurations that use intercluster Metro Mirror and Global Mirror relationships \nrequire the following other switch zoning considerations: \n\n(cid:2) Review the latest requirements and recommendations at this website. \n\n(cid:2) If two ISLs are connecting the sites, split the ports from each node between the ISLs. That \nis, exactly one port from each node must be zoned across each ISL. \n\n(cid:2) Local clustered system zoning continues to follow the standard requirement for all ports on \nall nodes in a clustered system to be zoned to one another. \n\nWhen designing zoning for a geographically dispersed solution, consider the effect of the \ncross-site links on the performance of the local system. \n\n**Important:**Be careful when you perform the zoning so that ports that are dedicated for \nintra-cluster communication are*not*used for Host/Storage traffic in the 8-port and 12-port \nconfigurations. \n\nThe use of mixed port speeds for intercluster communication can lead to port congestion, \nwhich can negatively affect the performance and resiliency of the SAN. Therefore, it is not \nsupported.", - "page_start": 78, - "page_end": 78, - "source_file": "sg247938.pdf" - }, - { - "text": "(cid:2) Number of paths per host multipath device \n\nThe maximum supported number of paths per multipath device that is visible on the host is \neight. Although the IBM Subsystem Device Driver Path Control Module (SDDPCM), \nrelated products, and most vendor multipathing software can support more paths, the \nStorwize V7000 expects a maximum of eight paths. In general, you see only an effect on \nperformance from more paths than eight. Although the IBM Spectrum Virtualize can work \nwith more than eight paths, this design is technically unsupported. \n\n(cid:2) Do not intermix dissimilar array types or sizes \n\nAlthough the IBM Spectrum Virtualize supports an intermix of differing storage within \nstorage pools, it is best to always use the same array model, Redundant Array of \nIndependent Disks (RAID) mode. RAID size (RAID 5 6+P+S does not mix well with RAID 6 \n14+2), and drive speeds. \n\nRules and guidelines are no substitution for monitoring performance. Monitoring performance \ncan provide a validation that design expectations are met, and identify opportunities for \nimprovement. \n\n**IBM Spectrum Virtualize performance perspectives**\n\nIBM Spectrum Virtualize software was developed by the IBM Research Group. It is designed \nto run on commodity hardware (mass-produced Intel-based processors [CPUs] with \nmass-produced expansion cards) and to provide distributed cache and a scalable cluster \narchitecture. One of the main goals of this design was to use refreshes in hardware. Currently, \nthe Storwize V7000 cluster is scalable up to eight nodes (four control enclosures). \n\nThe performance is near linear when nodes are added into the cluster until performance \neventually becomes limited by the attached components. Although virtualization provides \nsignificant flexibility in terms of the components that are used, it does not diminish the \nnecessity of designing the system around the components so that it can deliver the level of \nperformance that you want. \n\nThe key item for planning is your SAN layout. Switch vendors have slightly different planning \nrequirements, but the goal is that you always want to maximize the bandwidth that is available \nto the Storwize V7000 ports. The Storwize V7000 is one of the few devices that can drive \nports to their limits on average; therefore, it is imperative that you put significant thought into \nplanning the SAN layout. \n\nEssentially, performance improvements are gained by selecting the most appropriate internal \ndisk drive types, spreading the workload across a greater number of back-end resources \nwhen using external storage, and adding more caching. These capabilities are provided by \nthe Storwize V7000 cluster. However, the performance of individual resources eventually \nbecomes the limiting factor.", - "page_start": 762, - "page_end": 762, - "source_file": "sg247938.pdf" - }, - { - "text": "Depending on the infrastructure and servers types, you must determine the suitable choice \nwhen deciding between single and multiple Host Groups (Availability Zones) configuration. \nFrom an administrative perspective, it is easier to have single Host Group and not isolate the \nsystems into multiple Host Group (Availability zones), as shown in Figure 5-4.", - "page_start": 97, - "page_end": 97, - "source_file": "sg248459.pdf" - }, - { - "text": "When configuring multiple masters, the cluster installation process supports the native HA \nmethod. This method uses the native HA master capabilities that are built into OpenShift \nContainer Platform and can be combined with any Load Balancing solution. \n\nIf a host is defined in the [lb] section of the inventory file, Ansible installs and configures \nHAProxy automatically as the load balancing solution. If no host is defined, it is assumed that \nyou pre-configured an external load balancing solution of your choice to balance the master \nAPI (port 8443) on all master hosts. \n\n**Note:**The HAProxy Load Balancer is intended to demonstrate the API server’s HA mode \nand is not recommended for production environments. If you are deploying to a cloud \nprovider, Red Hat recommends deploying a cloud-native TCP-based Load Balancer or \ntake other steps to provide a highly available load balancer. \n\n**DNS**\nDNS service is an important component in the Red Hat OpenShift Container Platform \nenvironment. Regardless of the provider of DNS, an organization is required to have certain \nrecords in place to serve the various Red Hat OpenShift Container Platform components. \n\nConsidering the Load Balancer values for the Red Hat OpenShift Container Platform master \nservice and infrastructure nodes running router Pods are known beforehand, entries must be \nconfigured into the DNS before starting the deployment procedure. \n\n**DNS for OpenShift applications**\nApplications that are served by OpenShift are accessible by the router on ports 80/TCP and \n443/TCP. The router uses a wildcard record to map all host names under a specific sub \ndomain to the same IP address without requiring a separate record for each name. This \nprocess allows Red Hat OpenShift Container Platform to add applications with arbitrary \nnames if they are under that sub domain. \n\nFor example, a wildcard record for*.apps.example.com causes DNS name lookups for \napp1.apps.example.com and app2.apps.example.com to both return the same IP address: \n9.109.x.y. All traffic is forwarded to the OpenShift Infrastructure Nodes (Routers). The \nRouters examine the HTTP headers of the queries and forward them to the correct \ndestination. \n\nWith a load-balancer host address of 9.109.x.y, the wildcard DNS record for \n*.apps.example.com resolves IP address 9.109.x.y. \n\nA simple DNS round-robin resolution can be used to spread traffic across infrastructure \nnodes. \n\nFor production environments, it is recommended to have more advanced load balancing \ncapabilities to distribute the traffic among the OpenShift Routers. In those cases, an external \nLoad Balancer is used. \n\n**OpenShift Software Defined Networking (SDN)**\nRed Hat OpenShift Container Platform offers the ability to specify how pods communicate \nwith each other. This process can be done by using Red Hat provided Software-defined \nnetworks (SDN) or a third-party SDN. \n\nDeciding on the suitable internal network for an Red Hat OpenShift Container Platform step is \na crucial step. Unfortunately, no correct answer exists regarding the suitable pod network to \nchose because this choice varies based on the specific scenario requirements for how a Red \nHat OpenShift Container Platform environment is to be used.", - "page_start": 109, - "page_end": 109, - "source_file": "sg248459.pdf" - }, - { - "text": "(cid:2) Use PowerVC to manage the LPM feature to migrate VMs from one host to another. The \nLPM is important for frame evacuation during maintenance operations. It is recommended \nto include a dedicated Network interface for VIO management. \n\nFigure 5-9 shows how LPM is working with HMC configuration. \n\n\n\nFigure 5-9 Live Partition Mobility (LPM) with PowerVC and HMC \n\n(cid:2) Master/Infrastructure nodes are configured with the automatic remote restart; in case of \nhost failure, PowerVC automatically restarts the VMs (LPARs) on different hosts. \n\n(cid:2) Create Server Groups for OpenShift VMs and configure soft-anti-affinity rules. \n\n**OpenShift HA**\nOpenShift is also deployed for HA. In this reference architecture, the etcd state database is \ncolocated across the master nodes. The etcd requires a minimum of three nodes for HA. All \nmaster nodes are configured in PowerVC to automatically restart in case of any host failure. \n\nThis reference architecture also uses three infrastructure nodes. Infrastructure nodes host \nOpenShift infrastructure components, such as the registry, containers for log aggregation, \nand metrics. A minimum of three infrastructure nodes are needed for HA when a shared \naggregated logging database is used, and to ensure that service interruptions do not occur \nduring a restart. All infrastructure nodes are configured in PowerVC to automatically restart in \ncase of any host failure.", - "page_start": 105, - "page_end": 105, - "source_file": "sg248459.pdf" - }, - { - "text": "**8.2 Host clusters**\n\nIBM Storwize V7000 software supports host clusters starting with V7.7.1 and later. The host \ncluster allows a user to create a group of hosts to form a cluster. A cluster is treated as a \nsingle entity, which allows multiple hosts to access the same volumes. \n\nVolumes that are mapped to a host cluster are assigned to all members of the host cluster \nwith the same SCSI ID. \n\nA typical user case is to define a host cluster that contains all of the WWPNs belonging to the \nhosts participating in a host operating system-based cluster, such as IBM PowerHA®, and \nMicrosoft Cluster Server (MSCS). \n\nThe following new commands were added to deal with host clusters: \n\n(cid:2) lshostcluster \n(cid:2) lshostclustermember \n(cid:2) lshostclustervolumemap \n(cid:2) mkhost (modified to put host in a host cluster on creation) \n(cid:2) rmhostclustermember \n(cid:2) rmhostcluster \n(cid:2) rmvolumehostclustermap \n\n**8.3 N-Port Virtualization ID support**\n\nThe usage model for the Storwize V7000 is based on a two-way active/active node model. \nThis is a pair of distinct control modules that share active/active access for any specific \nvolume. These nodes each have their own Fibre Channel worldwide node name (WWNN). \nTherefore, ports that are presented from each node have a set of worldwide port names \n(WWPNs) that are presented to the fabric. \n\nTraditionally, if one node fails or is removed for some reason, the paths that are presented for \nvolumes from that node go offline. In this case, it is up to the native O/S multipathing software \nto fail over from using both sets of WWPN to only those that remain online. Although this \nprocess is what multipathing software is designed to do, occasionally it can be problematic, \nparticularly if paths are not seen as coming back online for some reason. \n\nStarting with Storwize V7000 V7.7, the system can be enabled into N_Port ID Virtualization \n(NPIV) mode. When NPIV mode is enabled on the Storwize V7000 system, ports do not \ncome online until they are ready to service I/O, which improves host behavior around node \nunpends. In addition, path failures because of an offline node are masked from hosts and \ntheir multipathing driver do not need to perform any path recovery. \n\nWhen NPIV is enabled on Storwize V7000 nodes, each physical WWPN reports up to four \nvirtual WWPNs, as listed in Table 8-1. \n\nTable 8-1 IBM Spectrum Virtualize NPIV Ports \n\n\n \n \n \n \n [html]\n
NPIV portPort description
Primary PortThis is the WWPN that communicates with backend storage and can be used for node to node traffic ( local or remote ).
Primary scsi Host Attach PortThis is the WWPN that communicates with hosts. It is a target port only. This is the primary port, so it is based on this local node ’ s WWNNL
", - "page_start": 340, - "page_end": 340, - "source_file": "sg247938.pdf" - }, - { - "text": "Finally, if the Pod connects to an external host, the traffic flow from the eth0 interface in the \npod to the vethX in the Linux bridge then to the br0 interface in the OVS uses the tun0 \ninterface through the eth0 to the physical network. \n\nAlmost all packet delivery decisions are performed with OpenFlow rules in the OVS bridge \nbr0, which simplifies the plug-in network architecture and provides flexible routing. In the case \nof the ovs-multitenant plug-in, this configuration also provides enforceable network isolation. \n\n**4.2.3 OpenShift external cluster communication**\n\nOpenShift Container Platform provides different ways to access the applications or services \nthat are running inside the cluster. \n\nAdministrators can make available a service endpoint that external traffic can reach by \nassigning a unique external IP address to that service from a range of external IP addresses. \nThis IP address range is specified by using a CIDR notation, which allows an application user \nto make a request against the cluster for an external IP address. \n\nEach IP address must be assigned to only one service to ensure that each service has a \nunique endpoint. \n\nThe recommendation, in order or preference, is: \n\n(cid:2) Use a router if you use HTTP/HTTPS or TLS-encrypted protocol other than HTTPS. \n(cid:2) Use a Load Balancer, an External IP, or a NodePort. \n\n**OpenShift Container Platform Router plug-in**\nThe following OpenShift Router plug-ins are available: \n\n(cid:2) HAProxy Template Router: The HAProxy template uses the openshift3/ose-haproxy-router \nimage to deploy one or more Router Pods (container) that are running on Infrastructure \nNodes on the OpenShift Container Platform. \n\n(cid:2) F5 BIG-IP Router plug-in: The F5 router integrates with a F5 BIG-IP system in your \n\nenvironment to synchronize routes. F5 BIG-IP version 11.4 or newer is required to have \nthe F5 iControl REST API. \n\nFor more information about the use of the router HAProxy plug-in, see this web page. \n\n**Assigning a public IP by using a load balancer service**\nThis method allows traffic to nonstandard ports through an IP address that is assigned from a \npool. \n\nIf you do not need a specific external IP address, you can configure a load balancer service to \nallow external access to an OpenShift Container Platform cluster. \n\nA load balancer service allocates a unique IP from a configured pool. The load balancer \nfeatures a single edge router IP (which can be a virtual IP (VIP), but is still a single machine \nfor initial load balancing). \n\n**Manually assigning an external IP to a service**\nA Kubernetes service serves as an internal load balancer. It identifies a set of replicated pods \nto proxy the connections it receives to them. Backing pods can be added to or removed from \na service arbitrarily, although the service remains consistently available, which enables \nanything that depends on the service to refer to it at a consistent address.", - "page_start": 81, - "page_end": 81, - "source_file": "sg248459.pdf" - }, - { - "text": "(cid:2) Balanced host load across HBA ports \n\nIf the host has more than one HBA port per fabric, zone each host port with a separate \ngroup of Storwize V7000 ports. \n\n(cid:2) Balanced host load across Storwize V7000 ports \n\nTo obtain the best overall performance of the subsystem and to prevent overloading, the \nload of each Storwize V7000 port should be equal. Assuming a similar load is generated \nby each host, you can achieve this balance by zoning approximately the same number of \nhost ports to each Storwize V7000 port. \n\nFigure 3-4 on page 56 shows an example of a balanced zoning configuration that was \ncreated by completing the following steps: \n\n1. Divide ports on the I/O Group into two disjoint sets, such that each set contains two ports \nfrom each I/O Group node, each connected to a different fabric. \n\nFor consistency, use the same port number on each I/O Group node. The example that is \nshown in Figure 3-4 on page 56 assigns ports 1 and 4 to one port set, and ports 2 and 3 to \nthe second set. \n\nBecause the I/O Group nodes have four FC ports each, two port sets are created. \n\n2. Divide hosts attached to the I/O Group into two equally numerous groups. \n\nIn general, for I/O Group nodes with more than four ports, divide the hosts into as many \ngroups as you created sets in step 1. \n\n3. Map each host group to exactly one port set. \n\n4. Zone all hosts from each group to the corresponding set of I/O Group node ports. \n\nThe host connections in the example on Figure 3-4 on page 56 are defined in the following \nmanner: \n\n– Hosts in group one are always zoned to ports 1 and 4 on both nodes. \n– Hosts in group two are always zoned to ports 2 and 3 on both nodes of the I/O Group. \n\n**Tip:**Create an alias for the I/O Group port set. This step makes it easier to correctly zone \nhosts to the correct set of I/O Group ports. It also makes host group membership visible in \nthe FC switch configuration. \n\nThe use of this schema provides four paths to one I/O Group for each host, and helps to \nmaintain an equal distribution of host connections on Storwize V7000 ports. \n\n**Tip:**To maximize performance from the host point of view, distribute volumes that are \nmapped to each host between both I/O Group nodes.", - "page_start": 76, - "page_end": 76, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0955.pdf", - "query": "Which orbiting instrument provides near-continuous full-sky coverage in the hard X-ray/low-energy gamma-ray range?", - "target_page": 1, - "target_passage": "Gamma ray Burst Monitor", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\nObservations of Soft Gamma Ray Sources > 100 keV Using Earth Occultation \nwith GBM \n\nG.L. Case, M.L. Cherry, J. Rodi \nDept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA \n\nA. Camero-Arranz \nFundaci´on Espa˜nola de Ciencia y Tecnolog´ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain \n\nE. Beklen \nMiddle East Technical University (METU), 06531, Ankara, Turkey \n\nC. A. Wilson-Hodge \nNASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP. Jenke \nNASA Postdoctoral Program Fellow, NASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP.N. Bhat, M.S. Briggs, V. Chaplin, V. Connaughton, R. Preece \nUniversity of Alabama in Huntsville, Huntsville, AL 35899 \n\nM.H. Finger \nUSRA, National Space Science and Technology Center, Huntsville, AL 35899 \n\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being \nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth \noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma \nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient \noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage \nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies \nbelow ∼ 25 keV and above ∼ 1.5 MeV. We describe the technique and present preliminary results \nafter the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: \nthe Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source \nXTE J1752-223. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n6 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n2 \nv \n5 \n5 \n9 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nsists of 12 NaI detectors 5(cid:48)(cid:48) in diameter by 0.5(cid:48)(cid:48) thick \nmounted on the corners of the spacecraft and oriented \nsuch that they view the entire sky not occulted by the \nEarth. GBM also contains 2 BGO detectors 5(cid:48)(cid:48) in di- \nameter by 5(cid:48)(cid:48) thick located on opposite sides of the \nspacecraft. None of the GBM detectors have direct \nimaging capability. \n\nI. INTRODUCTION \n\nThe Gamma ray Burst Monitor (GBM) on Fermi is \ncurrently the only instrument in orbit providing nearly \ncontinuous full sky coverage in the hard X-ray/low \nenergy gamma ray energy range. The Earth occul- \ntation technique, used very successfully on BATSE, \nhas been adapted to GBM. An initial catalog of 64 \nsources is currently being monitored and continuously \naugmented. At energies above 100 keV, six steady \nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, GRS 1915+105) and one transient \nsource (XTE J1752-223) have been detected in the \nfirst year of observation. We describe the instrument, \noutline the technique, and present light curves for the \nseven sources. \n\nKnown sources of gamma ray emission can be mon- \nitored with non-imaging detectors using the Earth oc- \ncultation technique, as was successfully demonstrated \nwith BATSE [3, 4]. When a source of gamma rays \nis occulted by the Earth, the count rate measured by \nthe detector will drop, producing a step-like feature. \nWhen the source reappears from behind the Earths \nlimb, the count rate will increase, producing another \nstep. The diameter of the Earth seen from Fermi is \n∼ 140◦, so roughly 30% of the sky is occulted by the \nEarth at any one time. Coupled with the ±35◦ slew- \ning of the pointing direction every orbit, this means \nthat the entire sky is occulted every two orbits. With \nan altitude of 565 km, a period of 96 minutes, and \nan orbital inclination of 26.5◦, individual occultation \nsteps last for ∼10 seconds (Fig. 1). \n\nII. GBM AND THE EARTH OCCULTATION \nOBSERVATIONAL TECHNIQUE \n\nThe Gamma ray Burst Monitor is the secondary \ninstrument onboard the Fermi satellite [1, 2]. It con-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified \nJulian days. FIG. 4: Cyg X-1 light curve. Horizontal scale is in modi- \nfied Julian days. \n\nto observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. \n\n\n\nGRS 1915+105 (Fig. 5) is a LMXB with the com- \npact object being a massive black hole. Evidence for \nemission above 100 keV has been seen previously [12] \nwith BATSE. The GBM light curve integrated over \n490 days shows significant emission above 100 keV. \n\n1E 1740-29 (Fig. 6) is a LMXB very near the \nGalactic Center. It is a microquasar, and spends most \nIntegral observa- \nof its time in the low/hard state. \ntions indicate the presence of a power law tail above \n200 keV [13]. The present GBM results are consis- \ntent with this high energy emission. In the future, we \n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0955.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "**References**\n\nJ. G. Mangum, and M. S. Yun (2007), vol. 375 \nof Astronomical Society of the Pacific Conference \nSeries, p. 234. \n\n[6] S. E. Healey, R. W. Romani, G. Cotter, P. F. \nMichelson, E. F. Schlafly, A. C. S. Readhead, \nP. Giommi, S. Chaty, I. A. Grenier, and L. C. \nWeintraub, ApJS 175, 97 (2008). \n\n[7] A. A. Abdo, M. Ackermann, M. Ajello, W. B. At- \nwood, M. Axelsson, L. Baldini, J. Ballet, G. Bar- \nbiellini, D. Bastieri, B. M. Baughman, et al., ApJ \n700, 597 (2009). \n\n[8] T. Hovatta, E. Nieppola, M. Tornikoski, E. Val- \ntaoja, M. F. Aller, and H. D. Aller, A&A 485, 51 \n(2008). \n\n[1] M. Sikora and G. Madejski, in American Insti- \ntute of Physics Conference Series, edited by F. A. \nAharonian and H. J. V¨olk (2001), vol. 558 of \nAmerican Institute of Physics Conference Series, \npp. 275–288. \n\n[2] M. Sikora, in Blazar Demographics and Physics, \nedited by P. Padovani and C. M. Urry (2001), vol. \n227 of Astronomical Society of the Pacific Con- \nference Series, pp. 95–104. \n\n[3] J. A. Stevens, S. J. Litchfield, E. I. Robson, D. H. \nHughes, W. K. Gear, H. Terasranta, E. Valtaoja, \nand M. Tornikoski, ApJ 437, 91 (1994). \n[4] P. T. P. Ho, J. M. Moran, and K. Y. Lo, ApJl [9] B. C. Kelly, J. Bechtold, and A. Siemiginowska, \n616, L1 (2004). ApJ 698, 895 (2009). \n[10] M. Sikora, R. Moderski, and G. M. Madejski, ApJ \n675, 71 (2008). \n\n[5] M. A. Gurwell, A. B. Peck, S. R. Hostler, M. R. \nDarrah, and C. A. Katz, in From Z-Machines to \nALMA: (Sub)Millimeter Spectroscopy of Galax- \nies, edited by A. J. Baker, J. Glenn, A. I. Harris,", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" - }, - { - "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "FIG. 2: Crab light curve. Horizontal scale is in modified \nJulian days over the 490 day GBM exposure period. Ver- \ntical scale is in photons/cm2/sec/keV averaged over daily \nintervals. Horizontal lines show the average flux in each of \nfive energy bands increasing from top to bottom \n\nThe shape of the individual occultation steps de- \npends on energy and occultation angle. Transmis- \nsion as a function of time is modeled as T (t) = \nexp[−µ(E)A(h)], where µ(E) is the mass attenuation \ncoefficient of gamma rays at energy E in air and A(h) \nis the air mass along the line of sight at a given alti- \ntude h(t). Account is taken of the detector response \nas it changes as a function of angle across the fit win- \ndow. For each source, occultation times are predicted. \nEach step is fit over a 4-minute window along with a \nquadratic background and using an assumed spectrum \nto determine the detector count rate due to the source. \nThe instrument response is used to convert the count \nrate to a flux. Up to 31 steps are possible for a given \nsource in a day, and these steps are summed to get a \nsingle daily average flux. The GBM occultation sensi- \ntivity exceeds that of BATSE at energies below ∼ 25 \nkeV and above ∼ 1.5 MeV [5]. \n\neral sources over the same time intervals in ref. [2], \nwhere it is seen that the results measured by the two \ninstruments compare well. At energies above the up- \nper energy limit of ∼ 195 keV of the Swift 22-month \ncatalog [6], however, the GBM observations provide \nthe only wide-field monitor available of the low en- \nergy gamma ray sky. \n\nThis work uses the GBM CTIME data, with its \n8 broad energy channels and 0.256-second resolution, \nrebinned to 2-second resolution. The occultation tech- \nnique relies on an input catalog of known sources. \nCurrently, we are monitoring 64 sources. Of these \n64 sources, 6 steady sources are detected above 100 \nkeV with a significance of at least 5σ after ∼ 490 days \nof observations, and one transient source. \n\nA. Steady Sources \n\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, and GRS 1915+105 are detected by \nGBM at energies above 100 keV. We show GBM light \ncurves generated from the Earth occultation analysis \nin several energy bands with one day resolution for \nthese six sources in Figures 2 - 7. \n\nIII. RESULTS \n\nTable I gives the fluxes and significances averaged \nover all the days from Aug. 12, 2008 (the beginning of \nscience operations) to Dec. 15, 2009, approximately \n490 days. \n\nThe results presented here are preliminary. We \nhave not completed the fine tuning of our algorithms, \nthough the average fluxes are not expected to change \nmuch. Future work will \ninclude using the GBM \nCSPEC data, with its finer energy binning, to exam- \nine the detailed spectra for these sources. \n\nThe Crab (Fig. 2) spectrum in the hard x-ray/low \nenergy gamma-ray region can be described by a bro- \nken power law, with the spectrum steepening at 100 \nkeV and then hardening at 650 keV [7, 8]. While the \nGBM CTIME data do not have the spectral resolution The measured 20 - 50 keV GBM light curves are \ncompared to Swift’s 15 - 50 keV light curves for sev- \n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0955.pdf" - }, - { - "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0955.pdf", - "query": "What is Cyg X-1?", - "target_page": 3, - "target_passage": "is a HMXB and one of the first systems determined to contain a black hole", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "CD \n\n\n\n\n\n\n\n\n\n\n\n\n\nANGLE OF ATTACK, DEGREES \na \n\nFigure 7.13. Brag Characferistics (sheet 2 of 2)", - "page_start": 48, - "page_end": 48, - "source_file": "00-80T-80.pdf" - }, - { - "text": ",. n \n\n\n,:,j \n,-g # I", - "page_start": 20, - "page_end": 20, - "source_file": "00-80T-80.pdf" - }, - { - "text": "4 \nSTABLE, POSITIVE CyAC \n\n\n\nCM \n\n\n\n\n\n\nai*\nI \nSTABLE, NEGATIVE f&AC \n\n\n\n CL \n\n\n\n) =3=Ez.,. \n\nCM + \n\n\n\nSUBSONIC - \n\n\n\n\\ \nSUPERSONIC \n\n\nFigure 4.7. Effect of CM~~ C. G. Position and Mach Nimber", - "page_start": 272, - "page_end": 272, - "source_file": "00-80T-80.pdf" - }, - { - "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified \nJulian days. FIG. 4: Cyg X-1 light curve. Horizontal scale is in modi- \nfied Julian days. \n\nto observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. \n\n\n\nGRS 1915+105 (Fig. 5) is a LMXB with the com- \npact object being a massive black hole. Evidence for \nemission above 100 keV has been seen previously [12] \nwith BATSE. The GBM light curve integrated over \n490 days shows significant emission above 100 keV. \n\n1E 1740-29 (Fig. 6) is a LMXB very near the \nGalactic Center. It is a microquasar, and spends most \nIntegral observa- \nof its time in the low/hard state. \ntions indicate the presence of a power law tail above \n200 keV [13]. The present GBM results are consis- \ntent with this high energy emission. In the future, we \n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0955.pdf" - }, - { - "text": "CENTRIFUGAL COMPRESSOR \n\n9A \n\nDWGLE ENTRY \nCENfRlFuGAL COMPRESSCR \n\nf-~&ARGE \n\n\n\n\n\n\n\n\n\n\n\nAXIAL FLOW COMPRESSOR \n\nSTA’VM BLADES7 \n\n\n\nUSCHARGE \n\n\n\n\n\nSHAFT7 \n\n\n\nCOMPRESSOR BLADING \n\n\nROTATING \nRows", - "page_start": 127, - "page_end": 127, - "source_file": "00-80T-80.pdf" - }, - { - "text": "+N,YAWlNG MOMENT \n\n\n\n\n\nYAWING MOMENT \nCOEFFICIENT,Cn \nt \n\n+Cn \n\n\n\n\n\nSIDESLLANGLE, p", - "page_start": 303, - "page_end": 303, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Figure 7.26. Airflow Separation (sheet 2 of 2)", - "page_start": 75, - "page_end": 75, - "source_file": "00-80T-80.pdf" - }, - { - "text": "TYPICAL GUILD-UP 0F tzci~m~ENTs \n\n\n\n,-WING+ FUSELAGE \n\nWING ONLY/. \n\n\n\n- - \n\n- \n\n\n\nC.G. @ 30% MAC \n\n\n\n\nEFFECT OF C.G. WsITION \n\n\n\n50% MAC \n\n\n\n40% MAC (NEUTRAL pOlNn \n---", - "page_start": 277, - "page_end": 277, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0955.pdf", - "query": "What satellite is the Gamma Ray Burst Observatory on?", - "target_page": 1, - "target_passage": " Fermi satellite", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\nObservations of Soft Gamma Ray Sources > 100 keV Using Earth Occultation \nwith GBM \n\nG.L. Case, M.L. Cherry, J. Rodi \nDept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA \n\nA. Camero-Arranz \nFundaci´on Espa˜nola de Ciencia y Tecnolog´ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain \n\nE. Beklen \nMiddle East Technical University (METU), 06531, Ankara, Turkey \n\nC. A. Wilson-Hodge \nNASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP. Jenke \nNASA Postdoctoral Program Fellow, NASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP.N. Bhat, M.S. Briggs, V. Chaplin, V. Connaughton, R. Preece \nUniversity of Alabama in Huntsville, Huntsville, AL 35899 \n\nM.H. Finger \nUSRA, National Space Science and Technology Center, Huntsville, AL 35899 \n\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being \nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth \noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma \nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient \noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage \nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies \nbelow ∼ 25 keV and above ∼ 1.5 MeV. We describe the technique and present preliminary results \nafter the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: \nthe Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source \nXTE J1752-223. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n6 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n2 \nv \n5 \n5 \n9 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nsists of 12 NaI detectors 5(cid:48)(cid:48) in diameter by 0.5(cid:48)(cid:48) thick \nmounted on the corners of the spacecraft and oriented \nsuch that they view the entire sky not occulted by the \nEarth. GBM also contains 2 BGO detectors 5(cid:48)(cid:48) in di- \nameter by 5(cid:48)(cid:48) thick located on opposite sides of the \nspacecraft. None of the GBM detectors have direct \nimaging capability. \n\nI. INTRODUCTION \n\nThe Gamma ray Burst Monitor (GBM) on Fermi is \ncurrently the only instrument in orbit providing nearly \ncontinuous full sky coverage in the hard X-ray/low \nenergy gamma ray energy range. The Earth occul- \ntation technique, used very successfully on BATSE, \nhas been adapted to GBM. An initial catalog of 64 \nsources is currently being monitored and continuously \naugmented. At energies above 100 keV, six steady \nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, GRS 1915+105) and one transient \nsource (XTE J1752-223) have been detected in the \nfirst year of observation. We describe the instrument, \noutline the technique, and present light curves for the \nseven sources. \n\nKnown sources of gamma ray emission can be mon- \nitored with non-imaging detectors using the Earth oc- \ncultation technique, as was successfully demonstrated \nwith BATSE [3, 4]. When a source of gamma rays \nis occulted by the Earth, the count rate measured by \nthe detector will drop, producing a step-like feature. \nWhen the source reappears from behind the Earths \nlimb, the count rate will increase, producing another \nstep. The diameter of the Earth seen from Fermi is \n∼ 140◦, so roughly 30% of the sky is occulted by the \nEarth at any one time. Coupled with the ±35◦ slew- \ning of the pointing direction every orbit, this means \nthat the entire sky is occulted every two orbits. With \nan altitude of 565 km, a period of 96 minutes, and \nan orbital inclination of 26.5◦, individual occultation \nsteps last for ∼10 seconds (Fig. 1). \n\nII. GBM AND THE EARTH OCCULTATION \nOBSERVATIONAL TECHNIQUE \n\nThe Gamma ray Burst Monitor is the secondary \ninstrument onboard the Fermi satellite [1, 2]. It con-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified \nJulian days. FIG. 4: Cyg X-1 light curve. Horizontal scale is in modi- \nfied Julian days. \n\nto observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. \n\n\n\nGRS 1915+105 (Fig. 5) is a LMXB with the com- \npact object being a massive black hole. Evidence for \nemission above 100 keV has been seen previously [12] \nwith BATSE. The GBM light curve integrated over \n490 days shows significant emission above 100 keV. \n\n1E 1740-29 (Fig. 6) is a LMXB very near the \nGalactic Center. It is a microquasar, and spends most \nIntegral observa- \nof its time in the low/hard state. \ntions indicate the presence of a power law tail above \n200 keV [13]. The present GBM results are consis- \ntent with this high energy emission. In the future, we \n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0955.pdf" - }, - { - "text": "1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nFor the synchrotron component of blazar spectra, \nthe low-frequency spectral break due to synchrotron \nself-absorption moves to higher frequencies as one \nmeasures closer to the base of the jet [2]. This of- \nten places the peak of the spectrum in the millime- \nter and submillimeter bands, where the emission is \noptically-thin and originates on parsec and sub-parsec \nscales [3], allowing direct observation of the most com- \npact regions near the central engine. The high en- \nergy γ-ray emission originates as a Compton process, \ntypically a combination of synchrotron-self-Compton \n(SSC) and external-radiation-Compton (ERC). De- \npending on the source properties, the synchrotron \nphotons or external photons are upscattered by the \nsame population of electrons that emit the millimeter \nand submillimeter spectra. Therefore the submillime- \nter and γ-ray emission are closely linked and give the \nfull information about the source emission. \n\nA systematic study of the submillimeter properties \nof the entire sample of Fermi blazars has yet to be con- \nducted and is one of the primary goals of our work. We \npresent here preliminary analysis of the submillimeter \nproperties of Fermi blazars detected by the Submil- \n1The Submillimeter Array is a joint project between the \nSmithsonian Astrophysical Observatory and the Academia \nSinica Institute of Astronomy and Astrophysics and is funded \nby the Smithsonian Institution and the Academia Sinica. \n2http://sma1.sma.hawaii.edu/callist/callist.html \n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n(z = 0.341) detected in the VHE band. In addition, \nVER J0521+211, likely associated with the radio-loud \nAGN RGB J0521.8+2112, was detected by VERTAS \nin ∼4 h of observations in October 2009 [23]. These \nobservations were motivated by its identification as a \n>30 GeV γ-ray source in the public Fermi-LAT data. \nIts VHE flux is 5% of the Crab Nebula flux, placing it \namong the brightest VHE blazars detected in recent \nyears. VERITAS later observed even brighter VHE \nflaring from VER J0521+211 in November 2009 [24], \nleading to deeper VHE observations. \n\n\n \n \n \n \n [html]\n
ObjectClass | RedshiftM 87
FR I0.004Mkn 421
HBL0.030Mkn 501
HBL0.0341ES 2344 + 514
HBL0.0441ES 1959 + 650
HBL0.047W Comae †
IBL0.102RGB J0710 + 591 †
HBL0.125H 1426 + 428
HBL0.1291ES 0806 + 524 †
HBL0.1381ES 0229 + 200
HBL0.1391ES 1218 + 304
HBL0.182RBS 0413 †
HBL0.1901ES 0502 + 675 †
HBL0.3413.66A †
IBL0.444?PKS 1424 + 240 †
IBL?VER J0521 + 211 †
??
\n\n**6. Blazars Upper Limits**\n\n(∼5.5σ; 3% Crab flux above 300 GeV; ΓVHE ∼ 2.7) \nduring VERITAS observations from December 2008 \nto March 2009. The initial announcement of the VHE \ndiscovery [19] led to its discovery above 1 GeV in the \nFermi-LAT data using a special analysis. RBS 0413, \na relatively distant HBL (z=0.19), was observed for \n16 h good-quality live time in 2008-092. These data \nresulted in the discovery of VHE gamma-rays (>270γ, \n∼6σ) at a flux (>200 GeV) of ∼2% of the Crab Neb- \nula flux. The discovery [20] was announced simultane- \nously with the LAT MeV-GeV detection. The VHE \nand other MWL observations, including Fermi-LAT \ndata, for each of these three sources will be the sub- \nject of a joint publication involving both the VERI- \nTAS and LAT collaborations.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed3.pdf", - "query": "When in present-day Poland did the first shift away from earlier ancestry occur?", - "target_page": 3, - "target_passage": "in the Middle to Late Bronze Age (1500 bce to 1000 bce), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "In the region of present-day Poland, our analysis suggests several \nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce \nto 1000 bce), we observe a clear shift away from preceding ancestry \noriginally associated with Corded Ware cultures55 (Fig. 3a). Second, \nin the first to fifth century ce, individuals associated with Wielbark \nculture5,12 show an additional strong shift away from the preceding \nBronze Age groups, and can only be modelled with a >75% component \nattributed to the EIA Scandinavian Peninsula. Multiple individuals, \nespecially from earlier Wielbark cemeteries, have approximately 100%", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed3.pdf" - }, - { - "text": "Scandinavia \n\n\n\n**Fig. 3 | Time transects across six geographical regions in Europe.**\n**a**–**f**, Ancestry change visualized over a time transect spanning from the Bronze \nAge to the present day in Poland (**a**), southeastern Europe (**b**), central Europe \n(**c**), Italy (**d**), Britain and Ireland (**e**) and Scandinavia (**f**). The maps show sample \nlocations of all available ancient genomes with at least 0.5× coverage from these regions (Supplementary Table 1). Their ancestry is shown on the same \nMDS model as in Fig. 2a for each time period. For each geographic region, \nthe early medieval period is highlighted in orange and the area in the MDS \ncorresponding to Scandinavian and central European ancestries is highlighted \nin an orange box. \n\nmedieval individuals (*P*≪ 1 × 10−32). Instead, the majority of individuals \nfrom medieval Poland can be modelled only as a mixture of ancestries \nrelated to Roman Iron Age Lithuania, which is similar to ancestries of \nindividuals from middle to late Bronze Age Poland (44%, 95% confidence \ninterval 36–51%), an ancestry component related to Hungarian Scyth- \nians or Slovakian La Tène individuals (49%, 95% confidence interval \n41–57%) and potentially a minority component of ancestry related to \nSarmatians from the Caucasus (*P*= 0.13) (Fig. 2c). Four out of twelve \nindividuals from medieval Poland, three of whom are from the late \nViking Age6, carried detectable Scandinavian-related ancestry. Some \nof the ancestry detected in individuals from later medieval Poland may \nhave persisted during the late first millennium ce in the cremating \nportion of the population, but regardless, this points to large-scale \nancestry transformation in medieval Poland (Fig. 3a). Future data could \nshed light on the extent to which this reflects the influence of groups \nspeaking Slavic languages in the region. \n\nIn present-day Slovakia, individuals associated with the Iron \nAge La Tène period appear close to Hungarian Scythians in the two \ndimensions of our MDS analysis, and are modelled as a mixture of \ncentral and eastern European ancestry. However, a first-century ce \nburial of a 50–60-year-old woman from Zohor is modelled only with \nScandinavian-related ancestry, providing evidence of ancestry related \nto the Scandinavian EIA appearing southwest of the range of the Wiel- \nbark archaeological complex5,57 (Fig. 3b). Later early medieval individu- \nals from Slovakia have partial Scandinavian-related ancestry, providing \nevidence for the integration between expanding and local groups. \n\nNearby, in present-day Hungary, we observe Scandinavian-related \nancestry components in several burials dating to the sixth century \nce associated with Longobards (Longobard_earlyMED(I))10 (Fig. 2c). \nThis is consistent with the original study10, which reported affinity to \npresent-day groups from northwestern Europe (GBR, CEU and FIN in \nthe 1000 Genomes Project (1000GP))10 but which we can resolve with", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Influx into pre-Viking Age Scandinavia**\nIn EIA Scandinavia (<500 ce), we find evidence for broad genetic homo- \ngeneity. Specifically, individuals from Denmark (100 ce–300 ce) were \nindistinguishable from contemporary people in the Scandinavian Pen- \ninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry \nalready in the eighth century ce (Late Iron Age/early Viking Age) on \nZealand (present-day Denmark) for which a 100% EIA ancestry model \nis rejected (*P*= 1 × 10−17 using Twigstats;*P*= 7.5 × 10−4 without). This \nshift in ancestry persists among later Viking Age groups in Denmark, \nwhere all groups are modelled with varying proportions of ancestry \nrelated to Iron Age continental groups in central Europe (Figs. 3f \nand 4c). A non-parametric MDS of Viking Age individuals suggests \nthat variation between individuals forms a cline spanning from the \nEIA Scandinavian Peninsula individuals to ancestry characteristic of \ncentral Europe (Fig. 4e). The observed shift in ancestry in Denmark \ncannot be confounded by potentially earlier unknown gene flow into \nIron Age source groups in Austria, France and Germany, but such gene \nflow could affect the exact ancestry proportions. \n\nIn southern Germany, the genetic ancestry of individuals from \nearly medieval Bavaria probably associated with the historical \nGermanic-language-speaking Baiuvarii59 cannot be modelled as deriv- \ning ancestry solely from earlier groups in Iron Age central Germany \n(*P*≪ 1 × 10−36). The Baiuvarii probably appeared in the region in the \nfifth century ce59, but their origins remain unresolved. Our current \nbest model indicates a mixture with ancestry derived from EIA Pen- \ninsular Scandinavia and central Europe, suggesting an expansion of \nScandinavian-related ancestry producing a regional ancestry shift \n(Figs. 2c and 3c). \n\nIn Italy, southward expansions of northern and central European ances- \ntries appear by the Late Antiquity (approximately fourth century ce), \nwhere a clear diversification of ancestry can be observed compared \nwith preceding time periods (Fig. 3d). However, no individuals with \nnear 100% Scandinavian ancestry can be observed in the sampling \ndata available so far. \n\nIn Britain, the ancestries of Iron Age and Roman individuals form a \ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available \npreceding Bronze Age individuals from Ireland and Orkney, and adja- \ncent to, but distinct from, available individuals in Iron Age and Roman \ncentral Europe. However, two first- to second-century ce burials from a \nRoman military fortress site in Austria (Klosterneuburg)5 carry ancestry \nthat is currently indistinguishable from Iron Age or Roman popula- \ntions of Britain, to the exclusion of other groups (qpWave cladality \n*P*= 0.11). One option is that they had ancestry from Britain; alternatively, \ncurrently unsampled populations from western continental Europe \ncarried ancestries similar to Iron Age southern Britain.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "These patterns are consistent with northward expansion of ancestry, \npotentially starting before the Viking Age, into the Jutland peninsula \nand Zealand island towards southern Sweden. The geographical ori- \ngin of this ancestry is currently difficult to discern, as the available \nsamples from Iron Age central Europe remain sparse. The timing \nof this expansion is constrained only by the samples available: this \nancestry is not observed in individuals from the Copenhagen area of \nDenmark (around 100 ce–300 ce)6, an individual from the southern tip \nof Sweden (around 500 ce)16, individuals from the Sandby Borg mas- \nsacre site on Öland in present-day Sweden (around 500 ce)7 and 31 indi- \nviduals from the mid-eighth century Salme ship burials in present-day \nEstonia (Extended Data Fig. 9), who probably originated in central \nSweden6. Therefore, this ancestry transformation most likely post- \ndated these individuals in each particular region and mostly occurred \nin the second half of the first millennium ce. \n\nTo assess the full extent of the impact of this ancestry influx into \nScandinavia, we next aimed to understand the ancestry of individu- \nals in Scandinavia during the Viking Age. Previous studies have sug- \ngested that there was a diversity of ancestries in Scandinavia during this \nperiod6,7,65, due to increased maritime mobility, but have not reported \nper-individual ancestry estimates based on preceding ancestry. We \nanalysed each individual’s ancestry using a rotational qpAdm scheme \n(Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which \nshowed increased power in distinguishing models when restricted \nto recent coalescences with Twigstats (more than 80% of accepted \none-source models in Twigstats were also accepted one-source models \nusing all SNPs, compared with less than 17% for the inverse). \n\nTwigstats substantially improves models of admixture between \nancestries from Iron Age Britain and northern Europe in early medi- \neval England9, halving standard errors from 9% with SNPs to 4% when \nusing time stratification (point estimates 80% and 79% Iron Age \nBritain-related ancestry, respectively). We used this improved reso- \nlution to demonstrate that an earlier Roman individual (6DT3) dating \nto approximately second to fourth century ce from the purported \ngladiator or military cemetery at Driffield Terrace in York (Roman \n*Eboracum*), England60, who was previously identified as an ancestry \noutlier61,62, specifically carried approximately 25% EIA Scandinavian \nPeninsula-related ancestry (Fig. 2c). This documents that people with \nScandinavian-related ancestry already were in Britain before the fifth \ncentury ce, after which there was a substantial influx associated with \nAnglo-Saxon migrations9. Although it is uncertain whether this indi- \nvidual was a gladiator or soldier, individuals and groups from northern \nEurope are indeed recorded in Roman sources both as soldiers and as \nenslaved gladiators63,64. \n\nAcross Europe, we see regional differences in the southeastern and \nsouthwestern expansions of Scandinavian-related ancestries. Early \nmedieval groups from present-day Poland and Slovakia carry spe- \ncific ancestry from one of the Scandinavian EIA groups—the one with \nindividuals primarily from the northern parts of Scandinavia in the \nEIA—with no evidence of ancestry related to the other primary group \nin more southern Scandinavia (Fig. 2d). By contrast, in southern and \nwestern Europe, Scandinavian-related ancestry either derives from", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "**High-resolution genomic history of early**\n**medieval Europe**\n\n**Leo Speidel1,2,3**✉**, Marina Silva1, Thomas Booth1, Ben Raffield4, Kyriaki Anastasiadou1,**\n**Christopher Barrington5, Anders Götherström6,7, Peter Heather8 & Pontus Skoglund1**✉ \nhttps://doi.org/10.1038/s41586-024-08275-2 \n\nReceived: 14 December 2023 \n\nAccepted: 23 October 2024 \n\nPublished online: 1 January 2025 \n\nOpen access \n\n Check for updates \n\nMany known and unknown historical events have remained below detection thresholds \nof genetic studies because subtle ancestry changes are challenging to reconstruct. \nMethods based on shared haplotypes1,2 and rare variants3,4 improve power but are not \nexplicitly temporal and have not been possible to adopt in unbiased ancestry models. \nHere we develop Twigstats, an approach of time-stratified ancestry analysis that can \nimprove statistical power by an order of magnitude by focusing on coalescences in \nrecent times, while remaining unbiased by population-specific drift. We apply this \nframework to 1,556 available ancient whole genomes from Europe in the historical \nperiod. We are able to model individual-level ancestry using preceding genomes to \nprovide high resolution. During the first half of the first millennium ce, we observe \nat least two different streams of Scandinavian-related ancestry expanding across \nwestern, central and eastern Europe. By contrast, during the second half of the first \nmillennium ce, ancestry patterns suggest the regional disappearance or substantial \nadmixture of these ancestries. In Scandinavia, we document a major ancestry influx \nby approximately 800 ce, when a large proportion of Viking Age individuals carried \nancestry from groups related to central Europe not seen in individuals from the early \nIron Age. Our findings suggest that time-stratified ancestry analysis can provide a \nhigher-resolution lens for genetic history. \n\nAncient genome sequencing has revolutionized our ability to recon- \nstruct expansions, migrations and admixture events in the ancient past \nand understand their impact on human genetic variation today. How- \never, tracing history using genetic ancestry has remained challenging, \nparticularly in historical periods for which the richest comparative \ninformation from history and archaeology often exists. This is because \nancestries in many geographical regions are often so similar as to be \nstatistically indistinguishable with current approaches. One example is \nnorthern and central Europe since the start of the Iron Age around 500 \nbce, a period for which many long-standing questions remain, such as \nthe nature of large-scale patterns of human migration during the fourth \nto sixth centuries ce, their impact on the Mediterranean world and later \npatterns of human mobility during the Viking Age (around 750–1050 ce). \nSeveral recent studies have documented substantial mobility and \ngenetic diversity in these time periods, suggesting stable population \nstructure despite high mobility5, and have revealed genetic variation \nin Viking Age Scandinavia6–8, early medieval England3,9, early medieval \nHungary10,11 and Iron Age and medieval Poland12. However, previous \nstudies mostly used large modern cohorts to study ancestry change \nthrough time and space. This is because the differentiation between \nIron Age groups in central and northern Europe is an order of magnitude \nlower (fixation index (*F*ST) = 0.1–0.7%; Extended Data Fig. 1) than, for \nexample, the more commonly studied hunter-gatherer, early farmer \nand steppe-pastoralist groups that shaped the ancestry landscape of", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Viking Age mobility into Scandinavia**\nPrevious studies had suggested a major influx of ancestry related to \nBritain into Viking Age Scandinavia6,7. Although we detect this ances- \ntry in some individuals (7 individuals in Norway, 14 in Denmark and \n14 in Sweden), including some individuals whose ancestry appears to \nbe entirely derived from Iron Age Britain, its overall impact appears \nreduced compared with previous reports. Our analysis indicates a pro- \nportionally larger impact of ancestry from Iron Age Britain in northern \nNorway, with southern Scandinavia predominantly influenced by \ncontinental central European ancestries (Fig. 4d). We hypothesize \nthat our estimates of ancestry from Britain are reduced relative to \nprevious studies because ancestry related to Britain and continen- \ntal central Europe may have been indistinguishable. This could be \ndue to a lack of statistical power to distinguish these closely related \nsources with standard methods, as well as through potential biases \nintroduced by using modern surrogate populations that have since \nbeen influenced by later gene flow (such as gene flow into Britain). \nWe illustrate this by replicating the analyses previously described6,7 \n(Extended Data Fig. 8). \n\nSimilarly, a previous study has suggested that individuals at sites such \nas Kärda in southern Sweden carried ancestry from southern Europe6. \nIn our models, two Kärda individuals fit with central European-related \nancestry, but none of the individuals has a substantial proportion of \nancestry related to southern European sources (Extended Data Fig. 9). \nInstead, we detect ancestry from southern European sources in only \nthree individuals from Scandinavia, and in relatively small propor- \ntions (Fig. 4a). \n\n**Conclusions**\nOur approach, Twigstats, transfers the power advantage of haplotype- \nbased approaches to a fully temporal framework, which is applica- \nble to*f*-statistics and enables previously unavailable unbiased and \ntime-stratified analyses of admixture. We demonstrated that Twigstats \nenables fine-scale quantitative modelling of ancestry proportions, \nrevealing wide-ranging ancestry changes that affect northern and \ncentral Europe during the Iron, Roman and Viking ages. We reveal evi- \ndence of the southward and/or eastward expansion of individuals who \nprobably spoke Germanic languages and who had Scandinavian-related \nancestry in the first half of the first millennium ce. We note that \n‘Scandinavian-related’ in this context relates to the ancient genomes \navailable, and so it is entirely possible that these processes were driven, \nfor example, from regions in northern-central Europe. This could be \nconsistent with the attraction of the greater wealth, which tended to \nbuild up among Rome’s immediate neighbours and may have played \na major role in vectors of migration internal to communities in Europe \nwho lived beyond the Roman frontier52. Later, patterns of gene flow \nseem to have turned northwards, with the spread of Iron Age Central \nEurope-related ancestry into Scandinavia. Overall, our approach can \nbe used for the reconstruction of new high-resolution genetic histories \naround the world. \n\nInterestingly, we detect ancestry from Bronze and Iron Age sources \nfrom Eastern Europe (present-day Lithuania and Poland), concentrated \nin southeastern parts of Sweden, particularly the island of Gotland \n(14 individuals; Fig. 4a). This is consistent with previous genetic \nstudies6,7. We find that this ancestry is enriched in male individuals \n(Extended Data Fig. 7d), suggesting male-biased mobility and/or burial. \nThe closest match tends to be Roman Iron Age Lithuanian genomes \nassociated with Balts, which would be consistent with mobility across \nthe Baltic Sea, but we caution that the geographical representation of \navailable genomes is still limited.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "II \nWielbark, Poland \nI \n\nBritain \nEastern Europe \n1 \n0 \n\nn \no \ns \nn \ne \nm \nD \n\nCentral Europe \ni \nHungary and Slovakia \n\nPortugal \n\n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n–0.002 –0.001 0 \n0.001 \nDimension 2 \n0.002 0.003 0.004 \n\nb \n\n3.3 \n2 \n\nIron Age, Denmark \n(first to third century CE) \n\n3 \nFriesland, the Netherlands \n(fifth to sixth century CE) \n\nII I III \n13 \n\n6 \nMedieval Poland (tenth \nto eleventh century CE) \nWielbark, Poland \n(first to third century CE) \n3 \n\nLa Tène, Slovakia \n(first century BCE \nto first century CE) \n\n2 \nBaiuvarii \n(fifth century CE) \n1 \n9 \nZohor, Slovakia \n(first to second \ncentury CE) \nLongobard \n(sixth century CE) \nI II 7 \n\nEarly medieval \nSlovakia \n(third to fifth century CE) \n\n4.7 \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \nSlovakia_Zohor_Germanic_Roman \nSlovakia_earlyMED \nSlovenia.lronRoman \nSlovenia.Roman.oNorthEurope \n\nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian Peninsula EIA \nRegular f3-statistics 0.002 \n\nEngland Diffield Terrace \nDenmark IA \nBritain \n\n0 1 \n\nn \no \ns \nn \ne \nm \nD \n\ni \n\nCentral \nEurope \n\nEarly medieval, \nincluding Wielbark, \nBaiuvarii, \nLongobards, \nEngland earlyMED, \nSlovakia earlyMED \n\nPortugal \n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n0.002 0.003 –0.002 –0.001 0 0.001 0.004 \nDimension 2 \n\nAnatolia_EBA \nAustria_Klosterneuburg_Roman \nBaiuvari_earlyMED \nBritain.lronRoman \nCentraIEurope.IronRoman(l) \nCentraIEurope.IronRoman(Il) \nCentraIEurope.IronRoman(IIl) \nCordedWare_EBA \nCroatia.IronRoman_oNorthEurope \nDenmark_BA Denmark_EVA \nDenmark_IA \nEngland_earlyMED_highCNE \nEngland_earlyMED_lowCNE \nEngland_earlyMED_midCNE \nEngland.Driffield.Terrace.Scandinavia \nHungary_earlyMED(I) \nHungary_earlyMED(II) \nHungarySlovakia.lronRoman \nIrelandOrkney_BA \n\nItaly.lmperial(l) \nltaly.lmperial(ll) \nltaly.lronRepublic \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_earlyMED(I) \nLongobard_earlyMED(II) \nMontenegro_earlyMED \nNetherlands_Friesland_earlyMED \nPoland_BA \n\n**Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**\n**a**, Source groups used for qpAdm modelling of early medieval Europe. MDS is \ncomputed jointly with individuals from later periods using pairwise outgroup \n*f*3 statistics (outgroup: Han Chinese people). These are calculated using \nTwigstats on Relate genealogies with a cut-off of 1,000 generations. The \ngeographical map shows sampling locations of these individuals.**b**, The \ngenetic structure of ancient groups predominantly from early medieval \ncontexts shown on the same MDS as in**a**. The magnified inset shows an MDS \ncomputed without Twigstats on the same samples as the Twigstats MDS and \nfocusing on early medieval or later individuals.**c**, Ancestry models of early \nmedieval (EM) groups across Europe computed using qpAdm. Sample sizes are shown in black boxes. Sources are highlighted in**a**and marked as bold in the \nkey, and were used in a rotational qpAdm scheme. For each target group, we \nremove models with infeasible admixture proportions (falling outside [0, 1]) \nand use a Twigstats cut-off of 1,000 generations. All models satisfy*P*> 0.01, \nunless a −log10[*P*value] is shown next to the model. If models satisfy*P*> 0.05, \nwe show all such models; otherwise, we show only the model with the largest \n*P*value.**d**, The ancestry proportion derived from EIA Scandinavia in groups \nwith a non-zero component of this ancestry. We show groups modelled in**c**\nthat have a feasible model (*P*> 0.01). In**c**,**d**, we show one s.e. BA, Bronze Age; \nCNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking \nAge; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "reduces standard errors (s.e.) by up to tenfold and potentially more, \ndepending on sample sizes and details of the genetic history model. The \napproach does not produce detectable bias in estimates of admixture \nproportions (Fig. 1b–d and Extended Data Fig. 3). Furthermore, we \ndemonstrate that computing*f*-statistics on genotypes ascertained \nfor young mutation ages produce a power gain nearly equal to that \nproduced when using full genealogies in many examples, while add- \ning flexibility by allowing lower-quality genomes to be grafted onto a \ngenealogy reconstructed with higher-quality genomes31. \n\nIn the first half of the first millennium ce, Roman historians such as \nTacitus and Ammianus Marcellinus described the geographical dis- \ntribution and movements of groups beyond the imperial frontier and \nsuggested a potential role for them in the fall of the western Roman \nEmpire52. However, the exact nature and scale of these historically \nattested demographic phenomena—and their genetic impact— \nhave been questioned53, and have been difficult to test with genetic \napproaches owing to the close relations shared between many groups \nthat were ostensibly involved. Less is understood at further distances \nfrom the Roman frontier owing to a lack of historical accounts. The \nimproved statistical power of time-restricted ancestry in Twigstats \nthus offers an opportunity to revisit these questions. \n\nTo develop an ancestry model for early medieval individuals (Supple- \nmentary Table 1), we first need a broad characterization of the ancestry \nof the earlier sources from the early Iron Age (EIA) and Roman periods. \nWe use hierarchical UPGMA clustering based on pairwise clade testing \nbetween all individuals, and formally test the cladality of proposed \nancestry groups with qpWave5 (cladality in this sense means whether \nthey are consistent with being symmetrically related to all other tested \ngroups; Methods). This resulted in a set of model ancestry sources \nthat included Iron Age and Roman Britain (*n*= 11), the Iron Age of cen- \ntral European regions of mostly Germany, Austria and France (*n*= 10), \nRoman Portugal (*n*= 4), Roman Italy (*n*= 10), Iron Age Lithuania (*n*= 5), \nthe EIA Scandinavian Peninsula (Sweden and Norway,*n*= 10) and several \nother more eastern groups dating to the Bronze Age and EIA (*n*= 25) \n(Fig. 2a and Extended Data Fig. 1). We then use a rotational qpAdm \napproach54 to narrow down the set of contributing sources from this \nlarger pool of putative sources. \n\nWe further confirm with simulations that genealogy-based*f*-statistics \nestimates are robust to sequencing and phase-switch errors of expected \nmagnitude (Extended Data Fig. 3b). In fact, although sequence errors \ncan affect SNP-based population-genetic approaches substantially, \nerrors can be ‘corrected’ in genealogies as they take all variants in a \nregion into account32. \n\nPrevious studies have suggested ascertaining rare mutations as a \nproxy for recent history3,4, but we show that this approach is prone to \nbias when effective population sizes vary between populations, and \nthat using full time-restricted genealogies is both unbiased and more \npowerful (Fig. 1b and Extended Data Fig. 3). We attribute this to the \nobservation that mutation age is not fully predictive of allele frequency \n(Extended Data Fig. 4) and that the genealogy-based approach gains \npower from the inclusion also of higher-frequency young mutations \nthat ‘tag’ recent coalescences by closely pre-dating them. We demon- \nstrate that a widely used ‘chromosome painting’ approach, and any \nconceptually similar modelling based on identity by descent, that finds \nthe nearest neighbours between chromosomal segments in a sample \nand model groups using a non-negative least squares of genome-wide \npainting profiles2 is also prone to bias, when source groups have under- \ngone strong drift since the admixture event (Fig. 1b and Extended Data \nFig. 3b).", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed3.pdf" - }, - { - "text": "[html]ArcICIC6.Margaryan, A. et al. Population genomics of the Viking ecrld. Nature 585.390 – 39642.Peter, B. M. Admisture, population structure, and F - statistics. Genetics 202, Wit5 – 15017.Rodriguea Varela, R. et al. The genetic history of Scandinaxia fromthe Roman Iron Age to the present. Cell 88.32 – 48 ( 2023 ).43.Ralph, P., Thornton, K. & Kelleher, J. Efficiently summarizing relationships in large samples : a general duality between statistics of genesiogies and genomes. Gene8.Ebeneseraditist, 5.5. 4t al. Ancient genomes from loeland reveal / the making of a human population. Science 300.9032 ( 2016 ).Table779 – 797 ( 2020 ). Raghavan, M. et al. Upper Palawolithic Siberian genome reseals dual ancestry of Native9.Gredzinger, I et al. The Anglo - Sason migration and the formation of the early English gene pool. Nature 810.102 - 193 ( 2022 ) Amorim, C : E. G. et al. Understanding 6th - century barbarian social organization andTableAmericans. Nature 505.67 – 99 ( 2014 ). Caseidy, L. M. et al. A dynastic elite in monumental Neelsithic seciety. Nature S82.384 – 388 ( 2020 ).Tablemigration through paleogenomics. Nait. Commun. 9.3547 ( 2016 ). Vyse, D N., Koncz, I., Modi, A, Mende, B. G. & Tian, Y. Fine - scale sempling uncovers the complexity of migrations in Sth - 6ith century Pannonia. Curt Bick 33.3069 – 306146.Patterson, N, et al. Large - scale migration into Britain during the Middle to Late Bronze Age, Nature 601.589 – 5584 ( 2022 ). Tournebize, If. & Childhi, L. Questioning Neunderthal admistane on models, robustness( 2013 )Tableand consensus in human evolution. Preprint at biofloid - https :// doi. org / 101101 / 2023.04.t2Stolanek, I. et al. Genetic history of East - Central Europe in the first millennium CE. Genome Biol. 24.173 ( 2023 ).Table05.535686 ( 2023 ). Erikson, A. & Manit3Hask, W. et al. Massive migration fromthe steppe was a source for Indio - European languages in Europe. Nature B22.207 ( 2015 ).Tablepolymorphism shared between modern human populations and ancient homininins. Proc. Nael. Acxel. Soi. U5A ND9.10956 – 13960 ( 2012 ).14Lazaridis, I. et al. Ancient human genomes suggest three ancestral populations for present - day Europeans. Nature SI3.4004 – 403 ( 2014 ).49.Green, It. E. et al. A draft sequence of the Neandertal genome. Science S28.7YD - T22 ( 2010 ).15Sleoglund, P et al. Ongins and genetic lacgacy of Neolithic farmers and hunter - gatherers in Europe. Science 328.468 – 489 ( 2012 ).50.Yang, M. A., Malaspinae, A.- S., Durand, E. Y. & Slation, M. Ancient structure in Africa unlikely to explain Neundenthal and non - African genetic similarity. Mol. Biol. Exol. 2916Allentoft, M : E. et al. Population genomics of Bronas Age Eurasia Nature S22.167 – 972 ( 2015 ).Table2987 – 2995 ( 2012 ). 5ankararaman, 5.17Skoglund, P et al. Genomic diversity and admixture differs for Stone - Age Scondinasian foragers and farmers. Scoience ( JAI, 147 – 750 ) ( 2014 ).Tablebetween Neandertala and modern humans. PLo3 Genet B, elOC040 [ 2012 ]. Heather, P. Empires and Barbanians. Migration, Dewelopment and the Birth of Europe18Yuncia. E. et al. False discovery rates of apAdm - based screens for genetic admixturePregnint at bioRaw - https ( Ildsi org / X010100 / 202304.35 / 58639 ( 2023 ).Table( Pan Macmillan, 2010 ). Halsall, G. Barbarian Mi9Reich, O.,", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "continuity from the EIA in Norway and northern Sweden (Fig. 4a). When \nconsidered collectively, the individuals who show evidence of central \nEuropean-related ancestry are mostly observed in regions histori- \ncally within the Danish sphere of influence and rule. Currently, no such \nindividuals, for example, are noted in eastern central Sweden, which \nwas a focus of regional power of the Svear (Fig. 4a). The difference in \ndistribution could suggest that the central European-related ancestry \nwas more common in regions dominated by the historical Götar and \ngroups inhabiting the lands on the borders of the Danish kingdom. \n\nthat of established groups, we focused on the island of Öland in south- \neast Sweden, where 23 individuals for whom we could reconstruct \nancestry portraits also had associated strontium stable isotope data66. \nStrontium isotope data from dental enamel reflect the geology of the \nregion where an individual grew to maturity, and there are considerable \ndifferences in expectations between Öland and many other regions \nin northern Europe. The full range of strontium isotope ratios in 109 \nindividuals show two modes, a majority group with low ratios and a \nsecond minority group with high ratios falling outside the expected \nrange of local fauna (Fig. 4b). Among 23 individuals with genomes in \nour data, all 5 individuals with 100% ancestry relating to central Europe To test the extent to which the variation in ancestry was consistent \nwith mobility during the lifetime of the individuals or, alternatively,", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed3.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed3.pdf", - "query": "How many clusters has the Scandinavian peninsula been divided into thanks to Twigstats?", - "target_page": 12, - "target_passage": "This approach results in two clusters in the Scandinavian Penin- sula, approximately separating northern from southern Scandinavia", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "individuals form a clade with respect to reference groups. The reason \nwhy this is a principled approach despite the 1000GP groups post-dating \nthe ancient individuals is that if a group of ancient individuals are truly \nhomogeneous, they will be so also with respect to later individuals. \n\n**Code availability**\nTwigstats is freely available under an MIT licence through GitHub \n(https://github.com/leospeidel/twigstats), and detailed documenta- \ntion, as well as example data, is available at https://leospeidel.github. \nio/twigstats/. The code has also been deposited at Zenodo (https:// \nzenodo.org/records/13833120)76. All scripts to reproduce simulations, \nand to run Relate on imputed ancient genomes, and downstream \nanalyses, including computation of*f*-statistics and running qpAdm \nmodels, are available through GitHub (https://github.com/leospeidel/ \ntwigstats_paper). \nWe then define clusters by running UPGMA (unweighted pair group \nmethod with arithmetic mean) on −log10[*P*values] obtained from \nqpwave between all pairs of individuals and cut the resulting dendro- \ngram at a height corresponding to a*P*value of 0.01. We then further \nsubdivide clusters by requiring all samples to be within 500 years of \nthe mean cluster age. \n\nTo choose the source groups shown in Fig. 2a and Extended Data \nFig. 1d, we run this algorithm on samples from Iron and Roman Age \nEurope (Supplementary Table 1). We retain groups that have at least \nthree individuals and, therefore, exclude clusters of size one or two. \n\n70. Maier, R., Flegontov, P., Flegontova, O., Changmai, P. & Reich, D. On the limits of fitting \n\ncomplex models of population history to*f*-statistics.*eLife***12**, e85492 (2023). \n71. Kelleher, J., Etheridge, A. M. & McVean, G. Efficient coalescent simulation and", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed3.pdf" - }, - { - "text": "c \n1.00 \nDenmark_EVA(3) Funen_VA(12) \n\ny \nr \nt \ns \ne \nc \nn \na \nd \ne \nt \na \ne \nr \n- \nl \na \nt \nn \ne \nn \ni \nt \nn \no \nC \n\n1 1 2 2 1 \n0.75 \n1.0 \n\nn \no \ni \nt \nr \no \np \no \nr \np \ny \nr \nt \ns \ne \nc \nn \nA \n\n0.5 \n0.50 \nl \n0 \n1 \n3 2 \n3 \n. . \n1.0 \n0.25 \n0.5 \n0 \n0 \n7 \n1 7 \n5 \n1 \n. \n7 \n1 \n. \n1 \n6 \n. . \n\nScandinavian Peninsula Central Europe \n\nAnatolia EBA \nAustria_Klosterneuburg_Roman \nBaiuvarii_EMED \nBritain.lronRoman \nCentraIEurope.lronRoman(l) \nCentraIEurope.lronRoman(lI) \nCentraIEurope.IronRoman(lII) \nCordedWare_EBA \nCroatia.lronRoman_oNorthEurope \nDenmark_BA \nDenmark_EVA \nDenmark_IA \nEngland_Saxon_highCNE \nEngland_Saxon_lowCNE \nEngland_Saxon_midCNE \nEngland.Roman.Gladiator.Scandinavia \nHungary_EM(I) \nHungary_EM(II) \nHungarySlovakia.lronRoman \nAll SNPs \nIrelandOrkney_BA \nItaly.lmperial(l) \nltaly.lmperial(lI) \nltaly.lronRepublic \nTwigstats 1,000 \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_EMED(I) \nLongobard_EMED(II) \nMontenegro_EM \nNetherlands_Friesland_Saxon \nPoland_BA \nFaroes \nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \n\nIreland \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nIsle of Man \nPoland_Wielbark(III) \n\nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nOrkney_VA \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \n\nSlovakia_Zohor_Germanic_Roman \nSlovakia.MigrationPeriod \nSlovenia.lronRoman \nOxford_VA Slovenia.Roman.oNorthEurope \n\nb \n50 \n\ns \nt \nn \nu \no \nc \nm \na \nr \ng \no \nt \ns \nh \n\n40 \n\n30 \ni \n\ne \np \no \nt \no \ns \n20 \n\n10 \ni \n\ne \nb \na \nt \nS \nl \n0 \n0 \n0.74 0.71 0.72 0.73 \n87Srf/86Sr \n\nd \n\n70.5 \n67.5 \n64.5 \n61.5 \n58.5 \n55.5 \ne \nd \nu \nt \ni \nt \na \nL \n\n0.75 1.00 0.25 0.50 \n0 \n\ne \nNorway_VA \nScandinavian Peninsula EIA \n\nBritain \n\nCentral \nEurope \n\n0.75 1.00 0.75 1.00 0.25 0.50 0.25 0.50 \n0 0 \n\nProportion of ancestry \n\nSweden_VA \nScandinavian Peninsula EIA \n\nBritain \nEastern Europe Eastern Europe \nCentral \nEurope \n\n**Fig. 4 | Ancestry in the Viking world. a**, Map showing ancestry carried by \nScandinavian Viking Age individuals as inferred using the best-fitting qpAdm \nmodel. These are chosen by either choosing the one-source model with largest \n*P*value and*P*> 0.01 or the two-source model with the largest*P*value and*P*> 0.01. \nExtended Data Fig. 7 shows the same map with all accepted models.**b**, Stable \nisotope data indicating the geology of childhood origin. The histogram shows \nthe ratio of strontium isotopes 87 to 86 measured in 109 individuals in Öland69. \nFor individuals included in our ancestry modelling, we plot Iron Age central \nEuropean-related ancestry against their stable isotope values (grey circles, \n*r*= −0.39,*P*= 0.075). Shared area corresponds to the 95% confidence band around the regression line.**c**, The ancestry shift observed in Viking Age Danish \ngroups using qpAdm on all SNPs or Twigstats. We show the best one-source and \nall two-source models with*P*> 0.05. For models with*P*< 0.05, the −log10[*P*value] \nis shown under the plot. Sample sizes for each group are shown in brackets. \n**d**, The ancestry proportion across Viking Age individuals in Denmark, Sweden \nand Norway grouped by latitude.**e**, Viking Age genetic variation (grey circles) \nvisualized on the same MDS as in Fig. 2a,b.**f**, The best-fitting qpAdm ancestry \nmodel for far-flung Viking individuals. Detailed models for all individuals are \nshown in Extended Data Figs. 9 and 10. In**c**and**f**, we show one s.e. Rotating \nqpAdm sources are marked in bold in the key.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed3.pdf" - }, - { - "text": "We additionally perform non-parametric multidimensional scaling \n(MDS) on outgroup-*f*3 statistics44 computed using Twigstats, the results \nof which do not depend on any modelling assumptions and which show \nincreased resolution compared with conventional outgroup-*f*3 sta- \ntistics (Fig. 2a,b, Extended Data Fig. 6 and Supplementary Table 2). \nEncouragingly, the MDS model supports regional fine-scale genetic \nstructures reflected in our source groups, such as the separation of \npredominantly Norwegian and northern Swedish EIA individuals from \nsouthern Peninsular Scandinavia (Fig. 2a); this relationship is not \ndetected without Twigstats. In this MDS analysis, we note a close affinity \nof wide-ranging individuals from Portugal, France, Germany, Austria \nand Britain. We hypothesize that this corresponds to areas associated \nwith the Celtic-speaking world, and that their close genetic affinity is \ndue to earlier expansions. Sparse sampling limits our understanding \nof the full extent of regional ancestry variation in central Europe and \nsome other regions, but the continental ancestries differentiated in \nthe MDS model suggests that major ancestry variation across Europe \nin this period is relatively well captured. \n\nWe next test the Twigstats time-restricted genealogy approach \non a range of empirical examples. First, we boost pairwise outgroup \n*f*3-statistics44 to quantify fine-scale population structure; we demon- \nstrate this improvement using a previously proposed simulation39 \n(Extended Data Fig. 5a). When applied to published genomes from \nNeolithic Europe (Methods and Supplementary Table 1), we can repli- \ncate the previously suggested fine-scale structure between individuals \nburied in megalithic structures in Ireland compared with others45, a \nrelationship that is not apparent from SNP data alone (Extended Data \nFig. 5b). For the well-studied example of three major ancestries contrib- \nuting to prehistoric Europe, that is, Mesolithic hunter-gatherers, early \nfarmers and steppe populations13–16, we obtain unbiased estimates and \nan approximately 20% improvement in standard errors in an already \nwell-powered qpAdm model46 (Extended Data Fig. 5c). \n\nFinally, we demonstrate that Twigstats can be used to resolve com- \npeting models of punctual admixture and long-standing gene flow, or \nconstrain the time of admixture. For instance, it has previously been \nsuggested that long-standing deep structure and gene flow between \nNeanderthals and early modern humans in Africa may produce genetic \npatterns that resemble a punctual admixture event some 60,000 years \nago47–49, casting doubt on the model of Neanderthal admixture into \nancestors of Eurasians49–51. However, whereas such long-standing deep \nsubstructure would confound SNP-based*f*-statistics to produce pat- \nterns similar to Neanderthal admixture, we demonstrate, in simula- \ntions, that Twigstats can clearly distinguish this history from recent \nadmixture (Extended Data Fig. 5d). Application of Twigstats on empiri- \ncal whole genomes produces results inconsistent with deep substruc- \nture alone, but consistent with punctual admixture. \n\n**Expansions of Scandinavian-like ancestry**\nWe assembled time transects using available aDNA data across several \ngeographical regions in Europe, and infer their ancestry using a model \nwith the EIA or Roman Iron Age sources previously defined (shown in \nFig. 2a). Our modelling provides direct evidence of individuals with \nancestry originating in northern Germany or Scandinavia appearing \nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup- \nplementary Table 3).", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed3.pdf" - }, - { - "text": "II \nWielbark, Poland \nI \n\nBritain \nEastern Europe \n1 \n0 \n\nn \no \ns \nn \ne \nm \nD \n\nCentral Europe \ni \nHungary and Slovakia \n\nPortugal \n\n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n–0.002 –0.001 0 \n0.001 \nDimension 2 \n0.002 0.003 0.004 \n\nb \n\n3.3 \n2 \n\nIron Age, Denmark \n(first to third century CE) \n\n3 \nFriesland, the Netherlands \n(fifth to sixth century CE) \n\nII I III \n13 \n\n6 \nMedieval Poland (tenth \nto eleventh century CE) \nWielbark, Poland \n(first to third century CE) \n3 \n\nLa Tène, Slovakia \n(first century BCE \nto first century CE) \n\n2 \nBaiuvarii \n(fifth century CE) \n1 \n9 \nZohor, Slovakia \n(first to second \ncentury CE) \nLongobard \n(sixth century CE) \nI II 7 \n\nEarly medieval \nSlovakia \n(third to fifth century CE) \n\n4.7 \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \nSlovakia_Zohor_Germanic_Roman \nSlovakia_earlyMED \nSlovenia.lronRoman \nSlovenia.Roman.oNorthEurope \n\nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian Peninsula EIA \nRegular f3-statistics 0.002 \n\nEngland Diffield Terrace \nDenmark IA \nBritain \n\n0 1 \n\nn \no \ns \nn \ne \nm \nD \n\ni \n\nCentral \nEurope \n\nEarly medieval, \nincluding Wielbark, \nBaiuvarii, \nLongobards, \nEngland earlyMED, \nSlovakia earlyMED \n\nPortugal \n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n0.002 0.003 –0.002 –0.001 0 0.001 0.004 \nDimension 2 \n\nAnatolia_EBA \nAustria_Klosterneuburg_Roman \nBaiuvari_earlyMED \nBritain.lronRoman \nCentraIEurope.IronRoman(l) \nCentraIEurope.IronRoman(Il) \nCentraIEurope.IronRoman(IIl) \nCordedWare_EBA \nCroatia.IronRoman_oNorthEurope \nDenmark_BA Denmark_EVA \nDenmark_IA \nEngland_earlyMED_highCNE \nEngland_earlyMED_lowCNE \nEngland_earlyMED_midCNE \nEngland.Driffield.Terrace.Scandinavia \nHungary_earlyMED(I) \nHungary_earlyMED(II) \nHungarySlovakia.lronRoman \nIrelandOrkney_BA \n\nItaly.lmperial(l) \nltaly.lmperial(ll) \nltaly.lronRepublic \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_earlyMED(I) \nLongobard_earlyMED(II) \nMontenegro_earlyMED \nNetherlands_Friesland_earlyMED \nPoland_BA \n\n**Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**\n**a**, Source groups used for qpAdm modelling of early medieval Europe. MDS is \ncomputed jointly with individuals from later periods using pairwise outgroup \n*f*3 statistics (outgroup: Han Chinese people). These are calculated using \nTwigstats on Relate genealogies with a cut-off of 1,000 generations. The \ngeographical map shows sampling locations of these individuals.**b**, The \ngenetic structure of ancient groups predominantly from early medieval \ncontexts shown on the same MDS as in**a**. The magnified inset shows an MDS \ncomputed without Twigstats on the same samples as the Twigstats MDS and \nfocusing on early medieval or later individuals.**c**, Ancestry models of early \nmedieval (EM) groups across Europe computed using qpAdm. Sample sizes are shown in black boxes. Sources are highlighted in**a**and marked as bold in the \nkey, and were used in a rotational qpAdm scheme. For each target group, we \nremove models with infeasible admixture proportions (falling outside [0, 1]) \nand use a Twigstats cut-off of 1,000 generations. All models satisfy*P*> 0.01, \nunless a −log10[*P*value] is shown next to the model. If models satisfy*P*> 0.05, \nwe show all such models; otherwise, we show only the model with the largest \n*P*value.**d**, The ancestry proportion derived from EIA Scandinavia in groups \nwith a non-zero component of this ancestry. We show groups modelled in**c**\nthat have a feasible model (*P*> 0.01). In**c**,**d**, we show one s.e. BA, Bronze Age; \nCNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking \nAge; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Extended Data Fig. 7 | Ancestry estimates stratified by genetic sex. a**, Map \nshowing ancestry carried by each Scandinavian Viking age individual.**b**, Ancestry \nproportions across individuals grouped by Latitude and genetic sex.**c**, Odds \nratio and p-values calculated using a two-sided Fisher’s exact test on the number \nof males and females carrying each ancestry in Viking Age Denmark, Sweden, \nNorway, Iceland, and Gotland.**d**,*F4*values of the form*f*4(Scandinavian_Peninsula_\nEIA(I), alternative source group, males in Viking group, females in Viking group) \ncomputed using all SNPs and Twigstats. A significantly positive value is \nevidence of attraction of females with pop2 or males with Scandinavian_\nPeninsula_EIA(I). Number of males and females is shown in each facet title and \nwe restrict to groups with at least four males and females. We plot one standard \nerror.**e**, Map showing ‘farflung’ Viking individuals grouped by ancestry and \ngenetic sex. In contrast to Fig. 4a and d where we showed results for the ‘best’ \nqpAdm model, here in panels**a**,**b, c,**and**e**, an individual is assigned an ancestry \ngroup, if it has**any**accepted model (p > 0.01) where that ancestry features.", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Extended Data Fig. 9 | Ancestry models of Viking Age individuals in**\n**Scandinavia. a**, MDS of each Scandinavian Viking group plotted on top of \npreceding Iron age and Roman individuals.**b**, All accepted qpAdm models using \nTwigstats-1000 for every Scandinavian Viking individual in Denmark, Sweden, \nand Norway, computed in a rotational qpAdm with source groups identical to \nFig. 4. We only retain models with feasible admixture proportions, standard \nerrors of <0.25, and show models with 1 source and a p-value greater than 0.01 \nor otherwise with 2 sources and a p-value greater than 0.01. If several models \nsatisfy p > 0.05, we show all such models, otherwise we select the model with \nthe largest p-value. The -log10 p-values are shown to the left of each model. \nWe combine models involving related sources, if they exist, by averaging their \nrespective admixture proportions, standard errors, and p-values. We plot one \nstandard error.", - "page_start": 20, - "page_end": 20, - "source_file": "pubmed3.pdf" - }, - { - "text": "**High-resolution genomic history of early**\n**medieval Europe**\n\n**Leo Speidel1,2,3**✉**, Marina Silva1, Thomas Booth1, Ben Raffield4, Kyriaki Anastasiadou1,**\n**Christopher Barrington5, Anders Götherström6,7, Peter Heather8 & Pontus Skoglund1**✉ \nhttps://doi.org/10.1038/s41586-024-08275-2 \n\nReceived: 14 December 2023 \n\nAccepted: 23 October 2024 \n\nPublished online: 1 January 2025 \n\nOpen access \n\n Check for updates \n\nMany known and unknown historical events have remained below detection thresholds \nof genetic studies because subtle ancestry changes are challenging to reconstruct. \nMethods based on shared haplotypes1,2 and rare variants3,4 improve power but are not \nexplicitly temporal and have not been possible to adopt in unbiased ancestry models. \nHere we develop Twigstats, an approach of time-stratified ancestry analysis that can \nimprove statistical power by an order of magnitude by focusing on coalescences in \nrecent times, while remaining unbiased by population-specific drift. We apply this \nframework to 1,556 available ancient whole genomes from Europe in the historical \nperiod. We are able to model individual-level ancestry using preceding genomes to \nprovide high resolution. During the first half of the first millennium ce, we observe \nat least two different streams of Scandinavian-related ancestry expanding across \nwestern, central and eastern Europe. By contrast, during the second half of the first \nmillennium ce, ancestry patterns suggest the regional disappearance or substantial \nadmixture of these ancestries. In Scandinavia, we document a major ancestry influx \nby approximately 800 ce, when a large proportion of Viking Age individuals carried \nancestry from groups related to central Europe not seen in individuals from the early \nIron Age. Our findings suggest that time-stratified ancestry analysis can provide a \nhigher-resolution lens for genetic history. \n\nAncient genome sequencing has revolutionized our ability to recon- \nstruct expansions, migrations and admixture events in the ancient past \nand understand their impact on human genetic variation today. How- \never, tracing history using genetic ancestry has remained challenging, \nparticularly in historical periods for which the richest comparative \ninformation from history and archaeology often exists. This is because \nancestries in many geographical regions are often so similar as to be \nstatistically indistinguishable with current approaches. One example is \nnorthern and central Europe since the start of the Iron Age around 500 \nbce, a period for which many long-standing questions remain, such as \nthe nature of large-scale patterns of human migration during the fourth \nto sixth centuries ce, their impact on the Mediterranean world and later \npatterns of human mobility during the Viking Age (around 750–1050 ce). \nSeveral recent studies have documented substantial mobility and \ngenetic diversity in these time periods, suggesting stable population \nstructure despite high mobility5, and have revealed genetic variation \nin Viking Age Scandinavia6–8, early medieval England3,9, early medieval \nHungary10,11 and Iron Age and medieval Poland12. However, previous \nstudies mostly used large modern cohorts to study ancestry change \nthrough time and space. This is because the differentiation between \nIron Age groups in central and northern Europe is an order of magnitude \nlower (fixation index (*F*ST) = 0.1–0.7%; Extended Data Fig. 1) than, for \nexample, the more commonly studied hunter-gatherer, early farmer \nand steppe-pastoralist groups that shaped the ancestry landscape of", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Viking Age mobility into Scandinavia**\nPrevious studies had suggested a major influx of ancestry related to \nBritain into Viking Age Scandinavia6,7. Although we detect this ances- \ntry in some individuals (7 individuals in Norway, 14 in Denmark and \n14 in Sweden), including some individuals whose ancestry appears to \nbe entirely derived from Iron Age Britain, its overall impact appears \nreduced compared with previous reports. Our analysis indicates a pro- \nportionally larger impact of ancestry from Iron Age Britain in northern \nNorway, with southern Scandinavia predominantly influenced by \ncontinental central European ancestries (Fig. 4d). We hypothesize \nthat our estimates of ancestry from Britain are reduced relative to \nprevious studies because ancestry related to Britain and continen- \ntal central Europe may have been indistinguishable. This could be \ndue to a lack of statistical power to distinguish these closely related \nsources with standard methods, as well as through potential biases \nintroduced by using modern surrogate populations that have since \nbeen influenced by later gene flow (such as gene flow into Britain). \nWe illustrate this by replicating the analyses previously described6,7 \n(Extended Data Fig. 8). \n\nSimilarly, a previous study has suggested that individuals at sites such \nas Kärda in southern Sweden carried ancestry from southern Europe6. \nIn our models, two Kärda individuals fit with central European-related \nancestry, but none of the individuals has a substantial proportion of \nancestry related to southern European sources (Extended Data Fig. 9). \nInstead, we detect ancestry from southern European sources in only \nthree individuals from Scandinavia, and in relatively small propor- \ntions (Fig. 4a). \n\n**Conclusions**\nOur approach, Twigstats, transfers the power advantage of haplotype- \nbased approaches to a fully temporal framework, which is applica- \nble to*f*-statistics and enables previously unavailable unbiased and \ntime-stratified analyses of admixture. We demonstrated that Twigstats \nenables fine-scale quantitative modelling of ancestry proportions, \nrevealing wide-ranging ancestry changes that affect northern and \ncentral Europe during the Iron, Roman and Viking ages. We reveal evi- \ndence of the southward and/or eastward expansion of individuals who \nprobably spoke Germanic languages and who had Scandinavian-related \nancestry in the first half of the first millennium ce. We note that \n‘Scandinavian-related’ in this context relates to the ancient genomes \navailable, and so it is entirely possible that these processes were driven, \nfor example, from regions in northern-central Europe. This could be \nconsistent with the attraction of the greater wealth, which tended to \nbuild up among Rome’s immediate neighbours and may have played \na major role in vectors of migration internal to communities in Europe \nwho lived beyond the Roman frontier52. Later, patterns of gene flow \nseem to have turned northwards, with the spread of Iron Age Central \nEurope-related ancestry into Scandinavia. Overall, our approach can \nbe used for the reconstruction of new high-resolution genetic histories \naround the world. \n\nInterestingly, we detect ancestry from Bronze and Iron Age sources \nfrom Eastern Europe (present-day Lithuania and Poland), concentrated \nin southeastern parts of Sweden, particularly the island of Gotland \n(14 individuals; Fig. 4a). This is consistent with previous genetic \nstudies6,7. We find that this ancestry is enriched in male individuals \n(Extended Data Fig. 7d), suggesting male-biased mobility and/or burial. \nThe closest match tends to be Roman Iron Age Lithuanian genomes \nassociated with Balts, which would be consistent with mobility across \nthe Baltic Sea, but we caution that the geographical representation of \navailable genomes is still limited.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "These patterns are consistent with northward expansion of ancestry, \npotentially starting before the Viking Age, into the Jutland peninsula \nand Zealand island towards southern Sweden. The geographical ori- \ngin of this ancestry is currently difficult to discern, as the available \nsamples from Iron Age central Europe remain sparse. The timing \nof this expansion is constrained only by the samples available: this \nancestry is not observed in individuals from the Copenhagen area of \nDenmark (around 100 ce–300 ce)6, an individual from the southern tip \nof Sweden (around 500 ce)16, individuals from the Sandby Borg mas- \nsacre site on Öland in present-day Sweden (around 500 ce)7 and 31 indi- \nviduals from the mid-eighth century Salme ship burials in present-day \nEstonia (Extended Data Fig. 9), who probably originated in central \nSweden6. Therefore, this ancestry transformation most likely post- \ndated these individuals in each particular region and mostly occurred \nin the second half of the first millennium ce. \n\nTo assess the full extent of the impact of this ancestry influx into \nScandinavia, we next aimed to understand the ancestry of individu- \nals in Scandinavia during the Viking Age. Previous studies have sug- \ngested that there was a diversity of ancestries in Scandinavia during this \nperiod6,7,65, due to increased maritime mobility, but have not reported \nper-individual ancestry estimates based on preceding ancestry. We \nanalysed each individual’s ancestry using a rotational qpAdm scheme \n(Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which \nshowed increased power in distinguishing models when restricted \nto recent coalescences with Twigstats (more than 80% of accepted \none-source models in Twigstats were also accepted one-source models \nusing all SNPs, compared with less than 17% for the inverse). \n\nTwigstats substantially improves models of admixture between \nancestries from Iron Age Britain and northern Europe in early medi- \neval England9, halving standard errors from 9% with SNPs to 4% when \nusing time stratification (point estimates 80% and 79% Iron Age \nBritain-related ancestry, respectively). We used this improved reso- \nlution to demonstrate that an earlier Roman individual (6DT3) dating \nto approximately second to fourth century ce from the purported \ngladiator or military cemetery at Driffield Terrace in York (Roman \n*Eboracum*), England60, who was previously identified as an ancestry \noutlier61,62, specifically carried approximately 25% EIA Scandinavian \nPeninsula-related ancestry (Fig. 2c). This documents that people with \nScandinavian-related ancestry already were in Britain before the fifth \ncentury ce, after which there was a substantial influx associated with \nAnglo-Saxon migrations9. Although it is uncertain whether this indi- \nvidual was a gladiator or soldier, individuals and groups from northern \nEurope are indeed recorded in Roman sources both as soldiers and as \nenslaved gladiators63,64. \n\nAcross Europe, we see regional differences in the southeastern and \nsouthwestern expansions of Scandinavian-related ancestries. Early \nmedieval groups from present-day Poland and Slovakia carry spe- \ncific ancestry from one of the Scandinavian EIA groups—the one with \nindividuals primarily from the northern parts of Scandinavia in the \nEIA—with no evidence of ancestry related to the other primary group \nin more southern Scandinavia (Fig. 2d). By contrast, in southern and \nwestern Europe, Scandinavian-related ancestry either derives from", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Extended Data Fig. 2 | Twigstats optimal cutoff. a**, Theoretically computed \nz-score of*f*4(PO,P1,PX,P2) at a single genomic locus (Supplementary Note), \nassuming PX is admixted between P1 and P2 at time 0.004 (in units of 2*N*e \ngenerations), e.g. corresponding to 100 generations with 2*N*e of 25,000. \nSources split at time 0.02.**b**, The theoretical fold-improvement of the best \nTwigstats z-score of*f*4(PO,P1,PX,P2) relative to the z-score obtained with regular*f*4-statistics. We use the same parameters as in**a**, but vary source split \ntimes to illustrate the improved power for mixtures involving more closely \nrelated groups.**c**, The optimal Twigstats cutoff time as a function of the source \nsplit time and the ratio between the optimal cutoff time and source split time. \n**d**, Comparison of z-scores computed using Twigstats to the corresponding \ntheoretical values shown in**a**.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed3.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed3.pdf", - "query": "What are the cultures with which the Wielbark culture is associated?", - "target_page": 4, - "target_passage": "linked to the later Chernyakhov cul- ture to the southeast and to early Goths", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "ancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark \narchaeological complex has been linked to the later Chernyakhov cul- \nture to the southeast and to early Goths, an historical Germanic group \nthat flourished in the second to fifth centuries ce56. Our modelling \nsupports the idea that some groups that probably spoke Germanic \nlanguages from Scandinavia expanded south across the Baltic into \nthe area between the Oder and Vistula rivers in the early centuries ce, \nalthough whether these expansions can be linked specifically with \nhistorical Goths is still debatable. Moreover, since a considerable \n\nproportion of Wielbark burials during this period were cremations, \nthe possible presence of individuals with other ancestries cannot be \nstrictly rejected if they were exclusively cremated (and are therefore \ninvisible in the aDNA record). \n\nA previous study could not reject continuity in ancestry from the \nWielbark-associated individuals to later medieval individuals from \na similar region12. With the improved power of Twigstats, models of \ncontinuity are strongly rejected, with no one-source model of any pre- \nceding Iron Age or Bronze Age group providing a reasonable fit for the", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "In the region of present-day Poland, our analysis suggests several \nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce \nto 1000 bce), we observe a clear shift away from preceding ancestry \noriginally associated with Corded Ware cultures55 (Fig. 3a). Second, \nin the first to fifth century ce, individuals associated with Wielbark \nculture5,12 show an additional strong shift away from the preceding \nBronze Age groups, and can only be modelled with a >75% component \nattributed to the EIA Scandinavian Peninsula. Multiple individuals, \nespecially from earlier Wielbark cemeteries, have approximately 100%", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed3.pdf" - }, - { - "text": "II \nWielbark, Poland \nI \n\nBritain \nEastern Europe \n1 \n0 \n\nn \no \ns \nn \ne \nm \nD \n\nCentral Europe \ni \nHungary and Slovakia \n\nPortugal \n\n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n–0.002 –0.001 0 \n0.001 \nDimension 2 \n0.002 0.003 0.004 \n\nb \n\n3.3 \n2 \n\nIron Age, Denmark \n(first to third century CE) \n\n3 \nFriesland, the Netherlands \n(fifth to sixth century CE) \n\nII I III \n13 \n\n6 \nMedieval Poland (tenth \nto eleventh century CE) \nWielbark, Poland \n(first to third century CE) \n3 \n\nLa Tène, Slovakia \n(first century BCE \nto first century CE) \n\n2 \nBaiuvarii \n(fifth century CE) \n1 \n9 \nZohor, Slovakia \n(first to second \ncentury CE) \nLongobard \n(sixth century CE) \nI II 7 \n\nEarly medieval \nSlovakia \n(third to fifth century CE) \n\n4.7 \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \nSlovakia_Zohor_Germanic_Roman \nSlovakia_earlyMED \nSlovenia.lronRoman \nSlovenia.Roman.oNorthEurope \n\nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian Peninsula EIA \nRegular f3-statistics 0.002 \n\nEngland Diffield Terrace \nDenmark IA \nBritain \n\n0 1 \n\nn \no \ns \nn \ne \nm \nD \n\ni \n\nCentral \nEurope \n\nEarly medieval, \nincluding Wielbark, \nBaiuvarii, \nLongobards, \nEngland earlyMED, \nSlovakia earlyMED \n\nPortugal \n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n0.002 0.003 –0.002 –0.001 0 0.001 0.004 \nDimension 2 \n\nAnatolia_EBA \nAustria_Klosterneuburg_Roman \nBaiuvari_earlyMED \nBritain.lronRoman \nCentraIEurope.IronRoman(l) \nCentraIEurope.IronRoman(Il) \nCentraIEurope.IronRoman(IIl) \nCordedWare_EBA \nCroatia.IronRoman_oNorthEurope \nDenmark_BA Denmark_EVA \nDenmark_IA \nEngland_earlyMED_highCNE \nEngland_earlyMED_lowCNE \nEngland_earlyMED_midCNE \nEngland.Driffield.Terrace.Scandinavia \nHungary_earlyMED(I) \nHungary_earlyMED(II) \nHungarySlovakia.lronRoman \nIrelandOrkney_BA \n\nItaly.lmperial(l) \nltaly.lmperial(ll) \nltaly.lronRepublic \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_earlyMED(I) \nLongobard_earlyMED(II) \nMontenegro_earlyMED \nNetherlands_Friesland_earlyMED \nPoland_BA \n\n**Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**\n**a**, Source groups used for qpAdm modelling of early medieval Europe. MDS is \ncomputed jointly with individuals from later periods using pairwise outgroup \n*f*3 statistics (outgroup: Han Chinese people). These are calculated using \nTwigstats on Relate genealogies with a cut-off of 1,000 generations. The \ngeographical map shows sampling locations of these individuals.**b**, The \ngenetic structure of ancient groups predominantly from early medieval \ncontexts shown on the same MDS as in**a**. The magnified inset shows an MDS \ncomputed without Twigstats on the same samples as the Twigstats MDS and \nfocusing on early medieval or later individuals.**c**, Ancestry models of early \nmedieval (EM) groups across Europe computed using qpAdm. Sample sizes are shown in black boxes. Sources are highlighted in**a**and marked as bold in the \nkey, and were used in a rotational qpAdm scheme. For each target group, we \nremove models with infeasible admixture proportions (falling outside [0, 1]) \nand use a Twigstats cut-off of 1,000 generations. All models satisfy*P*> 0.01, \nunless a −log10[*P*value] is shown next to the model. If models satisfy*P*> 0.05, \nwe show all such models; otherwise, we show only the model with the largest \n*P*value.**d**, The ancestry proportion derived from EIA Scandinavia in groups \nwith a non-zero component of this ancestry. We show groups modelled in**c**\nthat have a feasible model (*P*> 0.01). In**c**,**d**, we show one s.e. BA, Bronze Age; \nCNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking \nAge; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "[html]ArcICIC6.Margaryan, A. et al. Population genomics of the Viking ecrld. Nature 585.390 – 39642.Peter, B. M. Admisture, population structure, and F - statistics. Genetics 202, Wit5 – 15017.Rodriguea Varela, R. et al. The genetic history of Scandinaxia fromthe Roman Iron Age to the present. Cell 88.32 – 48 ( 2023 ).43.Ralph, P., Thornton, K. & Kelleher, J. Efficiently summarizing relationships in large samples : a general duality between statistics of genesiogies and genomes. Gene8.Ebeneseraditist, 5.5. 4t al. Ancient genomes from loeland reveal / the making of a human population. Science 300.9032 ( 2016 ).Table779 – 797 ( 2020 ). Raghavan, M. et al. Upper Palawolithic Siberian genome reseals dual ancestry of Native9.Gredzinger, I et al. The Anglo - Sason migration and the formation of the early English gene pool. Nature 810.102 - 193 ( 2022 ) Amorim, C : E. G. et al. Understanding 6th - century barbarian social organization andTableAmericans. Nature 505.67 – 99 ( 2014 ). Caseidy, L. M. et al. A dynastic elite in monumental Neelsithic seciety. Nature S82.384 – 388 ( 2020 ).Tablemigration through paleogenomics. Nait. Commun. 9.3547 ( 2016 ). Vyse, D N., Koncz, I., Modi, A, Mende, B. G. & Tian, Y. Fine - scale sempling uncovers the complexity of migrations in Sth - 6ith century Pannonia. Curt Bick 33.3069 – 306146.Patterson, N, et al. Large - scale migration into Britain during the Middle to Late Bronze Age, Nature 601.589 – 5584 ( 2022 ). Tournebize, If. & Childhi, L. Questioning Neunderthal admistane on models, robustness( 2013 )Tableand consensus in human evolution. Preprint at biofloid - https :// doi. org / 101101 / 2023.04.t2Stolanek, I. et al. Genetic history of East - Central Europe in the first millennium CE. Genome Biol. 24.173 ( 2023 ).Table05.535686 ( 2023 ). Erikson, A. & Manit3Hask, W. et al. Massive migration fromthe steppe was a source for Indio - European languages in Europe. Nature B22.207 ( 2015 ).Tablepolymorphism shared between modern human populations and ancient homininins. Proc. Nael. Acxel. Soi. U5A ND9.10956 – 13960 ( 2012 ).14Lazaridis, I. et al. Ancient human genomes suggest three ancestral populations for present - day Europeans. Nature SI3.4004 – 403 ( 2014 ).49.Green, It. E. et al. A draft sequence of the Neandertal genome. Science S28.7YD - T22 ( 2010 ).15Sleoglund, P et al. Ongins and genetic lacgacy of Neolithic farmers and hunter - gatherers in Europe. Science 328.468 – 489 ( 2012 ).50.Yang, M. A., Malaspinae, A.- S., Durand, E. Y. & Slation, M. Ancient structure in Africa unlikely to explain Neundenthal and non - African genetic similarity. Mol. Biol. Exol. 2916Allentoft, M : E. et al. Population genomics of Bronas Age Eurasia Nature S22.167 – 972 ( 2015 ).Table2987 – 2995 ( 2012 ). 5ankararaman, 5.17Skoglund, P et al. Genomic diversity and admixture differs for Stone - Age Scondinasian foragers and farmers. Scoience ( JAI, 147 – 750 ) ( 2014 ).Tablebetween Neandertala and modern humans. PLo3 Genet B, elOC040 [ 2012 ]. Heather, P. Empires and Barbanians. Migration, Dewelopment and the Birth of Europe18Yuncia. E. et al. False discovery rates of apAdm - based screens for genetic admixturePregnint at bioRaw - https ( Ildsi org / X010100 / 202304.35 / 58639 ( 2023 ).Table( Pan Macmillan, 2010 ). Halsall, G. Barbarian Mi9Reich, O.,", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Online content**\nAny methods, additional references, Nature Portfolio reporting summa- \nries, source data, extended data, supplementary information, acknowl- \nedgements, peer review information; details of author contributions \nand competing interests; and statements of data and code availability \nare available at https://doi.org/10.1038/s41586-024-08275-2. \n\n**Viking Age expansion from Scandinavia**\nTraditionally, historical perspectives on what is now often referred \nto as the Viking diaspora placed an emphasis on the movements and \nsettlements of population groups from various parts of Scandinavia67. \nOur explorative MDS analysis again indicates mixed ancestries related \nto the Scandinavian EIA, with regional differences that point to varied \nlocal admixture (Fig. 4e and Extended Data Fig. 10). \n\n1. \nLawson, D. J., Hellenthal, G., Myers, S. & Falush, D. Inference of population structure using \ndense haplotype data.*PLoS Genet.***8**, 11–17 (2012). \n2. Hellenthal, G. et al. A genetic atlas of human admixture history.*Science***343**, 747–751 \n(2014). \n3. Schiffels, S. et al. Iron Age and Anglo-Saxon genomes from East England reveal British \n\nmigration history.*Nat. Commun.***7**, 10408 (2016). \nFlegontov, P. et al. Palaeo-Eskimo genetic ancestry and the peopling of Chukotka and \nNorth America.*Nature***570**, 236–240 (2019). \n4. \n\nIn Britain, most of the individuals recovered from the two late Viking \nAge mass graves identified at Ridgeway Hill, Dorset, and St John’s \n5. Antonio, M. L. et al. Stable population structure in Europe since the Iron Age, despite high \nmobility.*eLife***13**, e79714 (2024). \n\nNature | Vol 637 | 2 January 2025 |**125**", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "These patterns are consistent with northward expansion of ancestry, \npotentially starting before the Viking Age, into the Jutland peninsula \nand Zealand island towards southern Sweden. The geographical ori- \ngin of this ancestry is currently difficult to discern, as the available \nsamples from Iron Age central Europe remain sparse. The timing \nof this expansion is constrained only by the samples available: this \nancestry is not observed in individuals from the Copenhagen area of \nDenmark (around 100 ce–300 ce)6, an individual from the southern tip \nof Sweden (around 500 ce)16, individuals from the Sandby Borg mas- \nsacre site on Öland in present-day Sweden (around 500 ce)7 and 31 indi- \nviduals from the mid-eighth century Salme ship burials in present-day \nEstonia (Extended Data Fig. 9), who probably originated in central \nSweden6. Therefore, this ancestry transformation most likely post- \ndated these individuals in each particular region and mostly occurred \nin the second half of the first millennium ce. \n\nTo assess the full extent of the impact of this ancestry influx into \nScandinavia, we next aimed to understand the ancestry of individu- \nals in Scandinavia during the Viking Age. Previous studies have sug- \ngested that there was a diversity of ancestries in Scandinavia during this \nperiod6,7,65, due to increased maritime mobility, but have not reported \nper-individual ancestry estimates based on preceding ancestry. We \nanalysed each individual’s ancestry using a rotational qpAdm scheme \n(Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which \nshowed increased power in distinguishing models when restricted \nto recent coalescences with Twigstats (more than 80% of accepted \none-source models in Twigstats were also accepted one-source models \nusing all SNPs, compared with less than 17% for the inverse). \n\nTwigstats substantially improves models of admixture between \nancestries from Iron Age Britain and northern Europe in early medi- \neval England9, halving standard errors from 9% with SNPs to 4% when \nusing time stratification (point estimates 80% and 79% Iron Age \nBritain-related ancestry, respectively). We used this improved reso- \nlution to demonstrate that an earlier Roman individual (6DT3) dating \nto approximately second to fourth century ce from the purported \ngladiator or military cemetery at Driffield Terrace in York (Roman \n*Eboracum*), England60, who was previously identified as an ancestry \noutlier61,62, specifically carried approximately 25% EIA Scandinavian \nPeninsula-related ancestry (Fig. 2c). This documents that people with \nScandinavian-related ancestry already were in Britain before the fifth \ncentury ce, after which there was a substantial influx associated with \nAnglo-Saxon migrations9. Although it is uncertain whether this indi- \nvidual was a gladiator or soldier, individuals and groups from northern \nEurope are indeed recorded in Roman sources both as soldiers and as \nenslaved gladiators63,64. \n\nAcross Europe, we see regional differences in the southeastern and \nsouthwestern expansions of Scandinavian-related ancestries. Early \nmedieval groups from present-day Poland and Slovakia carry spe- \ncific ancestry from one of the Scandinavian EIA groups—the one with \nindividuals primarily from the northern parts of Scandinavia in the \nEIA—with no evidence of ancestry related to the other primary group \nin more southern Scandinavia (Fig. 2d). By contrast, in southern and \nwestern Europe, Scandinavian-related ancestry either derives from", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Influx into pre-Viking Age Scandinavia**\nIn EIA Scandinavia (<500 ce), we find evidence for broad genetic homo- \ngeneity. Specifically, individuals from Denmark (100 ce–300 ce) were \nindistinguishable from contemporary people in the Scandinavian Pen- \ninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry \nalready in the eighth century ce (Late Iron Age/early Viking Age) on \nZealand (present-day Denmark) for which a 100% EIA ancestry model \nis rejected (*P*= 1 × 10−17 using Twigstats;*P*= 7.5 × 10−4 without). This \nshift in ancestry persists among later Viking Age groups in Denmark, \nwhere all groups are modelled with varying proportions of ancestry \nrelated to Iron Age continental groups in central Europe (Figs. 3f \nand 4c). A non-parametric MDS of Viking Age individuals suggests \nthat variation between individuals forms a cline spanning from the \nEIA Scandinavian Peninsula individuals to ancestry characteristic of \ncentral Europe (Fig. 4e). The observed shift in ancestry in Denmark \ncannot be confounded by potentially earlier unknown gene flow into \nIron Age source groups in Austria, France and Germany, but such gene \nflow could affect the exact ancestry proportions. \n\nIn southern Germany, the genetic ancestry of individuals from \nearly medieval Bavaria probably associated with the historical \nGermanic-language-speaking Baiuvarii59 cannot be modelled as deriv- \ning ancestry solely from earlier groups in Iron Age central Germany \n(*P*≪ 1 × 10−36). The Baiuvarii probably appeared in the region in the \nfifth century ce59, but their origins remain unresolved. Our current \nbest model indicates a mixture with ancestry derived from EIA Pen- \ninsular Scandinavia and central Europe, suggesting an expansion of \nScandinavian-related ancestry producing a regional ancestry shift \n(Figs. 2c and 3c). \n\nIn Italy, southward expansions of northern and central European ances- \ntries appear by the Late Antiquity (approximately fourth century ce), \nwhere a clear diversification of ancestry can be observed compared \nwith preceding time periods (Fig. 3d). However, no individuals with \nnear 100% Scandinavian ancestry can be observed in the sampling \ndata available so far. \n\nIn Britain, the ancestries of Iron Age and Roman individuals form a \ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available \npreceding Bronze Age individuals from Ireland and Orkney, and adja- \ncent to, but distinct from, available individuals in Iron Age and Roman \ncentral Europe. However, two first- to second-century ce burials from a \nRoman military fortress site in Austria (Klosterneuburg)5 carry ancestry \nthat is currently indistinguishable from Iron Age or Roman popula- \ntions of Britain, to the exclusion of other groups (qpWave cladality \n*P*= 0.11). One option is that they had ancestry from Britain; alternatively, \ncurrently unsampled populations from western continental Europe \ncarried ancestries similar to Iron Age southern Britain.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "Scandinavia \n\n\n\n**Fig. 3 | Time transects across six geographical regions in Europe.**\n**a**–**f**, Ancestry change visualized over a time transect spanning from the Bronze \nAge to the present day in Poland (**a**), southeastern Europe (**b**), central Europe \n(**c**), Italy (**d**), Britain and Ireland (**e**) and Scandinavia (**f**). The maps show sample \nlocations of all available ancient genomes with at least 0.5× coverage from these regions (Supplementary Table 1). Their ancestry is shown on the same \nMDS model as in Fig. 2a for each time period. For each geographic region, \nthe early medieval period is highlighted in orange and the area in the MDS \ncorresponding to Scandinavian and central European ancestries is highlighted \nin an orange box. \n\nmedieval individuals (*P*≪ 1 × 10−32). Instead, the majority of individuals \nfrom medieval Poland can be modelled only as a mixture of ancestries \nrelated to Roman Iron Age Lithuania, which is similar to ancestries of \nindividuals from middle to late Bronze Age Poland (44%, 95% confidence \ninterval 36–51%), an ancestry component related to Hungarian Scyth- \nians or Slovakian La Tène individuals (49%, 95% confidence interval \n41–57%) and potentially a minority component of ancestry related to \nSarmatians from the Caucasus (*P*= 0.13) (Fig. 2c). Four out of twelve \nindividuals from medieval Poland, three of whom are from the late \nViking Age6, carried detectable Scandinavian-related ancestry. Some \nof the ancestry detected in individuals from later medieval Poland may \nhave persisted during the late first millennium ce in the cremating \nportion of the population, but regardless, this points to large-scale \nancestry transformation in medieval Poland (Fig. 3a). Future data could \nshed light on the extent to which this reflects the influence of groups \nspeaking Slavic languages in the region. \n\nIn present-day Slovakia, individuals associated with the Iron \nAge La Tène period appear close to Hungarian Scythians in the two \ndimensions of our MDS analysis, and are modelled as a mixture of \ncentral and eastern European ancestry. However, a first-century ce \nburial of a 50–60-year-old woman from Zohor is modelled only with \nScandinavian-related ancestry, providing evidence of ancestry related \nto the Scandinavian EIA appearing southwest of the range of the Wiel- \nbark archaeological complex5,57 (Fig. 3b). Later early medieval individu- \nals from Slovakia have partial Scandinavian-related ancestry, providing \nevidence for the integration between expanding and local groups. \n\nNearby, in present-day Hungary, we observe Scandinavian-related \nancestry components in several burials dating to the sixth century \nce associated with Longobards (Longobard_earlyMED(I))10 (Fig. 2c). \nThis is consistent with the original study10, which reported affinity to \npresent-day groups from northwestern Europe (GBR, CEU and FIN in \nthe 1000 Genomes Project (1000GP))10 but which we can resolve with", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" - }, - { - "text": "We investigated regional differences in non-local ancestry across \nScandinavia. In Denmark, 25 out of 53 Viking Age individuals had detect- \nable (*z-*score > 1) central European-related ancestry (CentralEurope. \nIronRoman or Portugal.IronRoman) in their best accepted qpAdm \nmodels. In Sweden 20 out of 62 individuals had detectable central \nEuropean-related ancestry, concentrated almost entirely in southern \nregions (Fig. 4a,d). By contrast, in Norway, this ancestry was observed \nin only 2 out of 24 individuals, indicating a wide-ranging impact of \nincoming ancestry in southern Scandinavia and suggesting more \n\nNature | Vol 637 | 2 January 2025 |**123**", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "c \n1.00 \nDenmark_EVA(3) Funen_VA(12) \n\ny \nr \nt \ns \ne \nc \nn \na \nd \ne \nt \na \ne \nr \n- \nl \na \nt \nn \ne \nn \ni \nt \nn \no \nC \n\n1 1 2 2 1 \n0.75 \n1.0 \n\nn \no \ni \nt \nr \no \np \no \nr \np \ny \nr \nt \ns \ne \nc \nn \nA \n\n0.5 \n0.50 \nl \n0 \n1 \n3 2 \n3 \n. . \n1.0 \n0.25 \n0.5 \n0 \n0 \n7 \n1 7 \n5 \n1 \n. \n7 \n1 \n. \n1 \n6 \n. . \n\nScandinavian Peninsula Central Europe \n\nAnatolia EBA \nAustria_Klosterneuburg_Roman \nBaiuvarii_EMED \nBritain.lronRoman \nCentraIEurope.lronRoman(l) \nCentraIEurope.lronRoman(lI) \nCentraIEurope.IronRoman(lII) \nCordedWare_EBA \nCroatia.lronRoman_oNorthEurope \nDenmark_BA \nDenmark_EVA \nDenmark_IA \nEngland_Saxon_highCNE \nEngland_Saxon_lowCNE \nEngland_Saxon_midCNE \nEngland.Roman.Gladiator.Scandinavia \nHungary_EM(I) \nHungary_EM(II) \nHungarySlovakia.lronRoman \nAll SNPs \nIrelandOrkney_BA \nItaly.lmperial(l) \nltaly.lmperial(lI) \nltaly.lronRepublic \nTwigstats 1,000 \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_EMED(I) \nLongobard_EMED(II) \nMontenegro_EM \nNetherlands_Friesland_Saxon \nPoland_BA \nFaroes \nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \n\nIreland \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nIsle of Man \nPoland_Wielbark(III) \n\nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nOrkney_VA \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \n\nSlovakia_Zohor_Germanic_Roman \nSlovakia.MigrationPeriod \nSlovenia.lronRoman \nOxford_VA Slovenia.Roman.oNorthEurope \n\nb \n50 \n\ns \nt \nn \nu \no \nc \nm \na \nr \ng \no \nt \ns \nh \n\n40 \n\n30 \ni \n\ne \np \no \nt \no \ns \n20 \n\n10 \ni \n\ne \nb \na \nt \nS \nl \n0 \n0 \n0.74 0.71 0.72 0.73 \n87Srf/86Sr \n\nd \n\n70.5 \n67.5 \n64.5 \n61.5 \n58.5 \n55.5 \ne \nd \nu \nt \ni \nt \na \nL \n\n0.75 1.00 0.25 0.50 \n0 \n\ne \nNorway_VA \nScandinavian Peninsula EIA \n\nBritain \n\nCentral \nEurope \n\n0.75 1.00 0.75 1.00 0.25 0.50 0.25 0.50 \n0 0 \n\nProportion of ancestry \n\nSweden_VA \nScandinavian Peninsula EIA \n\nBritain \nEastern Europe Eastern Europe \nCentral \nEurope \n\n**Fig. 4 | Ancestry in the Viking world. a**, Map showing ancestry carried by \nScandinavian Viking Age individuals as inferred using the best-fitting qpAdm \nmodel. These are chosen by either choosing the one-source model with largest \n*P*value and*P*> 0.01 or the two-source model with the largest*P*value and*P*> 0.01. \nExtended Data Fig. 7 shows the same map with all accepted models.**b**, Stable \nisotope data indicating the geology of childhood origin. The histogram shows \nthe ratio of strontium isotopes 87 to 86 measured in 109 individuals in Öland69. \nFor individuals included in our ancestry modelling, we plot Iron Age central \nEuropean-related ancestry against their stable isotope values (grey circles, \n*r*= −0.39,*P*= 0.075). Shared area corresponds to the 95% confidence band around the regression line.**c**, The ancestry shift observed in Viking Age Danish \ngroups using qpAdm on all SNPs or Twigstats. We show the best one-source and \nall two-source models with*P*> 0.05. For models with*P*< 0.05, the −log10[*P*value] \nis shown under the plot. Sample sizes for each group are shown in brackets. \n**d**, The ancestry proportion across Viking Age individuals in Denmark, Sweden \nand Norway grouped by latitude.**e**, Viking Age genetic variation (grey circles) \nvisualized on the same MDS as in Fig. 2a,b.**f**, The best-fitting qpAdm ancestry \nmodel for far-flung Viking individuals. Detailed models for all individuals are \nshown in Extended Data Figs. 9 and 10. In**c**and**f**, we show one s.e. Rotating \nqpAdm sources are marked in bold in the key.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed3.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0806.pdf", - "query": "What do the timescales during which high-amplitude flaring events occur in blazars indicate?", - "target_page": 1, - "target_passage": "that much of the en- ergy is being produced deep within the jet on small, sub-parsec scales", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\ndetailed variability analysis for one of two reasons: \n(1) too few data points or (2) flux measurement un- \ncertainties on the order of the amplitude of observed \nvariability. It is important to note that, due to dis- \ncrepancies between the sampling frequency in both \nbands, the variability indices for the 850µm band may \nbe artificially depressed due to the fact that there are \nnot always corresponding measurements at higher fre- \nquencies during flaring epochs. \n\nWe follow the method of Kelly et al. [9], who model \nquasar optical light curves as a continuous time first- \norder autoregressive process (CAR(1)) in order to ex- \ntract characteristic time scales and the amplitude of \nflux variations. Although flaring behavior is not typi- \ncally thought of as an autoregressive process, we find \nthat the light curves are well-fit by the models and \ntherefore adopt the method here to study blazar sub- \nmillimeter light curves. \n\nFigure 3: Characteristic timescale (days) versus \nsubmillimeter luminosity (erg s−1) in the 1mm band for \nall objects. Physically, τ represents a “relaxation \ntimescale”, the timescale beyond which events are no \nlonger correlated. \n\nThe CAR(1) process is described by a stochastic \ndifferential equation [9], \n\n√ \n\n1 \nτ \ndS(t) = S(t) dt + σ dt (cid:15) (t) + b dt, (3) \n\nboth classes extending across a large range in τ . Be- \ncause of the uncertainty for objects with shorter char- \nacteristic timescales, it is hard to draw any definitive \nconclusions about the differences between classes. It \nis important to note that τ does not necessarily rep- \nresent a flaring timescale, which is a behavior that \ntypically operates on a scale of ∼10–100 days and not \non the longer timescales we see in τ . \n\n(4) \n\nIn equations 3 and 4, τ is called the “relaxation \ntime” of the process S(t) and is identified by the \nbreak in PX (f ). The power spectrum appears flat \nfor timescales longer than this and falls off as 1/f 2 for \ntimescales shorter than the characteristic timescale of \nthe process. **4. CONNECTION WITH GAMMA-RAYS**\n\nTaking the logarithm of the blazar light curve (in \nJy) to be S(t), we adopt τ (in days) as the character- \nistic timescale of variability, after which the physical \nprocess “forgets” about what has happened at time \nlags of greater than τ . The two other relevant pa- \nrameters, σ and µ = b/a, are the overall amplitude \nof variability and the logarithm of mean value of the \nlight curve, respectively. \n\nIn the routine, we construct an autoregressive \nmodel for the light curves for a minimum of 100,000 \niterations and calculate the value of τ from the break \nin the power spectrum in each instance. Due to the \nlimited number of observations in the 850µm band, \nwe performed this autoregressive analysis only for the \n1mm light curves, which typically have more than 10 \npoints per light curve. \n\nIn general, we find that in the submillimeter, we \nare observing these blazars at or near the peak of the \nsynchrotron component (αS ∼ 0), but that Fermi - \ndetected sources have more negative energy spectral \nindices overall than Fermi -nondetected sources. \nIn \nFigure 4, we see that while the majority of Fermi \nblazars are observed on the rising part of the syn- \nchrotron component (at lower energies than the peak), \nall of the objects have very steeply falling γ-ray energy \nspectral indexes, putting the γ-ray peak at lower en- \nergies than the observed Fermi band. Knowing that \nwe are not observing the synchrotron and γ-ray com- \nponents at analagous points in the spectrum may al- \nlow us to better understand the magnetic field in the \nparsec-scale jet region and the population of external \nphotons that is being upscattered to γ-rays. \n\nThis method yielded some surprising results. \nIn \nFigure 3, we see that the BL Lacs and FSRQs exhibit \nvirtually no difference in characteristic timescale, with", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0806.pdf" - }, - { - "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. \n\nflux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. \n\n**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "**References**\n\nJ. G. Mangum, and M. S. Yun (2007), vol. 375 \nof Astronomical Society of the Pacific Conference \nSeries, p. 234. \n\n[6] S. E. Healey, R. W. Romani, G. Cotter, P. F. \nMichelson, E. F. Schlafly, A. C. S. Readhead, \nP. Giommi, S. Chaty, I. A. Grenier, and L. C. \nWeintraub, ApJS 175, 97 (2008). \n\n[7] A. A. Abdo, M. Ackermann, M. Ajello, W. B. At- \nwood, M. Axelsson, L. Baldini, J. Ballet, G. Bar- \nbiellini, D. Bastieri, B. M. Baughman, et al., ApJ \n700, 597 (2009). \n\n[8] T. Hovatta, E. Nieppola, M. Tornikoski, E. Val- \ntaoja, M. F. Aller, and H. D. Aller, A&A 485, 51 \n(2008). \n\n[1] M. Sikora and G. Madejski, in American Insti- \ntute of Physics Conference Series, edited by F. A. \nAharonian and H. J. V¨olk (2001), vol. 558 of \nAmerican Institute of Physics Conference Series, \npp. 275–288. \n\n[2] M. Sikora, in Blazar Demographics and Physics, \nedited by P. Padovani and C. M. Urry (2001), vol. \n227 of Astronomical Society of the Pacific Con- \nference Series, pp. 95–104. \n\n[3] J. A. Stevens, S. J. Litchfield, E. I. Robson, D. H. \nHughes, W. K. Gear, H. Terasranta, E. Valtaoja, \nand M. Tornikoski, ApJ 437, 91 (1994). \n[4] P. T. P. Ho, J. M. Moran, and K. Y. Lo, ApJl [9] B. C. Kelly, J. Bechtold, and A. Siemiginowska, \n616, L1 (2004). ApJ 698, 895 (2009). \n[10] M. Sikora, R. Moderski, and G. M. Madejski, ApJ \n675, 71 (2008). \n\n[5] M. A. Gurwell, A. B. Peck, S. R. Hostler, M. R. \nDarrah, and C. A. Katz, in From Z-Machines to \nALMA: (Sub)Millimeter Spectroscopy of Galax- \nies, edited by A. J. Baker, J. Glenn, A. I. Harris,", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0806.pdf", - "query": "Where is the Submillimeter Array?", - "target_page": 1, - "target_passage": "near the summit of Mauna Ke", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nFor the synchrotron component of blazar spectra, \nthe low-frequency spectral break due to synchrotron \nself-absorption moves to higher frequencies as one \nmeasures closer to the base of the jet [2]. This of- \nten places the peak of the spectrum in the millime- \nter and submillimeter bands, where the emission is \noptically-thin and originates on parsec and sub-parsec \nscales [3], allowing direct observation of the most com- \npact regions near the central engine. The high en- \nergy γ-ray emission originates as a Compton process, \ntypically a combination of synchrotron-self-Compton \n(SSC) and external-radiation-Compton (ERC). De- \npending on the source properties, the synchrotron \nphotons or external photons are upscattered by the \nsame population of electrons that emit the millimeter \nand submillimeter spectra. Therefore the submillime- \nter and γ-ray emission are closely linked and give the \nfull information about the source emission. \n\nA systematic study of the submillimeter properties \nof the entire sample of Fermi blazars has yet to be con- \nducted and is one of the primary goals of our work. We \npresent here preliminary analysis of the submillimeter \nproperties of Fermi blazars detected by the Submil- \n1The Submillimeter Array is a joint project between the \nSmithsonian Astrophysical Observatory and the Academia \nSinica Institute of Astronomy and Astrophysics and is funded \nby the Smithsonian Institution and the Academia Sinica. \n2http://sma1.sma.hawaii.edu/callist/callist.html \n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "**References**\n\nJ. G. Mangum, and M. S. Yun (2007), vol. 375 \nof Astronomical Society of the Pacific Conference \nSeries, p. 234. \n\n[6] S. E. Healey, R. W. Romani, G. Cotter, P. F. \nMichelson, E. F. Schlafly, A. C. S. Readhead, \nP. Giommi, S. Chaty, I. A. Grenier, and L. C. \nWeintraub, ApJS 175, 97 (2008). \n\n[7] A. A. Abdo, M. Ackermann, M. Ajello, W. B. At- \nwood, M. Axelsson, L. Baldini, J. Ballet, G. Bar- \nbiellini, D. Bastieri, B. M. Baughman, et al., ApJ \n700, 597 (2009). \n\n[8] T. Hovatta, E. Nieppola, M. Tornikoski, E. Val- \ntaoja, M. F. Aller, and H. D. Aller, A&A 485, 51 \n(2008). \n\n[1] M. Sikora and G. Madejski, in American Insti- \ntute of Physics Conference Series, edited by F. A. \nAharonian and H. J. V¨olk (2001), vol. 558 of \nAmerican Institute of Physics Conference Series, \npp. 275–288. \n\n[2] M. Sikora, in Blazar Demographics and Physics, \nedited by P. Padovani and C. M. Urry (2001), vol. \n227 of Astronomical Society of the Pacific Con- \nference Series, pp. 95–104. \n\n[3] J. A. Stevens, S. J. Litchfield, E. I. Robson, D. H. \nHughes, W. K. Gear, H. Terasranta, E. Valtaoja, \nand M. Tornikoski, ApJ 437, 91 (1994). \n[4] P. T. P. Ho, J. M. Moran, and K. Y. Lo, ApJl [9] B. C. Kelly, J. Bechtold, and A. Siemiginowska, \n616, L1 (2004). ApJ 698, 895 (2009). \n[10] M. Sikora, R. Moderski, and G. M. Madejski, ApJ \n675, 71 (2008). \n\n[5] M. A. Gurwell, A. B. Peck, S. R. Hostler, M. R. \nDarrah, and C. A. Katz, in From Z-Machines to \nALMA: (Sub)Millimeter Spectroscopy of Galax- \nies, edited by A. J. Baker, J. Glenn, A. I. Harris,", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. \n\nflux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. \n\n**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
912 ( 1980 ).IL 3. Mediapatters and IL E. Marduk. Pleys. Ilev. Lett, 44.1110 ( 1090 ) [ Erratum - bid. 44.161080 ]: IL E. Menhak and R. N. Melaquera, Pleys. Lett. II HI : 222 ( 1390 ). S. Exalel, J. Pleys. G. ID5001 ( 200 ).
[ 4 ] S. los, X. Olads and Y. Ordinoa, Phys. Lett. 13.676.83 ( 2009 ); Plev. Bev. D. 80.11007 ( 2009 ).[ 3 ] W. Emain and S. Khalil, Eur. Phys. J. ( 122.625 ( 2907 ),[ 6 ] K. Huitu, S. Khali, H. Olasla and S. K. Rai, Phys. Rev. Lett. 101.181802 ( 2008 ).7 ) L. Daseo, A. Belyaer, S. Morrtti and C. H. Shenkers '- Theuistocleume, Phyx. Rev. D. 80.0G000 ( 2009 ).
[ 8 ] P. F. Perea, T. Hian and T. Li, Flyx. Ilev : D. 80, ( 73015 ( 2009 ). [ 9 ] S. Khalil and O. Seto, JCAP 0810.021 ( 2008 ).[ 10 ] M. S. Cureus. A. Duleo, B. A. Dohoroexn and T. M. P. Tait, Pley, Bev. D. T0.00009 ( 2000 ). [ 11 ] G. Cuerispaglia, C. Osaki, G. Marandella and A. Strenia, Piyx. Bev. D P4.03011 ( 2000 ).[ 12 ] S. Davson and W. Yan, Plys. Rev. D 79.095002 ( 2009 ). [ 13 ] L. Bases, A. Belyaev, S. Moretti and G. M. Pruna, arkiv
[ 14 ] E. W. Koilb and M. S. Turner, The Eirly Universe, Addison - Wodey ( 1990 ). [ 15 ] D. N. Spergel et al. [ WMAP Collaboration ], Astrophys. J. Strppl. IFN, 377[ 16 ] J. McDonald, Phys. Rev. D 50.3637 ( 1994 ).[ 17 ] C. P. Ehrgese, M. Psepdov and T. text Veldhike. Nucl. Phys. B 619.709 ( 2001 ). [ 19 ] H. Dovondiaed, B. Kitano, T. Li and H. Muropamas, Phys. Lett.. I3 609.117 ( 200
[ 19 ] T. Kikuchi and N. Okada, Phys. Lett. B 665.186 ( 2008 ).[ 20 ]. C. E. Yaguna, JCAP 0003.000 ( 2000 )].[ 21 ] L. M. Kcauus, S. Naori and M. Trodifen, Phys. Rev. II - 67.085002 ( 2003 ). [ 22 ]. E. A. Baltz and L. Bergstroma, Pleys. Rev. D 67.043516 ( 2000 ).
[ 23 ]. K. Cheung and O. Seto, Phys. Rev. D 69.113009 ( 2004 ).[ 24 ]. J. Angle et al. [ XENON Collaboration ]. Phys. Rev : Lett. 10.021803 ( 2008 ). [ 25 ]. Z. Almed et al. [ The CDMS - II Collaboration ], acKiv : 9012.3002 [ setre - pk. CO ].[ 26 ] http :// xenon. astro. columbia. edu /.
", - "page_start": 12, - "page_end": 12, - "source_file": "1002.2525.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0806.pdf", - "query": "How many blazars were observed by the SMA in either band during the three months August-October 2008?", - "target_page": 2, - "target_passage": "only 129 of the SMA blazars", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. \n\nflux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. \n\n**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "**References**\n\nJ. G. Mangum, and M. S. Yun (2007), vol. 375 \nof Astronomical Society of the Pacific Conference \nSeries, p. 234. \n\n[6] S. E. Healey, R. W. Romani, G. Cotter, P. F. \nMichelson, E. F. Schlafly, A. C. S. Readhead, \nP. Giommi, S. Chaty, I. A. Grenier, and L. C. \nWeintraub, ApJS 175, 97 (2008). \n\n[7] A. A. Abdo, M. Ackermann, M. Ajello, W. B. At- \nwood, M. Axelsson, L. Baldini, J. Ballet, G. Bar- \nbiellini, D. Bastieri, B. M. Baughman, et al., ApJ \n700, 597 (2009). \n\n[8] T. Hovatta, E. Nieppola, M. Tornikoski, E. Val- \ntaoja, M. F. Aller, and H. D. Aller, A&A 485, 51 \n(2008). \n\n[1] M. Sikora and G. Madejski, in American Insti- \ntute of Physics Conference Series, edited by F. A. \nAharonian and H. J. V¨olk (2001), vol. 558 of \nAmerican Institute of Physics Conference Series, \npp. 275–288. \n\n[2] M. Sikora, in Blazar Demographics and Physics, \nedited by P. Padovani and C. M. Urry (2001), vol. \n227 of Astronomical Society of the Pacific Con- \nference Series, pp. 95–104. \n\n[3] J. A. Stevens, S. J. Litchfield, E. I. Robson, D. H. \nHughes, W. K. Gear, H. Terasranta, E. Valtaoja, \nand M. Tornikoski, ApJ 437, 91 (1994). \n[4] P. T. P. Ho, J. M. Moran, and K. Y. Lo, ApJl [9] B. C. Kelly, J. Bechtold, and A. Siemiginowska, \n616, L1 (2004). ApJ 698, 895 (2009). \n[10] M. Sikora, R. Moderski, and G. M. Madejski, ApJ \n675, 71 (2008). \n\n[5] M. A. Gurwell, A. B. Peck, S. R. Hostler, M. R. \nDarrah, and C. A. Katz, in From Z-Machines to \nALMA: (Sub)Millimeter Spectroscopy of Galax- \nies, edited by A. J. Baker, J. Glenn, A. I. Harris,", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" - }, - { - "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. \n\n**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nFor the synchrotron component of blazar spectra, \nthe low-frequency spectral break due to synchrotron \nself-absorption moves to higher frequencies as one \nmeasures closer to the base of the jet [2]. This of- \nten places the peak of the spectrum in the millime- \nter and submillimeter bands, where the emission is \noptically-thin and originates on parsec and sub-parsec \nscales [3], allowing direct observation of the most com- \npact regions near the central engine. The high en- \nergy γ-ray emission originates as a Compton process, \ntypically a combination of synchrotron-self-Compton \n(SSC) and external-radiation-Compton (ERC). De- \npending on the source properties, the synchrotron \nphotons or external photons are upscattered by the \nsame population of electrons that emit the millimeter \nand submillimeter spectra. Therefore the submillime- \nter and γ-ray emission are closely linked and give the \nfull information about the source emission. \n\nA systematic study of the submillimeter properties \nof the entire sample of Fermi blazars has yet to be con- \nducted and is one of the primary goals of our work. We \npresent here preliminary analysis of the submillimeter \nproperties of Fermi blazars detected by the Submil- \n1The Submillimeter Array is a joint project between the \nSmithsonian Astrophysical Observatory and the Academia \nSinica Institute of Astronomy and Astrophysics and is funded \nby the Smithsonian Institution and the Academia Sinica. \n2http://sma1.sma.hawaii.edu/callist/callist.html \n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_MRM_2000.pdf", - "query": "How big is the Mermaid fleet?", - "target_page": 12, - "target_passage": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, S E A G O I N G O P E R A T I O N S \n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing \n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. \n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the \n\nwork increased productivity through enhanced bollard pull and consequent earnings. \n\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. \n\nThe Dampier Base will now comprise:- \n\n**•**\n**•**\n\nAn “all tides” approach channel to a minimum depth of 6 metres \n\nA wharf offering 7.5 metres depth at low tide, featuring a heavy loadout section to \n\naccommodate modules of up to 1500 tonnes to onshore projects on the Burrup Peninsular \n\nand adjacent mining centres. A subsea pipe reel loading facility will encourage the use of \n\nspool ships in the region for deepwater pipelay. On a project by project basis, pipeline \n\nprotection rock dumping, specialist vessel rig up activities and the like will be facilitated, \n\nas will dry and bulk cargo handling, refuelling, watering and all categories of waste \n\nreception. The joint Commonwealth and WA State Government initiative to establish \n\nan integrated industrial estate at Jervoise Bay (south of Perth) serviced by high wide load \n\ncorridors from Perth’s industrial areas will see the heavy capacity wharf playing a strategic \n\nrole in major capital works in the Pilbara, leading to significant cost savings.", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "\n \n \n \n \n [html]NoteConsolidated$\n
Company200019992000
1999$$$
in assets and liabilitiesModel1.361.086( 375.733 )
Percentage( 197.069 )( 177.830 )
progress323.621
Number of entits10.752107.206
γ( 161.355 )( 316.226 )
d other creditors749.28034.720( 98.375 )
n for income tax( 718.533 )( 931.758 )( 3.885 )
3.885Concome tax benefit( 346.520 )( 249.698 )
for deferred tax455.312691.991
related parties40.375
\n\n**(d) Businesses Acquired**\n\nOn 12 August 1998, Mermaid Marine \nAustralia Limited (formerly Bellbridge \nInvestments Pty Ltd) acquired 100% \nof the shares in Mermaid Marine Group \nPty Ltd. The acquisition details were: \n\n**Consideration**\nCash paid for purchase of shares \nBuy back of shares \nIssue of shares as part of acquisition \nPre-acquisition dividend \nStamp duty payable on transfer \n\nof shares \nShares issued \n\n**$**\n\n**$**\n5,923,618 \n(4,500,000) \n3,041,785 \n(2,076,382) – \n– \n– \n– \n\n55,590 \n2,444,611 – \n–", - "page_start": 52, - "page_end": 52, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "‘AIL WAVE \n\n\n\n\n\n\nFLIGHT", - "page_start": 415, - "page_end": 415, - "source_file": "00-80T-80.pdf" - }, - { - "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. \n\nAs more vessels seek protection, additional breakwaters can be constructed and sea room \n\ndredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four \n\nvessel specific mooring lines secured to special attachment points on the vessel. \n\n**F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or \n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is \n\nsuitable for development in its present state. \n\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services \n\nsuch as traffic flows, land allocation and security, as well as fulfilling the many and complex \n\nregulatory requirements related to health, safety, quarantine, environmental management, dust, \n\ndangerous goods and hazchem materials have been the subject of considerable study prior to this \n\nimplementation stage.", - "page_start": 16, - "page_end": 16, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Mangroves, a tropical evergreen shrub, which forms dense thickets along E N V I R O N M E N T A L I S S U E S \n\ncoastlines, are a key element of the life cycle of a large number of marine species in the areas in \n\nwhich Mermaid principally operates. \n\nAs at the date of the report, five hundred (500) juvenile mangroves have been transplanted with \n\n90% success. A further 174 mangrove seedlings have been planted and are showing very good \n\ngrowth rates. Attempts to transplant adult mangrove trees, have proved to be more difficult, but \n\nthe success with young plants now appears to guarantee a more than satisfactory outcome.", - "page_start": 24, - "page_end": 24, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "**G. SLIPWAY.**\n\nAustralia, and particularly the north west is impoverished in terms of infrastructure to service \n\nour marine industries. Some of this has been due to a historical link with our recent industrial \n\npast. This is now behind us, and Australia has now become a centre of excellence with respect \n\nto both new building and ship repair, particularly for high tech and specialty vessels. \n\nThe slipway will be a repair only facility, no new building is contemplated. Its capacity is \n\nstructured to meet the regional steel mono-hulled fleet requirements of some 60 vessels between \n\n200 and 4000 tonne displacement. Fishing industry, marine tourist industry, large private \n\npleasure craft , naval, scientific and law enforcement vessels are a secondary target. \n\nThe slipway is designed to initially accept vessels up to 2,700 tonnes, a restriction which is set \n\nby our current inventory of cradles used to support vessel on the slip. The cradles will be \n\nprogressively upgraded to ultimately handle 4000 tonne. A later expansion will allow 500 tonne \n\nvessels to be side slipped, thereby increasing capacity. \n\nThe Mermaid slipway will rank second in terms of capacity on the western half of the continent. \n\nTenix, Fremantle 8,000 tonne, Mermaid Dampier 2,700 tonne rising to 4,000 tonne, Darwin Ship \n\nRepair 2,500 tonne. The nearest other facilities are Singapore, Adelaide, Port Moresby or Cairns. \n\nMermaid has purchased a very large cyclone rated industrial building \n\n\n\nframe which will be sited beside the slipway and tenanted by Mermaid \n\nengineering and companies which will provide ancillary services \n\nrelated to ship repair. \n\n***The Northwest Shelf is a***\n***world scale offshore oil and***\n***gas exploration province.***", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "vessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which \n\nmeans there will be very few occasions when the largest vessels in the industry have to make a \n\ntide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will \n\nnot suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby \n\nDamper Public Wharf in terms of entry and departure draft restrictions. \n\nThe function and purpose of Berth 1 will be: \n\n• To service the larger offshore supply boat market on a fast turnaround basis. \n\n• To receive and offload very heavy ro/ro cargoes up to 1500 tonne delivered by ocean going \n\nheavy lift ships and barges. \n\n• To handle inbound and outbound cargoes related to major offshore pipe lay projects. \n\n• To receive and efficiently load reel ships used for deep water small diameter pipelay. \n\n**C. QUAY WALL (BERTH 2)**\n\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted \n\noperation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas \n\nindustry and mineral ports. This berth will offer excellent weather protection for small and \n\nmedium size vessels. \n\n**D. BREAKWATER.**\n\nThe rubble mount type breakwater will be an extension of the wharf, constructed using core and \n\narmor rock largely won from excavations on the Base. The excavations created will become \n\ndepositories for dredge spoil.", - "page_start": 14, - "page_end": 14, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "During 2000 Mermaid Marine formed a M E R M A I D L A B O U R A N D M A N A G E M E N T L I M I T E D \n\nnew business unit Mermaid Labour and Management Limited. The focus of this unit will be \n\nlabour supply and industrial relations management to the marine, offshore construction industry \n\nand onshore resources projects in the NW of Australia. The Directors and Management of the \n\nnew entity are very experienced, well known and regarded by the industry in general. The \n\ncompany has high expectations for Mermaid Labour and Management Limited. \n\nIn April 2000, following the regular six monthly Quality Assurance audit, the Company’s \n\naccreditation under AS/NZS/ISO 9002 was reconfirmed. Mermaid’s quality assurance and \n\ncompliance team continues with a continuous day to day effort to improve our health, safety and \n\nenvironmental performance. Stringent charterer requirements, which are a pre requisite of \n\nincreased vessel usage, must be met to the letter and are the subject of regular and demanding \n\naudits. Although time consuming and expensive, we are grateful to certain of the large \n\nproducers, who while demanding the highest levels of compliance, have also been prepared to \n\ngive their time, sharing their safety expertise with us and in that way assisting in the very major \n\nadvances our company has made in this all important area. \n\n\n\n\n\nMermaid remains dedicated to ensuring a safe environment in all areas where we operate or have S A F E T Y \n\nresponsibility.", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "**•**\nOperating crewed vessel charters; \n\n**•**\nVessel manning, management and logistics; \n\n**•**\nOperating supply base facilities; and \n\n**•**\nEquipment hire. \n\nOther than detailed in the Chairman’s Report set out at pages 1 and 2 of this report and/or in \n\nthe Operations Review set out on pages 3 to 9 of this report, (together the “Chairman’s and \n\nOperations Reviews”), there have been no significant changes to these activities during the \n\nFinancial Year. \n\nIn respect of the financial year ended 30 June 1999, as detailed in the directors’ report for that D I V I D E N D \n\nfinancial year, a final dividend of 1.25 cents per share, franked to 100 per cent at 36 per cent \n\ncorporate income tax rate, was paid to the holders of fully paid ordinary shares on 1 November 1999. \n\nThe Chairman’s and Operations S I G N I F I C A N T C H A N G E S I N T H E S T A T E O F A F F A I R S \n\nReviews set out the matters which have had a significant effect on the state of affairs of Mermaid. \n\nOther than those matters there were no significant changes in the state of affairs of Mermaid \n\nduring the Financial Year. \n\nOn 25 August 2000 the Company announced that it had reached two S U B S E Q U E N T E V E N T S \n\nagreements for the placement of a total of 16,666,666 ordinary fully paid shares in the Company \n\nat an issue price of 30 cents each (Shares). \n\nThe first agreement was with Mr Mark Bradley, who agreed to take a placement of 3,225,000 \n\nShares by 29 September 2000, followed by, if approved of by shareholders at the Company’s \n\nannual general meeting, a further 3,441,666 within 7 days of that meeting. \n\n\n\n\n\nMermaid’s principal activities during the course of the Financial Year were: \nP R I N C I P A L A C T I V I T I E S", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Trading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine O V E R V I E W \n\nAustralia Ltd (“Company”) and its controlled entities, experienced a 43% turnover reduction \n\nfrom last year. The result was almost entirely due to a heavy fall in oil prices, which reached their \n\nlow of US$10 in February 1999, leading to the lowest level of offshore activity for many years. \n\nIn September 1999 Mermaid exercised its option to acquire the utility vessel “Mermaid \n\nAchiever” for $3,250,000. Previously the Achiever operated under a bare boat charter. \n\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister \n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier \n\nBase). Since that time a detailed environmental management system has been produced for final \n\napproval and as a guide to daily environmental management and compliance. Refinements to \n\nthe design have proceeded, together with the preparation of bid packages and negotiations with \n\nBanks for project finance. \n\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough \n\nEngineering will see an extremely robust balance sheet, with cash on hand approaching $10 million. \n\nAs construction commences at Dampier, a level of project finance will be arranged providing a \n\ncomfortable mix of debt and equity and allowing the retention of a significant cash balance. \n\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax F I N A N C I A L \n\nprofit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease \n\nof 43% over the previous period. Fixed cost reductions enabled the Company to ride out the \n\nmarket reversal with a minimal loss and positive operating cash before capex of $1.6m. This \n\nresult, achieved against a major drop in turnover, was possible through a vigorous attack on \n\noverheads, which included more beneficial ownership costs, insurance savings, management \n\nsalary savings, including voluntary sacrifice from certain senior executives in recognition of the \n\ntighter conditions. In all the changes contributed approximately $1.5million to the bottom line. \n\nBare boat charters, although useful for the busy times encountered in 1998 exposed the \n\nCompany to a high level of fixed costs. The vessels were valuable earners and the transfer of the \n\nMermaid Achiever, Mermaid Eagle and Mermaid Reunion to Company ownership has proved \n\nto be the right decision for all market conditions. Although there have been no contracts yet let \n\nfor work of any significance by producers on the North West Shelf, underlying day to day activity \n\nhas returned. Expressions of interest for major project work have been issued and as an indication \n\nof better trading conditions, an unaudited profit of $496,721 has been recorded for the two \n\nmonths to 31st August 2000. The trend has continued in September.", - "page_start": 10, - "page_end": 10, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_MRM_2000.pdf", - "query": "What was the budget for the expansion of Dampier Base?", - "target_page": 14, - "target_passage": "a capital budget of $13m", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**•**\nA slipway initially capable of receiving vessels up to 2,700 tonnes capacity will handle \n\nmost of the 60 vessels currently working in the region, a considerable number, but one \n\nwhich will rise over coming years. First class engineering facilities have been planned \n\nand highly experienced management recruited. Alternative slipways offering \n\ncomparable capacity are only to be found in Darwin or Fremantle, a sea journey of \n\napproximately 1000 miles from this operational region. Australia has emerged as a \n\ncentre of excellence with respect to vessel repair work, the Dampier facility will both \n\nbenefit from and protect that valuable reputation. \n\n**•**\nRehabilitated land for buildings and storage will finally extend over 17 hectares. The \n\nmajor oilfield services company Halliburton, have been attracted to the base as a \n\ntenant and a $1.1m purpose built building is being constructed for their use. \n\nNegotiations are also proceeding with other groups who recognise the unique \n\nadvantages of operating from this strategically positioned Base. Rental income and \n\nassociated revenues such as plant and labour hire will contribute significantly to the \n\noverall economics of the facility. \n\n**•**\nProtected moorings for cyclone shelter will be established inside the breakwater for \n\nlong term lease to local tug operators. The demand arises from serious vessel and crew \n\nsafety considerations. The Dampier Port Authority are reluctant to see the continued \n\nuse of cyclone moorings in the Harbour, not only for safety reasons, but for \n\nenvironmental concerns as well. Oil spills are not acceptable under any circumstances \n\nand will be avoided whatever the cost. Tug owners share similar concerns, but in \n\naddition they need to remain in a position of readiness for crews and equipment to \n\nresume their important functions immediately following a cyclonic event. The number \n\nof specific purpose spread moorings, detailed on the adjacent plan will total 10 in the \n\nfirst phase of construction, a limit which will be assisted by an ability to remove vessels \n\nup to 100 tonnes from the water by wharf crane for tie down on cradles.", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Work on Dampier B A S E E X P A N S I O N W O R K S A N D E N V I R O N M E N T A L M A N A G E M E N T \n\nBase expansion commenced on 9 October and will be largely complete by June 2001, involving \n\na capital budget of $13m. \n\n**A. DREDGING**\n\nApproximately 700,000 m3 of material is to be dredged in King Bay to form an entrance \n\nchannel, vessel berths, cyclone moorings and to provide access to the slipway. \n\nThe experience of Woodside constructing their nearby base in 1981 indicates that two types of \n\ndredges will be required, a Cutter Suction to remove the soft unconsolidated material (approx.70%) \n\nand a Dipper Dredge (barge mounted back-hoe) to remove harder consolidated material. \n\nThe Dipper Dredge will be the largest of its type in the world, and will be an ideal remedial \n\ndredging tool using the experience gained from the earlier Woodside project. \n\nThe layout of the Base has been very much driven by the desire to avoid or minimize blasting \n\nwhile fulfilling functional objectives. \n\n**B. QUAY WALL ( BERTH 1)**\n\nMarket research and customer needs have caused Mermaid to relocate and redesign the main \n\nberth to accommodate a wider range of vessels than originally contemplated. The berth is now \n\nlocated in deeper water with better vessel access. \n\nThe depth alongside Berth 1 will be 7.5m. King Bay has a statistical average extreme low tide \n\n(MLWS) of 0.9 m, the occurrence of which can be expressed in hours per month. The largest", - "page_start": 13, - "page_end": 13, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "During the year ended December 31, 2013**,**the Company capitalized salaries of $2.8 million (2012 ‑ $2.0 million), as part of its project \nimprovement, suite renovation and development programs.", - "page_start": 77, - "page_end": 77, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. \n\nAs more vessels seek protection, additional breakwaters can be constructed and sea room \n\ndredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four \n\nvessel specific mooring lines secured to special attachment points on the vessel. \n\n**F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or \n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is \n\nsuitable for development in its present state. \n\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services \n\nsuch as traffic flows, land allocation and security, as well as fulfilling the many and complex \n\nregulatory requirements related to health, safety, quarantine, environmental management, dust, \n\ndangerous goods and hazchem materials have been the subject of considerable study prior to this \n\nimplementation stage.", - "page_start": 16, - "page_end": 16, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, S E A G O I N G O P E R A T I O N S \n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing \n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. \n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the \n\nwork increased productivity through enhanced bollard pull and consequent earnings. \n\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. \n\nThe Dampier Base will now comprise:- \n\n**•**\n**•**\n\nAn “all tides” approach channel to a minimum depth of 6 metres \n\nA wharf offering 7.5 metres depth at low tide, featuring a heavy loadout section to \n\naccommodate modules of up to 1500 tonnes to onshore projects on the Burrup Peninsular \n\nand adjacent mining centres. A subsea pipe reel loading facility will encourage the use of \n\nspool ships in the region for deepwater pipelay. On a project by project basis, pipeline \n\nprotection rock dumping, specialist vessel rig up activities and the like will be facilitated, \n\nas will dry and bulk cargo handling, refuelling, watering and all categories of waste \n\nreception. The joint Commonwealth and WA State Government initiative to establish \n\nan integrated industrial estate at Jervoise Bay (south of Perth) serviced by high wide load \n\ncorridors from Perth’s industrial areas will see the heavy capacity wharf playing a strategic \n\nrole in major capital works in the Pilbara, leading to significant cost savings.", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "in progress — other___6.4__13.7———__ ( 12.7 )____7.4Total$ 3.304.3$ 283.8$( 52.2 )$ 37.6$ 15.3$ ____$ 3.588.8Balance as of December 31.2003Accumula Additions Charged to ExpenseDepreciationAmortization Acquisitions, Net of DivestituresTransfers and AdjustmentsBalance as of December 31.2004dfill development costs$( 644.6 )$ ( 98.4 )$ 1.9$( 1.0 )$ (. 8 )$ ( 742.9 )Access and equipment.........( 666.4 )( 143.5 )43.5—1( 766.3 )Mings and improvements− 10 ( 62.3 )( 10.5 )2—. 8( 70.8 )Total......$( 1.373.3 )$( 252.4 )$ 46.6$( 1.0 )$ _. 1$( 1.580.0 )", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "2013 \nacquisition & \nDevelopment \nFacts \n$121M \n\nAcquisitions \nCompleted \n\n5.8% \n\nAverage Acquisition \nCapitalization Rate \n\n743 \n\nApartment Units \nAcquired", - "page_start": 14, - "page_end": 14, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "507 )( 73 )7Total assets :2003$ 141.658$33$ 10.340$ 6.721$2002112.76559.55410.9616.2551872001114.28056.09011.4805.373", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "[html]003 and 2002 :Balance as of December 31.2001New Expansions UndertakenLandfills Acquired, Net of DivestituresPermits Granted, Net of ClosuresAirspace ConsumedChanges in Engineering EstimatesChanges in DesignBalance as of December 31.2002Permitted airspace :Cubic yards ( in millions )1.329.0—4.945.1( 34.6 )13.1. 41.357.9Number of sites.......541156Expansion airspace :Cubic yards ( in millions )359.64.3—( 35.7 )—( 2.1 )27.2353.3Number of sites.......202—( 2 )_____20Total available airspace :Cubic yards ( in millions )1.688.64.34.99.4< underline >( 34.6 )11.027.61.711.2Number of sites___54Table__1156Balance as of December 31.2002New Expansions UndertakenLandfills Acquired, Net of DirestituresPermits Granted, Net of ClosuresAirspace ConsumedChanges in Engineering EstimatesChanges In DesignBalance as of December 31.2003Permitted airspace :Cubic yards ( in millions )1.357.9—26.3154.6( 39.3 )(. 9 )—1.498.6Number of sites562—58Expansion airspace :Cubic yards ( in millions )353.361.6—( 154.1 )—( 3.5 )11.4268.7Number of sites20——( 5 )_________________________________________________________________________________________________________________________________________________________________________________________________________15Total available airspace :Cubic yards ( in millions )1.711.261.626.3_5( 39.3 )( 4.4 )11.41.767.3Number of sites56 mm2 months—58 mmBalance as of December 31.2003Landfills Acquired, Net of DirestituresPermits Granted, Net of ClosuresAirspace ConsumedChanges in Engineering EstimatesChanges In DesignBalance as of December 31.2004Permitted airspace :Cubic yards ( in millions )1.498.624.448.6( 42.1 ). 1—1.529.6Number of sites581( 1 )58Expansion airspace :Cubic yards ( in millions )268.7—( 48.6 )—. 12.0222.2Number of sites15—( 3 )_____12Total available airspace :Cubic yards ( in millions )1.767.324.4—( 42.1 )− 22.01.751.8Number of sites581( 1", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Current: \n\nIn December 2003, the Company received written approval from the Internal Revenue Service to exclude \nprobable expansion airspace from its calculation of landÑll amortization, depletion, and Ñnal capping, closure \nand post-closure costs for tax purposes. As a result of this change, the Company's deferred income tax \nprovision increased by approximately $82.0 million during 2003, and the Company recorded a tax receivable of \n\n76", - "page_start": 83, - "page_end": 83, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_MRM_2000.pdf", - "query": "When did Mermaid Marine Service Base in the Port of Broome start?", - "target_page": 22, - "target_passage": "1 February 2000", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Mermaid Marine services base at the Port of Broome (Broome Base) B R O O M E S U P P LY B A S E \n\ncommenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex \n\nBrowse Ltd arrived from Japan. \n\n\n\nIt is presently expected that at least six \n\n(6) exploration wells will be drilled in the \n\narea during 2001. The Base now employs \n\nas many as ten (10) staff up from the \n\nthree (3) who commenced in February \n\n2000. Excellent management and staff \n\ncompetence are the prime factors, which \n\nhave delivered the smooth start up and \n\n***The Mermaid Broome Supply Base certified Impex, Woodside***\n***and BHP Petroleum exploration program during 2000.*** continued success at Broome. \n\nThe base is currently secured on a come and go lease arrangement, located on Port premises \n\nadjacent to the wharf gates. Although convenient, with an excellent cyclone proof building, the \n\nsite has limitations in terms of size and slope. An area more suitable for our long term needs has \n\nbeen optioned from Port authorities and discussions will proceed with our clients this year to \n\ndetermine their precise needs. \n\nThe success of Browse Basin wells drilled this year, strong developments in the energy sector and \n\nthe intention of operators to base their 2001 operations in Broome, have encouraged the Board \n\nto consider further investment to ensure that capability keeps pace with demand and that we \n\nleave no reason for competitors to offer more or better. \n\nThe offshore waters of the Northern Territory, the Zone of Co-Operation (ZOCA) between Australia \n\nand Timor, and the Commonwealth Territory of Ashmore and Cartier host approximately 35% of the \n\nexploration and development budgets of Australian offshore oil and gas industry. D A R W I N B A S E \n\nTwo large petrochemical projects are under study for the Darwin area based upon pipelines from \n\nthe Timor Sea gas resources of the projects above. \n\nDarwin will within 3 years be the northern terminus of the Australian national rail system with the \n\ncompletion of the Alice Springs Darwin rail link, further expanding its role in Australia’s economy.", - "page_start": 21, - "page_end": 21, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, S E A G O I N G O P E R A T I O N S \n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing \n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. \n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the \n\nwork increased productivity through enhanced bollard pull and consequent earnings. \n\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. \n\nThe Dampier Base will now comprise:- \n\n**•**\n**•**\n\nAn “all tides” approach channel to a minimum depth of 6 metres \n\nA wharf offering 7.5 metres depth at low tide, featuring a heavy loadout section to \n\naccommodate modules of up to 1500 tonnes to onshore projects on the Burrup Peninsular \n\nand adjacent mining centres. A subsea pipe reel loading facility will encourage the use of \n\nspool ships in the region for deepwater pipelay. On a project by project basis, pipeline \n\nprotection rock dumping, specialist vessel rig up activities and the like will be facilitated, \n\nas will dry and bulk cargo handling, refuelling, watering and all categories of waste \n\nreception. The joint Commonwealth and WA State Government initiative to establish \n\nan integrated industrial estate at Jervoise Bay (south of Perth) serviced by high wide load \n\ncorridors from Perth’s industrial areas will see the heavy capacity wharf playing a strategic \n\nrole in major capital works in the Pilbara, leading to significant cost savings.", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "During 2000 Mermaid Marine formed a M E R M A I D L A B O U R A N D M A N A G E M E N T L I M I T E D \n\nnew business unit Mermaid Labour and Management Limited. The focus of this unit will be \n\nlabour supply and industrial relations management to the marine, offshore construction industry \n\nand onshore resources projects in the NW of Australia. The Directors and Management of the \n\nnew entity are very experienced, well known and regarded by the industry in general. The \n\ncompany has high expectations for Mermaid Labour and Management Limited. \n\nIn April 2000, following the regular six monthly Quality Assurance audit, the Company’s \n\naccreditation under AS/NZS/ISO 9002 was reconfirmed. Mermaid’s quality assurance and \n\ncompliance team continues with a continuous day to day effort to improve our health, safety and \n\nenvironmental performance. Stringent charterer requirements, which are a pre requisite of \n\nincreased vessel usage, must be met to the letter and are the subject of regular and demanding \n\naudits. Although time consuming and expensive, we are grateful to certain of the large \n\nproducers, who while demanding the highest levels of compliance, have also been prepared to \n\ngive their time, sharing their safety expertise with us and in that way assisting in the very major \n\nadvances our company has made in this all important area. \n\n\n\n\n\nMermaid remains dedicated to ensuring a safe environment in all areas where we operate or have S A F E T Y \n\nresponsibility.", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Captain Jim Carver, Mermaid’s founder continues to play a significant role in Mermaid’s operations, \n\npaying particular attention to our business at sea. Under 20 years of Jim’s leadership, Mermaid \n\ndeveloped an enviable reputation as a “can do” company, and in our drive for new engineering \n\nexpertise and professionalism, we have no intention of allowing that attitude to be lost. \n\nLast year we identified Broome as our next strategic position. No oil and gas work had been \n\nsupported out of Broome for seventeen years and with the valuable cooperation and assistance \n\nof the Broome Port Authority, we secured Inpex, the large Japanese resource company as our first \n\nclient. The base was then established early this year. \n\nA new focus has developed in the Browse Basin and it is pleasing to report that after only seven \n\nmonths operation, our Base is profitable, housing Inpex, BHP, Woodside and Sedco in support \n\nof their current drilling programs. All the holes drilled from the Broome Base have been \n\ndesignated as commercial finds by the explorers and the very major increase in the reserves at \n\nBrecknock, Woodside’s permit 500 kilometres north of Broome creates optimism for future \n\nproduction based in the Broome area. \n\nDarwin was next on our list, enabling involvement in Timor Sea oil and gas activity. The Bayu \n\nUndan project operated by Phillips, is well advanced and will impact Darwin’s offshore activity \n\nquite soon. Pursuing the formula for a strategic sea/land interface, we reached agreement with \n\nPerkins Shipping in Darwin, to set up an office at their Frances Drive facility. Perkins Shipping \n\nis synonymous with Darwin’s history. Set up by V.B. Perkins in the late 40’s, it has grown to \n\nsignificant size, operating its ships across the top of Australia and into South East Asia. There \n\nare many synergies which Mermaid shares with Perkins and we look forward to developing our \n\nDarwin business in close association with that fine old Company. \n\nOur ambitions for the support of the oil and gas industry now go beyond bases and vessels. Early \n\nin the current financial year, Mermaid acquired 50% of the OIS MOC Joint Venture Pty Ltd, to \n\nbe paid for by the issue of 800,000 Mermaid shares. OIS MOC owns the highly successful labour \n\nhire business operated by Kevin Ponga and Rick De Franck. Kevin Ponga is now General \n\nManager of Mermaid Labour & Management Pty Limited and Mr De Franck becomes a Director. \n\nWith their reputation and talent added to Mermaid’s experienced team, this labour hire \n\ncompany has become a significant force and can be expected to be in the final when major \n\nlabour hire contracts are let.", - "page_start": 8, - "page_end": 8, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. \n\nAs more vessels seek protection, additional breakwaters can be constructed and sea room \n\ndredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four \n\nvessel specific mooring lines secured to special attachment points on the vessel. \n\n**F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or \n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is \n\nsuitable for development in its present state. \n\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services \n\nsuch as traffic flows, land allocation and security, as well as fulfilling the many and complex \n\nregulatory requirements related to health, safety, quarantine, environmental management, dust, \n\ndangerous goods and hazchem materials have been the subject of considerable study prior to this \n\nimplementation stage.", - "page_start": 16, - "page_end": 16, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Darwin is serviced by three marine infrastructure elements. \n\na. A public port adjacent to the main business centre, which is destined to be redeveloped \n\nas a cruise ship and tourism precinct . \n\nb. A group of freehold water front properties on Frances Bay near to the main business \n\ncenter. \n\nc. A recently commissioned public port and industrial estate at East Arm some 25 km from \n\nthe main business district. \n\nRegardless of industry trends, Mermaid has a need for a Darwin Base to service and care for \n\nMermaid vessels working in the area. Too often vessels have been demobilised to Dampier at the \n\nconclusion of a contract then being required to return to Darwin within days or weeks for \n\nanother assignment. \n\nMermaid has decided that needs and opportunities in the north of Australia can be best served by \n\nentering a co-operative arrangement with an established Darwin Company. Agreement has therefore \n\nbeen reached with Perkins Shipping Group, who are one of the freehold land owners on Frances Bay. \n\nPerkins Shipping, established in the 1950s is the major coastal shipping service provider in \n\nAustralia’s north, linking Darwin to mining and aboriginal committees from the Kimberly to \n\nGulf of Carpenteria. Additionally Perkins operate services to East Timor, mining operations in \n\nIndonesia, as well as Singapore and East Malaysia. The Perkins and Mermaid businesses are \n\ndifferent, but complementary, offering benefits to both. The arrangement with Perkins will give \n\nMermaid well placed office facilities, open storage and waterfront access.", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Trading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine O V E R V I E W \n\nAustralia Ltd (“Company”) and its controlled entities, experienced a 43% turnover reduction \n\nfrom last year. The result was almost entirely due to a heavy fall in oil prices, which reached their \n\nlow of US$10 in February 1999, leading to the lowest level of offshore activity for many years. \n\nIn September 1999 Mermaid exercised its option to acquire the utility vessel “Mermaid \n\nAchiever” for $3,250,000. Previously the Achiever operated under a bare boat charter. \n\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister \n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier \n\nBase). Since that time a detailed environmental management system has been produced for final \n\napproval and as a guide to daily environmental management and compliance. Refinements to \n\nthe design have proceeded, together with the preparation of bid packages and negotiations with \n\nBanks for project finance. \n\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough \n\nEngineering will see an extremely robust balance sheet, with cash on hand approaching $10 million. \n\nAs construction commences at Dampier, a level of project finance will be arranged providing a \n\ncomfortable mix of debt and equity and allowing the retention of a significant cash balance. \n\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax F I N A N C I A L \n\nprofit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease \n\nof 43% over the previous period. Fixed cost reductions enabled the Company to ride out the \n\nmarket reversal with a minimal loss and positive operating cash before capex of $1.6m. This \n\nresult, achieved against a major drop in turnover, was possible through a vigorous attack on \n\noverheads, which included more beneficial ownership costs, insurance savings, management \n\nsalary savings, including voluntary sacrifice from certain senior executives in recognition of the \n\ntighter conditions. In all the changes contributed approximately $1.5million to the bottom line. \n\nBare boat charters, although useful for the busy times encountered in 1998 exposed the \n\nCompany to a high level of fixed costs. The vessels were valuable earners and the transfer of the \n\nMermaid Achiever, Mermaid Eagle and Mermaid Reunion to Company ownership has proved \n\nto be the right decision for all market conditions. Although there have been no contracts yet let \n\nfor work of any significance by producers on the North West Shelf, underlying day to day activity \n\nhas returned. Expressions of interest for major project work have been issued and as an indication \n\nof better trading conditions, an unaudited profit of $496,721 has been recorded for the two \n\nmonths to 31st August 2000. The trend has continued in September.", - "page_start": 10, - "page_end": 10, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "vessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which \n\nmeans there will be very few occasions when the largest vessels in the industry have to make a \n\ntide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will \n\nnot suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby \n\nDamper Public Wharf in terms of entry and departure draft restrictions. \n\nThe function and purpose of Berth 1 will be: \n\n• To service the larger offshore supply boat market on a fast turnaround basis. \n\n• To receive and offload very heavy ro/ro cargoes up to 1500 tonne delivered by ocean going \n\nheavy lift ships and barges. \n\n• To handle inbound and outbound cargoes related to major offshore pipe lay projects. \n\n• To receive and efficiently load reel ships used for deep water small diameter pipelay. \n\n**C. QUAY WALL (BERTH 2)**\n\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted \n\noperation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas \n\nindustry and mineral ports. This berth will offer excellent weather protection for small and \n\nmedium size vessels. \n\n**D. BREAKWATER.**\n\nThe rubble mount type breakwater will be an extension of the wharf, constructed using core and \n\narmor rock largely won from excavations on the Base. The excavations created will become \n\ndepositories for dredge spoil.", - "page_start": 14, - "page_end": 14, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "**E. CYCLONE MOORINGS.**\n\nThe extent of the cyclone problem in Australia’s north and north west was emphasised when \n\nCyclone Tracey struck Darwin in 1974. The most powerful cyclone to cross the Australian coast \n\nwas Cyclone Vance in 1999, which passed near Dampier, destroying large parts of the towns of \n\nOnslow and Exmouth further to the south. \n\nThe problem is acute, particularly in the area between Exmouth and Port Hedland, which suffers \n\ncyclones of an intensity and frequency as high as anywhere in the world. The Mermaid Base is \n\ntypically on cyclone alert three times per season. The season is November to April. \n\nTo date there have been three options available to vessel owners when a cyclone approaches:. \n\n• Run to sea \n\n• Take refuge with crew onboard, on a mooring in the most sheltered location available such \n\nas the Dampier Archipelago or the Monte Bello Islands. \n\n• Construct a cyclone shelter. \n\nMermaid has undertaken significant engineering work on the placing of vessels on partially \n\nsheltered spread moorings, allowing the vessels to be secured near to shore and the crews \n\ndemobilized to take care of their families and attend to household cyclone preparation.", - "page_start": 15, - "page_end": 15, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "**G. SLIPWAY.**\n\nAustralia, and particularly the north west is impoverished in terms of infrastructure to service \n\nour marine industries. Some of this has been due to a historical link with our recent industrial \n\npast. This is now behind us, and Australia has now become a centre of excellence with respect \n\nto both new building and ship repair, particularly for high tech and specialty vessels. \n\nThe slipway will be a repair only facility, no new building is contemplated. Its capacity is \n\nstructured to meet the regional steel mono-hulled fleet requirements of some 60 vessels between \n\n200 and 4000 tonne displacement. Fishing industry, marine tourist industry, large private \n\npleasure craft , naval, scientific and law enforcement vessels are a secondary target. \n\nThe slipway is designed to initially accept vessels up to 2,700 tonnes, a restriction which is set \n\nby our current inventory of cradles used to support vessel on the slip. The cradles will be \n\nprogressively upgraded to ultimately handle 4000 tonne. A later expansion will allow 500 tonne \n\nvessels to be side slipped, thereby increasing capacity. \n\nThe Mermaid slipway will rank second in terms of capacity on the western half of the continent. \n\nTenix, Fremantle 8,000 tonne, Mermaid Dampier 2,700 tonne rising to 4,000 tonne, Darwin Ship \n\nRepair 2,500 tonne. The nearest other facilities are Singapore, Adelaide, Port Moresby or Cairns. \n\nMermaid has purchased a very large cyclone rated industrial building \n\n\n\nframe which will be sited beside the slipway and tenanted by Mermaid \n\nengineering and companies which will provide ancillary services \n\nrelated to ship repair. \n\n***The Northwest Shelf is a***\n***world scale offshore oil and***\n***gas exploration province.***", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "Word QS.pdf", - "query": "How do I create a new document in Word?", - "target_page": 2, - "target_passage": "Just select File > New", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. \n\nFind recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. \n\n\n\n\n\nAccess files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now.", - "page_start": 1, - "page_end": 1, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. \n\n\n\nWord works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "To format text, select it, and then select a button in the Font or Paragraph area on the Home \ntab. \n\nTry it: Select text in the lines below and choose formatting options so that the text is an \nexample of the formatting it’s describing: \n\n\n\n\n\n\n\n\n\n\n\n\n\nPro tip: If you selected whole words for this exercise, did you notice that Word popped up a \nlittle toolbar, with the font formatting options? \n\nBetween that and keyboard shortcuts like Ctrl+B \nand Ctrl+I, you save time by not having to go up to \nthe Home tab all the time.", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Unlike old-school user guides, this doc is yours to tailor exactly for your needs. Reading it will \nteach you some basics about Word, but this document isn’t just for reading. It’s for editing too, \nso you can learn by doing. \n\nFor practice using Word features, watch for Try it text in red throughout this document. \n\nTime saver: If you’ve only got a minute \nand you want to see how this works, \nwatch this Video: Welcome to Word. \n\n\n\nWrite eloquently, with a little help \n\nWord automatically checks spelling and grammar, and marks misspelled words with a red \nsquiggly underline. Grammatical glitches get a blue double underline. \n\nTry it: Put your cursor at the end of this paragraph, and hit Enter to start a new paragraph. Write \na sentence with some spelling or grammatical mistakes, and press Enter to finish the paragraph. \n\nRight-click the text that’s marked with underlines, or Press F7. Choose a suggestion to correct \nthe mistakes.", - "page_start": 0, - "page_end": 0, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "The Tell me search box takes you straight to commands and Help in Word. \n\nTry it: Get help: \n\n1. Go to Tell me what you want to do at the top of the window. \n\n2. Type what you want to do. \n\nFor example, type: \n\n Add watermark to quickly get to the watermark command. \n\n Help to go to Word help. \n\n Training to see the list of Word training courses. \n\n What’s new for a list of the most recent updates to Word", - "page_start": 7, - "page_end": 7, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Style sets and themes let you completely change the look of your document in an instant. They \nwork best when your document is formatted with styles (so it’s good that we fixed that Heading \nstyle, above). \n\nTry it: Explore style sets and themes: \n\n1. On the Design tab, select Themes, and choose a theme from the drop-down. \nNotice that the gallery of style sets updates to reflect the theme you picked. \n\n2. Select any theme you like from the drop-down and click to apply.", - "page_start": 5, - "page_end": 5, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise...*\n\n Click on**File Tab**\n\n then \nselect**Print**to display the \n***Print***dialog box \n\n*Your dialog box may appear a*\n*little different to the one*\n*shown, as the available*\n*options will depend on the*\n*make and model of printer that*\n*you are using...*\n\n Click on**Print**to print the \npages \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\n**For Your Reference…**\nTo***close a workbook***: \nTo***print a document***: \n\n1. Click on the***File Tab***\n1. Click on the***File Tab***\n2. Click on**Print**\n\n and select**Close**", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Availability**\n\nThe information in this article is applicable to the following versions of Word. \n\nWord for Windows Version 2408 and later. \n\nWord for Mac Version 16.89 and later. \n\nWord for iOS Version 2.89 and later. \n\nWord for Android Build 16.0.18025.XXXXX or later. \n\nWord for the web Build 16.0.18025.XXXXX or later. \n\nIt is available to customers with Office 2024 or Office LTSC 2024 and to customers with a \n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For \n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will \n\nbe available on January 14, 2025.", - "page_start": 60, - "page_end": 60, - "source_file": "office-pdf.pdf" - } - ] - }, - { - "references": { - "source_file": "Word QS.pdf", - "query": "Where can I find other Microsoft quick start guides?", - "target_page": 4, - "target_passage": "To download our free Quick Start Guides for your other favorite apps, go to https://go.microsoft.com/fwlink/?linkid=2008317.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help \nyou get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team. \n\n**Set up**\n\n**Explore**\nOnce you sign in,**connect**with your team in \nchat, channels, calls, and meetings. \n\n**Download**the app for desktop and mobile to \naccess Teams with the best performance \nanywhere you go. \n\n**Hit the ground running now!**Build confidence by trying things on your own. Go to the meet now button \n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!", - "page_start": 0, - "page_end": 0, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "You can read high level explanations of the core services here, and an example of how they interact \n\nwithin the context of an example microservice, or you can choose to skip ahead to the hands on \n\nworkshop that uses three common services to build a working microservice.", - "page_start": 33, - "page_end": 33, - "source_file": "serverless-core.pdf" - }, - { - "text": "The Tell me search box takes you straight to commands and Help in Word. \n\nTry it: Get help: \n\n1. Go to Tell me what you want to do at the top of the window. \n\n2. Type what you want to do. \n\nFor example, type: \n\n Add watermark to quickly get to the watermark command. \n\n Help to go to Word help. \n\n Training to see the list of Word training courses. \n\n What’s new for a list of the most recent updates to Word", - "page_start": 7, - "page_end": 7, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. \n\nFind recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. \n\n\n\n\n\nAccess files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "**Online resources**\n\nThese websites are also relevant as further information sources: \n\n(cid:2) DB2 11 for z/OS information \n\nhttp://www.ibm.com/software/db2zos/library.html \n\n(cid:2) IBM Content Manager OnDemand production information \n\nhttp://www.ibm.com/software/products/us/en/ondemand \n\n(cid:2) Content Manager OnDemand for i Knowledge Center \n\nhttp://www.ibm.com/support/knowledgecenter/SSB2EG/welcome \n\n(cid:2) Content Manager OnDemand for Multiplatform Knowledge Center \n\nhttp://www.ibm.com/support/knowledgecenter/SSEPCD/welcome", - "page_start": 433, - "page_end": 433, - "source_file": "sg246915.pdf" - }, - { - "text": "**Navigate with ease**\nUse the sidebar to manage long or \ncomplex documents.", - "page_start": 0, - "page_end": 0, - "source_file": "Word QS.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**Next Steps**\n\n**Share knowledge**\n\nYou will**get the most out of Teams**when you get to truly connect with your team and \ncollaborate together. Keep practicing until each step of your workflow feels natural. \n\nTeamwork is all about collaboration!**Share with your team**\n**best practices**you learn along the way, tips and tricks for \nhow you can best organize your workflows and ask for their \nown advice to define how you can best use Teams together. \n\n**Test meetings**\n\n**Keep learning**\n1. \n\nUse the Meet now button in the \nCalendar tab \n\nNo matter how you like to learn and practice, we've got \nresources to support and inspire you: \n\nThen select “Start meeting” 2. \n\n3. And then \"Join now” \n\n• \n\nVirtual classes: We have instructors to answer your \nquestions and walk you through all the details. \n\nHere you can try to share your screen, \nstart a whiteboard or even record \nyourself while you are practicing a \npresentation. This is your safe space \nto test everything out! \n\n• \n\nSupport articles and step-by-step guides: To get answers to \nyour most common questions.", - "page_start": 5, - "page_end": 5, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**\n\n\n\n**1**\n\n**8**", - "page_start": 1, - "page_end": 1, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - } - ] - }, - { - "references": { - "source_file": "Word QS.pdf", - "query": "How to connect to my Microsoft account from Word?", - "target_page": 2, - "target_passage": " Click File > Account to sign in with your Microsoft account", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now.", - "page_start": 1, - "page_end": 1, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "**Availability**\n\nThe information in this article is applicable to the following versions of Word. \n\nWord for Windows Version 2408 and later. \n\nWord for Mac Version 16.89 and later. \n\nWord for iOS Version 2.89 and later. \n\nWord for Android Build 16.0.18025.XXXXX or later. \n\nWord for the web Build 16.0.18025.XXXXX or later. \n\nIt is available to customers with Office 2024 or Office LTSC 2024 and to customers with a \n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For \n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will \n\nbe available on January 14, 2025.", - "page_start": 60, - "page_end": 60, - "source_file": "office-pdf.pdf" - }, - { - "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. \n\nFind recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. \n\n\n\n\n\nAccess files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. \n\n\n\nWord works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "**Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help \nyou get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team. \n\n**Set up**\n\n**Explore**\nOnce you sign in,**connect**with your team in \nchat, channels, calls, and meetings. \n\n**Download**the app for desktop and mobile to \naccess Teams with the best performance \nanywhere you go. \n\n**Hit the ground running now!**Build confidence by trying things on your own. Go to the meet now button \n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!", - "page_start": 0, - "page_end": 0, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "The Tell me search box takes you straight to commands and Help in Word. \n\nTry it: Get help: \n\n1. Go to Tell me what you want to do at the top of the window. \n\n2. Type what you want to do. \n\nFor example, type: \n\n Add watermark to quickly get to the watermark command. \n\n Help to go to Word help. \n\n Training to see the list of Word training courses. \n\n What’s new for a list of the most recent updates to Word", - "page_start": 7, - "page_end": 7, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "To format text, select it, and then select a button in the Font or Paragraph area on the Home \ntab. \n\nTry it: Select text in the lines below and choose formatting options so that the text is an \nexample of the formatting it’s describing: \n\n\n\n\n\n\n\n\n\n\n\n\n\nPro tip: If you selected whole words for this exercise, did you notice that Word popped up a \nlittle toolbar, with the font formatting options? \n\nBetween that and keyboard shortcuts like Ctrl+B \nand Ctrl+I, you save time by not having to go up to \nthe Home tab all the time.", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "You are prompted to insert the file to be imported, as shown in Figure 7-8. Browse for the file, \nselect it, and click**Import**. This scenario uses file type CSV because this format is the \ndownloaded format.", - "page_start": 194, - "page_end": 194, - "source_file": "sg248459.pdf" - }, - { - "text": "Get writing suggestions \n\nWith**Editor**, bring out your best writing. Editor helps you bring out your best \nwriting by giving you intelligent writing suggestions. It also calculates an Editor \nScore based on the number and types of suggestions you have yet to address. \nSelect an underlined word or phrase to accept or ignore a suggestion. \n\nView who else is typing \n\nCo-authoring Word documents that are shared on OneDrive or on a \nSharePoint site happens in real-time, which means you can easily view where \nother authors are making changes in the same document that you’re currently \nworking in. \n\n\n\nReview and track changes \n\nWhether you just want to check spelling, keep your word count in check, or fully \ncollaborate with other people, the**Review**tab has essential commands to track, \ndiscuss, and manage all of the changes made to your documents. \n\nFormat with styles \n\n**Styles**lets you create, apply, and review the formatting styles in your current \ndocument. To open it, select the**Home**tab, and then select the small arrow in the \nlower right corner of the Styles gallery.", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HRL_2004.pdf", - "query": "What are the products of Hormel Foods Corporation?", - "target_page": 4, - "target_passage": "meat and other food product", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "No new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. \n\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada, \nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and \noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a \nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea. \n\n**Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize \nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog \nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the \nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not \neliminated the sensitivity of Company results to raw material supply and price fluctuations.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S \nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF \nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD \nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, \nSWEET THING, THICK & EASY and WRANGLERS. \n\n**Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up \napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS, \n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material \nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders \nare accepted and shipped on a current basis. \n\n**Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with \nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. \nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and \nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc. \n\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong \nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then \nsupport higher value perceptions from customers. \n\nThe Company competes using this same strategy in international markets around the world. \n\n**Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The \nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42 \nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products. \n\n**Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "markets its turkey products through its own sales force and independent brokers. \n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 \nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest \ncompanies providing nutritional products to the U.S. healthcare industry. \n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages \nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers. \n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a \npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the \nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the \nPhilippines (Purefoods-Hormel, 40% holding). \n\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the \nCompany have been acquired in the ordinary course of business. \n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the \nbeginning of the fiscal year. \n\n**(b)*Industry Segment***\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other. \nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by \nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual \nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference. \n\n**(c)*Description of Business***\n\n**Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and \ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows: \n\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution \nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general- \npurpose financial statements. \n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon \nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen \nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and \nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin \nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), \nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001). \n\nNo new product in fiscal 2003 required a material investment of Company assets.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Item 2.PROPERTIES
Item 3.LEGAL PROCEEDINGS
Item. 4.SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS
PART. II
Item 5.MARKET FOR THE : REGISTRANTS COMMON STOCK AND RELATED STOCKHOLDER MATTERS
Item 6.SELECTED FINANCIAL DATA
Item Z.MAV45EMENTS DISCUSSION AND ANALYSIS OF FMANCAL CONDITION AND PESULTS OF OPERATIONS
Item 7AQUANTITATIVE AND QUALITATIVE DISCLOSURES ABOUT MARKET RISK
Item 8.FINANCIAL STATEMENTS AND SUPPLEMENTAL DATA
Item 9.CHWGES IN AND DISAGREEMENTS WITH ACCOUNTAVTS ON ACCOUNTING AND FINANCIAL DISCLOSURE
Item 9A.CONTROLS AND PROCEDURES
< underline > PART. III
Item 10.DIRECTORS AND EXECUTIVE OFFIOERS OF THE AGREEMENT
Item 11EXECUTIVE COMPENSATION
Item 12.SECURITY OWNERSHIP OF CERTAIN BENEFICIAL CWNEERS AND MANAGEMENT AND RELATED STCOXHOLDER MATTEPIS
Item_13ΔCERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS
Item 14.PRINCIPAL ACCOUNTING FEES AND SERVICES
PART. IV.
Item 15.EXHIBITS, FINANOAL STATEMENT SO - fEDULES AND REPORTS ON FORM 8 - K
\n\n**PART I**\n\n**Item 1.*BUSINESS***\n\n**Available Information**\n\nThe Company makes available, free of charge on its website at*www.hormel.com*, its annual report on Form 10-K, quarterly reports on Form 10-Q, \ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of \n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such \nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours. \n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free \nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website, \nfree of charge, under the caption \"Investor.\" \n\n**(a)*General Development of Business***\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. \nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel \nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of \nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has \nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business. \n\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned \nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing \nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**\n\n**FORM 10-K**\n\n**ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF**\n**THE SECURITIES EXCHANGE ACT OF 1934**\n\n**HORMEL FOODS CORPORATION**\n(Exact name of registrant as specified in its charter) \n\n**DELAWARE**\n(State or other jurisdiction of \nincorporation or organization) **41-0319970**\n(I.R.S. Employer \nIdentification No.) \n\n**55912-3680**\n(Zip Code) **1 HORMEL PLACE AUSTIN, MINNESOTA**\n(Address of principal executive offices) \n\nRegistrant's telephone number, including area code**(507) 437-5611**\n\nSecurities registered pursuant to Section 12 (b) of the Act: \n\n**COMMON STOCK, PAR VALUE $.0586 PER SHARE**\nTitle of Each Class \n**NEW YORK STOCK EXCHANGE**\nName of Each Exchange \nOn Which Registered \n\nSecurities registered pursuant to Section 12 (g) of the Act: \n\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 \nduring the preceding 12 months, and (2) has been subject to such filing requirements for the past 90 days. Yes ý No o \n\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the \nbest of registrant's knowledge in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendments to \nthis Form 10-K. o \n\nIndicate by check mark whether the registrant is an accelerated filer (as defined in Rule 12b-2 of the Act). Yes ý No o \n\nThe aggregate market value of the voting stock held by non-affiliates of the registrant as of April 26, 2003 (the last business day of the registrant's most \nrecently completed second fiscal quarter), was $1,592,020,962 based on the closing price of $21.74 per share on that date. \n\nAs of December 1, 2003, the number of shares outstanding of each of the Corporation's classes of common stock was as follows: \n\nCommon Stock, $.0586 Par Value—138,672,803 shares \n\nCommon Stock Non-Voting, $.01 Par Value—0 shares \n\n**DOCUMENTS INCORPORATED BY REFERENCE**\n\nPortions of the Annual Stockholders' Report for the year ended October 25, 2003, are incorporated by reference into Part I and Part II Items 5-8, and \nincluded as exhibit 13.1 filed herewith.", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "**LIST OF FINANCIAL STATEMENTS AND FINANCIAL STATEMENT SCHEDULES**\n\n**HORMEL FOODS CORPORATION**\n\n**FINANCIAL STATEMENTS**\n\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its \nstockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report: \n\n**Consolidated Statements of Financial Position**—October 25, 2003, and October 26, 2002. \n\n**Consolidated Statements of Operations**—Years Ended October 25, 2003, October 26, 2002 and October 27, 2001. \n\n**Consolidated Statements of Changes in Shareholders' Investment**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Consolidated Statements of Cash Flows**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Notes to Financial Statements**—October 25, 2003. \n\n**Report of Independent Auditors**\n\n**FINANCIAL STATEMENT SCHEDULES**\n\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith: \n\n**Schedule II—Valuation and Qualifying Accounts and Reserves...F-3**\n\nAll other schedules for which provision is made in the applicable accounting regulation of the Securities and Exchange Commission are not required \nunder the related instructions or are inapplicable, and therefore have been omitted. \n\n**FINANCIAL STATEMENTS AND SCHEDULES OMITTED**\n\nCondensed parent company financial statements of the registrant are omitted pursuant to Rule 5-04(c) of Article 5 of Regulation S-X. \n\n**Note (1)**—Uncollectible accounts written off. \n\n**Note (2)**—Recoveries on accounts previously written off. \n\n**Note (3)**—Increase in the reserve due to the inclusion of The Turkey Store Company accounts receivable. \n\n**Note (4)**—Increase in the reserve due to the inclusion of Diamond Crystal Brands accounts receivable. \n\n**LIST OF EXHIBITS**\n\n**HORMEL FOODS CORPORATION**\n\n2.1(1) \n\nAgreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition \nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K \ndated March 9, 2001, File No. 001-02402.) \n\n3.1(1) \nCertificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- \nK/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
3.2 ( 1 )Bylaws as amended to dates ( Incorporated by relevence to Enhibit 3.2 to Hormels Amerisment No. 3 to Pegistration Statement on Form 5 – 4 datest November 39.2001 ; Fle No. 301 - 88496 )
4.1 ( 1 )Inderture dated as of June 1.2011, between Hormel and U. S. Barrier Trust National Association, as Trustine relating to ortain outstanding ded securities, Incorporated by reference to Ecrible 4.1 to Hormel ’ s Registration Statement on
4.2 ( 1 )Supplemental Inderture No. 1 dated as of Juve 4.2011, to Inderture dated as of June 1.2010, between Hormel and U. S. Bark Trust National Association, as Trustee, relating to ontain outstanding det securities, Incorporated by referencel
4.3 ( 1 )Lefter of Representations detect June S, 2001, among Hormei, 6.5. Bork Trust National Association, as Trustee, and The Depository Trust Company relating to certain sustainsding dedet securities of Hormel, ( incorporated by reference
4.4 ( 1 )Pursuant to Item 601 ( 6 )/ 6 )/ 6 ) of Regulation S - A, opplex of instruments defining the rights of holders of certain long - term detail are not filed. Hormel sgrees to furnish copies therest to the Securities and Exchange Commission upon req
10.1 ( 1 )U. 5550.000.000 Crystilli Agreement, dated as of Crototixer 20.2003, between Hormer, the terries identified on the signature pages therest, and Clicocy LSA. Inc., as Administrative Agent, ( Incorporated by Reference to Eshbit 10.1 to
10.2 ( 1 )( 3 )Home Foods Corporation Dpensitors ’ Shares Incentive Compensation Plan. ( Incorporated by Reference to Appendis A to Home ’ s definitive Proxy Statement Ned on Decombw 30.1987, File No. 301 - 02432.)
10.3 ( 1 )( 3 )Home Foods Corporation Supplemental Executive Retirement Plan ( 2002 Restatement.) ( Incorporated by Reference to Exhibit 10.3 to Hormel ’ s Annusi Report on Form 10 - 4 for the fiscal year ended October 26.2002, fle No. 001 - 02402 )
10.4 ( 1 )( 3 )Homel Foods Corporation 2000 Stock Inoentive Plan, ( Incorporated by Pellevence to Evhblt A to Homel ’ s definitive Provy Statement filed on December 30.1998, Fie No. 01 - 02432.)
", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Outperform \n\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "[html]TableTableJoel W. Johnson60Chairman of the Board, President and Chief Executive Officer12 / 08 / 95 to Present1991Michael J. McCoy56Executive Vise Prepident and Chief Financial Officer Senior Vice President and Chief Financial Officer Vice President and Controller10 / 29 / 01 to Present05 / 01 / 00 to 10 / 28 / 0104 / 27 / 98 to 04 / 30 / 081996—VTC69 PT69SFORFTI all ITO TT69SUITHUT / Z7 / 8910 UW / Z0 / 390Gary J. Ray57Executive Vice President Refrigerated Foods Executive Vice President Operations11 / 01 / 99 to Present07 / 27 / 92 to 10 / 31 / 991988Eric A. Brown57Group Vice President Prepared Foods12 / 02 / 96 to Present1987Steven G. Binder46Group Vice President Foodservice Vice President Foodservice Director Foodservice Sales10 / 30 / 00 to Present 11 / 02 / 98 to 10 / 29 / 0012 / 30 / 96 to 11 / 01 / 981998Richard A. Bross52Group Vice President Hormei / President Hormel Foods International Corporation Vice President Hormei / President Hormel Proteinformel Poods International Corporation Vice President Grocery Products10 / 29 / 01 to Present11 / 01 / 99 to 10 / 28 / 0101 / 30 / 95 to 10 / 31 / 991995Jeffrey M. Ettinger45Group Vice President Hormel / President and Chief Executive Officer Jernie - O Turkey Slore Vice President Hormel / President and Chief Ciperating Officer Jennie - O Turkey Slore03 / 03 / 03 to Present1998StoreVice President Hormeil President and Chief Operating Officer Jennie - O Turkay StoreVice President Hormel / President and Chief Executive Officer Jenne - O Foods04 / 30 / 01 to 10 / 20 / 0101 / 31 / 00 to 04 / 29 / 01Elebusive Crisuer utilier - C Futus Vioe President Hormeli Uennie - O Foods Treasurer Assistant Treasurer11 / 01 / 99 to 01 / 30 / 0004 / 27 / 98 to 10 / 31 / 9911 / 24 / 97 to 04 / 26 / 98Ronald W. Fielding50Group Vice President Sales StrategyGroup Vice President Meat ProductsVice President Horme / ProductsVice President Hormel / President Hormel Foods International Corporation06 / 02 / 03 to Present 11 / 01 / 99 to 06 / 01 / 0301 / 27 / 97 to 10 / 31 / 991997James A. Jorgenson59Senior Vice President Corporate Staff Vice President Human Resources11 / 01 / 99 to Present 12 / 30 / 91 to 10 / 31 / 991990Mahlon C. Schneider64Senior Vice President External Affairs and General Counsel Vice President and General Counsel11 / 01 / 99 to Present1 / 19 / 90 to 10 / 31 / 99Thomas R. Day45Vice President Foodservice Sales Director Foodservice Sales Director Dubuque Foods Incorporated Foodservice Sales and Marketing10 / 30 / 00 to 10 / 29 / 002000Forrest D. Dryden60Vice President Research and Development01 / 26 / 87 to Present1987Jody H. Feragen47TreaterTreatmentAssurerTreatureTreature : National ComputerSystems in Eden Praine, Mini - resola, adata collection and software company10 / 29 / 01 to Present 10 / 30 / 00 to 10 / 29 / 0112 / 01 / 95 to 10 / 30 / 002000Dennis B. GoettschsoVice President Foodservice Marketing Director Foodservice", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HRL_2004.pdf", - "query": "Where are Hormel Foods Corporation plants located? ", - "target_page": 5, - "target_passage": "has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "No new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. \n\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada, \nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and \noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a \nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea. \n\n**Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize \nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog \nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the \nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not \neliminated the sensitivity of Company results to raw material supply and price fluctuations.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Item 2.PROPERTIES
Item 3.LEGAL PROCEEDINGS
Item. 4.SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS
PART. II
Item 5.MARKET FOR THE : REGISTRANTS COMMON STOCK AND RELATED STOCKHOLDER MATTERS
Item 6.SELECTED FINANCIAL DATA
Item Z.MAV45EMENTS DISCUSSION AND ANALYSIS OF FMANCAL CONDITION AND PESULTS OF OPERATIONS
Item 7AQUANTITATIVE AND QUALITATIVE DISCLOSURES ABOUT MARKET RISK
Item 8.FINANCIAL STATEMENTS AND SUPPLEMENTAL DATA
Item 9.CHWGES IN AND DISAGREEMENTS WITH ACCOUNTAVTS ON ACCOUNTING AND FINANCIAL DISCLOSURE
Item 9A.CONTROLS AND PROCEDURES
< underline > PART. III
Item 10.DIRECTORS AND EXECUTIVE OFFIOERS OF THE AGREEMENT
Item 11EXECUTIVE COMPENSATION
Item 12.SECURITY OWNERSHIP OF CERTAIN BENEFICIAL CWNEERS AND MANAGEMENT AND RELATED STCOXHOLDER MATTEPIS
Item_13ΔCERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS
Item 14.PRINCIPAL ACCOUNTING FEES AND SERVICES
PART. IV.
Item 15.EXHIBITS, FINANOAL STATEMENT SO - fEDULES AND REPORTS ON FORM 8 - K
\n\n**PART I**\n\n**Item 1.*BUSINESS***\n\n**Available Information**\n\nThe Company makes available, free of charge on its website at*www.hormel.com*, its annual report on Form 10-K, quarterly reports on Form 10-Q, \ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of \n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such \nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours. \n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free \nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website, \nfree of charge, under the caption \"Investor.\" \n\n**(a)*General Development of Business***\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. \nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel \nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of \nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has \nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business. \n\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned \nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing \nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**\n\n**FORM 10-K**\n\n**ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF**\n**THE SECURITIES EXCHANGE ACT OF 1934**\n\n**HORMEL FOODS CORPORATION**\n(Exact name of registrant as specified in its charter) \n\n**DELAWARE**\n(State or other jurisdiction of \nincorporation or organization) **41-0319970**\n(I.R.S. Employer \nIdentification No.) \n\n**55912-3680**\n(Zip Code) **1 HORMEL PLACE AUSTIN, MINNESOTA**\n(Address of principal executive offices) \n\nRegistrant's telephone number, including area code**(507) 437-5611**\n\nSecurities registered pursuant to Section 12 (b) of the Act: \n\n**COMMON STOCK, PAR VALUE $.0586 PER SHARE**\nTitle of Each Class \n**NEW YORK STOCK EXCHANGE**\nName of Each Exchange \nOn Which Registered \n\nSecurities registered pursuant to Section 12 (g) of the Act: \n\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 \nduring the preceding 12 months, and (2) has been subject to such filing requirements for the past 90 days. Yes ý No o \n\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the \nbest of registrant's knowledge in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendments to \nthis Form 10-K. o \n\nIndicate by check mark whether the registrant is an accelerated filer (as defined in Rule 12b-2 of the Act). Yes ý No o \n\nThe aggregate market value of the voting stock held by non-affiliates of the registrant as of April 26, 2003 (the last business day of the registrant's most \nrecently completed second fiscal quarter), was $1,592,020,962 based on the closing price of $21.74 per share on that date. \n\nAs of December 1, 2003, the number of shares outstanding of each of the Corporation's classes of common stock was as follows: \n\nCommon Stock, $.0586 Par Value—138,672,803 shares \n\nCommon Stock Non-Voting, $.01 Par Value—0 shares \n\n**DOCUMENTS INCORPORATED BY REFERENCE**\n\nPortions of the Annual Stockholders' Report for the year ended October 25, 2003, are incorporated by reference into Part I and Part II Items 5-8, and \nincluded as exhibit 13.1 filed herewith.", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "**ITEM 2. PROPERTIES**\n\nOur corporate headquarters is located in Ft. Lauderdale, Florida in leased premises. As of December 31, \n2004, we operated approximately 6,100 collection vehicles. Certain of our property and equipment are subject \nto operating leases or liens securing payment of portions of our indebtedness. We also lease certain of our \noÇces and equipment. We believe that our facilities are suÇcient for our current needs.", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "HORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S \nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF \nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD \nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, \nSWEET THING, THICK & EASY and WRANGLERS. \n\n**Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up \napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS, \n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material \nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders \nare accepted and shipped on a current basis. \n\n**Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with \nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. \nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and \nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc. \n\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong \nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then \nsupport higher value perceptions from customers. \n\nThe Company competes using this same strategy in international markets around the world. \n\n**Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The \nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42 \nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products. \n\n**Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "**LIST OF FINANCIAL STATEMENTS AND FINANCIAL STATEMENT SCHEDULES**\n\n**HORMEL FOODS CORPORATION**\n\n**FINANCIAL STATEMENTS**\n\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its \nstockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report: \n\n**Consolidated Statements of Financial Position**—October 25, 2003, and October 26, 2002. \n\n**Consolidated Statements of Operations**—Years Ended October 25, 2003, October 26, 2002 and October 27, 2001. \n\n**Consolidated Statements of Changes in Shareholders' Investment**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Consolidated Statements of Cash Flows**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Notes to Financial Statements**—October 25, 2003. \n\n**Report of Independent Auditors**\n\n**FINANCIAL STATEMENT SCHEDULES**\n\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith: \n\n**Schedule II—Valuation and Qualifying Accounts and Reserves...F-3**\n\nAll other schedules for which provision is made in the applicable accounting regulation of the Securities and Exchange Commission are not required \nunder the related instructions or are inapplicable, and therefore have been omitted. \n\n**FINANCIAL STATEMENTS AND SCHEDULES OMITTED**\n\nCondensed parent company financial statements of the registrant are omitted pursuant to Rule 5-04(c) of Article 5 of Regulation S-X. \n\n**Note (1)**—Uncollectible accounts written off. \n\n**Note (2)**—Recoveries on accounts previously written off. \n\n**Note (3)**—Increase in the reserve due to the inclusion of The Turkey Store Company accounts receivable. \n\n**Note (4)**—Increase in the reserve due to the inclusion of Diamond Crystal Brands accounts receivable. \n\n**LIST OF EXHIBITS**\n\n**HORMEL FOODS CORPORATION**\n\n2.1(1) \n\nAgreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition \nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K \ndated March 9, 2001, File No. 001-02402.) \n\n3.1(1) \nCertificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- \nK/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
3.2 ( 1 )Bylaws as amended to dates ( Incorporated by relevence to Enhibit 3.2 to Hormels Amerisment No. 3 to Pegistration Statement on Form 5 – 4 datest November 39.2001 ; Fle No. 301 - 88496 )
4.1 ( 1 )Inderture dated as of June 1.2011, between Hormel and U. S. Barrier Trust National Association, as Trustine relating to ortain outstanding ded securities, Incorporated by reference to Ecrible 4.1 to Hormel ’ s Registration Statement on
4.2 ( 1 )Supplemental Inderture No. 1 dated as of Juve 4.2011, to Inderture dated as of June 1.2010, between Hormel and U. S. Bark Trust National Association, as Trustee, relating to ontain outstanding det securities, Incorporated by referencel
4.3 ( 1 )Lefter of Representations detect June S, 2001, among Hormei, 6.5. Bork Trust National Association, as Trustee, and The Depository Trust Company relating to certain sustainsding dedet securities of Hormel, ( incorporated by reference
4.4 ( 1 )Pursuant to Item 601 ( 6 )/ 6 )/ 6 ) of Regulation S - A, opplex of instruments defining the rights of holders of certain long - term detail are not filed. Hormel sgrees to furnish copies therest to the Securities and Exchange Commission upon req
10.1 ( 1 )U. 5550.000.000 Crystilli Agreement, dated as of Crototixer 20.2003, between Hormer, the terries identified on the signature pages therest, and Clicocy LSA. Inc., as Administrative Agent, ( Incorporated by Reference to Eshbit 10.1 to
10.2 ( 1 )( 3 )Home Foods Corporation Dpensitors ’ Shares Incentive Compensation Plan. ( Incorporated by Reference to Appendis A to Home ’ s definitive Proxy Statement Ned on Decombw 30.1987, File No. 301 - 02432.)
10.3 ( 1 )( 3 )Home Foods Corporation Supplemental Executive Retirement Plan ( 2002 Restatement.) ( Incorporated by Reference to Exhibit 10.3 to Hormel ’ s Annusi Report on Form 10 - 4 for the fiscal year ended October 26.2002, fle No. 001 - 02402 )
10.4 ( 1 )( 3 )Homel Foods Corporation 2000 Stock Inoentive Plan, ( Incorporated by Pellevence to Evhblt A to Homel ’ s definitive Provy Statement filed on December 30.1998, Fie No. 01 - 02432.)
", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Livestock slaughtered by the Company is purchased by Company buyers and commission dealers at sale barns and terminal markets or under long-term \nsupply contracts at locations principally in Minnesota, Illinois, Iowa, Nebraska, Colorado and South Dakota. The cost of livestock and the utilization of the \nCompany's facilities are affected by both the level and the methods of pork production in the United States. The hog production industry has been rapidly \nmoving to very large, vertically integrated, year-round confinement operations operating under long-term supply agreements. This has resulted in fewer \nhogs being available on the spot cash market, which decreases the supply of hogs on the open market and can severely diminish the utilization of \nslaughter facilities and increase the cost of the raw materials they produce. The Company, along with others in the industry, uses long-term supply \ncontracts to manage the effects of this trend and to assure a stable supply of raw materials while minimizing extreme fluctuations in costs over the long- \nterm. This may result in costs for live hogs that are either higher or lower than the spot cash market depending on the relationship of the cash spot \nmarket to contract prices. Contract costs are fully reflected in the Company's reported financial results. In fiscal 2003, the Company purchased 79 percent \nof its hogs under long-term supply contracts. \n\nIn fiscal 2003, JOTS raised approximately 57 percent of the turkeys needed to meet its raw material requirements for whole bird and processed turkey \nproducts. Turkeys not sourced within the Company are contracted with independent turkey growers. JOTS' turkey-raising farms are located throughout \nMinnesota and Wisconsin. Production costs in raising turkeys are primarily subject to fluctuations in feed grain prices and to a lesser extent fuel costs. \n\n**Manufacturing**\n\nThe Company has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China that slaughter livestock for processing. Quality Pork Processors of \nDallas, Texas, operates the slaughter facility at Austin under a custom slaughter arrangement. \n\nFacilities that produce manufactured items are located in Algona, Iowa; Aurora, Illinois; Austin, Minnesota; Beloit, Wisconsin; Bondurant, Iowa; Ft. Dodge, \nIowa; Fremont, Nebraska; Houston, Texas; Knoxville, Iowa; Mitchellville, Iowa; Osceola, Iowa; Perrysburg, Ohio; Quakertown, Pennsylvania; Rochelle, \nIllinois; Savannah, Georgia; Sparta, Wisconsin; Stockton, California; Tucker, Georgia; Visalia, California; Wichita, Kansas; Beijing, China; and Shanghai, \nChina. Company products are also custom manufactured by several other companies. The following are the Company's larger custom manufacturers: \nLakeside Packing Company, Manitowoc, Wisconsin; Schroeder Milk, Maplewood, Minnesota; Steuben Foods, Jamaica, New York; Power Packaging, St. \nCharles, Illinois; Criders, Stilmore, Georgia; Tony Downs, St. James, Minnesota; and Concept Foods, Alma, Kansas. Power \n\nLogistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa. \n\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo, \nMinnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota. \n\n**Patents and Trademarks**\n\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued \npatents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary, \nHormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or \nlicensed trademarks used in the Company's segments are:", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "markets its turkey products through its own sales force and independent brokers. \n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 \nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest \ncompanies providing nutritional products to the U.S. healthcare industry. \n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages \nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers. \n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a \npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the \nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the \nPhilippines (Purefoods-Hormel, 40% holding). \n\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the \nCompany have been acquired in the ordinary course of business. \n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the \nbeginning of the fiscal year. \n\n**(b)*Industry Segment***\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other. \nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by \nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual \nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference. \n\n**(c)*Description of Business***\n\n**Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and \ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows: \n\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution \nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general- \npurpose financial statements. \n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon \nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen \nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and \nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin \nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), \nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001). \n\nNo new product in fiscal 2003 required a material investment of Company assets.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Killam properties inc \n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HRL_2004.pdf", - "query": "Does Hormel Food Corporation have any material legal proceedings pending?", - "target_page": 8, - "target_passage": "The Company knows of no pending material legal proceedings.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
Item 2.PROPERTIES
Item 3.LEGAL PROCEEDINGS
Item. 4.SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS
PART. II
Item 5.MARKET FOR THE : REGISTRANTS COMMON STOCK AND RELATED STOCKHOLDER MATTERS
Item 6.SELECTED FINANCIAL DATA
Item Z.MAV45EMENTS DISCUSSION AND ANALYSIS OF FMANCAL CONDITION AND PESULTS OF OPERATIONS
Item 7AQUANTITATIVE AND QUALITATIVE DISCLOSURES ABOUT MARKET RISK
Item 8.FINANCIAL STATEMENTS AND SUPPLEMENTAL DATA
Item 9.CHWGES IN AND DISAGREEMENTS WITH ACCOUNTAVTS ON ACCOUNTING AND FINANCIAL DISCLOSURE
Item 9A.CONTROLS AND PROCEDURES
< underline > PART. III
Item 10.DIRECTORS AND EXECUTIVE OFFIOERS OF THE AGREEMENT
Item 11EXECUTIVE COMPENSATION
Item 12.SECURITY OWNERSHIP OF CERTAIN BENEFICIAL CWNEERS AND MANAGEMENT AND RELATED STCOXHOLDER MATTEPIS
Item_13ΔCERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS
Item 14.PRINCIPAL ACCOUNTING FEES AND SERVICES
PART. IV.
Item 15.EXHIBITS, FINANOAL STATEMENT SO - fEDULES AND REPORTS ON FORM 8 - K
\n\n**PART I**\n\n**Item 1.*BUSINESS***\n\n**Available Information**\n\nThe Company makes available, free of charge on its website at*www.hormel.com*, its annual report on Form 10-K, quarterly reports on Form 10-Q, \ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of \n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such \nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours. \n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free \nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website, \nfree of charge, under the caption \"Investor.\" \n\n**(a)*General Development of Business***\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. \nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel \nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of \nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has \nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business. \n\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned \nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing \nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "No new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. \n\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada, \nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and \noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a \nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea. \n\n**Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize \nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog \nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the \nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not \neliminated the sensitivity of Company results to raw material supply and price fluctuations.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**\n\n**FORM 10-K**\n\n**ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF**\n**THE SECURITIES EXCHANGE ACT OF 1934**\n\n**HORMEL FOODS CORPORATION**\n(Exact name of registrant as specified in its charter) \n\n**DELAWARE**\n(State or other jurisdiction of \nincorporation or organization) **41-0319970**\n(I.R.S. Employer \nIdentification No.) \n\n**55912-3680**\n(Zip Code) **1 HORMEL PLACE AUSTIN, MINNESOTA**\n(Address of principal executive offices) \n\nRegistrant's telephone number, including area code**(507) 437-5611**\n\nSecurities registered pursuant to Section 12 (b) of the Act: \n\n**COMMON STOCK, PAR VALUE $.0586 PER SHARE**\nTitle of Each Class \n**NEW YORK STOCK EXCHANGE**\nName of Each Exchange \nOn Which Registered \n\nSecurities registered pursuant to Section 12 (g) of the Act: \n\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 \nduring the preceding 12 months, and (2) has been subject to such filing requirements for the past 90 days. Yes ý No o \n\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the \nbest of registrant's knowledge in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendments to \nthis Form 10-K. o \n\nIndicate by check mark whether the registrant is an accelerated filer (as defined in Rule 12b-2 of the Act). Yes ý No o \n\nThe aggregate market value of the voting stock held by non-affiliates of the registrant as of April 26, 2003 (the last business day of the registrant's most \nrecently completed second fiscal quarter), was $1,592,020,962 based on the closing price of $21.74 per share on that date. \n\nAs of December 1, 2003, the number of shares outstanding of each of the Corporation's classes of common stock was as follows: \n\nCommon Stock, $.0586 Par Value—138,672,803 shares \n\nCommon Stock Non-Voting, $.01 Par Value—0 shares \n\n**DOCUMENTS INCORPORATED BY REFERENCE**\n\nPortions of the Annual Stockholders' Report for the year ended October 25, 2003, are incorporated by reference into Part I and Part II Items 5-8, and \nincluded as exhibit 13.1 filed herewith.", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "**LIST OF FINANCIAL STATEMENTS AND FINANCIAL STATEMENT SCHEDULES**\n\n**HORMEL FOODS CORPORATION**\n\n**FINANCIAL STATEMENTS**\n\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its \nstockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report: \n\n**Consolidated Statements of Financial Position**—October 25, 2003, and October 26, 2002. \n\n**Consolidated Statements of Operations**—Years Ended October 25, 2003, October 26, 2002 and October 27, 2001. \n\n**Consolidated Statements of Changes in Shareholders' Investment**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Consolidated Statements of Cash Flows**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Notes to Financial Statements**—October 25, 2003. \n\n**Report of Independent Auditors**\n\n**FINANCIAL STATEMENT SCHEDULES**\n\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith: \n\n**Schedule II—Valuation and Qualifying Accounts and Reserves...F-3**\n\nAll other schedules for which provision is made in the applicable accounting regulation of the Securities and Exchange Commission are not required \nunder the related instructions or are inapplicable, and therefore have been omitted. \n\n**FINANCIAL STATEMENTS AND SCHEDULES OMITTED**\n\nCondensed parent company financial statements of the registrant are omitted pursuant to Rule 5-04(c) of Article 5 of Regulation S-X. \n\n**Note (1)**—Uncollectible accounts written off. \n\n**Note (2)**—Recoveries on accounts previously written off. \n\n**Note (3)**—Increase in the reserve due to the inclusion of The Turkey Store Company accounts receivable. \n\n**Note (4)**—Increase in the reserve due to the inclusion of Diamond Crystal Brands accounts receivable. \n\n**LIST OF EXHIBITS**\n\n**HORMEL FOODS CORPORATION**\n\n2.1(1) \n\nAgreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition \nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K \ndated March 9, 2001, File No. 001-02402.) \n\n3.1(1) \nCertificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- \nK/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
3.2 ( 1 )Bylaws as amended to dates ( Incorporated by relevence to Enhibit 3.2 to Hormels Amerisment No. 3 to Pegistration Statement on Form 5 – 4 datest November 39.2001 ; Fle No. 301 - 88496 )
4.1 ( 1 )Inderture dated as of June 1.2011, between Hormel and U. S. Barrier Trust National Association, as Trustine relating to ortain outstanding ded securities, Incorporated by reference to Ecrible 4.1 to Hormel ’ s Registration Statement on
4.2 ( 1 )Supplemental Inderture No. 1 dated as of Juve 4.2011, to Inderture dated as of June 1.2010, between Hormel and U. S. Bark Trust National Association, as Trustee, relating to ontain outstanding det securities, Incorporated by referencel
4.3 ( 1 )Lefter of Representations detect June S, 2001, among Hormei, 6.5. Bork Trust National Association, as Trustee, and The Depository Trust Company relating to certain sustainsding dedet securities of Hormel, ( incorporated by reference
4.4 ( 1 )Pursuant to Item 601 ( 6 )/ 6 )/ 6 ) of Regulation S - A, opplex of instruments defining the rights of holders of certain long - term detail are not filed. Hormel sgrees to furnish copies therest to the Securities and Exchange Commission upon req
10.1 ( 1 )U. 5550.000.000 Crystilli Agreement, dated as of Crototixer 20.2003, between Hormer, the terries identified on the signature pages therest, and Clicocy LSA. Inc., as Administrative Agent, ( Incorporated by Reference to Eshbit 10.1 to
10.2 ( 1 )( 3 )Home Foods Corporation Dpensitors ’ Shares Incentive Compensation Plan. ( Incorporated by Reference to Appendis A to Home ’ s definitive Proxy Statement Ned on Decombw 30.1987, File No. 301 - 02432.)
10.3 ( 1 )( 3 )Home Foods Corporation Supplemental Executive Retirement Plan ( 2002 Restatement.) ( Incorporated by Reference to Exhibit 10.3 to Hormel ’ s Annusi Report on Form 10 - 4 for the fiscal year ended October 26.2002, fle No. 001 - 02402 )
10.4 ( 1 )( 3 )Homel Foods Corporation 2000 Stock Inoentive Plan, ( Incorporated by Pellevence to Evhblt A to Homel ’ s definitive Provy Statement filed on December 30.1998, Fie No. 01 - 02432.)
", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "**HORMEL FOODS CORPORATION**\n\nBy: /s/ JOEL W. JOHNSON Date: January 23, 2004 \n\nJOEL W. JOHNSON \nChairman of the Board, \nPresident and Chief Executive Officer \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the \nRegistrant and in the capacities and on the dates indicated. Each person whose signature to this report on Form 10-K appears below hereby constitutes \nand appoints each of Michael J. McCoy, Jody H. Feragen and Mark P. Kalvoda as his or her true and lawful attorney-in-fact and agent, with full power of \nsubstitution, to sign on his or her behalf individually and in the capacity stated below and to perform any acts necessary to be done in order to file the \nAnnual Report on Form 10-K and all amendments to this report on Form 10-K, and any and all instruments or documents filed as part of or in connection \nwith this report on Form 10-K or the amendments hereto, and each of the undersigned does hereby ratify and confirm all that said attorney-in-fact and \nagent, or his substitutes, shall do or cause to be done by virtue hereof.", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "HORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S \nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF \nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD \nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, \nSWEET THING, THICK & EASY and WRANGLERS. \n\n**Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up \napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS, \n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material \nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders \nare accepted and shipped on a current basis. \n\n**Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with \nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. \nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and \nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc. \n\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong \nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then \nsupport higher value perceptions from customers. \n\nThe Company competes using this same strategy in international markets around the world. \n\n**Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The \nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42 \nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products. \n\n**Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "We have also audited, in accordance with the standards of the Public Company Accounting Oversight Board (United States), the \nconsolidated financial statements as of and for the year ended January 31, 2015 of the Company and our report dated March 16, 2015 \nexpressed an unqualified opinion on those financial statements.", - "page_start": 78, - "page_end": 78, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "markets its turkey products through its own sales force and independent brokers. \n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 \nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest \ncompanies providing nutritional products to the U.S. healthcare industry. \n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages \nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers. \n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a \npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the \nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the \nPhilippines (Purefoods-Hormel, 40% holding). \n\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the \nCompany have been acquired in the ordinary course of business. \n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the \nbeginning of the fiscal year. \n\n**(b)*Industry Segment***\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other. \nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by \nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual \nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference. \n\n**(c)*Description of Business***\n\n**Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and \ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows: \n\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution \nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general- \npurpose financial statements. \n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon \nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen \nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and \nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin \nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), \nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001). \n\nNo new product in fiscal 2003 required a material investment of Company assets.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "[html]TableTableJoel W. Johnson60Chairman of the Board, President and Chief Executive Officer12 / 08 / 95 to Present1991Michael J. McCoy56Executive Vise Prepident and Chief Financial Officer Senior Vice President and Chief Financial Officer Vice President and Controller10 / 29 / 01 to Present05 / 01 / 00 to 10 / 28 / 0104 / 27 / 98 to 04 / 30 / 081996—VTC69 PT69SFORFTI all ITO TT69SUITHUT / Z7 / 8910 UW / Z0 / 390Gary J. Ray57Executive Vice President Refrigerated Foods Executive Vice President Operations11 / 01 / 99 to Present07 / 27 / 92 to 10 / 31 / 991988Eric A. Brown57Group Vice President Prepared Foods12 / 02 / 96 to Present1987Steven G. Binder46Group Vice President Foodservice Vice President Foodservice Director Foodservice Sales10 / 30 / 00 to Present 11 / 02 / 98 to 10 / 29 / 0012 / 30 / 96 to 11 / 01 / 981998Richard A. Bross52Group Vice President Hormei / President Hormel Foods International Corporation Vice President Hormei / President Hormel Proteinformel Poods International Corporation Vice President Grocery Products10 / 29 / 01 to Present11 / 01 / 99 to 10 / 28 / 0101 / 30 / 95 to 10 / 31 / 991995Jeffrey M. Ettinger45Group Vice President Hormel / President and Chief Executive Officer Jernie - O Turkey Slore Vice President Hormel / President and Chief Ciperating Officer Jennie - O Turkey Slore03 / 03 / 03 to Present1998StoreVice President Hormeil President and Chief Operating Officer Jennie - O Turkay StoreVice President Hormel / President and Chief Executive Officer Jenne - O Foods04 / 30 / 01 to 10 / 20 / 0101 / 31 / 00 to 04 / 29 / 01Elebusive Crisuer utilier - C Futus Vioe President Hormeli Uennie - O Foods Treasurer Assistant Treasurer11 / 01 / 99 to 01 / 30 / 0004 / 27 / 98 to 10 / 31 / 9911 / 24 / 97 to 04 / 26 / 98Ronald W. Fielding50Group Vice President Sales StrategyGroup Vice President Meat ProductsVice President Horme / ProductsVice President Hormel / President Hormel Foods International Corporation06 / 02 / 03 to Present 11 / 01 / 99 to 06 / 01 / 0301 / 27 / 97 to 10 / 31 / 991997James A. Jorgenson59Senior Vice President Corporate Staff Vice President Human Resources11 / 01 / 99 to Present 12 / 30 / 91 to 10 / 31 / 991990Mahlon C. Schneider64Senior Vice President External Affairs and General Counsel Vice President and General Counsel11 / 01 / 99 to Present1 / 19 / 90 to 10 / 31 / 99Thomas R. Day45Vice President Foodservice Sales Director Foodservice Sales Director Dubuque Foods Incorporated Foodservice Sales and Marketing10 / 30 / 00 to 10 / 29 / 002000Forrest D. Dryden60Vice President Research and Development01 / 26 / 87 to Present1987Jody H. Feragen47TreaterTreatmentAssurerTreatureTreature : National ComputerSystems in Eden Praine, Mini - resola, adata collection and software company10 / 29 / 01 to Present 10 / 30 / 00 to 10 / 29 / 0112 / 01 / 95 to 10 / 30 / 002000Dennis B. GoettschsoVice President Foodservice Marketing Director Foodservice", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "Open_Data_Report.pdf", - "query": "What is Mexican Farm Subsidies ?", - "target_page": 9, - "target_passage": "an online tool to analyze how the federal government allocates those subsidies", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Middle East, Africa, Latin America and the Caribbean**\n\n**Growing with Profit, not at Its Expense**", - "page_start": 68, - "page_end": 68, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Right now, one of the most active Asian countries in the Open Data arena is India, which also \n\nsigned an Open Government partnership with the USA in November 2010. In January 2011 the \n\nIndian Congress Party announced plans for a new law to fight corruption among public servants and \n\npoliticians. Anti-corruption websites (including ones in local dialects) like \n\nIndiaagainstcorruption.org, already existed, including one, Ipaidabribe.com, that collected more \n\nthan 3,000 people reports of graft in its first four months. \n\nAs it happens in Asia, even Latin America is currently focused, at least outside Public \n\nAdministration circles, on how to open public data to achieve actual transparency. This appears \n\neven from the way many projects are labeled, that is \"Civic Information\" instead of Open Data \n\n(which is an idea starting from data*reuse*) or Open Government. \n\nThe reason is that even where good Freedom of Information laws exist in Latin America, they still \n\nhave too little practical effects. Mexico, for example, already has a digital system to manage \n\nFreedom of Information requests, but there are reports of complaints filed against municipal \n\nofficials that either have no effect at all, or aren't possible in the first place, because relevant \n\ninformation has not been updated in years, or omits key data like (in the case of budget reports) \n\n*\"descriptions of how the money was spent\"*. \n\nEven with these difficulties, the Latin America Open Data/Civic Information landscape is active \n\nand definitely worthwhile following. The list of interesting Civic Information projects in Latin \n\nAmerica include (from Sasaki's Access to Information: Is Mexico a Model for the Rest of the \n\nWorld?: \n\n• Mexico \n\n• Mexican Farm Subsidies - an online tool to analyze how the federal government \n\nallocates those subsidies \n\n• Compare Your School : compares aggregate test results from any school with the \n\nmunicipal, regional, and national averages \n\n• Rebellion of the Sick built for patients with chronic diseases whose expenses are not \n\ncovered by the government subsidized health coverage. \n\n• Argentina: Public Spending in Bahía analyzes how public funds are used. \n\n• Colombia: Visible Congress monitors the actions of the Colombian congress \n\n• Brazil \n\n• Eleitor 2010 : a website to submit reports of electoral fraud during the Brazil 2010 \n\n*9/34*\n\n*Copyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)*", - "page_start": 8, - "page_end": 8, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "progress towards the target will be under constant review, and adjustment if needed, to \nfarmers’ \nmitigate against undue \ncompetitiveness. \n\nimpact on biodiversity, food security and \n\nAgroecology can provide healthy food while maintaining productivity, increase soil \nfertility and biodiversity, and reduce the footprint of food production. Organic farming in \nparticular holds great potential for farmers and consumers alike. The sector creates jobs \nand attracts young farmers. Organic farming also provides 10-20 % more jobs per hectare \nthan conventional farms, and creates added value for agricultural products32. To make the \nmost of this potential, at least**25% of the EU’s agricultural land must be organically**\n**farmed by 2030**. In addition to CAP measures, the Commission will put forward an \nAction Plan on organic farming, helping Member States stimulate both supply and \ndemand of organic products. It will also ensure consumer’s trust through promotion \ncampaigns and green public procurement. In the implementation of the EU-wide agro- \necological targets set out in this strategy and in the Farm to Fork Strategy, the different \nstarting points and differences in progress already made in Member States will be taken \ninto account. \n\nThe uptake of agroforestry support measures under rural development should be \nincreased as it has great potential to provide multiple benefits for biodiversity, people and \nclimate. \n\nThe decline of**genetic diversity**must also be reversed, including by facilitating the use \nof traditional varieties of crops and breeds. This would also bring health benefits through \nmore varied and nutritious diets. The Commission is considering the revision of \nmarketing rules for traditional crop varieties in order to contribute to their conservation \nand sustainable use. The Commission will also take measures to facilitate the registration \nof seed varieties, including for organic farming, and to ensure easier market access for \ntraditional and locally adapted varieties. \n\n*2.2.3. Addressing land take and restoring soil ecosystems*\n\nSoil is one of the most complex of all ecosystems. It is a habitat in its own right, and \nhome to an incredible diversity of organisms that regulate and control key ecosystem \nservices such as soil fertility, nutrient cycling and climate regulation.**Soil is a hugely**\n**important non-renewable resource**, vital for human and economic health, as well as the \nproduction of food and new medications. \n\nIn the EU, the degradation of soil is having considerable environmental and economic \nconsequences. Poor land management, such as deforestation, overgrazing, unsustainable \nfarming and forestry practices, construction activities and land sealing are among the \nmain causes of this situation33. Despite recent reductions in the pace of soil sealing, \nfertile soils continue to be lost to land take and urban sprawl34. When compounded by \n\n32 OECD (2016), Farm Management Practices to Foster Green Growth. \n33 European Environment Agency (2019), EEA Signals 2019: Land and Soil in Europe. \n34 European Environment Agency and Swiss Federal Office for the Environment (FOEN) (2016), Urban \nsprawl in Europe. \n\n8", - "page_start": 8, - "page_end": 8, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "Net investment in landÑll land and development costsÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $ 836.1 $1,524.1 $2,360.2", - "page_start": 47, - "page_end": 47, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Investment in LandÑlls**", - "page_start": 47, - "page_end": 47, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**22. Investments in Controlled Entities**", - "page_start": 71, - "page_end": 71, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**The SMBC Foundation**\n**for International Cooperation**\nThe SMBC Foundation for International Cooperation \nThe SMBC Foundation for International Cooperation \nstrives to assist in developing the human resources \nstrives to assist in developing the human resources \nnecessary to achieve sustainable growth in develop \nnecessary to achieve sustainable growth in develop- \ning economies as well as to promote international \ning economies as well as to promote international \nexchange activities. The foundation has provided \nexchange activities. The foundation has provided \nfinancial support for students from Asian countries \nfinancial support for students from Asian countries \neach year, enabling them to attend universities in \neach year, enabling them to attend universities in \nJapan. The foundation also offers subsidies to \nJapan. The foundation also offers subsidies to \nresearch institutes and researchers undertaking \nresearch institutes and researchers undertaking \nprojects related to developing countries. \nprojects related to developing countries. \n\n\n\n\n\n\n\nEmployee volunteers who participated in \n landscape improvement projects \n\n**Europe**\n**8**\n\n**Donation for a Japanese-language speech contest**\n\nThe European office of the Japan Research Institute (JRI) \nThe European office of the Japan Research Institute (JRI) \nmade a donation in support of a Japanese-language speech \nmade a donation in support of a Japanese-language speech \ncontest. \ncontest. \n\n**Mozambique**\n**9**\n\n**UNICEF support initiatives**\n\nThrough the Climate & Children Supporters project, the bank \nThrough the Climate & Children Supporters project, the bank \nhas supported UNICEF projects in Mozambique benefitting \nhas supported UNICEF projects in Mozambique benefitting \nchildren and improving \nchildren and improving \nthe water-supply and \nthe water-supply and \nsanitary environment. \nsanitary environment. \n\n*Please see this website \nfor further details (in \nJapanese): \n www.smbc.co.jp/ccs/ \nⓒⓒ UNICEF Mozambique/Arild Drivdal \n\nScholarship students at Sun Yat-sen University \n\n**Hong Kong**\n**3**\n\n**Supporting performances**\n**by young Asian musicians**\nSMBC Hong Kong Branch makes donations to the Asian \nSMBC Hong Kong Branch makes donations to the Asian \nYouth Orchestra (AYO), \nYouth Orchestra (AYO), \ncomprising young Asian \ncomprising young Asian \nm u s i c i a n s s e l e c t e d \nm u s i c i a n s s e l e c t e d \nthrough auditioning who \nthrough auditioning who \nperform all over Asia. \nperform all over Asia. \n\nPhotographs supplied by AYO", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "Open_Data_Report.pdf", - "query": "What concerns has open data raised in the insurance sector?", - "target_page": 23, - "target_passage": "insurance companies may charge higher fees for life insurance to those among their customers who... put online a family tree from which it shows that they come from families with an average life expectancy lower than usual", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides \n\nthat those from (properly done) Open Data are a really tiny percentage of the total. \n\nThis is a consequence of the fact that data about us end up online from the most different sources \n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never \n\nmind*prove*, that they've been used against our interest. There have been concerns, for example, that \n\ninsurance companies may charge higher fees for life insurance to those among their customers \n\nwho... put online a family tree from which it shows that they come from families with an average \n\nlife expectancy lower than usual. \n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of \n\ndata, that weren't even published by any Public Administration? Of course, publishing online \n\ncomplete, official Census data of several generations, in a way that would make such automatic \n\nanalysis possible would be a totally different matter. \n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is \n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always \n\nremember and explain that: \n\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air \n\npollution measurements....) \n\n2. The majority of data that are directly related to individuals (e.g. things like names and \n\naddress of people with specific diseases, or who were victims of some crime) have no reason \n\nto be published,**nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to \n\npublic offices, Government and Parliament members etc...) already exist in many countries \n\n4. Very often, in practice, Open Data struggles only happen about*when and how*to make \n\navailable in the most effective way for society information that was*already*recognized as \n\npublic.*What*to declare public, hence open, is indeed a serious issue (more on this in the next \n\nparagraph) but is a separate one. \n\n**3.8. Need to better define what is Public Data**\nTogether with citizens education, there is a huge challenge that Governments and the Open Data \n\nmovement will have to face (hopefully together) in 2011 and beyond. This challenge is to update \n\nand expand the definition of Public Data and to have it accepted by lawmakers and public \n\nadministrators.", - "page_start": 22, - "page_end": 22, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "**3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen,*before*\n\nthey are published online. The most common concerns of this type are (from Open Public Data: \n\nThen What? - Part 1): \n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as \n\nprivate property by private corporations, because the public agencies whose job was to \n\nproduce those data, can't sell them anymore. \n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of \n\nreducing trust in institutions and inhibiting decision-making even more than today. \n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account \n\nis that, once data are open, routinely used and monitored by as many independent users as possible, \n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the \n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very \n\nexpensive, studies and surveys to update a whole corpus of data in one run. \n\nBesides, and above all, even if opening data always destroyed any source of income for the public \n\noffice that used to create and maintain them, this problem would only exist for the PSI datasets that \n\nare*already*sold today. Such data, even if of strategic importance as is the case with digital \n\ncartography, are only a minimal fraction of all the PSI that could and should be opened to increase \n\ntransparency, reduce the costs of Government and stimulate the economy. In all these other cases: \n\n• the money to generate the data already arrives by some other source than sales and \n\nlicensing(but even with those data it may be possible to generate them by crowdsourcing, \n\nthereby reducing those costs!) \n\n• the only extra expense caused by publishing those data online (assuming they're already \n\navailable in some digital format, of course!), would be the hosting and bandwidth costs, that \n\nmay be greatly reduced by mirroring and other technical solutions like torrents, already \n\nwidely used to distribute Free/Open Source Software (FOSS) through the Internet. \n\n**3.6.2. Real impact of data manipulation or misunderstanding**\n\nThe fix for the risk that data is manipulated is to not only open government data and procedures, but \n\nto simplify the latter (which eventually also greatly reduces cost) as much as possible. Abundance \n\nof occasions to secretly play with data and how they are managed is a symptom of excessive, or \n\npeak complexity: again, problems and risks with Open Data are a symptom of a [pre-", - "page_start": 16, - "page_end": 16, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "What is, exactly, Public Data? A definition that is accepted almost implicitly is*\"data that is of*\n\n*public interest, that belongs to the whole community, data that every citizen is surely entitled to*\n\n*know and use\"*. This definition is so generic that accepting it together with the assumption that all \n\nsuch data should be open as preached by the Open Data movement (online, as soon as possible, in \n\nmachine readable format with an open license etc...) doesn't create any particular problem or \n\nconflict. \n\nReal problems however start as it has happened all too often so far, whenever we assume more or \n\nless consciously that \"Public Data\" in the sense defined above and data directly produced by \n\nGovernments and Public Administrations, that is what's normally called PSI (Public Sector \n\nInformation) are the same thing. \n\nThere is no doubt that Governments and Public Administrations produce huge quantities of Public \n\nData. But this is an age of privatization of many public services, from transportation to healthcare, \n\nenergy and water management. This is an age in which many activities with potentially very serious \n\nimpacts on whole communities, like processing of hazardous substances or toxic waste, happen \n\n*outside*Public Administrations. The paradox is that, as Sasaki put it, this increased privatization is \n\nhappening in the very same period in which*\" we are observing a worldwide diffusion of access to*\n\n*information laws that empower citizens to hold government agencies accountable.\"*\n\nIn such a context, \"Public Data\"is critical just because it is a much bigger set of data than what \n\nconstitutes traditional, official PSI. \"Public Data\" includes all that information*plus*the much bigger \n\namount of data describing and measuring all the activities of private companies, from bus \n\ntimetables to packaged food ingredients, aqueducts performances and composition of fumes \n\nreleased in the atmosphere, that have a*direct impact*on the health and rights of all citizens of the \n\ncommunities affected by the activities of those companies. \n\nAre such data \"Public\" today, in the sense defined at the beginning of this paragraph, that is \n\nsomething every citizen has the right to know without intermediaries or delegates, or not? Should \n\nthey be public? If yes, shouldn't law mandate that all such data be Open (that is, published online as \n\nsoon as possible, in machine readable format with an open license etc...) just like, for example, the \n\nbudget of some Ministry? Answering these questions may be one of the biggest challenges for the \n\nOpen Data community, and for society as a whole, in the next years. \n\nHere are, in order to facilitate reflection on this issue, a few recent, real world examples of \"Public \n\n\n \n \n \n \n [html]\n
Data * that are not PSI, and of the impacts of their lack of openness.TableSpecificity
", - "page_start": 23, - "page_end": 23, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Social and political lands2.1. Wikileaks and the Open Data movement.
.... 52.2. Data Openness in EU
.... 62.3. Open Data in Latin America, Asia and Africa.
.... 8Emerging trends and issues related to Open Data...
. 113.1. Cost of not opening PSI is increasing
... 113.2. Creative, unforeseen uses of local Open Data increase.
... 123.3. Legal issues remain crucial
... 133.4. The price of digitization
... 143.5. The nature of Open Government and the relationship between citizens and Government
... 153.6. Clearer vision of the real risks and limits of Open Data
... 163.6. 1. Data alterations and financial sustainability.
... 173.6. 2. Real impact of data manipulation or misunderstanding.
... 173.6. 3. Unequal access.
... 193.6. 4. Lack of education to data
... 20S. fo. S. Lack of public interest
.... 213.6. 6. Unprepared Public Administrators...
... 223.7. The privacy problem.
... 223.8. Need to better define what is Public Data.
... 23Conclusion : seven Open Data strategy and best pra
. 274.1. Properly define and explain both Open Data and Public Data
... 274.2. Keep political issues separated by economics ones.
... 274.3. Keep past and future separate
... 284.4. Impose proper licensing and streamline procurement.
... 294.5. Educate citizens to understand and use data.
... 304.6. Focus on local, specific issues to raise interest for Open Data.
... 314.7. Involve NGOs, charities and business associations.
... 32
", - "page_start": 1, - "page_end": 1, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "there is no mandate to support one group to centralize it. \n\nKenya's own OpenData.go.ke website has only ever seen a small handful of data sets, \nnone of which are now (early April 2011) available anymore. Groups like the Ministry \nof Education might publish some information on schools, but they won't give anyone \nthe location data. \n\n**3. Emerging trends and issues related to Open**\n**Data**\nOne of the most common activities for Open Data activists in this moment is the creation of \n\ncountry-wide catalogs of all data sources, to facilitate individuation and correlation of independent \n\ndata sets. Normally, all initiatives of this type are announced on the Open Knowledge Foundation \n\nblog and/or its data hub CKAN. Another relevant development is the publication of an Open Data \n\nManual that*\"can be used by anyone but is especially designed for those seeking to open up data,*\n\n*since it discusses why to go open, what open is, and the how to 'Open' Data.\"*Activists in several \n\nEuropean countries have already published local versions of the manual, or equivalent documents. \n\nOn this background, several interesting issues, some of which were anticipated in the Open Data, \n\nOpen Society report, are coming in full light. They are presented, one at a time, in the following \n\nsections of this chapter. \n\n**3.1. Cost of not opening PSI is increasing**\nMuch has been said on the*economic*benefits of opening public sector information, and much more \n\nremains to be said and studied. One part of this issue that is becoming more evident over time is that \n\nOpen Data are the simplest, if not the only way, to save Public Administrations from the costs that \n\nthey have*already*(and rightfully!) forced themselves to bear, through assorted laws and official \n\nregulations. This is explained well in the report from LinkedGov about the economic impact of \n\nopen data: \n\n*(p. 2) \"As the costs of disseminating and accessing information have declined, the*\n*transactions costs associated with charging for access to information, and controlling*\n*subsequent redistribution have come to constitute a major barrier to access in*\n*themselves. As a result, the case for free (gratis) provision of Public Sector Information*\n*is stronger than has already been recognized.*\n\nEaves provides a practical example from Canada in Access to Information is Fatally Broken… You \n\nJust Don't Know it Yet:*the number of Access to Information Requests (ATIP) has almost tripled*", - "page_start": 10, - "page_end": 10, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "more concrete over time is damage control. In a world that produces digital data without \n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to \n\npredict, practically impossible to avoid and increasingly common. Opening public government data, \n\nthat is providing plenty of officially verified information, becomes therefore also a damage control \n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official \n\nOpen Public Data, individual citizens, political parties or other organizations will start to process \n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different \n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong \n\nconclusions. This is not some theoretical possibility far in the future, as this real world example \n\n(from a comment to an Open Data discussion in an italian blog) proves: \n\n\"*on the*[non italian]*Geonames website you can download geo-referenced data*\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n*that not one was right. What should be done in such cases?*\n\n**2.1. Wikileaks and the Open Data movement**\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published \n\nby Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence \n\nof a more or less conscious mixing of the two themes, because in a very general sense, both Open \n\nData and Wikileaks are about transparency, accountability and democracy. \n\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks \n\nscandal. \n\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and \n\ntransparency whenever government activities are concerned. Citizens must be able to know what \n\nthe state is*actually*doing but sometimes, be it for careful evaluation of all the alternatives or \n\nbecause of security, it must be possible to work behind closed doors, at least temporarily. We'll \n\ncome back to this point later in this report. \n\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness \n\nand transparency in politics, not only there are deep differences between the two ideas but, in our", - "page_start": 4, - "page_end": 4, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "22.Thinking About Africa's Open Data \n\n23.Towards EU Benchmarking 2.0 - Transparency and Open Data on Structural Funds in \n\nEurope \n\n24.UK Open Government Licence removes barriers to re-use of public sector information \n\n25.Western Europe: A journey through tech for transparency projects \n\n26.What open data means to marginalized communities \n\n27.What's in a Name? Open Gov and Good Gov \n\n28.WikiLeaks Relationship With the Media \n\n29.WikiLeaks, Open Information and Effective Use: Exploring the Limits of Open Government", - "page_start": 33, - "page_end": 33, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "**1. Introduction**\nThis report is the final deliverable of the Open Data, Open Society research project. It follows the \n\npublication of the Open Data, Open Society report, finished in late October 2010 and published in \n\nearly January 2011. That first report focused on explaining the critical importance of digital data in \n\ncontemporary society and business activities; defining Open Data; giving examples on their \n\npotential, especially at the local level, on transparency and economics activities; finally, defining \n\nsummarizing some general best practices. \n\nThis second report looks at what happened in the Open Data arena after October 2010. After some \n\nconsiderations on the general social and political background in late 2010/early 2011, it is divided \n\nin two main parts. The first describes some emerging trends and issues related to Open Data, that \n\ngot minor or no coverage in the first report. The second part discusses some practices and actions to \n\nfollow to deal with those trends and issues. \n\n**2. Social and political landscape**\nIt is worthwhile to begin by mentioning several events, happened between the end of 2010 and the \n\nfirst months of 2011, that can help to understand what will be the place and role of Open Data in the \n\nfuture, as well as the challenges faced by its advocates. \n\nThe first two are the Spanish \"Indignados\" and the Arab Spring. The first movement has among its \n\ngoals*\"a change in society and an increase in social awareness\"*. The Arab Spring, as L. Millar put \n\nit on the New Zealand Computer Society website,*\"demonstrated the potency of technology to*\n\n*reflect citizens' views of government systems that are not transparent.\"*As a consequence, noted the \n\nAfrinnovator blog,*\"we have seen from the civil disobedience in the North of Africa and the Middle*\n\n*East, the appetite for more accountable and transparent government will only grow from here on\"*. \n\nFrom this analysis it looks like, in a way, both the Indignados and the participants to the Arab \n\nSpring are (also) asking for Open Data, even if they aren't using the term and many participants to \n\nthese grassroots movement may still ignore its definition, that was born inside hackers and Public", - "page_start": 2, - "page_end": 2, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "**2.3. Open Data in Latin America, Asia and Africa**\nSeveral countries in Latin America are studying and making experiments with Open Data both at \n\nthe government and at the grassroots level. The same is happening, on a much smaller scale, in a \n\nfew parts of Asia and Africa. On average, the volume of these Open Data experiments and the level \n\nof*local*interest and awareness around them is still lower than what is happening in Europe and \n\nNorth America. In spite of this we suggest that it is important, for public officials and civic activists \n\nin Western Countries, to follow these developments closely. The reason is that they may turn into \n\nvery useful test beds for all the strengths and limits of Open Data, especially those not encountered \n\nyet where the movement was born. \n\nIn fact, the original discourse and arguments around Open Data are heavily Western centric. The \n\nproblem they want to solve is how to make democracy work better*in countries where it already*\n\n*exists and which share a great amount of history and cultural/philosophical values*. \n\nOther countries face very different challenges, from the philosophical level to the practical one. A \n\ncommon issue in developing countries, for example, is that there is very little to open simply \n\nbecause much PSI (Public Sector Information) doesn't exist in digital format yet. Therefore, the first \n\nthing to do is to*create*data, normally through outsourcing and crowd sourcing. \n\nOther issues, that will be discussed in detail in other sections of the report because they are also \n\npresent in Europe in different forms, are related to lack of equal opportunities for access to data and \n\nserious fears (sometimes, concrete, sometimes caused by confusion about what should be open and \n\nhow) that data will be used*against*citizens. A commenter to Gurstein's Open Data: Empowering \n\nthe Empowered or Effective Data Use for Everyone? said: \n\n*in Delhi and Mumbai, mobs and rioters managed to get information about particular*\n*identity groups through voter rolls: openness is, in certain situations, a precarious*\n*virtue. It is almost certain that Open Data would be used to rig election but here again*\n*openness is not the issue, they would find it anyway...*\n\nSo far, the main interest about Open Data in Asian countries seems limited, so to speak, to its \n\neffects on transparency in politics. At a two-weeks programming contest held at the end of 2010 in \n\nThailand, for example, one of the most appreciated entries was a software scraper of the Thailand's \n\nMember of House of Representative Website, that made it possible for everybody to create", - "page_start": 7, - "page_end": 7, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "several centuries, in the analog, pre-computer world. Developing countries are good case studies \n\nfrom this point of view, because they are often leapfrogging from oral tradition straight to \n\ncomputers in all fields, not just e-government. \n\nLand ownership in India, discussed by Gurnstein in 2010, is a perfect example of the problems \n\ncarried by digitization that requests for Open Data only expose, without creating them. Digitization \n\ncan certainly increase efficiency, transparency and economic activities, but fully achieves these \n\ngoals only by: \n\n• standardizing as much as possible all concepts, formats and procedures. \n\n• replacing*completely*, at least in standard day to day procedures, whatever other records and \n\nways of working existed before \n\nGurnstein wrote: \n\n*\"The problem of open access in the case of land records in India is... the manner in*\n*which the data tends to get encoded. Typically, digitization of land records would mean*\n*either scanning the record as it is, or inputting all the data on the record as it is,*\n*without changing any fields. But ways of maintaining land records are highly diverse...*\n*Private ownership is not the only means of holding a land parcel. When it comes to*\n*land ownership, for example, it may eliminate the history of land, how were sub-*\n*divisions and usufruct rights negotiated and enforced.\"*\n\nAnother risk of digitization and e-government (without openness, that is) is lack of contact between \n\ncitizens and institutions: \n\n*\"Prior to digitization, land records in India were available to people who made*\n*requests with village accountants for them. .. after digitization of several services,*\n*village accountants no longer personally visit the villages they are in charge of... What*\n*has happened with digitization is a reorganization of earlier forms of social and*\n*political relations. Accountability has moved from the immediate village level\"*\n\nOf course, all these problems existed well before computers and return every time the political or \n\nsocial order changes. The demand for Open Data is only increasing, by orders of magnitude, the \n\nnumbers of times in which we meet them. \n\n**3.5. The nature of Open Government and the relationship**\n**between citizens and Government**\nOpen Data are an essential part of Open Government. Almost everybody agrees with this. \n\nAgreement on what exactly defines Open Government is, however, less universal. In January 2011 \n\nLucas Cioffi, replying to Alex Howard, wrote:", - "page_start": 14, - "page_end": 14, - "source_file": "Open_Data_Report.pdf" - } - ] - }, - { - "references": { - "source_file": "Open_Data_Report.pdf", - "query": "What are Steinberg's concerns about the government releasing all non-private existing data?", - "target_page": 28, - "target_passage": "The first reasons for Steinberg's concern is that asking for everything as soon as possible would \"stress the system too much, by spreading thin the finite amount of good will, money and political capital\". The second is that many existing old data and data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend resources in opening them", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "more concrete over time is damage control. In a world that produces digital data without \n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to \n\npredict, practically impossible to avoid and increasingly common. Opening public government data, \n\nthat is providing plenty of officially verified information, becomes therefore also a damage control \n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official \n\nOpen Public Data, individual citizens, political parties or other organizations will start to process \n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different \n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong \n\nconclusions. This is not some theoretical possibility far in the future, as this real world example \n\n(from a comment to an Open Data discussion in an italian blog) proves: \n\n\"*on the*[non italian]*Geonames website you can download geo-referenced data*\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n*that not one was right. What should be done in such cases?*\n\n**2.1. Wikileaks and the Open Data movement**\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published \n\nby Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence \n\nof a more or less conscious mixing of the two themes, because in a very general sense, both Open \n\nData and Wikileaks are about transparency, accountability and democracy. \n\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks \n\nscandal. \n\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and \n\ntransparency whenever government activities are concerned. Citizens must be able to know what \n\nthe state is*actually*doing but sometimes, be it for careful evaluation of all the alternatives or \n\nbecause of security, it must be possible to work behind closed doors, at least temporarily. We'll \n\ncome back to this point later in this report. \n\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness \n\nand transparency in politics, not only there are deep differences between the two ideas but, in our", - "page_start": 4, - "page_end": 4, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "**4.3. Keep past and future separate**\nFor the same reason why it is important to always distinguishes between political and economical \n\nadvantages (or disadvantages) of Open Data, it is necessary to keep decisions about*future*data \n\n(those that will arrive in the future, due to new contracts, public services and so on) separate from \n\nthose about data that already exist. At the end of 2010, T. Steinberg wrote that the idea that \n\nGovernment should publish everything non-private it can**now**is \"rather dangerous\", and that it \n\nwould be much better to release nothing until someone actually asked for it, and at that point doing \n\nit right, that is with an open license and so on. The first reasons for Steinberg's concern is that \n\nasking for everything as soon as possible would*\"stress the system too much, by spreading thin the*\n\n*finite amount of good will, money and political capital\"*. The second is that many existing old data \n\nand data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend \n\nresources in opening them. \n\nEven if these concerns were always true, it is important to realize that they apply (especially the \n\nsecond) to already existing data, not to future ones. The two classes of data have, or can have, very \n\ndifferent constraints. Existing data may still exist only in paper format and/or be locked by closed or \n\nunclear licenses, or not relevant anymore for future decisions. \n\nOpening*future*data, instead, is almost always more important, useful urgent, easier and cheaper \n\nthan digitizing or even only reformatting material that in many cases is already too old to make \n\nimmediate, concrete differences. While this argument is probably not always true when we look at \n\nOpen data for transparency, it probably is when it comes to economic development. \n\nTherefore, features and guidelines that should be present in all future data generation and \n\nmanagement processes include: \n\n• standardization: the less, obviously open, formats are used for data of the same type, the \n\neasier it is to merge and correlate them. The formats that have to be standardized are not \n\nonly those at the pure software level. Even more important is, for example, to adopt by law \n\nstandard identificators for government suppliers, names and machine-readable identifiers of \n\nbudget voices and so on \n\n• preparation for future digitization: new digital systems should explicitly be designed from \n\nthe beginning so that it will be possible, when non-digital records will be digitized, to add \n\nthem to the databases without modifying losses. \n\n\n \n \n \n \n [html]\n
TableTableTable28 / 34Cageright 2012 LOX8, Sourks Seprior : Sent Time, This work is releceed andiror Constine Common atribution license ( htp :// rnativecommens. org / licenses / hy5.01 )
", - "page_start": 27, - "page_end": 27, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides \n\nthat those from (properly done) Open Data are a really tiny percentage of the total. \n\nThis is a consequence of the fact that data about us end up online from the most different sources \n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never \n\nmind*prove*, that they've been used against our interest. There have been concerns, for example, that \n\ninsurance companies may charge higher fees for life insurance to those among their customers \n\nwho... put online a family tree from which it shows that they come from families with an average \n\nlife expectancy lower than usual. \n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of \n\ndata, that weren't even published by any Public Administration? Of course, publishing online \n\ncomplete, official Census data of several generations, in a way that would make such automatic \n\nanalysis possible would be a totally different matter. \n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is \n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always \n\nremember and explain that: \n\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air \n\npollution measurements....) \n\n2. The majority of data that are directly related to individuals (e.g. things like names and \n\naddress of people with specific diseases, or who were victims of some crime) have no reason \n\nto be published,**nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to \n\npublic offices, Government and Parliament members etc...) already exist in many countries \n\n4. Very often, in practice, Open Data struggles only happen about*when and how*to make \n\navailable in the most effective way for society information that was*already*recognized as \n\npublic.*What*to declare public, hence open, is indeed a serious issue (more on this in the next \n\nparagraph) but is a separate one. \n\n**3.8. Need to better define what is Public Data**\nTogether with citizens education, there is a huge challenge that Governments and the Open Data \n\nmovement will have to face (hopefully together) in 2011 and beyond. This challenge is to update \n\nand expand the definition of Public Data and to have it accepted by lawmakers and public \n\nadministrators.", - "page_start": 22, - "page_end": 22, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "**3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen,*before*\n\nthey are published online. The most common concerns of this type are (from Open Public Data: \n\nThen What? - Part 1): \n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as \n\nprivate property by private corporations, because the public agencies whose job was to \n\nproduce those data, can't sell them anymore. \n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of \n\nreducing trust in institutions and inhibiting decision-making even more than today. \n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account \n\nis that, once data are open, routinely used and monitored by as many independent users as possible, \n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the \n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very \n\nexpensive, studies and surveys to update a whole corpus of data in one run. \n\nBesides, and above all, even if opening data always destroyed any source of income for the public \n\noffice that used to create and maintain them, this problem would only exist for the PSI datasets that \n\nare*already*sold today. Such data, even if of strategic importance as is the case with digital \n\ncartography, are only a minimal fraction of all the PSI that could and should be opened to increase \n\ntransparency, reduce the costs of Government and stimulate the economy. In all these other cases: \n\n• the money to generate the data already arrives by some other source than sales and \n\nlicensing(but even with those data it may be possible to generate them by crowdsourcing, \n\nthereby reducing those costs!) \n\n• the only extra expense caused by publishing those data online (assuming they're already \n\navailable in some digital format, of course!), would be the hosting and bandwidth costs, that \n\nmay be greatly reduced by mirroring and other technical solutions like torrents, already \n\nwidely used to distribute Free/Open Source Software (FOSS) through the Internet. \n\n**3.6.2. Real impact of data manipulation or misunderstanding**\n\nThe fix for the risk that data is manipulated is to not only open government data and procedures, but \n\nto simplify the latter (which eventually also greatly reduces cost) as much as possible. Abundance \n\nof occasions to secretly play with data and how they are managed is a symptom of excessive, or \n\npeak complexity: again, problems and risks with Open Data are a symptom of a [pre-", - "page_start": 16, - "page_end": 16, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "What is, exactly, Public Data? A definition that is accepted almost implicitly is*\"data that is of*\n\n*public interest, that belongs to the whole community, data that every citizen is surely entitled to*\n\n*know and use\"*. This definition is so generic that accepting it together with the assumption that all \n\nsuch data should be open as preached by the Open Data movement (online, as soon as possible, in \n\nmachine readable format with an open license etc...) doesn't create any particular problem or \n\nconflict. \n\nReal problems however start as it has happened all too often so far, whenever we assume more or \n\nless consciously that \"Public Data\" in the sense defined above and data directly produced by \n\nGovernments and Public Administrations, that is what's normally called PSI (Public Sector \n\nInformation) are the same thing. \n\nThere is no doubt that Governments and Public Administrations produce huge quantities of Public \n\nData. But this is an age of privatization of many public services, from transportation to healthcare, \n\nenergy and water management. This is an age in which many activities with potentially very serious \n\nimpacts on whole communities, like processing of hazardous substances or toxic waste, happen \n\n*outside*Public Administrations. The paradox is that, as Sasaki put it, this increased privatization is \n\nhappening in the very same period in which*\" we are observing a worldwide diffusion of access to*\n\n*information laws that empower citizens to hold government agencies accountable.\"*\n\nIn such a context, \"Public Data\"is critical just because it is a much bigger set of data than what \n\nconstitutes traditional, official PSI. \"Public Data\" includes all that information*plus*the much bigger \n\namount of data describing and measuring all the activities of private companies, from bus \n\ntimetables to packaged food ingredients, aqueducts performances and composition of fumes \n\nreleased in the atmosphere, that have a*direct impact*on the health and rights of all citizens of the \n\ncommunities affected by the activities of those companies. \n\nAre such data \"Public\" today, in the sense defined at the beginning of this paragraph, that is \n\nsomething every citizen has the right to know without intermediaries or delegates, or not? Should \n\nthey be public? If yes, shouldn't law mandate that all such data be Open (that is, published online as \n\nsoon as possible, in machine readable format with an open license etc...) just like, for example, the \n\nbudget of some Ministry? Answering these questions may be one of the biggest challenges for the \n\nOpen Data community, and for society as a whole, in the next years. \n\nHere are, in order to facilitate reflection on this issue, a few recent, real world examples of \"Public \n\n\n \n \n \n \n [html]\n
Data * that are not PSI, and of the impacts of their lack of openness.TableSpecificity
", - "page_start": 23, - "page_end": 23, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "with a project called \"Tales of Things\" to allow people to leave messages for each other (or just for \n\nthe world) at the bus stops. Scanning the QR code now allows people to see not just the bus \n\ntimetable, but also the notes other travelers have left on that stop, including*\"what's nearby, who's*\n\n*waiting for whom, what number can you call for a good time. It's a cross between bus stop*\n\n*Facebook and digital graffiti\"*, that happened thanks to the openness of the original bus stop data. \n\nThe Social Life of Data Project will study instead how particular datasets have been used, who used \n\nthem, how those people are connected and what conversations happen around Open Data. \n\n**3.3. Legal issues remain crucial**\nProper licensing of Public data is essential. The more Open Data activities continue, the clearer this \n\nrule becomes. What distinguishes Open Data from \"mere\" transparency is reuse. Paraphrasing \n\nEaves, until a government get the licensing issue right, Open Data cannot bring all the possible \n\nbenefits in that country. If there are no guarantees that public data can be used without restriction, \n\nvery little happens in practice, and when it happens it may be something against the public interest. \n\nCanadian Company Public Engines Inc, that is paid by local police departments to collect, process \n\nand analyze official crime data, also publishes online, with a proprietary license, anonymized \n\nsummaries of those data. When in 2010 another company, Report See Inc, scraped those data from \n\ntheir website to reuse them, Public Engines sued. \n\nReporting this, D. Eaves rightly points out that*both*companies are right: one is trying to protect its \n\ninvestment, the other is simply trying to reuse what IS public data, by getting it from the ONLY \n\nplace where it's available. This is what happens when public officials leave the ownership of*public*\n\ndata to the third parties hired to collect them. Please note that, in practice, it makes very little \n\ndifference whether those third parties are private, for-profit corporations or even other Public \n\nAdministrations. Unless, of course, there are national laws already in place that define in advance \n\nwhat is the license of all present and future Public Data,*no matter how they were generated and by*\n\n*whom*, those data can be lost in any moment for society. In all other cases, the legal status of data \n\nwill be either officially closed and locked, or uncertain enough to prevent most or all reuses. In \n\nFebruary 2011, the news came that, even if they weren't the original copyright holders, Public \n\nEngines had been able to put together enough legal claims to convince Report See to give up. \n\nDisputes like this should not happen and would not happen if all contracts regarding collection and \n\nmanagement of PSI clearly specified that all the resulting data either go directly into the public \n\ndomain (after being anonymized if necessary, of course) or remain exclusive property of the", - "page_start": 12, - "page_end": 12, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "government. Even ignoring data openness, this is essential for at least three other reasons. The first \n\nis to protect a public administration from having to pay*twice*for those data, if it needs it again in \n\nthe future for some other internal activity, not explicitly mentioned in the initial contract. The \n\nsecond reason is to not spend more than what is absolutely necessary to respond to public records \n\nrequests, that is to comply with Freedom of Information laws. \n\nThe final reason is to guarantee quality assurance and detection of abuses at the smallest cost, that is \n\nsharing it with all the citizens using the public services based on those data. A real world example \n\nof this point comes from the \"Where's My Villo?\" service in Brussels. Villo! is a city-wide bike- \n\nsharing scheme started in May 2009, through a partnerships with a private company: JCDecaux \n\nfinances the infrastructure and operates it, in exchange for advertising space on the bikes \n\nthemselves and on billboards at the bike sharing stations. The availability of bikes and parking \n\nspaces of each station is published online in real time on the official Villo's website. \n\nWhen the quality of service decreased, some citizens started \"Where's My Villo?\", another website \n\nthat reuses those data to measure where and how often there aren't enough available bikes and \n\nparking spaces, in a way that made it impossible for JCDecaux to deny the problems and stimulated \n\nit to fix them. Both this happy ending and the fact that it came at almost no cost to the city, because \n\ncitizens could monitor the service by themselves, were possible just because the data from the \n\nofficial website were legally and automatically reusable. \n\n**3.4. The price of digitization**\nIn practice, public data can be opened at affordable costs, in a useful and easily usable way, only if \n\nit is in digital format. As a consequence of this fact, demand for Open Data exposes a problem that \n\nalready existed and must be fixed anyway, regardless (again) of openness. Any substantial increase \n\nof efficiency and reduction of the costs of Public Administrations can only happen when data and \n\nprocedures are digitized. The problem is that such digitization (which, obviously, must happen \n\nanyway sooner or later) can be very expensive and we are only now starting to really realize how \n\nmuch. Actual, material costs are not the worst problem here. Activities like semi-automatic \n\nscanning of paper documents or typing again their content inside some database, are relatively low, \n\none-time expenses that are also very easy to calculate and budget in advance with great precision. \n\nThe real costs are those at the social, cultural, historical and workflow reorganization level. What is \n\nreally difficult, that is expensive in ways that are hard to predict, is to fit inside digital, more or less \n\n\n \n \n \n \n [html]\n
duration of developmentdilutionsDiabetes,1OTITIdUS,IldDIUSdIIUMaximumGenome ( mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, meaIIIdyDeOver
", - "page_start": 13, - "page_end": 13, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "there is no mandate to support one group to centralize it. \n\nKenya's own OpenData.go.ke website has only ever seen a small handful of data sets, \nnone of which are now (early April 2011) available anymore. Groups like the Ministry \nof Education might publish some information on schools, but they won't give anyone \nthe location data. \n\n**3. Emerging trends and issues related to Open**\n**Data**\nOne of the most common activities for Open Data activists in this moment is the creation of \n\ncountry-wide catalogs of all data sources, to facilitate individuation and correlation of independent \n\ndata sets. Normally, all initiatives of this type are announced on the Open Knowledge Foundation \n\nblog and/or its data hub CKAN. Another relevant development is the publication of an Open Data \n\nManual that*\"can be used by anyone but is especially designed for those seeking to open up data,*\n\n*since it discusses why to go open, what open is, and the how to 'Open' Data.\"*Activists in several \n\nEuropean countries have already published local versions of the manual, or equivalent documents. \n\nOn this background, several interesting issues, some of which were anticipated in the Open Data, \n\nOpen Society report, are coming in full light. They are presented, one at a time, in the following \n\nsections of this chapter. \n\n**3.1. Cost of not opening PSI is increasing**\nMuch has been said on the*economic*benefits of opening public sector information, and much more \n\nremains to be said and studied. One part of this issue that is becoming more evident over time is that \n\nOpen Data are the simplest, if not the only way, to save Public Administrations from the costs that \n\nthey have*already*(and rightfully!) forced themselves to bear, through assorted laws and official \n\nregulations. This is explained well in the report from LinkedGov about the economic impact of \n\nopen data: \n\n*(p. 2) \"As the costs of disseminating and accessing information have declined, the*\n*transactions costs associated with charging for access to information, and controlling*\n*subsequent redistribution have come to constitute a major barrier to access in*\n*themselves. As a result, the case for free (gratis) provision of Public Sector Information*\n*is stronger than has already been recognized.*\n\nEaves provides a practical example from Canada in Access to Information is Fatally Broken… You \n\nJust Don't Know it Yet:*the number of Access to Information Requests (ATIP) has almost tripled*", - "page_start": 10, - "page_end": 10, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "opinion, the Wikileaks experience proves the advantages of Open Data. \n\nWas Wikileaks right to publish the cable? Were the specific facts and behaviors uncovered by \n\nCablegate right or wrong? The answer to these questions are outside the scope of this document. \n\nHere we only wish to point out that Cablegate and Wikileaks, at least in the form we've known them \n\nso far, have been about: \n\n• reacting to problems*after*they occurred \n\n• without any intervention and involvement of the parties and organizations that may have \n\nbehaved improperly \n\nOpen Data, instead, is about*prevention*of errors, abuses and inefficiencies, through conscious and \n\ncontinuous collaboration of citizens and governments officials*during*day to day operations, if not \n\nbefore their beginning. \n\nOf course, citizens must always check that they aren't getting incomplete or biased data. But in any \n\ncase, Open Data means that the involved government officials aren't just prepared to see that data \n\npublished, they know and accept it from the start. In such a context, some risks associated to \n\nWikileaks, like the fact that the leaker lacks the means to influence the downstream use of the \n\ninformation, and therefore may harm anybody connected to the linked information, are almost non- \n\nexistent. \n\nAbove all, unlike the content of most Wikileaks documents, Open Data are almost always data that \n\nshould surely be open, unlike wartime military reports, and that almost never contain any personal \n\ninformation. In summary, whatever the conclusions about Wikileaks are, they could not be \n\nconclusions against Open Data, because there are too many differences between the two \n\nmovements. \n\n**2.2. Data Openness in EU**\nBoth the interest and the need for data openness at the European Union level remain high. Here, \n\nwithout making any complete analysis, we'll only report and comment a few relevant episodes. \n\nWhile studies continue to point at the political and economical advantages of Open Data, great \n\ninefficiencies and delays still keep the time and cost savings that could be achieved a far goal for \n\nthe European Union. \n\nAll the principles of the Open Declaration (collaboration, transparency, empowerment) have been \n\ndeclared key areas of action of the new EC eGov action plan. Particularly important, as explained", - "page_start": 5, - "page_end": 5, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Social and political lands2.1. Wikileaks and the Open Data movement.
.... 52.2. Data Openness in EU
.... 62.3. Open Data in Latin America, Asia and Africa.
.... 8Emerging trends and issues related to Open Data...
. 113.1. Cost of not opening PSI is increasing
... 113.2. Creative, unforeseen uses of local Open Data increase.
... 123.3. Legal issues remain crucial
... 133.4. The price of digitization
... 143.5. The nature of Open Government and the relationship between citizens and Government
... 153.6. Clearer vision of the real risks and limits of Open Data
... 163.6. 1. Data alterations and financial sustainability.
... 173.6. 2. Real impact of data manipulation or misunderstanding.
... 173.6. 3. Unequal access.
... 193.6. 4. Lack of education to data
... 20S. fo. S. Lack of public interest
.... 213.6. 6. Unprepared Public Administrators...
... 223.7. The privacy problem.
... 223.8. Need to better define what is Public Data.
... 23Conclusion : seven Open Data strategy and best pra
. 274.1. Properly define and explain both Open Data and Public Data
... 274.2. Keep political issues separated by economics ones.
... 274.3. Keep past and future separate
... 284.4. Impose proper licensing and streamline procurement.
... 294.5. Educate citizens to understand and use data.
... 304.6. Focus on local, specific issues to raise interest for Open Data.
... 314.7. Involve NGOs, charities and business associations.
... 32
", - "page_start": 1, - "page_end": 1, - "source_file": "Open_Data_Report.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed4.pdf", - "query": "How did serum estradiol and progesterone levels change during pregnancy?", - "target_page": 2, - "target_passage": "Serum hormone concentrations increased significantly over the course of pregnancy and dropped precipitously postpartum", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "b Sex steroid hormones \n12,500 \n\n17β-estradiol \nProgesterone \n\n1 \n– \nl \n\nm \ng \np \nl \n\no \nd \na \nr \nt \ns \ne \n- \nβ \n7 \n1 \n\ni \n\n\n<0 0–13 14–26 27–40 \nGestation weeks \n\n\n0 \n0 \n\nBirth \n–1 0 10 20 30 40 50 \n\nWeeks since conception \n\n\n\nPre/IVF \n\n// \n\n// \n\n// \n\n// \n\n93 162 \n\n\n\n50 \n\nBirth \n\n\n\nd \n4.80 \n) \n3 \nm \nm \nV \nM \nG \n5 \n0 \n1 \n× \n( \n4.60 \n0 \n1.80 \n) \nm \nm \nT \nC \n6 \n0 \n1 \n× \n( \n1.60 \n\n0 \n) \n1.29 \n3 l \nm \nm \n\no \nv \nn \na \nr \nB \ni \n\n6 \n0 \n1 \n× \n( \n1.27 \n\n0 \n\n14 27 40 \nWeeks since conception \n\nSummary brain measures \n\n. \nt \nn \na \nu \nq \n*R*2 adj = 0.50,*P*= 0.007 \n*R*2 adj = 0.91,*P*< 0.001 0.44 \n\ny \np \no \nr \nt \no \ns \ni \nn \na \nl \na \nb \no \nG \n0.38 \n\n0 \n\ns \ne \nl \nc \ni \nr \nt \nn \ne \nv \nt \na \nL \n\n4,800 \n) \n3 \nm \nm \n( \n\n3,900 \n0 \n\nadj = 0.90,*P*< 0.001 26,000 \n) \n3 \nF \nS \nC \nm \nm \n( \n\n24,500 \n100 150 0 50 100 150 \nWeeks since conception \n\n50 \nWeeks since conception \n\ncolors denote pregnancy stage. The participant underwent IVF to achieve \npregnancy, allowing for precise mapping of ovulation, conception and gestation \nweek.**d**, Summary (that is, total) of brain measures throughout the experiment. \nGeneralized additive models revealed GMV, CT and total brain volume decreased \nthroughout pregnancy (see Methods for validation with cubic regression), with \na slight recovery postpartum. Global QA, lateral ventricle and CSF volumes \ndisplayed nonlinear increases across gestation, with a notable rise in the second \nand third trimesters before dropping sharply postpartum. Shaded regions \nrepresent 95% confidence bands; solid lines indicate model fit; dashed line \nindicates parturition. **Fig. 1 | Precision imaging reveals neuroanatomical changes throughout**\n**gestation. a**, Standard medical demarcations for pregnancy stages (that is, \ntrimesters) by gestation week (the image is created with BioRender.com). \n**b**, Steroid hormones increased significantly throughout pregnancy and dropped \nprecipitously postpartum, as is characteristic of the prenatal and postnatal \nperiods.**c**, A healthy 38-year-old primiparous woman underwent 26 scanning \nsessions from 3 weeks preconception through 2 years postpartum. Scans were \ndistributed throughout preconception (four scans), first trimester (four scans), \nsecond trimester (six scans), third trimester (five scans) and postpartum \n(seven scans); tick marks indicate when major measures were collected and", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed4.pdf" - }, - { - "text": "**Neuroanatomical changes observed over the**\n**course of a human pregnancy**\n\n\n \n \n \n \n [html]Laura Pritschet ® 1 : 1 ; Caitlin M. Taylor Φ1 ; Daniela Cossio Φ2 ; Lackung Examination\n
Received : 23 August 2023
Accepted : 29 July 2024
Hannah Grotzingar ', Evan Layher ', Elizabeth R. Chrastii Φ3 & Egaly β, Ilecabody Spaking
Published online : 16 September 2024
||| Check for updates
\n\nWorldwide, nearly 85% of women experience one or more pregnancies \nin their lifetime1, with 140 million women becoming pregnant each \nyear. Over an approximately 40-week gestational window, the maternal \nbody undergoes profound physiological adaptations to support the \ndevelopment of the fetus, including increases in plasma volume, meta- \nbolic rate, oxygen consumption and immune regulation2. These rapid \nadaptations are initiated by 100-fold to 1,000-fold increases in hormone \nproduction, including estrogen and progesterone. These neuromodu- \nlatory hormones also drive significant reorganization of the central \nnervous system. Evidence from animal models and human studies con- \nverge on pregnancy as a period of remarkable neuroplasticity3–10 (see \nref. 10 for one of the earliest known observations). Gestational increases \nin steroid hormone synthesis drive neurogenesis, dendritic spine \ngrowth, microglial proliferation, myelination and astrocyte remodeling \n(for review, see ref. 11). These cellular changes are pronounced in brain \ncircuits that promote maternal behavior. For example, Ammari et al. \nrecently discovered that steroid hormones can fine-tune the response \nproperties of galanin neurons in the rodent medial preoptic area of \nthe hypothalamus (mPOA), leading to enhanced sensitivity in dams \nto sensory cues from newborn pups12. \n\nIn humans, reductions in gray matter volume (GMV) have \nbeen observed postpartum13–16, particularly in regions central to \ntheory-of-mind processing13. These GMV changes persist at 6 years \npostpartum17 and are traceable decades later18,19, underscoring the \npermanence of this major remodeling event. And yet the changes that \noccur within the maternal brain during gestation itself are virtually \nunknown (see ref. 20 for early neuroimaging insight). A recent study by \nPaternina-Die et al. offers intriguing clues21. Women were scanned once \nin the third trimester and again in the postpartum period, revealing a \nreduction of cortical volume observable in the late pregnancy scan. \nThese findings suggest that pregnancy is a highly dynamic period for \nneural remodeling, yet neuroscientists lack a detailed map of how the \nhuman brain changes throughout the gestational period. \n\nHere we conducted a precision imaging study of pregnancy in \nwhich a healthy 38-year-old primiparous woman underwent 26 mag- \nnetic resonance imaging (MRI) scans and venipuncture beginning \n3 weeks preconception through 2 years postpartum. We observed \nwidespread reductions in cortical GMV and cortical thickness (CT) \noccurring in step with advancing gestational week and the dramatic \nrise in sex hormone production. Remodeling was also evident within", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed4.pdf" - }, - { - "text": "In contrast, GMV within regions of the default mode (subnetwork \nC), limbic (subnetworks A and B) and visual peripheral networks buck \nthe global trend by slightly increasing (for example, temporal poles), \nremaining constant (for example, orbitofrontal cortex) or reducing at \na much slower rate (for example, extrastriate cortex) than total GMV \n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these \nregions exhibit similar patterns (Supplementary Fig. 3 and Supple- \nmentary Tables 4 and 5). \n\n**Results**\n**Serological evaluations**\nSerological evaluations captured canonical hormone fluctuations \ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). \nSerum hormone concentrations increased significantly over the course \nof pregnancy and dropped precipitously postpartum (preconcep- \ntion, estradiol (E) = 3.42 pg ml−1 and progesterone (P) = 0.84 ng ml−1; \n3 weeks preparturition, E = 12,400 pg ml−1 and P = 103 ng ml−1; 3 months \npostparturition, E = 11.50 pg ml−1 and P = 0.04 ng ml−1). \n\n**Subcortical GMV changes tied to gestation**\nConsistent with the broader cortical reductions in GMV, several subcor- \ntical regions significantly reduced in volume across gestation (Fig. 3a, \nleft). This included bilateral ventral diencephalon (right hemisphere \nvalues shown in Fig. 3a, right; encompasses hypothalamus, substantia \nnigra, mammillary body, lateral geniculate nucleus and red nucleus \namong others22), caudate, hippocampus and thalamus, along with left \nputamen and brain stem (Supplementary Table 6,*q*< 0.05). \n\nNext, high-resolution segmentation of the MTL allowed us to \ninterrogate subcortical structures at a finer resolution, revealing non- \nlinear volumetric decreases in CA1 (*F*(2,15) = 5.84,*q*= 0.031,*R*2 \nadj = 0.36; \nFig. 3b, left) and CA2/CA3 (*F*(2,15) = 6.82,*q*= 0.027,*R*2 \nadj = 0.41; Fig. 3b, \nmiddle) across gestation. PHC exhibited linear volumetric decreases \nacross gestation (*F*(1,16) = 24.87,*q*< 0.001,*R*2 \nadj = 0.58; Fig. 3b, right) \nwhich was also tied to estradiol (*F*(1,12) = 20.21,*q*= 0.005,*R*2 \nadj = 0.60). \nAll three relationships remained significant after proportional correc- \ntion for total GMV. There was no significant change in other subregions \nor total volume of the hippocampal body, or in the parahippocampal \ngyrus (Supplementary Table 7 and Supplementary Fig. 8). \n\n**Whole-brain dynamics from baseline through postpartum**\nTo begin, we characterized broad neuroanatomical changes over the \ncourse of the entire experimental window (baseline—2 years postpar- \ntum, 26 scans; Fig. 1d). Generalized additive models revealed strong \nnonlinear (effective degrees of freedom > 3) relationships between \nweeks since conception and summary brain metrics. Total GMV \n(*F*= 27.87,*P*< 0.001, deviance explained = 93.9%,*R*2 \nadj = 0.91), summary \nCT (*F*= 15.79,*P*< 0.001, deviance explained = 78.6%,*R*2 \nadj = 0.75) and \ntotal brain volume (*F*= 26.12,*P*< 0.001, deviance explained = 93.4%, \n*R*2 \nadj = 0.90) linearly decreased during gestation and appeared to \npartially rebound postpartum. In contrast, global microstructural \nintegrity (QA) of white matter increased throughout the first and sec- \nond trimesters before returning to baseline levels in the postpartum \nperiod (whole-brain QA,*F*= 4.62,*P*= 0.007, deviance explained = 60.2%, \n*R*2 \nadj = 0.51). We also observed nonlinear patterns of lateral ventricle \nexpansion*(F*= 10.44,*P*< 0.001, deviance explained = 83.8%,*R*2 \nadj = 0.77) \nand increased cerebrospinal fluid (CSF;*F*= 13.32,*P*< 0.001, deviance \nexplained = 83.8%,*R*2 \nadj = 0.79) rising in the second and third trimesters \nbefore dropping sharply postpartum.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "sleep patterns11. These factors could have a role in the brain changes \nobserved here, with some driving neurobiological changes and others, \nlike water retention, potentially affecting MRI-based measurements. \nNote that, although cortical reductions in GMV over gestation were \nstable across analyses, accounting for QC measures influenced the \nmagnitude and location of these results. These metrics all fell within \nthe standard range, but there may be meaningful reductions in signal \nthat accompany volumetric reductions (for example, increased CSF \nand decreased GM)—a methodological nuance that goes beyond the \nscope of this resource study. Ultimately, identifying the shared and \nunique contributions of these factors to the neuroanatomical changes \nthat unfold across gestation warrants further investigation. Deeply \nphenotyping a large and diverse cohort of women across pregnancy will \nopen up new avenues of exploration, for example, allowing research- \ners to link blood-based proteomic signatures to pregnancy outcomes; \ndeploying wearable devices to monitor changes in sleep, cognition and \nmood; and probing the broader social and environmental determinants \nof maternal health27. overlook the full range of changes that unfold within the gestational \nwindow, and underrepresent the brain’s metamorphosis during preg- \nnancy. Furthermore, although observed changes were largely global, \nsome regions displayed notable stability (for example, extrastriate cor- \ntex). The subcortical region that displayed the strongest relationship \nwith gestation week was the ventral diencephalon, which encompasses \nthe hypothalamus and subsequent medial preoptic area and paraven- \ntricular nucleus—structures critical for inducing maternal behavior12,16. \nThe hippocampus exhibited a reduction in volume across gestation, \nand with higher spatial resolution, this reduction was revealed to be \ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other \nhippocampal subfields remained stable. Adjacent PHC within the \nMTL also exhibited volume reduction across gestation. While our hip- \npocampal findings are consistent with pre/post studies of pregnancy13, \nthe precision lens applied within gestation revealed the nonlinear \nnature of this reduction. Recapitulating and clarifying these region- \nally specific patterns of volume change throughout the MTL merits \nfurther investigation. \n\nSimilar precision imaging studies have captured dynamic brain \nreorganization across other neuroendocrine transitions, such as the \nmenstrual cycle (see review in ref. 28), underscoring the powerful \nrole steroid hormones have in shaping the mammalian brain29. Endo- \ncrine changes across pregnancy dwarf those that occur across the \nmenstrual cycle, which highlights the critical need to map the brain’s \nresponse to this unique hormonal state. Broad physiological changes \noccur in tandem with the rise in steroid hormones, including changes \nin body mass composition, water retention, immune function and The neuroanatomical changes that unfold during matrescence \nmay have broad implications for understanding individual differences \nin parental behavior13,24,30,31, vulnerability to mental health disorders32,33 \nand patterns of brain aging18,19,34–36. Decreases in GMV may reflect \n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- \ntion for parenthood26. For example, in rodents, steroid hormones \npromote parental behavior by remodeling specific neural circuits in the \nmedial preoptic area of the hypothalamus. These behavioral adapta- \ntions are critical to the dam’s ability to meet the demands of caring for", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" - }, - { - "text": "table, th, td {\n border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]\n
20.Cotridge, A. et al. Change in brain size during and after pregnancy : study in healthy women and women with preeclampsia. Am. J. Neuroradiol. 23.19 – 26 ( 2002 ).38.
21.Paternina - Di, M. et al. Women ’ s neuroplasticity during gestation, childbirth and postpartum. Nat. Neurosci. 27.399 – 327 ( 2024 ).39.
22.Makris, N. et al. Decreased volume of the brain reward system in alcoholism. Biol. Psychiatry 64.192 - 202 ( 2008 ).23.
Filevich, E. et al. Day2day : investigating daily variability of magnetic resonance imaging measures over half a year. BMC Neurosci. 18.65 ( 2017 ).40.24.
Dulac, C., O ’ Connell, L. A. & Wu, Z. Neural control of maternal and paternal behaviors. Science 345.765 – 770 ( 2014 ).41.25.
Carmona, S. et al. Pregnancy and adolescence entail similar neuroanatomical adaptations. a comparative analysis of cerebral morphometric changes. Hum. Brain Mapp, 40.2143 – 2152 ( 209 ).42.26.
Pawluski, J. L., Hoekzema, E., Leuner, B. & Lonstein, J. S. Less canTableTable
be more. fine tuning the maternal brain. Neurosci. Biobehax. Rev. 133.104475 ( 2022 ).43.27.
Martinez - Garcia, M., Jacobs, E. G., de Lange, A. M. G. & Carmona, S. Advancing the neuroscience of human pregnancy. Nat. Neurosci, ZT, 805 – 807 ( 2024 ).44.28.
Pritschet, L., Taylor, C. M., Santander, T. & Jacobs, E. G. Applying dense - sampling methods to reveal dynamic endocrine45.Table
modulation of the nervous system. Curr. Opin. Behav. Sci. 40.72 – 78 ( 2021 ).46.29.
Taxier, L. R., Gross, K. S. & Frick, K. M. Oestradiol as a neuromodulator of learning and memory. Nat. Rev. Neurosci. 2f,47.Table
535 – 550 ( 2020 ).48.30.
Kohl, J. et al. Functional circuit architecture underlying parental behaviour. Nature 556.326 – 331 ( 2018 ). Article 7701.31.Rodrigo, M. J. et al. Inferior fronto - temporo - occipital connectivity : a missing link between maltreated girls and neglectful mothers. Soc. Cogn. Affect. Neurosci. It, 1658 – 1665 ( 2016 ).
Pubjuris32.Pawluski, J. L., L., Lonstein, J. S. & Fleming, A. S. The neurobiology of postpartum anxiety and depression. Trends Neurosci. 40.106 – 120 ( 2017 ).
Ope Attrition33.Barba - Muller, E., Craddock, S., Carmona, S. & Hoekzema, E. Brain plasticity in pregnancy and the postpartum period : links to maternal caregiving and mental health. Arch. Womens Ment. Health 22.289 – 299 ( 2019 ).
adapas last south34.Barth, C. & de Lange, A.- M. G. Towards an understanding of women ’ s brain aging the immunology of pregnancy and menopause. Front. Neuroendocrinol, 58.100850 ( 2020 ).
artic individual incleaves35.Orchard, E. R., Rutherford, H. J. V., Holmes, A. J. & Jamadar, S. D. Matrescence. Ufetime impact of motherhood on cognition and the brain. Trends Cogn. Sci. Zf, 302 ��� 316 [ 2023 ].
use use, hold36.Duarte - Guterman, F : et al. Cellular and molecular signatures of motherhood in the adult and ageing rat brain. Open Biol. 10.230217 ( 2023 ).
org /
", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed4.pdf" - }, - { - "text": "**References**\n1. World Health Organization. Maternal, newborn, child and \nadolescent health and ageing. platform.who.int/data/ \nmaternal-newborn-child-adolescent-ageing (2022). \n\n2. Thornburg, K. L., Bagby, S. P. & Giraud, G. D.*Knobil and Neill’s*\n*Physiology of Reproduction*pp. 1927–1955 (Elsevier, 2015). \n3. Brunton, P. J. & Russell, J. A. The expectant brain: adapting for \nmotherhood.*Nat. Rev. Neurosci.***9**, 11–25 (2008). \n4. Gregg, C. Pregnancy, prolactin and white matter regeneration. \n*J. Neurol. Sci.***285**, 22–27 (2009). \n5. Haim, A. et al. A survey of neuroimmune changes in pregnant \n\nand postpartum female rats.*Brain Behav. Immun.***59**, \n67–78 (2017). \n6. Barrière, D. A. et al. Brain orchestration of pregnancy and \n\nmaternal behavior in mice: a longitudinal morphometric study. \n*NeuroImage***230**, 117776 (2021). \n\nAlthough studied to a lesser degree, ties between maternal \nbehavior and white matter microstructure (particularly connectiv- \nity between temporal and occipital lobes) have been noted31. Here we \nreveal pronounced GMV changes in regions within sensory, attention \nand default mode networks over the gestational window. In paral- \nlel, we observed increased anisotropy in white matter tracts that \nfacilitate communication between emotional and visual processing \nhubs37–39, including the inferior longitudinal fasciculus and inferior \nfronto-occipital fasciculus. Pinpointing the synchrony of gray and \nwhite matter changes that unfold in the maternal brain could be \nkey to understanding the behavioral adaptions that emerge during \nand after pregnancy, such as honing the brain’s visual and auditory \nresponses to infant cues and eliciting maternal behavior. Research \ninto other major transition periods supports this idea. For instance, \nadolescence is a dynamic period characterized by region-specific, \nnonlinear decreases in GMV and increases in WMV, maturational \nbrain changes that are tied to gains in executive function and social \ncognition40. For both adolescence41 and matrescence, the consider- \nable rise in steroid hormone production appears to remodel the brain \n(see ref. 25 for comparative analysis), promoting a suite of behaviors \nadaptive to that life stage. How specific neural changes give rise to \nspecific behavioral adaptations has yet to be fully explored with \nrespect to human pregnancy. \n\n7. Celik, A., Somer, M., Kukreja, B., Wu, T. & Kalish, B. T. The \n\ngenomic architecture of pregnancy-associated plasticity in \nthe maternal mouse hippocampus.*eNeuro***9**, ENEURO.0117-22. \n2022 (2022). \n8. Puri, T. A., Richard, J. E. & Galea, L. A. M. Beyond sex differences: \n\nshort- and long-term effects of pregnancy on the brain.*Trends*\n*Neurosci.***46**, 459–471 (2023). \n9. Chaker, Z. et al. Pregnancy-responsive pools of adult neural \n\nstem cells for transient neurogenesis in mothers.*Science***382**, \n958–963 (2023). \n\n10. Diamond, M. C., Johnson, R. E. & Ingham, C. Brain plasticity \ninduced by environment and pregnancy.*Int. J. Neurosci.***2**, \n171–178 (1971). \n11. Servin-Barthet, C. et al. The transition to motherhood: \n\nlinking hormones, brain and behaviour.*Nat. Rev. Neurosci.***24**, \n605–619 (2023).", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "linking hormones, brain and behaviour.*Nat. Rev. Neurosci.***24**, \n605–619 (2023). \n\nThis precision imaging study mapped neuroanatomical changes \nacross pregnancy in a single individual, precluding our ability to gen- \neralize to the broader population. To benchmark our findings, we com- \npared the magnitude of GMV changes observed throughout pregnancy \nagainst data from nonpregnant individuals sampled over a similar time \ncourse. Doing so provided compelling evidence that pregnancy-related \nneuroanatomical shifts far exceed normative day-to-day brain variabil- \nity and measurement error. Evidence suggests that white matter micro- \nstructure remains fairly stable over a six-month period42, but more \nstudies are needed to compare the degree of white matter changes \nobserved during pregnancy to normative change over time. Further, \nsampling larger cohorts of women will generate much-needed norma- \ntive models of brain change (akin to ref. 43) throughout pregnancy to \nestablish what constitutes a typical degree of neuroanatomical change \nexpected during gestation and postpartum recovery. \n12. Ammari, R. et al. Hormone-mediated neural remodeling \n\norchestrates parenting onset during pregnancy.*Science***382**, \n76–81 (2023). \n\n13. Hoekzema, E. et al. Pregnancy leads to long-lasting changes in \nhuman brain structure.*Nat. Neurosci.***20**, 287–296 (2017). \n14. Hoekzema, E. et al. Mapping the effects of pregnancy on \n\nresting state brain activity, white matter microstructure, neural \nmetabolite concentrations and grey matter architecture.*Nat.*\n*Commun.***13**, 6931 (2022). \n\n15. Martínez-García, M., Paternina-Die, M., Desco, M., Vilarroya, O. \n& Carmona, S. Characterizing the brain structural adaptations \nacross the motherhood transition.*Front. Glob. Womens Health***2**, \n742775 (2021). \n16. Spalek, K. et al. Pregnancy renders anatomical changes in \n\nhypothalamic substructures of the human brain that relate to \naspects of maternal behavior.*Psychoneuroendocrinology***164**, \n107021 (2024). \n17. Martínez-García, M. et al. Do pregnancy-induced brain changes \n\nreverse? The brain of a mother six years after parturition.*Brain Sci.*\n**11**, 168 (2021b). \n18. De Lange, A.-M. G. et al. Population-based neuroimaging reveals \n\ntraces of childbirth in the maternal brain.*Proc. Natl Acad. Sci. USA*\n**116**, 22341–22346 (2019). \n\nThese findings provide a critical rationale for conducting further \nprecision imaging studies of pregnancy in demographically enriched \ncohorts to determine the universality and idiosyncrasy of these adap- \ntations and their role in maternal health. Are the changes observed in \nour participant reflective of the broader population? Do deviations \nfrom the norm lead to maladaptive outcomes? A precision imaging \napproach can help determine whether the pace of pregnancy-induced \nneuroanatomical changes drives divergent brain health outcomes in \nwomen, as may be the case during other rapid periods of brain devel- \nopment44. One in five women experiences perinatal depression45 and \nwhile the first FDA-approved treatment is now available46, early detec- \ntion remains elusive. Precision imaging studies could offer clues about \nan individual’s risk for or resilience to depression before symptom \nonset, helping clinicians better determine when and how to intervene. \nNeuroscientists and clinicians also lack tools to facilitate detection \nand treatment of neurological disorders that co-occur, worsen or \nremit with pregnancy, such as epilepsy, headaches, multiple sclerosis \nand intracranial hypertension47. Precision mapping of the maternal \nbrain lays the groundwork for a greater understanding of the subtle \nand sweeping structural, functional, behavioral and clinical changes \nthat unfold across pregnancy. Such pursuits will advance our basic", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "*Cortical GMV and CT*. We then narrowed our analyses to the first 19 \nsessions (baseline—36 weeks gestation) to assess novel brain changes \noccurring over the gestational window. We first computed Pearson’s \nproduct-moment correlation matrices between the following vari- \nables: gestation week, estradiol, progesterone and the 17 network-level \naverage GMV values. We then ran a multivariate regression analysis \npredicting ROI-level GMV changes by gestation week. To identify which \nregions were changing at a rate different from the global decrease, \nwe then ran the analyses again to include total GMV in the regression \nmodel (Supplementary Table 2). This was extended to the network \nlevel, where we ran partial correlations accounting for total GMV. These \nsame analyses were then run with CT measures. Globally-corrected \nresults provided in Supplementary Tables 1–5. Percent change at the \nnetwork level was computed by subtracting the final pregnancy value \n(36 weeks pregnant) from the first prepregnancy baseline value, then \ndividing that difference by said first prepregnancy baseline value. All \nanalyses underwent multiple comparisons testing (false discovery rate \n(FDR)-corrected at*q*< 0.05). \n\n||*ts*− ̂*t*|| \n̂*t*\nε*j*= 100 × mean ( ) \n\nWhere*ts*is the morphometric measurement of a parcel for session*s*\n̂*t*is the mean of*t*across sessions55,79. Thus, we defined variability \nand \nas the mean absolute percent difference between each individual and \nthe mean across sessions. Across-session variability estimates for all \n400 regions were then averaged across eight participants, and a global \nmeasure of cortical GMV variability was computed by averaging across \nthe 400 regions. This approach was repeated independently for the \nT2 hippocampal scans, wherein we computed across-session variability \nfor each parcel of the ASHS parcellation scheme (*n*= 7 bilateral sub- \nfields). However, it is important to note that raw subfield values (that \nis, no manual retouching) were used for Day2Day variability assess- \nments and should be interpreted with caution. Finally, to better com- \npare against our own data, we repeated this approach using our", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - }, - { - "text": "**Cortical volume and thickness changes tied to gestation**\nWe then narrowed the aperture to capture changes unfolding within \ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships \nbetween summary brain metrics were evident over the gestational \nperiod as follows: total brain volume, GMV and CT were positively asso- \nciated with one another, whereas lateral ventricles, CSF and global QA \ndemonstrated negative relationships with GMV (Supplementary Fig. 1). \nChanges in GMV were near-ubiquitous across the cortical mantle \n(Fig. 2a). Most large-scale brain networks exhibited decreases in GMV \n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of \ninterest (ROI) demonstrated negative relationships between GMV and \ngestation week (Fig. 2a and Supplementary Table 2). Together, these \nresults provide evidence of a global decrease in cortical volume across \npregnancy. Several sensory and attention subnetworks were particu- \nlarly sensitive to gestation, including the control (subnetwork B), sali- \nence/ventral attention (subnetwork A), dorsal attention (subnetwork \nB), default (subnetwork A) and somatomotor (subnetworks A and B) \nnetworks (Supplementary Table 1). Regions driving these network-level \nchanges include the bilateral inferior parietal lobe, postcentral gyri, \ninsulae, prefrontal cortex, posterior cingulate and somatosensory \ncortex (Fig. 2c, Supplementary Table 2 and validation of findings using \nalternate pipeline in Supplementary Tables 1 and 3). These regions and \n\n**White matter microstructure changes tied to gestation**\nIn contrast to decreasing global GMV, correlational tractography of \nwhite matter, which tests for linear trends in the data, revealed increas- \ning microstructural integrity across the whole brain during gestation \n(Fig. 4a), concomitant with the rise in 17β-estradiol and progesterone \n(all*q*< 0.001; Supplementary Fig. 9). Tracts displaying robust corre- \nlations with gestational week included the corpus callosum, arcuate \nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal \nfasciculus (Fig. 4b), as well as the cingulum bundle, middle and superior \nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon- \ntine tracts (see Supplementary Table 9 for complete list). \n\n**Comparing brain changes across pregnancy against controls**\nWe then compared the changes in GMV across gestation to that of typi- \ncal variability over time, derived from eight densely-sampled controls23. \nThe GMV changes we see across pregnancy far exceed normative brain \nvariability (Supplementary Fig. 11). On average, change in cortical GMV \nwas nearly three times higher than controls scanned over a similar \nduration (Supplementary Fig. 11a,b). This extends to MTL subfields, \nwherein change in volume was three to four times greater across gesta- \ntion than normative brain variability (Supplementary Fig. 11c,d). We \ncontextualized these findings further by comparing gestational GMV \nchange against our participant’s preconception brain volumes; average \nGMV change during pregnancy was six times (cortical) and three times \n(MTL) higher than the variability observed between baseline sessions.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "Our findings from this precision imaging study show that preg- \nnancy is characterized by reductions in GMV, cortical thinning and \nenhanced white matter microstructural integrity that unfold week by \nweek. These changes were also tied to the significant rise in steroid hor- \nmone concentrations over pregnancy. Some of these changes persist \nat 2 years postpartum (for example, global reductions in GMV and CT), \nwhile others, including markers of white matter integrity, appear to be \ntransient. Ventricular expansion and contraction parallel these cortical \nchanges. These widespread patterns, and the notable increase in CSF \nvolume across gestation, could reflect increased water retention and \nsubsequent compression of cortical tissue. However, the persistence \nof these changes at 2 years postpartum and regional variation in GMV, \nCT and QA, hint at cellular underpinnings, such as alterations in glia", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed4.pdf", - "query": "Which cortical sub-networks were particularly sensitive to pregnancy?", - "target_page": 2, - "target_passage": "Several sensory and attention subnetworks were particu- larly sensitive to gestation, including the control (subnetwork B), sali- ence ventral attention (subnetwork A), dorsal attention (subnetwork B), default (subnetwork A) and somatomotor (subnetworks A and B) networks", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Cortical volume and thickness changes tied to gestation**\nWe then narrowed the aperture to capture changes unfolding within \ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships \nbetween summary brain metrics were evident over the gestational \nperiod as follows: total brain volume, GMV and CT were positively asso- \nciated with one another, whereas lateral ventricles, CSF and global QA \ndemonstrated negative relationships with GMV (Supplementary Fig. 1). \nChanges in GMV were near-ubiquitous across the cortical mantle \n(Fig. 2a). Most large-scale brain networks exhibited decreases in GMV \n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of \ninterest (ROI) demonstrated negative relationships between GMV and \ngestation week (Fig. 2a and Supplementary Table 2). Together, these \nresults provide evidence of a global decrease in cortical volume across \npregnancy. Several sensory and attention subnetworks were particu- \nlarly sensitive to gestation, including the control (subnetwork B), sali- \nence/ventral attention (subnetwork A), dorsal attention (subnetwork \nB), default (subnetwork A) and somatomotor (subnetworks A and B) \nnetworks (Supplementary Table 1). Regions driving these network-level \nchanges include the bilateral inferior parietal lobe, postcentral gyri, \ninsulae, prefrontal cortex, posterior cingulate and somatosensory \ncortex (Fig. 2c, Supplementary Table 2 and validation of findings using \nalternate pipeline in Supplementary Tables 1 and 3). These regions and \n\n**White matter microstructure changes tied to gestation**\nIn contrast to decreasing global GMV, correlational tractography of \nwhite matter, which tests for linear trends in the data, revealed increas- \ning microstructural integrity across the whole brain during gestation \n(Fig. 4a), concomitant with the rise in 17β-estradiol and progesterone \n(all*q*< 0.001; Supplementary Fig. 9). Tracts displaying robust corre- \nlations with gestational week included the corpus callosum, arcuate \nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal \nfasciculus (Fig. 4b), as well as the cingulum bundle, middle and superior \nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon- \ntine tracts (see Supplementary Table 9 for complete list). \n\n**Comparing brain changes across pregnancy against controls**\nWe then compared the changes in GMV across gestation to that of typi- \ncal variability over time, derived from eight densely-sampled controls23. \nThe GMV changes we see across pregnancy far exceed normative brain \nvariability (Supplementary Fig. 11). On average, change in cortical GMV \nwas nearly three times higher than controls scanned over a similar \nduration (Supplementary Fig. 11a,b). This extends to MTL subfields, \nwherein change in volume was three to four times greater across gesta- \ntion than normative brain variability (Supplementary Fig. 11c,d). We \ncontextualized these findings further by comparing gestational GMV \nchange against our participant’s preconception brain volumes; average \nGMV change during pregnancy was six times (cortical) and three times \n(MTL) higher than the variability observed between baseline sessions.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes \n\nLateral ventricle \n\nCaudate \n\nThalamus \n4,000 \n) \n3 \nm \nm \n3,800 \n( \n\nV \nM \nG \ng \nv \nA \n3,600 \n\n\n\nRight ventral diencephalon \nGestation Gestation + postpartum \n\n4,000 \n\n3,900 \n\n3,800 \n\n3,700 \n\n3,600 \n\n3,500 \n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\n\n\n\n\n\n\n\n\n\n\nGestation \n*R2* adj = 0.41,*q*= 0.027 \n) \n3 \n200 \nm \nm \n180 ( \n\nV \nM \nG \ng \nv \nA \n\n180 \n\n160 \n\n0 10 \n\n\n\n1,900 \n\n1,800 \n\n1,700 \nPre \n1st 2nd 3rd \nStage \n30 \n\nGestation Gestation + postpartum \n*R2* adj = 0.36,*q*= 0.031 \n) \n540 3 \n540 \nm \nm \n( \n\nV \nM \nG \ng \nv \nA \n460 460 \n0 \n20 \n10 \nWeek \n30 Pre \n1st 2nd 3rd \nStage \n\nGestation + postpartum Gestation \n*R2* adj = 0.58,*q*= 0.001 200 \n) \n3 \nm \nm \n1,900 \n( \n\nV \nM \nG \ng \nv \nA \n\n1,800 \n160 \n1,700 \n\n20 \nWeek \n30 Pre 1st 2nd 3rd Post 0 \n10 \nWeek \n20 \nStage \n\n**Fig. 3 | Subcortical GMV changed throughout gestation. a**, Multivariate \nregression analyses revealed largely negative relationships between gestation \nweek and subcortical GMV regions over pregnancy, including bilateral thalamus, \ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus, \nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral \nventricles displayed the only positive relationships with gestation week \n(also depicted in Fig. 1d). The whole-brain subcortical GMV estimates shown \nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR- \ncorrected at*q*< 0.05. Inset, right ventral diencephalon displayed the strongest \nnegative association with gestation (left; baseline—36 weeks, 19 scans) and did \nnot return to baseline postpartum (right; gestation and postpartum, 26 scans). \n**b**, The participant’s hippocampus and surrounding cortex were segmented \ninto seven bilateral subregions. Quadratic (CA1, CA2/CA3) and linear regression \nanalyses (PHC) revealed subfields were negatively associated with gestation \nweek (baseline—36 weeks, 18 scans) and did not return to baseline postpartum \n(gestation and postpartum, 25 scans). Shaded regions in scatterplots represent \na 95% confidence interval. Each boxplot represents IQR for each stage, with a \nhorizontal line representing the median value. The whiskers indicate variability \noutside (±1.5) of this range. Outside values are >1.5× and <3× IQR beyond either \nend of the box. FDR-corrected at*q*< 0.05. For**a**and**b**, nonsignificant regions \nwere set to zero for interpretability. See Supplementary Fig. 6 for complete \nlabeling of regions in both segmentations. Brain visualizations created with R \npackage ggseg48*.*DC, diencephalon. \n\noutstanding questions. This study and corresponding open-access \ndataset offer neuroscientists a detailed map of the human brain across \ngestation, a resource for which a wide range of previously unattainable \nneurobiological questions can now be explored. \n\nor neuron number, synaptic density and myelination (for review on \nthe latter, see ref. 4). Future studies of the relationship between fluid \ndynamics and volumetric changes will help clarify the factors that drive \nglobal neural changes during pregnancy; such insights will have broad \nimplications for maternal health (for example, neurological effects tied \nto pre-eclampsia or edema).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed4.pdf" - }, - { - "text": "–8 \n\nl \na \nt \no \nT \nA \nc \nb \nm \nL \nC \nN \nM \nD \ni \nr \ne \nP \ns \ni \nV \nt \nn \ne \nC \ns \ni \nV \nB \nN \nM \nD \nB \nt \no \nM \nm \no \nS \n\ni \ni \n\n\n\nL \n\nLat R \nMed \n\nRegional GMV \n\nPostcentral gyrus \nDorsal attention network B \n\nB \nt \nn \no \nC \nB \nc \nb \nm \nL \nA \nN \nM \nD \nr \na \nP \np \nm \ne \nT \nA \nn \nt \nt \nA \ns \nr \no \nD \nA \nt \no \nM \nm \no \nS \nA \nt \nn \no \nC \nB \nn \nt \nt \nA \ns \nr \no \nD \nC \nt \nn \no \nC \n\nA \nn \nt \nt \nA \nt \nn \ne \nV \nl \na \nS B \nn \nt \nt \nA \nt \nn \ne \nV \nl \na \nS \n\ni \ni \n\nFrontal eye fields \nDorsal attention network B \n\n\n\n\n\n\n\nGestation Gestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( ) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 –1 –1 \n\nV \nM \nG \ng \nv \nA V \nM \nG \ng \nv \nA \n–2 –2 –2 \n\n0 10 \n20 \nWeek \n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\nMedial frontal \nSalience ventral attention network A Inferior parietal \nControl network B \n\nGestation + postpartum Gestation Gestation + postpartum \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n–1 –1 \n\nV \nM \nG \ng \nv \nA \n–2 –2 \n\n30 Pre 1st \n2nd \nStage \n3rd Post 0 10 \n20 \nWeek \n\nInsula \nSalience ventral attention network B \n\n\n\n\n\n\n\nGestation Gestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( ) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 –1 \n\nV \nM \nG \ng \nv \nA V \nM \nG \ng \nv \nA \n\n–1 \n–2 –2 –2 \n\n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post 0 10 \n20 \nWeek \n\nGestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 \n\nV \nM \nG \ng \nv \nA \n\n–1 \n–2 –2 \n\n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\n**Fig. 2 | Cortical GMV showed widespread change through gestation and**\n**postpartum. a**, Multivariate regression analyses reveal largely negative \nrelationships between gestation week and regional GMV, with only a minority \nof regions unaffected or increasing over the gestational window (baseline—36 \nweeks). All associations presented here were corrected for multiple comparisons \n(FDR at*q*< 0.05; nonsignificant values set to zero for interpretability).**b**, Average \nnetwork change was calculated by estimating GMV percent change from baseline \n(initial) to 36 weeks gestation (final). Attention and control networks appear \nmost affected.**c**, Six representative regions, classified by major subnetworks, \nthat exhibit pronounced GMV change across gestation. For each panel, we \ndisplay a scatterplot between average GMV of the ROIs and gestation week \n(left; gestation sessions only, 19 scans), and summary GMV of ROIs by pregnancy \nstage across the whole study (right; gestation and postpartum sessions, 26 scans). Shaded regions in scatterplots represent a 95% confidence interval. Each \nboxplot represents IQR for each stage, with a horizontal line representing the \nmedian value. The whiskers indicate variability outside (±1.5) of this range. \nOutside values are >1.5× and <3× IQR beyond either end of the box. All statistical \ntests were corrected for multiple comparisons (FDR at*q*< 0.05) and values \nwere*z*scored and transformed to have a mean of zero and s.d. of one for easier \ncomparison across regions. Please note that the data values shown here are raw \n(see Supplementary Tables 1 and 2 and Supplementary Data 1 for exhaustive list). \nBrain visualizations created with R package ggseg48. IQR, interquartile range; \nLat, lateral; Med, medial; DMN, default mode network; VisPeri, visual peripheral \nnetwork; SomMot, somatomotor network; VisCent, visual central network; Cont, \ncontrol network; TempPar, temporal parietal network; DorsAttn, dorsal attention \nnetwork; SalVentAttn, salience/ventral attention network.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed4.pdf" - }, - { - "text": "table, th, td {\n border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]\n
20.Cotridge, A. et al. Change in brain size during and after pregnancy : study in healthy women and women with preeclampsia. Am. J. Neuroradiol. 23.19 – 26 ( 2002 ).38.
21.Paternina - Di, M. et al. Women ’ s neuroplasticity during gestation, childbirth and postpartum. Nat. Neurosci. 27.399 – 327 ( 2024 ).39.
22.Makris, N. et al. Decreased volume of the brain reward system in alcoholism. Biol. Psychiatry 64.192 - 202 ( 2008 ).23.
Filevich, E. et al. Day2day : investigating daily variability of magnetic resonance imaging measures over half a year. BMC Neurosci. 18.65 ( 2017 ).40.24.
Dulac, C., O ’ Connell, L. A. & Wu, Z. Neural control of maternal and paternal behaviors. Science 345.765 – 770 ( 2014 ).41.25.
Carmona, S. et al. Pregnancy and adolescence entail similar neuroanatomical adaptations. a comparative analysis of cerebral morphometric changes. Hum. Brain Mapp, 40.2143 – 2152 ( 209 ).42.26.
Pawluski, J. L., Hoekzema, E., Leuner, B. & Lonstein, J. S. Less canTableTable
be more. fine tuning the maternal brain. Neurosci. Biobehax. Rev. 133.104475 ( 2022 ).43.27.
Martinez - Garcia, M., Jacobs, E. G., de Lange, A. M. G. & Carmona, S. Advancing the neuroscience of human pregnancy. Nat. Neurosci, ZT, 805 – 807 ( 2024 ).44.28.
Pritschet, L., Taylor, C. M., Santander, T. & Jacobs, E. G. Applying dense - sampling methods to reveal dynamic endocrine45.Table
modulation of the nervous system. Curr. Opin. Behav. Sci. 40.72 – 78 ( 2021 ).46.29.
Taxier, L. R., Gross, K. S. & Frick, K. M. Oestradiol as a neuromodulator of learning and memory. Nat. Rev. Neurosci. 2f,47.Table
535 – 550 ( 2020 ).48.30.
Kohl, J. et al. Functional circuit architecture underlying parental behaviour. Nature 556.326 – 331 ( 2018 ). Article 7701.31.Rodrigo, M. J. et al. Inferior fronto - temporo - occipital connectivity : a missing link between maltreated girls and neglectful mothers. Soc. Cogn. Affect. Neurosci. It, 1658 – 1665 ( 2016 ).
Pubjuris32.Pawluski, J. L., L., Lonstein, J. S. & Fleming, A. S. The neurobiology of postpartum anxiety and depression. Trends Neurosci. 40.106 – 120 ( 2017 ).
Ope Attrition33.Barba - Muller, E., Craddock, S., Carmona, S. & Hoekzema, E. Brain plasticity in pregnancy and the postpartum period : links to maternal caregiving and mental health. Arch. Womens Ment. Health 22.289 – 299 ( 2019 ).
adapas last south34.Barth, C. & de Lange, A.- M. G. Towards an understanding of women ’ s brain aging the immunology of pregnancy and menopause. Front. Neuroendocrinol, 58.100850 ( 2020 ).
artic individual incleaves35.Orchard, E. R., Rutherford, H. J. V., Holmes, A. J. & Jamadar, S. D. Matrescence. Ufetime impact of motherhood on cognition and the brain. Trends Cogn. Sci. Zf, 302 – 316 [ 2023 ].
use use, hold36.Duarte - Guterman, F : et al. Cellular and molecular signatures of motherhood in the adult and ageing rat brain. Open Biol. 10.230217 ( 2023 ).
org /
", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed4.pdf" - }, - { - "text": "sleep patterns11. These factors could have a role in the brain changes \nobserved here, with some driving neurobiological changes and others, \nlike water retention, potentially affecting MRI-based measurements. \nNote that, although cortical reductions in GMV over gestation were \nstable across analyses, accounting for QC measures influenced the \nmagnitude and location of these results. These metrics all fell within \nthe standard range, but there may be meaningful reductions in signal \nthat accompany volumetric reductions (for example, increased CSF \nand decreased GM)—a methodological nuance that goes beyond the \nscope of this resource study. Ultimately, identifying the shared and \nunique contributions of these factors to the neuroanatomical changes \nthat unfold across gestation warrants further investigation. Deeply \nphenotyping a large and diverse cohort of women across pregnancy will \nopen up new avenues of exploration, for example, allowing research- \ners to link blood-based proteomic signatures to pregnancy outcomes; \ndeploying wearable devices to monitor changes in sleep, cognition and \nmood; and probing the broader social and environmental determinants \nof maternal health27. overlook the full range of changes that unfold within the gestational \nwindow, and underrepresent the brain’s metamorphosis during preg- \nnancy. Furthermore, although observed changes were largely global, \nsome regions displayed notable stability (for example, extrastriate cor- \ntex). The subcortical region that displayed the strongest relationship \nwith gestation week was the ventral diencephalon, which encompasses \nthe hypothalamus and subsequent medial preoptic area and paraven- \ntricular nucleus—structures critical for inducing maternal behavior12,16. \nThe hippocampus exhibited a reduction in volume across gestation, \nand with higher spatial resolution, this reduction was revealed to be \ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other \nhippocampal subfields remained stable. Adjacent PHC within the \nMTL also exhibited volume reduction across gestation. While our hip- \npocampal findings are consistent with pre/post studies of pregnancy13, \nthe precision lens applied within gestation revealed the nonlinear \nnature of this reduction. Recapitulating and clarifying these region- \nally specific patterns of volume change throughout the MTL merits \nfurther investigation. \n\nSimilar precision imaging studies have captured dynamic brain \nreorganization across other neuroendocrine transitions, such as the \nmenstrual cycle (see review in ref. 28), underscoring the powerful \nrole steroid hormones have in shaping the mammalian brain29. Endo- \ncrine changes across pregnancy dwarf those that occur across the \nmenstrual cycle, which highlights the critical need to map the brain’s \nresponse to this unique hormonal state. Broad physiological changes \noccur in tandem with the rise in steroid hormones, including changes \nin body mass composition, water retention, immune function and The neuroanatomical changes that unfold during matrescence \nmay have broad implications for understanding individual differences \nin parental behavior13,24,30,31, vulnerability to mental health disorders32,33 \nand patterns of brain aging18,19,34–36. Decreases in GMV may reflect \n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- \ntion for parenthood26. For example, in rodents, steroid hormones \npromote parental behavior by remodeling specific neural circuits in the \nmedial preoptic area of the hypothalamus. These behavioral adapta- \ntions are critical to the dam’s ability to meet the demands of caring for", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" - }, - { - "text": "In contrast, GMV within regions of the default mode (subnetwork \nC), limbic (subnetworks A and B) and visual peripheral networks buck \nthe global trend by slightly increasing (for example, temporal poles), \nremaining constant (for example, orbitofrontal cortex) or reducing at \na much slower rate (for example, extrastriate cortex) than total GMV \n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these \nregions exhibit similar patterns (Supplementary Fig. 3 and Supple- \nmentary Tables 4 and 5). \n\n**Results**\n**Serological evaluations**\nSerological evaluations captured canonical hormone fluctuations \ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). \nSerum hormone concentrations increased significantly over the course \nof pregnancy and dropped precipitously postpartum (preconcep- \ntion, estradiol (E) = 3.42 pg ml−1 and progesterone (P) = 0.84 ng ml−1; \n3 weeks preparturition, E = 12,400 pg ml−1 and P = 103 ng ml−1; 3 months \npostparturition, E = 11.50 pg ml−1 and P = 0.04 ng ml−1). \n\n**Subcortical GMV changes tied to gestation**\nConsistent with the broader cortical reductions in GMV, several subcor- \ntical regions significantly reduced in volume across gestation (Fig. 3a, \nleft). This included bilateral ventral diencephalon (right hemisphere \nvalues shown in Fig. 3a, right; encompasses hypothalamus, substantia \nnigra, mammillary body, lateral geniculate nucleus and red nucleus \namong others22), caudate, hippocampus and thalamus, along with left \nputamen and brain stem (Supplementary Table 6,*q*< 0.05). \n\nNext, high-resolution segmentation of the MTL allowed us to \ninterrogate subcortical structures at a finer resolution, revealing non- \nlinear volumetric decreases in CA1 (*F*(2,15) = 5.84,*q*= 0.031,*R*2 \nadj = 0.36; \nFig. 3b, left) and CA2/CA3 (*F*(2,15) = 6.82,*q*= 0.027,*R*2 \nadj = 0.41; Fig. 3b, \nmiddle) across gestation. PHC exhibited linear volumetric decreases \nacross gestation (*F*(1,16) = 24.87,*q*< 0.001,*R*2 \nadj = 0.58; Fig. 3b, right) \nwhich was also tied to estradiol (*F*(1,12) = 20.21,*q*= 0.005,*R*2 \nadj = 0.60). \nAll three relationships remained significant after proportional correc- \ntion for total GMV. There was no significant change in other subregions \nor total volume of the hippocampal body, or in the parahippocampal \ngyrus (Supplementary Table 7 and Supplementary Fig. 8). \n\n**Whole-brain dynamics from baseline through postpartum**\nTo begin, we characterized broad neuroanatomical changes over the \ncourse of the entire experimental window (baseline—2 years postpar- \ntum, 26 scans; Fig. 1d). Generalized additive models revealed strong \nnonlinear (effective degrees of freedom > 3) relationships between \nweeks since conception and summary brain metrics. Total GMV \n(*F*= 27.87,*P*< 0.001, deviance explained = 93.9%,*R*2 \nadj = 0.91), summary \nCT (*F*= 15.79,*P*< 0.001, deviance explained = 78.6%,*R*2 \nadj = 0.75) and \ntotal brain volume (*F*= 26.12,*P*< 0.001, deviance explained = 93.4%, \n*R*2 \nadj = 0.90) linearly decreased during gestation and appeared to \npartially rebound postpartum. In contrast, global microstructural \nintegrity (QA) of white matter increased throughout the first and sec- \nond trimesters before returning to baseline levels in the postpartum \nperiod (whole-brain QA,*F*= 4.62,*P*= 0.007, deviance explained = 60.2%, \n*R*2 \nadj = 0.51). We also observed nonlinear patterns of lateral ventricle \nexpansion*(F*= 10.44,*P*< 0.001, deviance explained = 83.8%,*R*2 \nadj = 0.77) \nand increased cerebrospinal fluid (CSF;*F*= 13.32,*P*< 0.001, deviance \nexplained = 83.8%,*R*2 \nadj = 0.79) rising in the second and third trimesters \nbefore dropping sharply postpartum.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "*Cortical GMV and CT*. We then narrowed our analyses to the first 19 \nsessions (baseline—36 weeks gestation) to assess novel brain changes \noccurring over the gestational window. We first computed Pearson’s \nproduct-moment correlation matrices between the following vari- \nables: gestation week, estradiol, progesterone and the 17 network-level \naverage GMV values. We then ran a multivariate regression analysis \npredicting ROI-level GMV changes by gestation week. To identify which \nregions were changing at a rate different from the global decrease, \nwe then ran the analyses again to include total GMV in the regression \nmodel (Supplementary Table 2). This was extended to the network \nlevel, where we ran partial correlations accounting for total GMV. These \nsame analyses were then run with CT measures. Globally-corrected \nresults provided in Supplementary Tables 1–5. Percent change at the \nnetwork level was computed by subtracting the final pregnancy value \n(36 weeks pregnant) from the first prepregnancy baseline value, then \ndividing that difference by said first prepregnancy baseline value. All \nanalyses underwent multiple comparisons testing (false discovery rate \n(FDR)-corrected at*q*< 0.05). \n\n||*ts*− ̂*t*|| \n̂*t*\nε*j*= 100 × mean ( ) \n\nWhere*ts*is the morphometric measurement of a parcel for session*s*\n̂*t*is the mean of*t*across sessions55,79. Thus, we defined variability \nand \nas the mean absolute percent difference between each individual and \nthe mean across sessions. Across-session variability estimates for all \n400 regions were then averaged across eight participants, and a global \nmeasure of cortical GMV variability was computed by averaging across \nthe 400 regions. This approach was repeated independently for the \nT2 hippocampal scans, wherein we computed across-session variability \nfor each parcel of the ASHS parcellation scheme (*n*= 7 bilateral sub- \nfields). However, it is important to note that raw subfield values (that \nis, no manual retouching) were used for Day2Day variability assess- \nments and should be interpreted with caution. Finally, to better com- \npare against our own data, we repeated this approach using our", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - }, - { - "text": "As a further test of the robustness of the dataset, we ran QC assess- \nments on all T1w images using the IQMs pipeline64 from MRIQC (ver- \nsion 23.1). Assessments of interest included (1) coefficient of joint \nvariation (CJV), (2) signal-to-noise ratio for gray matter (SNR) and (3) \ncontrast-to-noise ratios (CNR). All QC metrics fell within expected \nstandard ranges65 (Supplementary Fig. 4b–d). Although relationships \nexisted between gestation week and QC measures (CJV,*r*= 0.70 and \n*P*< 0.001; SNR and CNR,*r*= −0.83 and*P*< 0.001), including these vari- \nables in the regression models did not detract from our finding sug- \ngesting cortical GMV reductions occur over gestation, especially within \nregions belonging to attention and somatosensory networks (Supple- \nmentary Fig. 5). When looking across all MRIQC outputs, discrepancies \nwere noted in session seven (gestation week nine, first trimester). \nRemoving this day from the analyses only strengthened observed \nrelationships between cortical volume and gestation; however, for \ncompleteness, data from this day is included in the main findings. \nThese QC outputs for each session of the experiment can be found \nin Supplementary Data 1. Finally, we used FreeSurfer’s Eueler num- \nber to evaluate a field-standard quantitative assessment of each T1w \nstructural image66. We observed no significant relationships between \nthe Euler number and gestation week or summary brain metrics. A \ndiscrepancy (for example, two s.d. below average) was noted in session \neight; however, again, removing this session did not detract from our \nmain findings showing reductions in GMV over gestation.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed4.pdf" - }, - { - "text": "performed an outlier check, labeling images as a ‘low-quality outlier’ if \nthe correlation coefficient was >3 s.d. from the absolute mean. None of \nour scans were flagged as outliers. The reconstructed participant files \nwere aggregated into one connectometry database per metric. *Subcortical GMV*. A similar statistical approach was taken for subcorti- \ncal volume estimates. We ran a multivariate regression analysis predict- \ning GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by \ngestation week (FDR-corrected at*q*< 0.05). \n\nTo evaluate the relationship between gestation week and MTL \nsubregion volume over pregnancy (*n*= 7 bilateral subregions and \n*n*= 18 MTL scans), we used a combination of linear and nonlinear \nmodels based on individual subregion data patterns. Models were \ncompared for best fit with each subregion via AIC from the GLM output \n(as described in ‘Summary brain metrics’). A linear regression model \nwas most appropriate for PHC (AICdiff < 3), whereas a quadratic model \nperformed best for CA1 and CA2/CA3. As a control, we repeated the \nanalyses with MTL subregion volumes after proportional volume cor- \nrection of total GMV calculated by ASHS. Finally, we evaluated the \nrelationship between endogenous sex hormones (estrogen and proges- \nterone) and subregion volumes using linear regression. Relationships \nwere considered significant only if they met FDR correction at*q*< 0.05. \n\n*Day2Day control dataset*. To compare our findings against a control \ngroup of nonpregnant densely-sampled individuals, we used the Day- \n2Day dataset23 which offered comparable whole-brain T1 and T2 MTL \nscans for eight participants (two male) scanned 12–50 times over 2–7 \nmonths. Each participant was run through the ANTs CT and ASHS pro- \ncessing pipelines as outlined above (‘Cortical volume and thickness’ \nand ‘Hippocampal segmentation’). To note, for each participant, we \ncreated an SST based on their first two sessions for consistency with \nthe primary dataset; subfield volumes for the T2 MTL scans did not \nundergo manual retouching. Due to missing header information on \nthe publicly available diffusion scans, we were unable to benchmark \nour white matter changes with the Day2Day dataset. \n\n**Statistical analysis.**Statistical analyses were conducted using R (sMRI; \nversion 3.4.4) and DSI Studio (dMRI; Chen-2022-07-31).", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - }, - { - "text": "**References**\n1. World Health Organization. Maternal, newborn, child and \nadolescent health and ageing. platform.who.int/data/ \nmaternal-newborn-child-adolescent-ageing (2022). \n\n2. Thornburg, K. L., Bagby, S. P. & Giraud, G. D.*Knobil and Neill’s*\n*Physiology of Reproduction*pp. 1927–1955 (Elsevier, 2015). \n3. Brunton, P. J. & Russell, J. A. The expectant brain: adapting for \nmotherhood.*Nat. Rev. Neurosci.***9**, 11–25 (2008). \n4. Gregg, C. Pregnancy, prolactin and white matter regeneration. \n*J. Neurol. Sci.***285**, 22–27 (2009). \n5. Haim, A. et al. A survey of neuroimmune changes in pregnant \n\nand postpartum female rats.*Brain Behav. Immun.***59**, \n67–78 (2017). \n6. Barrière, D. A. et al. Brain orchestration of pregnancy and \n\nmaternal behavior in mice: a longitudinal morphometric study. \n*NeuroImage***230**, 117776 (2021). \n\nAlthough studied to a lesser degree, ties between maternal \nbehavior and white matter microstructure (particularly connectiv- \nity between temporal and occipital lobes) have been noted31. Here we \nreveal pronounced GMV changes in regions within sensory, attention \nand default mode networks over the gestational window. In paral- \nlel, we observed increased anisotropy in white matter tracts that \nfacilitate communication between emotional and visual processing \nhubs37–39, including the inferior longitudinal fasciculus and inferior \nfronto-occipital fasciculus. Pinpointing the synchrony of gray and \nwhite matter changes that unfold in the maternal brain could be \nkey to understanding the behavioral adaptions that emerge during \nand after pregnancy, such as honing the brain’s visual and auditory \nresponses to infant cues and eliciting maternal behavior. Research \ninto other major transition periods supports this idea. For instance, \nadolescence is a dynamic period characterized by region-specific, \nnonlinear decreases in GMV and increases in WMV, maturational \nbrain changes that are tied to gains in executive function and social \ncognition40. For both adolescence41 and matrescence, the consider- \nable rise in steroid hormone production appears to remodel the brain \n(see ref. 25 for comparative analysis), promoting a suite of behaviors \nadaptive to that life stage. How specific neural changes give rise to \nspecific behavioral adaptations has yet to be fully explored with \nrespect to human pregnancy. \n\n7. Celik, A., Somer, M., Kukreja, B., Wu, T. & Kalish, B. T. The \n\ngenomic architecture of pregnancy-associated plasticity in \nthe maternal mouse hippocampus.*eNeuro***9**, ENEURO.0117-22. \n2022 (2022). \n8. Puri, T. A., Richard, J. E. & Galea, L. A. M. Beyond sex differences: \n\nshort- and long-term effects of pregnancy on the brain.*Trends*\n*Neurosci.***46**, 459–471 (2023). \n9. Chaker, Z. et al. Pregnancy-responsive pools of adult neural \n\nstem cells for transient neurogenesis in mothers.*Science***382**, \n958–963 (2023). \n\n10. Diamond, M. C., Johnson, R. E. & Ingham, C. Brain plasticity \ninduced by environment and pregnancy.*Int. J. Neurosci.***2**, \n171–178 (1971). \n11. Servin-Barthet, C. et al. The transition to motherhood: \n\nlinking hormones, brain and behaviour.*Nat. Rev. Neurosci.***24**, \n605–619 (2023).", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed4.pdf", - "query": "What may reflect the decrease in GMV during pregnancy?", - "target_page": 6, - "target_passage": " Decreases in GMV may reflect ‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- tion for parenthood", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**Cortical volume and thickness changes tied to gestation**\nWe then narrowed the aperture to capture changes unfolding within \ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships \nbetween summary brain metrics were evident over the gestational \nperiod as follows: total brain volume, GMV and CT were positively asso- \nciated with one another, whereas lateral ventricles, CSF and global QA \ndemonstrated negative relationships with GMV (Supplementary Fig. 1). \nChanges in GMV were near-ubiquitous across the cortical mantle \n(Fig. 2a). Most large-scale brain networks exhibited decreases in GMV \n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of \ninterest (ROI) demonstrated negative relationships between GMV and \ngestation week (Fig. 2a and Supplementary Table 2). Together, these \nresults provide evidence of a global decrease in cortical volume across \npregnancy. Several sensory and attention subnetworks were particu- \nlarly sensitive to gestation, including the control (subnetwork B), sali- \nence/ventral attention (subnetwork A), dorsal attention (subnetwork \nB), default (subnetwork A) and somatomotor (subnetworks A and B) \nnetworks (Supplementary Table 1). Regions driving these network-level \nchanges include the bilateral inferior parietal lobe, postcentral gyri, \ninsulae, prefrontal cortex, posterior cingulate and somatosensory \ncortex (Fig. 2c, Supplementary Table 2 and validation of findings using \nalternate pipeline in Supplementary Tables 1 and 3). These regions and \n\n**White matter microstructure changes tied to gestation**\nIn contrast to decreasing global GMV, correlational tractography of \nwhite matter, which tests for linear trends in the data, revealed increas- \ning microstructural integrity across the whole brain during gestation \n(Fig. 4a), concomitant with the rise in 17β-estradiol and progesterone \n(all*q*< 0.001; Supplementary Fig. 9). Tracts displaying robust corre- \nlations with gestational week included the corpus callosum, arcuate \nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal \nfasciculus (Fig. 4b), as well as the cingulum bundle, middle and superior \nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon- \ntine tracts (see Supplementary Table 9 for complete list). \n\n**Comparing brain changes across pregnancy against controls**\nWe then compared the changes in GMV across gestation to that of typi- \ncal variability over time, derived from eight densely-sampled controls23. \nThe GMV changes we see across pregnancy far exceed normative brain \nvariability (Supplementary Fig. 11). On average, change in cortical GMV \nwas nearly three times higher than controls scanned over a similar \nduration (Supplementary Fig. 11a,b). This extends to MTL subfields, \nwherein change in volume was three to four times greater across gesta- \ntion than normative brain variability (Supplementary Fig. 11c,d). We \ncontextualized these findings further by comparing gestational GMV \nchange against our participant’s preconception brain volumes; average \nGMV change during pregnancy was six times (cortical) and three times \n(MTL) higher than the variability observed between baseline sessions.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "sleep patterns11. These factors could have a role in the brain changes \nobserved here, with some driving neurobiological changes and others, \nlike water retention, potentially affecting MRI-based measurements. \nNote that, although cortical reductions in GMV over gestation were \nstable across analyses, accounting for QC measures influenced the \nmagnitude and location of these results. These metrics all fell within \nthe standard range, but there may be meaningful reductions in signal \nthat accompany volumetric reductions (for example, increased CSF \nand decreased GM)—a methodological nuance that goes beyond the \nscope of this resource study. Ultimately, identifying the shared and \nunique contributions of these factors to the neuroanatomical changes \nthat unfold across gestation warrants further investigation. Deeply \nphenotyping a large and diverse cohort of women across pregnancy will \nopen up new avenues of exploration, for example, allowing research- \ners to link blood-based proteomic signatures to pregnancy outcomes; \ndeploying wearable devices to monitor changes in sleep, cognition and \nmood; and probing the broader social and environmental determinants \nof maternal health27. overlook the full range of changes that unfold within the gestational \nwindow, and underrepresent the brain’s metamorphosis during preg- \nnancy. Furthermore, although observed changes were largely global, \nsome regions displayed notable stability (for example, extrastriate cor- \ntex). The subcortical region that displayed the strongest relationship \nwith gestation week was the ventral diencephalon, which encompasses \nthe hypothalamus and subsequent medial preoptic area and paraven- \ntricular nucleus—structures critical for inducing maternal behavior12,16. \nThe hippocampus exhibited a reduction in volume across gestation, \nand with higher spatial resolution, this reduction was revealed to be \ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other \nhippocampal subfields remained stable. Adjacent PHC within the \nMTL also exhibited volume reduction across gestation. While our hip- \npocampal findings are consistent with pre/post studies of pregnancy13, \nthe precision lens applied within gestation revealed the nonlinear \nnature of this reduction. Recapitulating and clarifying these region- \nally specific patterns of volume change throughout the MTL merits \nfurther investigation. \n\nSimilar precision imaging studies have captured dynamic brain \nreorganization across other neuroendocrine transitions, such as the \nmenstrual cycle (see review in ref. 28), underscoring the powerful \nrole steroid hormones have in shaping the mammalian brain29. Endo- \ncrine changes across pregnancy dwarf those that occur across the \nmenstrual cycle, which highlights the critical need to map the brain’s \nresponse to this unique hormonal state. Broad physiological changes \noccur in tandem with the rise in steroid hormones, including changes \nin body mass composition, water retention, immune function and The neuroanatomical changes that unfold during matrescence \nmay have broad implications for understanding individual differences \nin parental behavior13,24,30,31, vulnerability to mental health disorders32,33 \nand patterns of brain aging18,19,34–36. Decreases in GMV may reflect \n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- \ntion for parenthood26. For example, in rodents, steroid hormones \npromote parental behavior by remodeling specific neural circuits in the \nmedial preoptic area of the hypothalamus. These behavioral adapta- \ntions are critical to the dam’s ability to meet the demands of caring for", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" - }, - { - "text": "In contrast, GMV within regions of the default mode (subnetwork \nC), limbic (subnetworks A and B) and visual peripheral networks buck \nthe global trend by slightly increasing (for example, temporal poles), \nremaining constant (for example, orbitofrontal cortex) or reducing at \na much slower rate (for example, extrastriate cortex) than total GMV \n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these \nregions exhibit similar patterns (Supplementary Fig. 3 and Supple- \nmentary Tables 4 and 5). \n\n**Results**\n**Serological evaluations**\nSerological evaluations captured canonical hormone fluctuations \ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). \nSerum hormone concentrations increased significantly over the course \nof pregnancy and dropped precipitously postpartum (preconcep- \ntion, estradiol (E) = 3.42 pg ml−1 and progesterone (P) = 0.84 ng ml−1; \n3 weeks preparturition, E = 12,400 pg ml−1 and P = 103 ng ml−1; 3 months \npostparturition, E = 11.50 pg ml−1 and P = 0.04 ng ml−1). \n\n**Subcortical GMV changes tied to gestation**\nConsistent with the broader cortical reductions in GMV, several subcor- \ntical regions significantly reduced in volume across gestation (Fig. 3a, \nleft). This included bilateral ventral diencephalon (right hemisphere \nvalues shown in Fig. 3a, right; encompasses hypothalamus, substantia \nnigra, mammillary body, lateral geniculate nucleus and red nucleus \namong others22), caudate, hippocampus and thalamus, along with left \nputamen and brain stem (Supplementary Table 6,*q*< 0.05). \n\nNext, high-resolution segmentation of the MTL allowed us to \ninterrogate subcortical structures at a finer resolution, revealing non- \nlinear volumetric decreases in CA1 (*F*(2,15) = 5.84,*q*= 0.031,*R*2 \nadj = 0.36; \nFig. 3b, left) and CA2/CA3 (*F*(2,15) = 6.82,*q*= 0.027,*R*2 \nadj = 0.41; Fig. 3b, \nmiddle) across gestation. PHC exhibited linear volumetric decreases \nacross gestation (*F*(1,16) = 24.87,*q*< 0.001,*R*2 \nadj = 0.58; Fig. 3b, right) \nwhich was also tied to estradiol (*F*(1,12) = 20.21,*q*= 0.005,*R*2 \nadj = 0.60). \nAll three relationships remained significant after proportional correc- \ntion for total GMV. There was no significant change in other subregions \nor total volume of the hippocampal body, or in the parahippocampal \ngyrus (Supplementary Table 7 and Supplementary Fig. 8). \n\n**Whole-brain dynamics from baseline through postpartum**\nTo begin, we characterized broad neuroanatomical changes over the \ncourse of the entire experimental window (baseline—2 years postpar- \ntum, 26 scans; Fig. 1d). Generalized additive models revealed strong \nnonlinear (effective degrees of freedom > 3) relationships between \nweeks since conception and summary brain metrics. Total GMV \n(*F*= 27.87,*P*< 0.001, deviance explained = 93.9%,*R*2 \nadj = 0.91), summary \nCT (*F*= 15.79,*P*< 0.001, deviance explained = 78.6%,*R*2 \nadj = 0.75) and \ntotal brain volume (*F*= 26.12,*P*< 0.001, deviance explained = 93.4%, \n*R*2 \nadj = 0.90) linearly decreased during gestation and appeared to \npartially rebound postpartum. In contrast, global microstructural \nintegrity (QA) of white matter increased throughout the first and sec- \nond trimesters before returning to baseline levels in the postpartum \nperiod (whole-brain QA,*F*= 4.62,*P*= 0.007, deviance explained = 60.2%, \n*R*2 \nadj = 0.51). We also observed nonlinear patterns of lateral ventricle \nexpansion*(F*= 10.44,*P*< 0.001, deviance explained = 83.8%,*R*2 \nadj = 0.77) \nand increased cerebrospinal fluid (CSF;*F*= 13.32,*P*< 0.001, deviance \nexplained = 83.8%,*R*2 \nadj = 0.79) rising in the second and third trimesters \nbefore dropping sharply postpartum.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "*Cortical GMV and CT*. We then narrowed our analyses to the first 19 \nsessions (baseline—36 weeks gestation) to assess novel brain changes \noccurring over the gestational window. We first computed Pearson’s \nproduct-moment correlation matrices between the following vari- \nables: gestation week, estradiol, progesterone and the 17 network-level \naverage GMV values. We then ran a multivariate regression analysis \npredicting ROI-level GMV changes by gestation week. To identify which \nregions were changing at a rate different from the global decrease, \nwe then ran the analyses again to include total GMV in the regression \nmodel (Supplementary Table 2). This was extended to the network \nlevel, where we ran partial correlations accounting for total GMV. These \nsame analyses were then run with CT measures. Globally-corrected \nresults provided in Supplementary Tables 1–5. Percent change at the \nnetwork level was computed by subtracting the final pregnancy value \n(36 weeks pregnant) from the first prepregnancy baseline value, then \ndividing that difference by said first prepregnancy baseline value. All \nanalyses underwent multiple comparisons testing (false discovery rate \n(FDR)-corrected at*q*< 0.05). \n\n||*ts*− ̂*t*|| \n̂*t*\nε*j*= 100 × mean ( ) \n\nWhere*ts*is the morphometric measurement of a parcel for session*s*\n̂*t*is the mean of*t*across sessions55,79. Thus, we defined variability \nand \nas the mean absolute percent difference between each individual and \nthe mean across sessions. Across-session variability estimates for all \n400 regions were then averaged across eight participants, and a global \nmeasure of cortical GMV variability was computed by averaging across \nthe 400 regions. This approach was repeated independently for the \nT2 hippocampal scans, wherein we computed across-session variability \nfor each parcel of the ASHS parcellation scheme (*n*= 7 bilateral sub- \nfields). However, it is important to note that raw subfield values (that \nis, no manual retouching) were used for Day2Day variability assess- \nments and should be interpreted with caution. Finally, to better com- \npare against our own data, we repeated this approach using our", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - }, - { - "text": "Our findings from this precision imaging study show that preg- \nnancy is characterized by reductions in GMV, cortical thinning and \nenhanced white matter microstructural integrity that unfold week by \nweek. These changes were also tied to the significant rise in steroid hor- \nmone concentrations over pregnancy. Some of these changes persist \nat 2 years postpartum (for example, global reductions in GMV and CT), \nwhile others, including markers of white matter integrity, appear to be \ntransient. Ventricular expansion and contraction parallel these cortical \nchanges. These widespread patterns, and the notable increase in CSF \nvolume across gestation, could reflect increased water retention and \nsubsequent compression of cortical tissue. However, the persistence \nof these changes at 2 years postpartum and regional variation in GMV, \nCT and QA, hint at cellular underpinnings, such as alterations in glia", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed4.pdf" - }, - { - "text": "–8 \n\nl \na \nt \no \nT \nA \nc \nb \nm \nL \nC \nN \nM \nD \ni \nr \ne \nP \ns \ni \nV \nt \nn \ne \nC \ns \ni \nV \nB \nN \nM \nD \nB \nt \no \nM \nm \no \nS \n\ni \ni \n\n\n\nL \n\nLat R \nMed \n\nRegional GMV \n\nPostcentral gyrus \nDorsal attention network B \n\nB \nt \nn \no \nC \nB \nc \nb \nm \nL \nA \nN \nM \nD \nr \na \nP \np \nm \ne \nT \nA \nn \nt \nt \nA \ns \nr \no \nD \nA \nt \no \nM \nm \no \nS \nA \nt \nn \no \nC \nB \nn \nt \nt \nA \ns \nr \no \nD \nC \nt \nn \no \nC \n\nA \nn \nt \nt \nA \nt \nn \ne \nV \nl \na \nS B \nn \nt \nt \nA \nt \nn \ne \nV \nl \na \nS \n\ni \ni \n\nFrontal eye fields \nDorsal attention network B \n\n\n\n\n\n\n\nGestation Gestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( ) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 –1 –1 \n\nV \nM \nG \ng \nv \nA V \nM \nG \ng \nv \nA \n–2 –2 –2 \n\n0 10 \n20 \nWeek \n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\nMedial frontal \nSalience ventral attention network A Inferior parietal \nControl network B \n\nGestation + postpartum Gestation Gestation + postpartum \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n–1 –1 \n\nV \nM \nG \ng \nv \nA \n–2 –2 \n\n30 Pre 1st \n2nd \nStage \n3rd Post 0 10 \n20 \nWeek \n\nInsula \nSalience ventral attention network B \n\n\n\n\n\n\n\nGestation Gestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( ) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 –1 \n\nV \nM \nG \ng \nv \nA V \nM \nG \ng \nv \nA \n\n–1 \n–2 –2 –2 \n\n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post 0 10 \n20 \nWeek \n\nGestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 \n\nV \nM \nG \ng \nv \nA \n\n–1 \n–2 –2 \n\n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\n**Fig. 2 | Cortical GMV showed widespread change through gestation and**\n**postpartum. a**, Multivariate regression analyses reveal largely negative \nrelationships between gestation week and regional GMV, with only a minority \nof regions unaffected or increasing over the gestational window (baseline—36 \nweeks). All associations presented here were corrected for multiple comparisons \n(FDR at*q*< 0.05; nonsignificant values set to zero for interpretability).**b**, Average \nnetwork change was calculated by estimating GMV percent change from baseline \n(initial) to 36 weeks gestation (final). Attention and control networks appear \nmost affected.**c**, Six representative regions, classified by major subnetworks, \nthat exhibit pronounced GMV change across gestation. For each panel, we \ndisplay a scatterplot between average GMV of the ROIs and gestation week \n(left; gestation sessions only, 19 scans), and summary GMV of ROIs by pregnancy \nstage across the whole study (right; gestation and postpartum sessions, 26 scans). Shaded regions in scatterplots represent a 95% confidence interval. Each \nboxplot represents IQR for each stage, with a horizontal line representing the \nmedian value. The whiskers indicate variability outside (±1.5) of this range. \nOutside values are >1.5× and <3× IQR beyond either end of the box. All statistical \ntests were corrected for multiple comparisons (FDR at*q*< 0.05) and values \nwere*z*scored and transformed to have a mean of zero and s.d. of one for easier \ncomparison across regions. Please note that the data values shown here are raw \n(see Supplementary Tables 1 and 2 and Supplementary Data 1 for exhaustive list). \nBrain visualizations created with R package ggseg48. IQR, interquartile range; \nLat, lateral; Med, medial; DMN, default mode network; VisPeri, visual peripheral \nnetwork; SomMot, somatomotor network; VisCent, visual central network; Cont, \ncontrol network; TempPar, temporal parietal network; DorsAttn, dorsal attention \nnetwork; SalVentAttn, salience/ventral attention network.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed4.pdf" - }, - { - "text": "Whole-brain subcortical volumes \n\nLateral ventricle \n\nCaudate \n\nThalamus \n4,000 \n) \n3 \nm \nm \n3,800 \n( \n\nV \nM \nG \ng \nv \nA \n3,600 \n\n\n\nRight ventral diencephalon \nGestation Gestation + postpartum \n\n4,000 \n\n3,900 \n\n3,800 \n\n3,700 \n\n3,600 \n\n3,500 \n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\n\n\n\n\n\n\n\n\n\n\nGestation \n*R2* adj = 0.41,*q*= 0.027 \n) \n3 \n200 \nm \nm \n180 ( \n\nV \nM \nG \ng \nv \nA \n\n180 \n\n160 \n\n0 10 \n\n\n\n1,900 \n\n1,800 \n\n1,700 \nPre \n1st 2nd 3rd \nStage \n30 \n\nGestation Gestation + postpartum \n*R2* adj = 0.36,*q*= 0.031 \n) \n540 3 \n540 \nm \nm \n( \n\nV \nM \nG \ng \nv \nA \n460 460 \n0 \n20 \n10 \nWeek \n30 Pre \n1st 2nd 3rd \nStage \n\nGestation + postpartum Gestation \n*R2* adj = 0.58,*q*= 0.001 200 \n) \n3 \nm \nm \n1,900 \n( \n\nV \nM \nG \ng \nv \nA \n\n1,800 \n160 \n1,700 \n\n20 \nWeek \n30 Pre 1st 2nd 3rd Post 0 \n10 \nWeek \n20 \nStage \n\n**Fig. 3 | Subcortical GMV changed throughout gestation. a**, Multivariate \nregression analyses revealed largely negative relationships between gestation \nweek and subcortical GMV regions over pregnancy, including bilateral thalamus, \ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus, \nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral \nventricles displayed the only positive relationships with gestation week \n(also depicted in Fig. 1d). The whole-brain subcortical GMV estimates shown \nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR- \ncorrected at*q*< 0.05. Inset, right ventral diencephalon displayed the strongest \nnegative association with gestation (left; baseline—36 weeks, 19 scans) and did \nnot return to baseline postpartum (right; gestation and postpartum, 26 scans). \n**b**, The participant’s hippocampus and surrounding cortex were segmented \ninto seven bilateral subregions. Quadratic (CA1, CA2/CA3) and linear regression \nanalyses (PHC) revealed subfields were negatively associated with gestation \nweek (baseline—36 weeks, 18 scans) and did not return to baseline postpartum \n(gestation and postpartum, 25 scans). Shaded regions in scatterplots represent \na 95% confidence interval. Each boxplot represents IQR for each stage, with a \nhorizontal line representing the median value. The whiskers indicate variability \noutside (±1.5) of this range. Outside values are >1.5× and <3× IQR beyond either \nend of the box. FDR-corrected at*q*< 0.05. For**a**and**b**, nonsignificant regions \nwere set to zero for interpretability. See Supplementary Fig. 6 for complete \nlabeling of regions in both segmentations. Brain visualizations created with R \npackage ggseg48*.*DC, diencephalon. \n\noutstanding questions. This study and corresponding open-access \ndataset offer neuroscientists a detailed map of the human brain across \ngestation, a resource for which a wide range of previously unattainable \nneurobiological questions can now be explored. \n\nor neuron number, synaptic density and myelination (for review on \nthe latter, see ref. 4). Future studies of the relationship between fluid \ndynamics and volumetric changes will help clarify the factors that drive \nglobal neural changes during pregnancy; such insights will have broad \nimplications for maternal health (for example, neurological effects tied \nto pre-eclampsia or edema).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed4.pdf" - }, - { - "text": "Gray Matter Volume & Cortical Thickness: \nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy \nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a \nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were \nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non- \ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We \nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week \n(FDR-corrected at q < 0.05). \n\nT2-weighted MTL scans: \nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n = \n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual \nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" - }, - { - "text": "As a further test of the robustness of the dataset, we ran QC assess- \nments on all T1w images using the IQMs pipeline64 from MRIQC (ver- \nsion 23.1). Assessments of interest included (1) coefficient of joint \nvariation (CJV), (2) signal-to-noise ratio for gray matter (SNR) and (3) \ncontrast-to-noise ratios (CNR). All QC metrics fell within expected \nstandard ranges65 (Supplementary Fig. 4b–d). Although relationships \nexisted between gestation week and QC measures (CJV,*r*= 0.70 and \n*P*< 0.001; SNR and CNR,*r*= −0.83 and*P*< 0.001), including these vari- \nables in the regression models did not detract from our finding sug- \ngesting cortical GMV reductions occur over gestation, especially within \nregions belonging to attention and somatosensory networks (Supple- \nmentary Fig. 5). When looking across all MRIQC outputs, discrepancies \nwere noted in session seven (gestation week nine, first trimester). \nRemoving this day from the analyses only strengthened observed \nrelationships between cortical volume and gestation; however, for \ncompleteness, data from this day is included in the main findings. \nThese QC outputs for each session of the experiment can be found \nin Supplementary Data 1. Finally, we used FreeSurfer’s Eueler num- \nber to evaluate a field-standard quantitative assessment of each T1w \nstructural image66. We observed no significant relationships between \nthe Euler number and gestation week or summary brain metrics. A \ndiscrepancy (for example, two s.d. below average) was noted in session \neight; however, again, removing this session did not detract from our \nmain findings showing reductions in GMV over gestation.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed4.pdf" - }, - { - "text": "**Neuroanatomical changes observed over the**\n**course of a human pregnancy**\n\n\n \n \n \n \n [html]Laura Pritschet ® 1 : 1 ; Caitlin M. Taylor Φ1 ; Daniela Cossio Φ2 ; Lackung Examination\n
Received : 23 August 2023
Accepted : 29 July 2024
Hannah Grotzingar ', Evan Layher ', Elizabeth R. Chrastii Φ3 & Egaly β, Ilecabody Spaking
Published online : 16 September 2024
||| Check for updates
\n\nWorldwide, nearly 85% of women experience one or more pregnancies \nin their lifetime1, with 140 million women becoming pregnant each \nyear. Over an approximately 40-week gestational window, the maternal \nbody undergoes profound physiological adaptations to support the \ndevelopment of the fetus, including increases in plasma volume, meta- \nbolic rate, oxygen consumption and immune regulation2. These rapid \nadaptations are initiated by 100-fold to 1,000-fold increases in hormone \nproduction, including estrogen and progesterone. These neuromodu- \nlatory hormones also drive significant reorganization of the central \nnervous system. Evidence from animal models and human studies con- \nverge on pregnancy as a period of remarkable neuroplasticity3–10 (see \nref. 10 for one of the earliest known observations). Gestational increases \nin steroid hormone synthesis drive neurogenesis, dendritic spine \ngrowth, microglial proliferation, myelination and astrocyte remodeling \n(for review, see ref. 11). These cellular changes are pronounced in brain \ncircuits that promote maternal behavior. For example, Ammari et al. \nrecently discovered that steroid hormones can fine-tune the response \nproperties of galanin neurons in the rodent medial preoptic area of \nthe hypothalamus (mPOA), leading to enhanced sensitivity in dams \nto sensory cues from newborn pups12. \n\nIn humans, reductions in gray matter volume (GMV) have \nbeen observed postpartum13–16, particularly in regions central to \ntheory-of-mind processing13. These GMV changes persist at 6 years \npostpartum17 and are traceable decades later18,19, underscoring the \npermanence of this major remodeling event. And yet the changes that \noccur within the maternal brain during gestation itself are virtually \nunknown (see ref. 20 for early neuroimaging insight). A recent study by \nPaternina-Die et al. offers intriguing clues21. Women were scanned once \nin the third trimester and again in the postpartum period, revealing a \nreduction of cortical volume observable in the late pregnancy scan. \nThese findings suggest that pregnancy is a highly dynamic period for \nneural remodeling, yet neuroscientists lack a detailed map of how the \nhuman brain changes throughout the gestational period. \n\nHere we conducted a precision imaging study of pregnancy in \nwhich a healthy 38-year-old primiparous woman underwent 26 mag- \nnetic resonance imaging (MRI) scans and venipuncture beginning \n3 weeks preconception through 2 years postpartum. We observed \nwidespread reductions in cortical GMV and cortical thickness (CT) \noccurring in step with advancing gestational week and the dramatic \nrise in sex hormone production. Remodeling was also evident within", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "6126797.pdf", - "query": "How to light up my sports smart watch?", - "target_page": 2, - "target_passage": "Up button: Short press to light up or turn off the screen", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. \n\n\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the \nshortcut. \n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth \nconnection status, time, power, brightness adjustment and other functions.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous \nsong/play next song of your phone. \nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the \nsmartwatch. \n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be \ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be \nsynchronized to the APP for you to check. \n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. \n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. \n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the \nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly \nfor the measurement. \n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the \nECG interface in the app, you can have single measurement at a time. The data of ECG will be \nsaved in the mobile phone. This function should be used with the app. \n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other \n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to \noperate the function). \n\n\n \n \n \n \n [html]\n
Activity Consistence
", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n\n\n**Thank you for choosing our smart watch. You can fully understand**\n\n**the use and operation of the equipment by reading this manual.**\n\n**The company reserves the right to modify the contents of this manual**\n\n**without any prior notice.**\n\nThe product contains: a packing box, a manual, a watch body, and a \n\ncharging cable. \n\n\n \n \n \n \n [html]\n
A. Watch function descriptionButton description :
", - "page_start": 0, - "page_end": 0, - "source_file": "6126797.pdf" - }, - { - "text": "1.2 Search the application at App market and download \nFor Android users: \nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download, \nremember to check the pop-up box on your phone when installing, and agree to the permission. \nFor iOS users: \nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your \nphone when installing, and agree to the permission. \n\nAfter WearPro is installed, the app icon appears as . \n\n2.Bind Bluetooth \n\n\n\n2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app.", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. \n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off \nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling \nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the \nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when \nthey are successfully bound. \n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50 \ncall records, and it will be automatically overwritten when 128 records are full. Click any call \nrecord to call back) \n3. Dial the keyboard, you can enter the phone number to make a call. \n\n**1.5 message**\n\n\n \n \n \n \n [html]\n
II light up or vibrate.
5.2. SMS notification :
", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as \n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this \nperiod. \n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once \nor repeatedly on the date (week) setting, and the alarm can be turned on/off. \n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting. \nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the \nscreen. \n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting \nand selecting the date (week) of the water reminder. When the time of drink water reminder is \nreached, the watch will vibrate and there will be a water icon on the screen. \n\n**11. Dial push**\n\n11.1.Push an existing watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart \nand bind the APP automatically after the synchronization of the watch face. \n11.2. Customize the watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch \nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the \nAPP automatically after the synchronization of the watch face. \n\n\n \n \n \n \n [html]\n
Firmware version
", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "The version of the watch is displayed on “Firmware upgrade” in the column of “Device”, and \n\nusers can decide to whether upgrade the firmware version. \n\n**13. Unbind**\n\nIn the \"Device\" column of WearPro, scroll down to the \"Unbind\" and click to unbind the APP. The \niSO users need to go to the Bluetooth settings of the phone, select the Bluetooth name of the \n\n\n\nsmart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. \n\n**●Frequently asked questions and answers**\n\n***Please avoid exposing the device to extreme temperatures that are**\n\n**too cold or too hot for a long time, which may cause permanent**\n\n**damage.**\n\n***Why can't I take a hot bath with my watch?**\n\n**The temperature of the bath water is relatively changed, it will**\n\n**produce a lot of water vapor, and the water vapor is in the gas phase,**\n\n**and its molecular radius is small, and it is easy to seep into the gap of**\n\n**the watch case. The internal circuit of the watch is short-circuited,**\n\n**which damages the circuit board of the watch and damages the**\n\n**watch.**\n\n***No power on, no charging**\n\n**If you receive the goods and the watch does not turn on, it may be**\n\n**caused by a collision during the transportation of the watch and the**\n\n\n \n \n \n \n [html]\n
battery Seiko board has been protected, so plug in the charging cableto activate it.
Table
", - "page_start": 7, - "page_end": 7, - "source_file": "6126797.pdf" - }, - { - "text": "**Warranty description:**\n\n**1. If there are any quality problems caused by manufacturing,**\n\n**materials, design, etc. in normal use, the motherboard of the watch is**\n\n**guaranteed for repair for free within one year, while the battery and**\n\n**charger within half a year from the date of purchase.**\n\n**2. No warranty is provided for failures caused by the user's personal**\n\n**reasons, as follows:**\n\n**1). Failure caused by unauthorized disassembly or modification of**\n\n**the watch.**\n\n**2). Failure caused by accidental fall during use.**\n\n**3). All man-made damages or the third party's fault, or misuses (such**\n\n**as: water in the device, cracking by external force, scratches on the**\n\n**case, damage, etc.) are not covered in the warranty.**\n\n**3. When requesting the warranty service, please provide a warranty**\n\n**card with the date of purchase and the stamp of the place of purchase**\n\n\n \n \n \n \n [html]\n
on it.
", - "page_start": 8, - "page_end": 8, - "source_file": "6126797.pdf" - }, - { - "text": "During climbing", - "page_start": 167, - "page_end": 167, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "6126797.pdf", - "query": "Is my sports smartwatch's fitness data turned on or off by default?", - "target_page": 4, - "target_passage": "Fitness data is turned on by default.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. \n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the \nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly \nfor the measurement. \n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the \nECG interface in the app, you can have single measurement at a time. The data of ECG will be \nsaved in the mobile phone. This function should be used with the app. \n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other \n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to \noperate the function). \n\n\n \n \n \n \n [html]\n
Activity Consistence
", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous \nsong/play next song of your phone. \nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the \nsmartwatch. \n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be \ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be \nsynchronized to the APP for you to check. \n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. \n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. \n\n\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the \nshortcut. \n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth \nconnection status, time, power, brightness adjustment and other functions.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n\n\n**Thank you for choosing our smart watch. You can fully understand**\n\n**the use and operation of the equipment by reading this manual.**\n\n**The company reserves the right to modify the contents of this manual**\n\n**without any prior notice.**\n\nThe product contains: a packing box, a manual, a watch body, and a \n\ncharging cable. \n\n\n \n \n \n \n [html]\n
A. Watch function descriptionButton description :
", - "page_start": 0, - "page_end": 0, - "source_file": "6126797.pdf" - }, - { - "text": "**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as \n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this \nperiod. \n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once \nor repeatedly on the date (week) setting, and the alarm can be turned on/off. \n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting. \nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the \nscreen. \n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting \nand selecting the date (week) of the water reminder. When the time of drink water reminder is \nreached, the watch will vibrate and there will be a water icon on the screen. \n\n**11. Dial push**\n\n11.1.Push an existing watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart \nand bind the APP automatically after the synchronization of the watch face. \n11.2. Customize the watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch \nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the \nAPP automatically after the synchronization of the watch face. \n\n\n \n \n \n \n [html]\n
Firmware version
", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "The version of the watch is displayed on “Firmware upgrade” in the column of “Device”, and \n\nusers can decide to whether upgrade the firmware version. \n\n**13. Unbind**\n\nIn the \"Device\" column of WearPro, scroll down to the \"Unbind\" and click to unbind the APP. The \niSO users need to go to the Bluetooth settings of the phone, select the Bluetooth name of the \n\n\n\nsmart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. \n\n**●Frequently asked questions and answers**\n\n***Please avoid exposing the device to extreme temperatures that are**\n\n**too cold or too hot for a long time, which may cause permanent**\n\n**damage.**\n\n***Why can't I take a hot bath with my watch?**\n\n**The temperature of the bath water is relatively changed, it will**\n\n**produce a lot of water vapor, and the water vapor is in the gas phase,**\n\n**and its molecular radius is small, and it is easy to seep into the gap of**\n\n**the watch case. The internal circuit of the watch is short-circuited,**\n\n**which damages the circuit board of the watch and damages the**\n\n**watch.**\n\n***No power on, no charging**\n\n**If you receive the goods and the watch does not turn on, it may be**\n\n**caused by a collision during the transportation of the watch and the**\n\n\n \n \n \n \n [html]\n
battery Seiko board has been protected, so plug in the charging cableto activate it.
Table
", - "page_start": 7, - "page_end": 7, - "source_file": "6126797.pdf" - }, - { - "text": "1.2 Search the application at App market and download \nFor Android users: \nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download, \nremember to check the pop-up box on your phone when installing, and agree to the permission. \nFor iOS users: \nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your \nphone when installing, and agree to the permission. \n\nAfter WearPro is installed, the app icon appears as . \n\n2.Bind Bluetooth \n\n\n\n2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app.", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. \n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off \nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling \nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the \nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when \nthey are successfully bound. \n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50 \ncall records, and it will be automatically overwritten when 128 records are full. Click any call \nrecord to call back) \n3. Dial the keyboard, you can enter the phone number to make a call. \n\n**1.5 message**\n\n\n \n \n \n \n [html]\n
II light up or vibrate.
5.2. SMS notification :
", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "**ITEM 6. SELECTED FINANCIAL DATA (in millions, except per share data)**", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**Warranty description:**\n\n**1. If there are any quality problems caused by manufacturing,**\n\n**materials, design, etc. in normal use, the motherboard of the watch is**\n\n**guaranteed for repair for free within one year, while the battery and**\n\n**charger within half a year from the date of purchase.**\n\n**2. No warranty is provided for failures caused by the user's personal**\n\n**reasons, as follows:**\n\n**1). Failure caused by unauthorized disassembly or modification of**\n\n**the watch.**\n\n**2). Failure caused by accidental fall during use.**\n\n**3). All man-made damages or the third party's fault, or misuses (such**\n\n**as: water in the device, cracking by external force, scratches on the**\n\n**case, damage, etc.) are not covered in the warranty.**\n\n**3. When requesting the warranty service, please provide a warranty**\n\n**card with the date of purchase and the stamp of the place of purchase**\n\n\n \n \n \n \n [html]\n
on it.
", - "page_start": 8, - "page_end": 8, - "source_file": "6126797.pdf" - } - ] - }, - { - "references": { - "source_file": "6126797.pdf", - "query": "When does my Sport smartwatch start and stop monitoring sleep?", - "target_page": 5, - "target_passage": "Sleep monitoring time period: from 18:00 at night to 10:00 the next day", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous \nsong/play next song of your phone. \nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the \nsmartwatch. \n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be \ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be \nsynchronized to the APP for you to check. \n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. \n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. \n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the \nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly \nfor the measurement. \n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the \nECG interface in the app, you can have single measurement at a time. The data of ECG will be \nsaved in the mobile phone. This function should be used with the app. \n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other \n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to \noperate the function). \n\n\n \n \n \n \n [html]\n
Activity Consistence
", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as \n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this \nperiod. \n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once \nor repeatedly on the date (week) setting, and the alarm can be turned on/off. \n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting. \nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the \nscreen. \n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting \nand selecting the date (week) of the water reminder. When the time of drink water reminder is \nreached, the watch will vibrate and there will be a water icon on the screen. \n\n**11. Dial push**\n\n11.1.Push an existing watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart \nand bind the APP automatically after the synchronization of the watch face. \n11.2. Customize the watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch \nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the \nAPP automatically after the synchronization of the watch face. \n\n\n \n \n \n \n [html]\n
Firmware version
", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. \n\n\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the \nshortcut. \n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth \nconnection status, time, power, brightness adjustment and other functions.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. \n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off \nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling \nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the \nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when \nthey are successfully bound. \n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50 \ncall records, and it will be automatically overwritten when 128 records are full. Click any call \nrecord to call back) \n3. Dial the keyboard, you can enter the phone number to make a call. \n\n**1.5 message**\n\n\n \n \n \n \n [html]\n
II light up or vibrate.
5.2. SMS notification :
", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "1.2 Search the application at App market and download \nFor Android users: \nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download, \nremember to check the pop-up box on your phone when installing, and agree to the permission. \nFor iOS users: \nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your \nphone when installing, and agree to the permission. \n\nAfter WearPro is installed, the app icon appears as . \n\n2.Bind Bluetooth \n\n\n\n2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app.", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n\n\n**Thank you for choosing our smart watch. You can fully understand**\n\n**the use and operation of the equipment by reading this manual.**\n\n**The company reserves the right to modify the contents of this manual**\n\n**without any prior notice.**\n\nThe product contains: a packing box, a manual, a watch body, and a \n\ncharging cable. \n\n\n \n \n \n \n [html]\n
A. Watch function descriptionButton description :
", - "page_start": 0, - "page_end": 0, - "source_file": "6126797.pdf" - }, - { - "text": "The version of the watch is displayed on “Firmware upgrade” in the column of “Device”, and \n\nusers can decide to whether upgrade the firmware version. \n\n**13. Unbind**\n\nIn the \"Device\" column of WearPro, scroll down to the \"Unbind\" and click to unbind the APP. The \niSO users need to go to the Bluetooth settings of the phone, select the Bluetooth name of the \n\n\n\nsmart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. \n\n**●Frequently asked questions and answers**\n\n***Please avoid exposing the device to extreme temperatures that are**\n\n**too cold or too hot for a long time, which may cause permanent**\n\n**damage.**\n\n***Why can't I take a hot bath with my watch?**\n\n**The temperature of the bath water is relatively changed, it will**\n\n**produce a lot of water vapor, and the water vapor is in the gas phase,**\n\n**and its molecular radius is small, and it is easy to seep into the gap of**\n\n**the watch case. The internal circuit of the watch is short-circuited,**\n\n**which damages the circuit board of the watch and damages the**\n\n**watch.**\n\n***No power on, no charging**\n\n**If you receive the goods and the watch does not turn on, it may be**\n\n**caused by a collision during the transportation of the watch and the**\n\n\n \n \n \n \n [html]\n
battery Seiko board has been protected, so plug in the charging cableto activate it.
Table
", - "page_start": 7, - "page_end": 7, - "source_file": "6126797.pdf" - }, - { - "text": "**Warranty description:**\n\n**1. If there are any quality problems caused by manufacturing,**\n\n**materials, design, etc. in normal use, the motherboard of the watch is**\n\n**guaranteed for repair for free within one year, while the battery and**\n\n**charger within half a year from the date of purchase.**\n\n**2. No warranty is provided for failures caused by the user's personal**\n\n**reasons, as follows:**\n\n**1). Failure caused by unauthorized disassembly or modification of**\n\n**the watch.**\n\n**2). Failure caused by accidental fall during use.**\n\n**3). All man-made damages or the third party's fault, or misuses (such**\n\n**as: water in the device, cracking by external force, scratches on the**\n\n**case, damage, etc.) are not covered in the warranty.**\n\n**3. When requesting the warranty service, please provide a warranty**\n\n**card with the date of purchase and the stamp of the place of purchase**\n\n\n \n \n \n \n [html]\n
on it.
", - "page_start": 8, - "page_end": 8, - "source_file": "6126797.pdf" - }, - { - "text": "As of January 31, 2015 and February 1, 2014, we were in compliance with this covenant. We will continue to monitor this covenant and \nbelieve that we will remain in compliance with this covenant during 2015.", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "OTC_NSANY_2004.pdf", - "query": "Have the operating profits in Japan for Nissan gone up or down in 2004?", - "target_page": 5, - "target_passage": "operating profits in Japan came to ¥341.1 billion, a decrease of 3.2 percent compared to last year", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**The recovery story is complete**\n\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up \n\nto all the challenges. We had a record year in revenues, operating profit, net income, sales \n\nvolume and production. \n\n**Sales performance**\n\nGlobal sales came to 3,388,000 units, which exceeded our forecast of 3,380,000 units. This \n\nrecord level represents an increase of 10.8 percent, or 331,000 units, over fiscal 2003, and is \n\n281,000 units more than the previous record level set in 1990. In fiscal 2004, we released nine \n\nall-new models globally. \n\nAlong with record sales, we achieved a global production record. Nissan’s manufacturing \n\nplants turned out 3,378,000 units, or 293,000 units more than the previous record. \n\n**Financial performance**\n\n• Consolidated net revenues came to 8 trillion ¥576.3 billion, up 15.4 percent from last year. \n\n• Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a \n\npercentage of net revenue, our operating profit margin came to 10.0 percent. \n\n• Net income reached ¥512.3 billion, an increase of ¥8.6 billion. \n\n**Nissan 180 commitments**\n\nFiscal 2004 marked the end of our NISSAN 180 business plan. Obviously, NISSAN 180 cannot \n\nbe closed completely until the end of September 2005, but we know that we have already \n\ndelivered two of the plan’s three critical commitments. \n\n• We committed to an 8 percent operating profit margin, and our margin has been at or above \n\n10 percent for every year of NISSAN 180. \n\n• We committed to zero debt, and today we have more than ¥200 billion in net cash under the \n\nnew and more demanding accounting standards. \n\n• Our only remaining commitment is to achieve one million additional sales. Even here we are in \n\nreasonably good shape. At the midpoint of the measurement period we are at 1,809,000 units, \n\nwhich is a slight advance compared to our commitment to reach 3,597,000 units by the end of \n\nSeptember 2005.", - "page_start": 7, - "page_end": 7, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Nissan Motor Co, Ltd. and Consolidated Subsidiaries Fiscal years 2004.2003 and 2002
Millions of yen2004.31.202003Me. 31.20042002Met 31.2008
Net sales¥ 8.576.277¥ 7.429.219¥ 6.828.588
Cost of sales ( N = 166 #< 11 )6.351.2695.310.1724.872.324
Gross profit2.225.0082.119.0471.956.264
Selling, general and administrative expenses ( Notes 6ond 11 )1.363.8481.294.1921.219.034
Operating income861.160824.855737.230
Other income ( expenses ):Interest income14.93410.321
7.566Interest expense( 26.656 )( 27.290 )
( 25.060 )Equity in earnings of unconsolidatedsubsidiaries and affiliates36.790
11.62311.395Other, net ( Note 12 )( 92.995 )
( 83.012 )( 36.507 )( 67.927 )( 88.358 )
( 42.606 )Income before income taxes andminority interests793.233
736.497694.624Income taxes ( Nete 15 ):Current
179.226137.745113.185Deferred
78.83781.29585.513258.063
219.040198.698Minority interests( 22.889 )
( 13.790 )( 761 )Net income ( Note 18 )¥ 512.281
¥ 503.667¥495.165
", - "page_start": 75, - "page_end": 75, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Looking to the New Fiscal Year**\n\nNissan will continue to grow in fiscal 2005. Even assuming a relatively flat total industry volume \n\nof 61 million units globally, Nissan’s sales are forecast to come to 3,618,000 units, a 6.8 percent \n\nincrease over the prior year. \n\nWorldwide, we will launch six all-new models—five in Japan, one in Europe—leading to \n\ntwenty regional product events. \n\n**Our sales objectives**\n\n• Japan: 933,000 units, a 10 percent increase over last year \n\n• U.S.: 1,047,000 units, an increase of 3.3 percent \n\n• Europe: 550,000 units, a 1.1 percent increase over last year \n\n• General Overseas Markets: 1,088,000 units, a 10.7 percent increase \n\n**Our financial outlook**\n\nAny new fiscal year brings risks and opportunities, and 2005 brings very high levels of \n\nuncertainty and risks—volatility in exchange rates, higher interest rates, higher commodity prices, \n\nhigher energy prices, higher incentives and uncertainty about growth in the U.S. and Japan. The \n\nopportunity is in following through on the NISSAN Value-Up plan quickly and effectively. \n\nIn light of these factors, our forecast for fiscal 2005 is as follows. This is based on a foreign \n\nexchange rate assumption for the year of ¥105 per dollar and ¥130 per euro: \n\n• Net revenue is predicted to be ¥9 trillion, up 4.9 percent. \n\n• Operating profit is expected to be ¥870 billion, up 1 percent. \n\n• Ordinary profit is expected to reach ¥860 billion, up 0.5 percent. \n\n• Net income is predicted to be ¥517 billion, up 0.9 percent. \n\n• Capital expenditures are expected to reach ¥540 billion, up 13.1 percent. \n\n• R&D expenses are forecast to reach ¥450 billion, or 5 percent of net sales, up 13.0 percent. \n\n• ROIC is expected to remain at or above 20 percent.", - "page_start": 9, - "page_end": 9, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "*Millions of*\n*U.S. dollars (Note 1)*\n*(except per*\n*share amounts)*\n2004 \n*Mar. 31, 2005*\n\n*Millions of yen*\n*(except per share amounts and number of employees)*\n\n2004 \n*Mar. 31, 2005* 2003 \n*Mar. 31, 2004* 2002 \n*Mar. 31, 2003* 2001 \n*Mar. 31, 2002* 2000 \n*Mar. 31, 2001* *For the years ended*\n\n¥8,576,277 ¥7,429,219 ¥6,828,588 ¥6,196,241 ¥6,089,620 \n$80,152 \nNet sales \n\n861,160 8,048 \nOperating income 824,855 737,230 489,215 290,314 \n\n512,281 4,788 \nNet income 503,667 495,165 372,262 331,075 \n\n125.16 1.17 \nNet income per share (Note 2) 122.02 117.75 92.61 83.53 \n\n94,236 881 \nCash dividends paid (Note 3) 74,594 50,800 27,841 0 \n\n¥2,465,750 ¥2,023,994 ¥1,808,304 ¥1,620,822 ¥ 957,939 \n9,848,523 \n\n$23,044 \nShareholder’s equity \n\n92,042 \nTotal assets 7,859,856 7,349,183 7,215,005 6,451,243 \n\n1,963,173 18,347 \nLong-term debt 1,694,793 1,603,246 1,604,955 1,402,547 \n\n525,926 4,915 \nDepreciation and amortization 461,037 371,125 374,827 360,191 \n\n183,607 \nNumber of employees 123,748 127,625 125,099 133,833 \n\nNotes: 1. Unless indicated otherwise, all dollar figures herein refer to U.S. currency. Yen amounts have been translated into U.S. dollars, for convenience \nonly, at ¥107 = $1, the approximate exchange rate on March 31, 2005. \n2. Net income per share amounts are based on the weighted average number of shares of common stock outstanding during each year. \n\nFigures for net income per share are in exact yen and U.S. dollars. \nNumber of shares outstanding as of March 31, 2005: 4,520,715,112. \n3. Cash dividends during the full year by subsidiary companies to non-Nissan minority shareholders are not included. \n\n\n \n \n \n \n [html]\n
Sales and Production ( units ) Potential2004Mw. 21.20052003Mex 31.20042002Mex 31.20032001Mus 31.20022000Mw. 31.2001
Global vehicle production3.293.3392.883.4092.586.6022.428.2792.475.730
Japan1.481.5631.475.0631.444.3141.272.8511.313.527
United States803.556619.665392.458353.366352.927
Mexico325.086308.322340.658328.946312.691
Spain142.889116.58984.919137.502136.807
United Kingdom319.652331.924297.719296.788327.792
Others51.57231.84626.53428.82631.986
Global unit sales ( wholesale )3.470.4222.946.7822.635.6862.460.4842.564.160
Japan819.152799.206792.767702.657725.842
North America ( Notes 1 and 2 )1.394.0991.204.8821.040.684958.030985.168
Europe ( Note2 )554.901548.693458.222453.697513.048
Others ( Note 1 )702.270394.001344.013336.100340.102
\n\nNotes: 1. Unit sales in Mexico are included in “North America.” \n2. Sales and Production for Europe and Mexico for each year are on a January to December basis. (In the annual reports for the fiscal years before \n2003, production for Europe and Mexico was on April to March basis.)", - "page_start": 71, - "page_end": 71, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]( SANS ) ANT and attended attended and results of births of births ( interventions )For the years ended\n
2004Met 31.2006
2003Mv. 31.20042002Mw. 31.20092001Mw. 81.20022000Me. 31.20012004Mo : 37.290Net sales
¥ 8.576.277¥ 7.429.219¥ 6.828.588¥ 6.196.241¥ 6.089.620$ 80.15 :Operating income
861.160824.855737.230489.215290.3148.04Net income
512.281503.667495.165372.262331.0754.78Net income per share (% ex - 2 )
125.16122.02117.7592.6183.531.1Cash dividends paid ( h, w, s )
94.23674.59450.80027.841088Shareholder ' s equity
¥ 2.465.750¥ 2.023.994¥ 1.808.304¥ 1.620.822¥957.939$ 23.04
Total assets9.848.5237.859.8567.349.1837.215.0056.451.24392.04 :
Net consolidated automotive debt (%**)( 205.791 )13.603107.952431.714952.657( 1.92 :
Number of employees183.607123.748127.625125.099133.833
\n\nNotes: 1. Unless indicated otherwise, all dollar figures herein refer to U.S. currency. Yen amounts have been translated into U.S. dollars, for convenience \nonly, at ¥107 = $1, the approximate exchange rate on March 31, 2005. \n2. Net income per share amounts are based on the weighted average number of shares of common stock outstanding during each year. \n\nFigures for net income per share are in exact yen and U.S. dollars. \nNumber of shares outstanding as of March 31, 2005: 4,520,715,112. \n\n3. Cash dividends during the full year by subsidiary companies to non-Nissan minority shareholders are not included. \n4. Net consolidated automotive debt was ¥8,602 million cash positive in fiscal year 2002, ¥215,861 million cash positive in fiscal year 2003, and \n¥453,470 million cash positive in fiscal year 2004, using the same accounting principles as fiscal year 2001. \n\n**861** **8,576** **512**\n\n**’00 ’01 ’02 ’03 ’04** **’00 ’01 ’02 ’03 ’04** **’00 ’01 ’02 ’03 ’04**\n\n504 7,429 825 \n737 495 6,829 \n6,196 489 372 \n6,090 290 331", - "page_start": 2, - "page_end": 2, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "(% of net revenue) \n5.8% \n**478**\n6 \n427 \n**5.6%**\n**398**\n4.8% \n354 \n5 \n**4.6%**\n300 \n4 \n\n3 \n**’04**\n\n**Corporate Rating**\n**Investment in Our Future**\n(Billion Yen) \nAa3 AA– \n5.5% \n500 \nA1 A+ \n5.3% \nA2 A \nR&I 378 \n400 A3 A– \n4.4% \n4.2% 326 \n4.1% Baa1 BBB+ \n4.0% \nS&P 3.8% \nBaa2 BBB \n262 \n300 \n239 244 \n3.4% 232 Baa3 BBB– \nMoody’s 206 \nBa1 BB+ \n200 \n**’99** **’00** **’01** **’02** **’03** **9/01 4/02 9/02 4/03 9/03 4/04 9/04 4/05 5/05**\nCanton plant investment included from fiscal year 2001 \n\n**Automotive Debt:**\n\nDespite higher levels incurred for capital expenditures and \n\nR&D, cash generated from operating activities in the \n\nautomotive division eliminated net automotive debt. Nissan \n\nheld a ¥205.8 billion yen net cash position at the close of \n\nfiscal 2004 in this division. \n\n**Rating**\n\nRegarding Nissan’s long-term credit rating, R&I upgraded \n\nNissan from A- to A on May 11, 2005. S&P upgraded their \n\nrating from BBB to BBB+ on July 20, 2004, and Moody’s \n\nupgraded from Baa3 to Baa1 on January 29, 2004. \n\n**Investment Policy**\n\nCapital expenditures increased by ¥50.2 billion to ¥477.5 \n\nbillion, representing 5.6 percent of net revenue. This \n\nincrease included the Canton plant expansion. R&D \n\nexpenditures increased by ¥43.8 billion to ¥398.1 billion. \n\nThis increase went to fund new technologies and product \n\ndevelopment. Our R&D resources are focused on projects \n\nthat add value to our customers and that will deliver an \n\nexpected return, in both the short and long term. \n\n**Dividend**\n\nAt the annual general meeting of shareholders on June 21, \n\n2005, the company proposed increasing its dividend to \n\n¥24 per share in 2004, up from ¥19 in 2003. In the first \n\nyear of the NISSAN Value-up dividend policy, the \n\nCompany plans to increase the per-share dividend to ¥29 \n\nin 2005. By the end of NISSAN Value-up in March 2008, \n\nNissan plans to pay an annual dividend of no less than \n\n¥40 per share. \n\n**Return on Invested Capital (ROIC)**\n\nNissan’s investments are made within the strict guidelines \n\nof its automotive operating ROIC. Based on these \n\nguidelines, Nissan reached 20.1 percent of ROIC on a \n\nconsistent basis as of fiscal 2003. \n\n**Dividend Policy**\n(Dividend per share, in yen) \n\n40 \n34 40 \n29 \n24 30 \n19 \n14 20 \n8 \n7 \n10 \n0 \n0 \n**’99** **’00** **’01** **’02** **’03** **’04** **’05*** **’06*** **’07***\n*Forecast", - "page_start": 15, - "page_end": 15, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]Consolidated subsidiariesAs of Mw. 31.2005JapanUS\n
CompanyLocationPrincipal businessCapital ( millions )Nissan share *(%)
Nissan Shatai Co., Ltd.Hiratsuka - shi, KanagawaManufacture and sales of automobiles and parts¥ 7.90443.80
Aichi Machine Industry Co., Ltd.Nagoya, AichiManufacture and sales of automotive parts¥ 8.51841.70
JATCO Ltd.Fuji, ShizuokaManufacture and sales of automotive parts¥ 29.93581.76
Nissan Kohki Co., Ltd.Samukawa, KanagawaManufacture and sales of automotive parts¥ 2.02097.73
Calsonic Kansei CorporationTokyoManufacture and sales of automotive parts¥ 40.60641.87
Nissan Motor Car Carrier Co, Ltd.TokyoInternational automobile transport¥ 64060.00
Nissan Trading Co., Ltd.Yokohama, KanagawaImport and export of automobiles, parts, etc.¥ 320100.00
Nissan Financial Services Co., Ltd.Chiba, ChibaAutomobile financing and leasing¥ 16.387100.00
Autech Japan, Inc.Chigasaki, KanagawaDevelopment, manufacture and sales of limited - edition automobiles¥ 480100.00
Nissan Real Estate Development CorporationTokyoReal estate sales, purchase and leasing¥ 1.00070.50
Nissan Finance Co., Ltd.TokyoFinance and accounting support¥ 2.491100.00
Aichi Nissan Motor Co., Ltd.Nagoya, AichiSales of automobiles and parts¥ 100100.00
Tokyo Nissan Motor Sales Co, Ltd.TokyoSales of automobiles and parts¥ 100100.00
Nissan Prince Tokyo Motor Sales Co., Ltd.TokyoSales of automobiles and parts¥ 100100.00
Nissan Chuo Parts Sales Co., Ltd.Yokohama, KanagawaSales of automobile repair parts¥ 54580.61
Nissan North America, Inc.Gardena, CaliforniaManagement of North American subsidiaries, manufacture and sales of automobiles and parts$ 1.791100.00
Nissan Motor Acceptance CorporationTorrance CaliforniaFinance of wholesale and retail automobile sales in US$ 499100.00
Nissan Motor Corporation in Hawai, Ltd.Honolulu, HawaiiSales of automobiles and parts$ 6100.00
Nissan Capital of America, Inc.Torrance, CaliforniaFinancing for group companies$ 1100.00
Nissan Technical Center North America, Inc.Farmington Hills MichiganResearch and development, testing$ 16100.00
Nissan Motor Insurance CorporationHonolulu, HawaiiCasualty insurance$ 10100.00
Nissan Forklift Co., North AmericaMarengo, IllinoisManufacture and sales of forklifts and parts$ 34100.00
\n\nNissan Canada, Inc. Mississauga, Ontario", - "page_start": 107, - "page_end": 107, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Net Cash Flow (automotive)**\n(Billion Yen) \n\n+1,082.2 \nOperating \n–203.0 –450.7 \nactivities \nbefore tax Tax paid Investing \nactivities \n\n1,200 \n1,000 \nh \ns \na \nC 800 \n600 \n\n–26.0 \nTreasury \nstock \n–94.0 \nDividend \npaid \n400 \n\n–99.1 +10.0 \nOther \nFX rate \nfinancial \nimpact \nactivities \n\n**205.8**\n\nNet debt \nat end \nof FY03 \n**–13.6**\n200 \nNet debt \nat the end \nof FY04 \n0 \nt \nb \ne \nD \n-200 \n\n**Impact on Operating Profit**\n(Billion Yen) \n\n+284 \nVolume \n/mix \n1,100 \n\n–92 \nProduct \nenrichment \n–114 \nSales \nexpenses \nWarranty \nexpenses \n–41 \n1,000 \n\n+131 \nPurchasing \ncost \nreduction \n–44 –15 \nR&D \nexpenses \nG&A \nand \nothers \n900 \n\nManu- \nfacturing \nexpenses \n–25.7**861.2**\nFY04 \nOP \n\n**824.9**-78 \n\nFY03 \nOP \nForex 800 \n\n+31 \nScope of \nconsolidation \n700 \n\n**Net Income**\n\nNet non-operating expenses totaled ¥5.5 billion, ¥9.7 \n\nbillion lower than last year. This was primarily due to a ¥5.3 \n\nbillion decrease in financial costs and a ¥5.3 billion \n\nincrease in equity in earnings of unconsolidated \n\nsubsidiaries and affiliates, thanks mainly to Renault. Net \n\nextraordinary losses totaled ¥62.5 billion, ¥10.7 billion \n\nlower than last year, mainly due to the sale of the site of \n\nthe former Murayama plant. Net income before taxes came \n\nto ¥793.2 billion. Income taxes totaled ¥258.0 billion, with \n\nan effective consolidated tax rate of 33 percent. Minority \n\ninterests amounted to ¥22.9 billion, mainly from Yulon \n\nNissan Motor. As a result, net income reached ¥512.3 \n\nbillion, an increase of ¥8.6 billion. \n\nCurrent liabilities increased by 28.1 percent, or ¥872.2 \n\nbillion, to ¥3,974.7 billion. This increase included changes \n\nin the scope of consolidation of ¥144.4 billion and an \n\nincrease in short-term borrowings for sales financing of \n\n¥558.5 billion. \n\nIn 2004, total shareholder equity increased from \n\n¥2,024.0 billion to ¥2,465.8 billion. This gain was primarily \n\ndue to net income of ¥512.3 billion, offset by dividends \n\npaid totaling ¥101.2 billion. Consolidated shareholder \n\nequity represented 29 percent of total revenues and 25 \n\npercent of total assets. \n\n**Cash Flow**\n\nCash from operating activities was ¥369.4 billion, below \n\nthe previous year’s level of ¥797.4 billion. This drop was \n\nprimarily caused by a ¥331.2 billion increase in finance \n\n**FINANCIAL POSITION**\nreceivables in the U.S. and Japan. There were also \n\nincreases in inventory and income tax paid. \n\nCash used for investing activities increased by ¥108.9 \n\nbillion to ¥865.0 billion. This increase was mainly due to an \n\nincrease of leased vehicles in the U.S. \n\nCash from financing activities totaled ¥521.0 billion, \n\nincluding an increase in short-term borrowing of ¥666.2 \n\nbillion, offset by ¥94 billion for the payment of dividends \n\nand ¥26 billion for the acquisition of treasury stock. \n\nIn total, cash and cash equivalents increased by ¥95.6 \n\nbillion to ¥289.8 billion from fiscal 2004. \n\n**Balance Sheet**\n\nIn 2004, total consolidated assets increased by 25.3 \n\npercent to ¥9,848.5 billion. \n\nCurrent assets increased by 36.4 percent, or ¥1,372.4 \n\nbillion, to ¥5,139.4 billion. This increase included changes \n\nin the scope of consolidation by ¥271.1 billion and an \n\nincrease in sales finance receivables by ¥840.6 billion \n\nthanks to increased sales in the U.S. Fixed assets \n\nincreased by 15.1 percent, or ¥616.7 billion, to ¥4,708.0 \n\nbillion. Property, plant and equipment valuation increased \n\nby ¥593.6 billion, mainly due to capital expenditures of \n\n¥477.5 billion and an increase in leased vehicles.", - "page_start": 14, - "page_end": 14, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "DESPITE NISSAN’S RECORD OPERATING RESULT IN FISCAL 2004, ITS STOCK PERFORMANCE RETURN WAS \n\nNEGATIVE AND LOWER THAN THE TOPIX INDEX. THE INVESTOR RELATIONS TEAM WAS STRENGTHENED \n\nAT THE START OF FISCAL 2005 TO BETTER ADDRESS THE NEEDS OF INVESTORS AND ENHANCE THEIR \n\nUNDERSTANDING OF NISSAN’S PERFORMANCE. INVESTORS WILL NOW BE ABLE TO GAIN A MORE IN-DEPTH \n\nVIEW OF THE COMPANY’S OPERATIONS AND PERFORMANCE INDICATORS. \n\n**IR Activities**\n\nUnder NISSAN Value-Up, the IR team’s performance will \n\nbe evaluated based on the price-earnings ratio (PER) and \n\nvolatility relative to our major competitors. PER is used to \n\nmeasure how successfully the IR team manages market \n\nexpectations about Nissan in order to maintain the Nissan \n\nshare price close to an intrinsic value. The other measure, \n\nvolatility, is used to measure the risk investors perceive \n\nwhen considering Nissan stock. If Nissan can successfully \n\nreduce volatility, the minimum return required by investors \n\nshould decline. The IR team believes that a strengthening \n\nof disclosure activities is required to improve both \n\nmeasures. The team plans to disclose not only financial \n\nresults but also more forward-looking information about \n\nNissan fundamentals such as technology and product. \n\nSuch forward-looking information helps investors to \n\nforecast future performance more precisely and reduces \n\nuncertainty about the future. As a consequence, Nissan will \n\nincrease the number of investor conferences, events, and \n\nteleconferences during fiscal 2005. \n\n**Share Performance in Fiscal 2004**\n\nNissan’s share price began at ¥1,143 at the beginning \n\nof fiscal 2004 and ended the fiscal year at ¥1,099, \n\ngenerating a negative return of 3.85 percent. Total \n\nshareholder return (TSR) was -1.67 percent, while the \n\ndividend yield came to 2.18 percent (¥24 per share dividend, \n\ndivided by the ¥1,099 closing price). Adverse movements \n\nin foreign exchange rates and commodity price hikes \n\nadversely affected Nissan’s profitability, which was reflected \n\nin the share price. In addition, specific events relating \n\ndirectly to the company also had a negative impact. Later in \n\nthis report, corporate officers will explain what actions \n\nNissan has undertaken to ensure better performance. \n\n**Payout Policy**\n\nNissan announced its NISSAN Value-Up three-year dividend \n\npolicy, covering the period from fiscal 2005 to fiscal 2007, at \n\nthe annual general meeting of shareholders on June 23, \n\n2004. Nissan proposes a long-term dividend policy to \n\nprovide more visibility and improve transparency into the \n\nways in which Nissan rewards its shareholders. Nissan \n\nbelieves that a long-term dividend policy reduces uncertainty \n\nfor investors who already own or are considering acquiring \n\nNissan stock. \n\n**Five-Year Share Performance**\n(Index: April 3, 2000=100) \n400 \nNissan \n300 \n\n200 \nTOPIX Transportation Equipment Index \n100 \nTOPIX \n80 Apr. \nMay June July Aug. Sept Oct. Nov Dec. \nJan. \n**2005**\n**’01** **’02** **’03** **’04** **’05**\n0 \n**2004**", - "page_start": 16, - "page_end": 16, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Driving Ahead in a Flat Market**\n\n\n\ndeclining sales as a result. Still, we do see potential in new \n\nareas within the market. For example, we increased the \n\nnumber of women employed as “carlife” advisors and \n\ntechnical advisors. We did this to put both women and older \n\ncustomers at ease when they have sales and service \n\nissues. Both types of advisors are important to our sales \n\nand service at a dealership because they make the process \n\nmore transparent and understandable. Service is a very \n\nprofitable part of business in Japan, so taking ours to the \n\nnext level is crucial. \n\nWe have two plans to expand sales in a flat market. \n\nThe first is to develop a more efficient marketing strategy \n\nthat is aligned with our quality products. The second is to \n\nbuild a more efficient dealership network, which will boost \n\ncustomer satisfaction. If we succeed at these, we can raise \n\nboth our sales and our customer retention rate. \n\nOur dealers are reporting that the quality of our \n\nvehicles has improved greatly. We knew this from the \n\nupstream side, but it means a great deal to get \n\nconfirmation from the market. Quality is always a risk factor \n\nin Japan; consumers here are unforgiving about quality \n\nproblems. The Internet has accelerated the ability to share \n\n“Nissan’s performance in \n\nJapan in 2004 was solid. \n\nProfit rose 1.4 percent and \n\nour market share went up \n\n0.4 percent to 14.6 percent. \n\nLaunching six new models in \n\nthe second half boosted our \n\nresults dramatically: we \n\nregistered a 1.1 percent \n\nincrease in market share \n\nK A Z U H I K O T O I D A \nSenior Vice President \nover the previous period. \n\nAnd for the first time in 19 \n\nyears we had four cars—the Tiida, Note, March and \n\nCube—in the top ten. \n\nOur steady growth has continued into 2005, \n\npowered by positive customer response to both the \n\nMurano and Tiida. These are the kinds of attractive, \n\nunique products that have an immediate impact on \n\nconsumers. We’ve also strengthened our position \n\nin the important small car market, and plan to \n\naugment that with the launch of the Otti, an OEM \n\nproject with Mitsubishi, and the Moco, an OEM \n\nproduct with Suzuki. While we do need to raise our \n\ngame in the SUV market, our overall coverage has \n\nimproved recently. \n\ninformation, both good and bad, so the level and rate of \n\ninformation from dealers and consumers have gone up \n\naccordingly. Meanwhile, even prices for used Nissan \n\nvehicles are improving steadily, a major indication that the \n\nNissan brand is recognized and valued. \n\nOur home market is of prime importance to Nissan. \n\nJapan is a major contributor to our total profit, and we will \n\ncontinue to make the upgrades in quality, products and \n\nservice needed to drive sales and profit higher.” \n\n\n\n\n\nWe’ve set an ambitious sales target of 933,000 vehicles \n\nfor 2005, which represents an increase of 10 percent. I’m \n\nconfident that we can achieve this because of the strength \n\nof our product lineup. The recently released Serena \n\nunderwent a full model change, for example, which should \n\ngive us more muscle in the minivan market. We also \n\nrecently decided to offer our entire lineup through both our \n\nblue and red sales channels, so customers will be able to \n\nsee every model at any outlet they visit. This is in stark \n\ncontrast to the traditional dealership system in Japan, \n\nwhich has many different sales channels. \n\nThe aging of the population has made the automotive \n\nmarket in Japan much tougher, and we expect flat or even", - "page_start": 61, - "page_end": 61, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "Microscope Manual.pdf", - "query": "How can CEDAR Oil be used with the AY11236 microscope?", - "target_page": 10, - "target_passage": "1. Drop some cedar oil on to the top of the 100x objective when the 100x objective is being used. NOTE: To maintain a good quality image, rotate the turret right and left several times to eliminate bubbles in the cedar oil. 2. After finishing the observation, wipe off the cedar oil. 3. Do not use the 40x objective until you have wiped off all of the cedar oil.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "**SPECIFICATIONS**\n1. Length of mechanical tube: 160mm \n2. Conjugate distance between object and image: 195mm \n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion) \n4. Illumination: Input 110V or 200V; Output: 20W \n5. Fine adjustment range: .002mm \n6. Coarse Adjustment Range: 20mm \n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm \n8. Condenser Elevation Range: 15mm \n9. Iris diaphragm aperture: 2mm-30mm \n\n**PARTS LIST**\n\n\n \n \n \n \n [html]NameMicroscope Stand4x ( parfocal distance adjusted )\n
Qty
1
110 ×
1Achromatic Objective
40 × ( s ) ( parfocal distance adjustable )1
\n\n2 10x Wide Field Eyepiece w/Pointer \n\nAbbe Condenser NA1.25 1 \n**Objective Specifications**\n1 Plastic Dust Cover \n\n\n \n \n \n \n [html]Achromatic Objective\n
ClassificationOptical SystemMagnificationNumerical ApertureWorking Distance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40 × Spring Adjustable Focus0.650.57mm
Oil Immer -100x Spring Adjustable1.250.18mm
\n\nSpare 6V20W Halogen Bulb \n1 \n\n1 Lens Cleaning Tissue \n\n1 Cedar Oil \n\n1 1A Fuse (spare) \n\n1 Specification \n\nInspection Certificate 1 \n\nPacking List 1 \n\n**OPERATION**\n\nNote: For oil immersion, please use the index of refraction 1.515 oil \n**Eyepiece Specifications**\n\n1. Remove all components from package. Identify all parts before \n assembling instrument. \n2. Attach 4x, 10x and 40x objectives by screwing into revolving \n turret. Tighten and secure to maximum finger pressure only. \n3. Place the specimen on the stage and secure with spring clips. \n NOTE: The cover glass must face upward (the thinner glass is \n the cover glass), otherwise when the 40x objective is used the \n specimen cannot be observed. Observation is best when the \n thickness of the cover glass is 0.1-1.1mm and the cover glass \n is 0.17mm. \n4. Plug power cord into an electrical outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the lowest magnification objective \n first. The 10x objective provides a larger field of view making it \n easier to search the specimen. \n\n**Classification Magnification**\n**Field of View (FOV)**\n**Diameter**\n\nPlain Field \nEyepiece \n10x 18mm \n\n**Total Magnification**\n\n\n \n \n \n \n [html]Eyepiece\n
Magnification
10 ×
Objective4 ×
40 ×10 ×
100 ×40 × ( s )
400x100 × ( oil, s )
", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Maintenance.............................................................................................................................................................................................
Model AY11240 / Model AY11238...............................................................................................................................................................................Model AY11228 / Model AY11232....................................................
Model AY11230 / Model AY11234...............................................................................................................................................................................Model AY11236............................................................................................................................................................................................
\n\n\n\n\n\n**MODEL AY11240/AY11238**\n\nEyepiece \n\nEyepiece Monocular Tube \n\nEyepiece \nSet Screw \n\nRotating Head \n\nStage Height \nLimit Adjustment \nBarrel \n\nRevolving \nTurret \n\nCoarse \nAdjustment \nKnob \nStand \nRevolving Turret \n\nObjectives \n\nObjectives \nSpring \nClips \nCoarse \nAdjustment \nKnob Fine \nAdjustment \nKnob \nSpring Clips \n\n**IMPORTANT NOTES**\nStage \nStand \n\n5-Hole \nDiaphragm \nand Condenser \nFine \nAdjustment \nKnob \nStage \n\nCongratulations on your purchase of this high quality BARSKA \nmicroscope. With proper care, this microscope will provide many \nyears of use. Please read the following instructions before \noperating this instrument. \n1. Do not attempt to disassemble the instrument. This product has \n been carefully assembled at the factory and should only be \n examined by a factory-trained technician. \n2. This instrument should only be used in an environment with an \n indoor temperature range of 32oF to 104oF. \n3. Do not use this instrument in an environment with a lot of dust. \n**Cover the instrument when not in use.**\n4. Do not subject the instrument to shock. \n\n5-Hole \nDiaphragm \nand Condenser \nConcave \nMirror \nPower \nCord Lamp \n\nLamp \nOn/Off \nSwitch \n\n**Model AY11240** **Model AY11238**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11240 and Model AY11238 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. \n\n**MAINTENANCE**\n\nProper care and storage of this instrument is essential. Please read \nthe following guidelines: \n1. Keep the instrument in a dry and moisture-free location. \n2. Do not expose to acid, alkali fumes or moisture. \n3. Keep optical parts clean and free of dust. To clean optical parts \n gently wipe with lens cleaning tissue and a mixture of alcohol \n and diethyl ether. Depending on weather conditions, the \n following are the recommended mixture ratios: \n Wet weather: 1:2 \n Dry Weather: 1:1 \n4. After use, cover the instrument with the plastic dust cover. \n5. If instrument is to be stored for an extended period of time, \n remove the eyepiece and oculars and store in a moisture-proof \n container. \n\n**CONSTRUCTION**", - "page_start": 1, - "page_end": 1, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**OPERATION (cont.)** **MODEL AY11236**\n\nInterpupillary Slide Adjustment \n**Model AY11230**\nEyepiece \n\nRotating Head \n\nRevolving Turret \nStand \n\nObjectives \n\nStage \n\nCoarse \nAdjustment \nKnob \nFine \nAdjustment \nKnob \nStage Clip \nAdjustment \n\nCondenser \nFocusing \nKnob \n\nLamp \nOn/Off \nSwitch \n\nPower \nCord \n\nLamp \n\n**Model AY11236**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound \nmicroscope designed for biological studies such as specimen \nexamination. It can also be used for examining bacteria and \nfor general clinical and medical studies and other scientific uses. \n\n\n \n \n \n \n [html]\n
Model AY11234FOCUSING
1. Turn the focusing knob avou until a clear image isNumber of fluoring
2. If the image is unclear, ar height of the elevator upExpecimen agnification
then turn the focusing kConcentrations
ZOOM MAGNIFICATIONn can be
1. Turn the zoom magnificat the desired magnification view.PUPILLARY
2. In most situations, it is rethat you focus at the lowthe observer ' s lary distance. Illary distance
magnification, then move magnification and re - focu necessary.Authority expectations
3. If the image is not clear t at the same time, the did need adjustment.DIOPTER RING ADJUSTM
ctive cover. the working1. To adjust the eyepiece foor without eyeglasses and differences in acuity betw and left eyes, follow the steps :
focus knob until ar and sharp.a. Observe an image threyepiece and bring a sinto focus using the fob. By turning the diopter
Tablebring the same point if
remove the and removec. Then bring the same p focus through the righ by turning the right diff
cap.logen bulb. e base plate and
d. With more than one vi viewer should note the diopter ring position fc and right eyepieces, th viewing set the diopter adjustments to that se
\n\n**CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope. \nIt is constructed with two optical paths at the same angle. It is \nequipped with transmitted illumination. By using this instrument, \nthe user can observe specimens at magnification from 40x to \n1000x by selecting the desired objective lens. Coarse and fine \nfocus adjustments provide accuracy and image detail. The rotating \nhead allows the user to position the eyepieces for maximum \nviewing comfort and easy access to all adjustment knobs. \n\n1. The vertical tube can be used for \n instructional viewing or to \n\nphotograph \ndigital camera or \nunit. \n2. Loosen the retention screw, then rotate \n the adjustment ring to change the \n\n the image witrh a \n micro TV \n\n length of the vertical tube. \n3. Make sure that both the images in \n\n**13**", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11230\n
Model AY11234NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x ob ).)
110x Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 earnings12.10W Halogen Lamp12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11230**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11234**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11230**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10x, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11234**\n**Optical Specifications - Model AY11234**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**OPERATION (cont.)**\n\n6. Adjust the interpupillary distance by using the eyepiece \n interpupillary slide adjustment. \n7. Observe using the right eyepiece adjusting the coarse and fine \n focus and adjust the diopter ring until image is clear and sharp. \n8. Observe with the left eyepiece and adjust the diopter ring until \n image is clear and sharp. \n9. Rotate the fine focus adjustment when using other objectives. \n NOTE: This instrument is equipped with patent objectives so \n the precision or parfocalization is very high. \n\n**ADJUSTING THE CONDENSER APERTURE**\n\n1. The numerical aperture of the condenser should match the \n numerical aperture of the objective being used. \n2. To make sure that the objectives are imaging properly \n (especially the 40x and 100x), follow this procedure: \n\n1. Take off the eyepiece. \n2. Look through the eyepiece. \n 3. The smallest circle or light that you can see is the \n\n eyepiece's exit pupil. \n4. Adjust the aperture of the iris diaphragm in the \n condenser to 70% or 80% for the best contrast for \n observation (See Fig. 2.). \n\nAdjustable \nRing Tightening \nRing Mark \nSleeve Front \nSleeve \n\nExit Pupil \nof Objective \n\n\n\n\n\n**Fig. 1 - Objective Parts**\n\n10. If the image is in focus with the 10x objective, you can select \n other objectives and observe the specimen even if the fine \n adjustment knob has not been used by using the following \n method (See Fig. 1): \nAperture of \nDiaphragm \n\n1. Unscrew the 40x or 100x objective and remove from \n turret. \n2. Remove the mark sleeve. \n3. Turn the ring on the objective to adjust its parfocal \n distance. \n4. Re-insert the objective and compare with the 10x. \n5. Adjust until the 40x and 100x objectives image is clear. \n\n**Fig. 2 - Condenser Diaphram Aperture**\n\n**TROUBLESHOOTING**\n\n**USING THE CEDAR OIL**\n\n1. Drop some cedar oil on to the top of the 100x objective when the \n 100x objective is being used. NOTE: To maintain a good quality \n image, rotate the turret right and left several times to eliminate \n bubbles in the cedar oil. \n2. After finishing the observation, wipe off the cedar oil. \n3. Do not use the 40x objective until you have wiped off all of the \n cedar oil. \n\n\n \n \n \n \n [html]\n
ProblemPossible CauseSolution
1. Image not clear.1. Specimen is in incorrect2. Lans is dirty. 2. Lans is dirty. 3. Coldar oil first placed on metastasis of biomersion objective. 4. Butbles in Credar oilS. Codar oil on 40x objective. 6. Sris diaphragm open too wide.1. Re - position specimen. 2. Clean lens. 3. Put a drop of Cedar oil on proportions. 4. Rotate turnet several times by the compared to eliminate bubbles. 5. Clean 40x sbjective. 6. Reduce size of iris diaphragm.
2. Poor illumination.1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level.1. Re - position condenser. 2. Clean lens. 3. Re - position specimen so it is level.
3. Illumination not bright.1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty.1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.
4. Cannot focus at high magnification.1. Specimen is in incorrect position.1. Re - position specimen.
5. Objective lenses touch specimen.1. Stage is too high.1. Re - position stage.
", - "page_start": 9, - "page_end": 9, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11228\n
Model AY11232NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x obj.)]
110 × Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 ea. spare )12.10W Halogen Lamp 12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11228**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11232**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11228**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10 ×, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11232**\n**Optical Specifications - Model AY11232**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**CONSTRUCTION**\n\nBARSKA Model AY11230 is a fixed power trinocular stereo \nmicroscope. It is constructed with two optical paths at the same \nangle. It is equipped with transmitted illumination and oblique \nillumination. By using this instrument, the user can observe and \nenlarge the right side stereo image. BARSKA Model AY11234 is a \nzoom trinocular stereo microscope. The object being viewed is \nenlarged through two identical sized sets of right and left eye \nlenses. The zoom provides different magnification and features an \ninversion system which allows the image to be viewed normally \nand right side up. \n\n**10**", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**USING THE 5-HOLE DIAPHRAGM**\n\n\n\nDiopter \nAdjustment \n\n\n\n**OPERATION (cont.)**\n\n**Model AY11240** **Model AY11238**\n\n7. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n8. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. 6. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n7. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. \n\nFocus \nKnob \nEyepiece \nVertical \nPole Eyepiece \n\nDiopter \nAdjustment \n\nPrism \nCap \n\nFocus \nKnob \n\nLens \nHousing \n\nOblique \nIlluminator \nIllumination \nControls \nRotary \nCase \n\n1. To obtain the best contrast for observing, match the hole size to \n the objective that is being used to view the specimen. \n2. Each hole has a corresponding number from 1 to 5. 1 is the \n smallest hole; 5 is the largest hole. \n Use the following guidelines to match the hole number to the \n objective that you have selected: \n 40x objective: Use #5 hole \n 10x objective: Use #4 or #3 hole \n 4x objective: Use #2 or #1 hole \n\nLens \nSpring \nClips \nSpring \nClips \nStage \nStage \n\n**Model AY11232**\n\n**COARSE KNOB ADJUSTMENT - Model AY11240**\n**MICROSCOPE USAGE**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut \n (See Fig.1). \n2. To adjust the knob loosen or tighten the nut. \n NOTE: Adjusting the nut too tight will make focusing difficult. \n Adjusting the nut too loose will cause the tube to slide. \n\nBARSKA Model AY11228 and Model AY11232 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. \n\n\n\n**CONSTRUCTION**\n\nBARSKA Model AY11228 is a fixed power stereo microscope. It is \nconstructed with two optical paths at the same angle. It is \nequipped with transmitted illumination and oblique illumination. \nBy using this instrument, the user can observe and enlarge the \nright side stereo image. BARSKA Model AY11232 is a zoom stereo \nmicroscope. The object being viewed is enlarged through two \nidentical sized sets of right and left eye lenses. The zoom provides \ndifferent magnification and features an inversion system which \nallows the image to be viewed normally and right side up. \n\nHeavy-Light \nAdjustment Nut \n\n**Fig. 1- Coarse Adjustment Knob**\n\n**6**", - "page_start": 3, - "page_end": 3, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "\n \n \n \n \n [html]Model AY11240Model AY11238NameNameMicroscope StandMicroscope StandAchromatic ObjectiveAchromatic ObjectivePlain Concave Mirror10x Wide Field EyepiecePlastic Dust CoverPlastic Dust Cover10x Wide Field EyepieceSpare BulbLens Cleaning TissueLens Cleaning TissueSpecificationSpecificationInspection CertificateInspection CertificatePacking ListPacking List\n
QtyQty
11
4 ×14 ×1
10x110 ×1
40x ( s )140 × ( s )1
11
11
11
11
11
11
11
\n\n**Model AY11238**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Attach 4x, 10x and 40x objectives \n to revolving turret. 3. Place the \n specimen on the stage and \n secure with spring clips. NOTE: The \n cover glass must face upward (the \n thinner glass is the cover glass), \n otherwise when the 40x objective is \n used the specimen cannot be \n observed. Observation is best when \n the thickness of the cover glass is \n 0.1-1.1mm and the cover glass is \n 0.17mm. \n4. Plug power cord into an electrical \n outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the \n lowest magnification objective \n first. The 4x objective provides a \n larger field of view to search \n specimen. \n\n\n \n \n \n \n [html]\n
Objective1UX
4 ×40 ×
10 ×100 ×
40 × ( s )400 ×
\n\n\n \n \n \n \n [html]Achromatic Objective\n
_SystemPlaqifillationApertureDistance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40x Spring Adjustable Focus0.650.57mm
\n\n**OPERATION**\n\n**Model AY11240**", - "page_start": 2, - "page_end": 2, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5 ×2 ×Working Distance ( mm )
1561024430WF10x / 20mm
7 ×- 45 ×3.5 ×- 22.5x5.3 ×- 33.8 ×0.5 ×- 57.5x14 ×- 90 ×Field of View Objective Dia. ( mm )
28.6 - 4.457.2 - 8.838.1 - 5.919.0 - 2.914.3 - 2.2WF12.5 ×/ 18mm
8.8 ×- 56x4.4x - 28x6.6x - 42x8.3. 2x - 84x17.6 × 112 ×Field of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15x / 16mm
10.5 × d5.3 ×- 33.8x7.9 ×– 58.6x5.7 × 101821 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.530.5 - 4.815.3 - 2411.5 - 1.8WF20x / 12mm
14 ×- 90 ×7 ×- 45 ×10.5 × 67.5 ×21 ×- 135x28 ×- 180 ×Field of View Objective Dia. ( mm )
17.0 - 234.0 - 5.422.7 – 3.611.3 - 1.88.5 - 1.4WF25x / 9mm
17.5 × 4112.538.8 ×- 56.3 ×13 ×- 84.4 ×16.3 × 169x35 ×- 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 - 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" - } - ] - }, - { - "references": { - "source_file": "Microscope Manual.pdf", - "query": "For the AY11230 microscope, what is the interpupillary adjustment?", - "target_page": 7, - "target_passage": "Model AY11230 1. Interpupillary Adjustment: 55mm - 75mm", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "**OPERATION (cont.)** **MODEL AY11236**\n\nInterpupillary Slide Adjustment \n**Model AY11230**\nEyepiece \n\nRotating Head \n\nRevolving Turret \nStand \n\nObjectives \n\nStage \n\nCoarse \nAdjustment \nKnob \nFine \nAdjustment \nKnob \nStage Clip \nAdjustment \n\nCondenser \nFocusing \nKnob \n\nLamp \nOn/Off \nSwitch \n\nPower \nCord \n\nLamp \n\n**Model AY11236**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound \nmicroscope designed for biological studies such as specimen \nexamination. It can also be used for examining bacteria and \nfor general clinical and medical studies and other scientific uses. \n\n\n \n \n \n \n [html]\n
Model AY11234FOCUSING
1. Turn the focusing knob avou until a clear image isNumber of fluoring
2. If the image is unclear, ar height of the elevator upExpecimen agnification
then turn the focusing kConcentrations
ZOOM MAGNIFICATIONn can be
1. Turn the zoom magnificat the desired magnification view.PUPILLARY
2. In most situations, it is rethat you focus at the lowthe observer ' s lary distance. Illary distance
magnification, then move magnification and re - focu necessary.Authority expectations
3. If the image is not clear t at the same time, the did need adjustment.DIOPTER RING ADJUSTM
ctive cover. the working1. To adjust the eyepiece foor without eyeglasses and differences in acuity betw and left eyes, follow the steps :
focus knob until ar and sharp.a. Observe an image threyepiece and bring a sinto focus using the fob. By turning the diopter
Tablebring the same point if
remove the and removec. Then bring the same p focus through the righ by turning the right diff
cap.logen bulb. e base plate and
d. With more than one vi viewer should note the diopter ring position fc and right eyepieces, th viewing set the diopter adjustments to that se
\n\n**CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope. \nIt is constructed with two optical paths at the same angle. It is \nequipped with transmitted illumination. By using this instrument, \nthe user can observe specimens at magnification from 40x to \n1000x by selecting the desired objective lens. Coarse and fine \nfocus adjustments provide accuracy and image detail. The rotating \nhead allows the user to position the eyepieces for maximum \nviewing comfort and easy access to all adjustment knobs. \n\n1. The vertical tube can be used for \n instructional viewing or to \n\nphotograph \ndigital camera or \nunit. \n2. Loosen the retention screw, then rotate \n the adjustment ring to change the \n\n the image witrh a \n micro TV \n\n length of the vertical tube. \n3. Make sure that both the images in \n\n**13**", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5 ×2 ×Working Distance ( mm )
1561024430WF10x / 20mm
7 ×- 45 ×3.5 ×- 22.5x5.3 ×- 33.8 ×0.5 ×- 57.5x14 ×- 90 ×Field of View Objective Dia. ( mm )
28.6 - 4.457.2 - 8.838.1 - 5.919.0 - 2.914.3 - 2.2WF12.5 ×/ 18mm
8.8 ×- 56x4.4x - 28x6.6x - 42x8.3. 2x - 84x17.6 × 112 ×Field of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15x / 16mm
10.5 × d5.3 ×- 33.8x7.9 ×– 58.6x5.7 × 101821 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.530.5 - 4.815.3 - 2411.5 - 1.8WF20x / 12mm
14 ×- 90 ×7 ×- 45 ×10.5 × 67.5 ×21 ×- 135x28 ×- 180 ×Field of View Objective Dia. ( mm )
17.0 - 234.0 - 5.422.7 – 3.611.3 - 1.88.5 - 1.4WF25x / 9mm
17.5 × 4112.538.8 ×- 56.3 ×13 ×- 84.4 ×16.3 × 169x35 ×- 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 - 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5x2xWorking Distance ( mm )
1561024430WF10 ×/ 20mm
7x - 45x3.5x - 2.5x5.3x - 33.8x10.5 × 167.5x14 ×- 90xField of View Objective Dia. ( mm )
28.6 – 4.457.2 - 8.838.1 - 5.919.0 – 2.914.3 – 2.2WF12.5x / 18mm
8.8 ×– 56x4.4 × 2886.6 ×– 42x13.2 × L84x17.6 × LLLField of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15 ×/ 16mm
10.5 × 67.5x5.3x - 33.8x7.9 ×– 58.6x15.7 × L101x21 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.230.5 - 4.815.3 – 2411.5 – 1.8WF20 ×/ 12mm
14 ×- 90 ×7x - 45 ×10.5 × 67.5x21 ×- 135 ×28 ×- 180 >Field of View Objective Dia. ( mm )
17.0 – 2.734.0 - 5.422.7 - 3.611.3 – 1.88.5 - 1.4WF25x / 9mm
17.5 × 112.5 :8.8x - 56.3x13 ×- 84.4 ×26.3 × 1169 ×35x - 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 – 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11230\n
Model AY11234NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x ob ).)
110x Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 earnings12.10W Halogen Lamp12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11230**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11234**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11230**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10x, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11234**\n**Optical Specifications - Model AY11234**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11228\n
Model AY11232NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x obj.)]
110 × Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 ea. spare )12.10W Halogen Lamp 12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11228**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11232**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11228**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10 ×, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11232**\n**Optical Specifications - Model AY11232**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**MODEL AY11230/AY11234**\n\n**Model AY11228**\nVertical \nTube Vertical \nTube \nDiopter \nAdjustment \nDiopter \nAdjustment Eyepiece \nEyepiece \n\nPrism \nCap \n\nPrism \nCap \nFocus \nKnob \n\nMagnification \nAdjustment \nKnob \n\nRotary \nCase \nFocus \nKnob \nLens \nHousing \n\nOblique \nIlluminator \nLens \n\nTightening \nKnob Oblique \nIlluminator \nSpring \nClips \n\nSpring \nClips \nStage \nIllumination \nControls \nStage \n\n\n\n\n**Model AY11234**\n\n\n \n \n \n \n [html]\n
Model AY11232
FOCUSING
1. Turn the focusing knob away or to you until a clear image is viewed.2. If the image is unclear, adjust the height of the elevator up or down, then turn the focusing knob again
TableZOOM MAGNIFICATION
Age1. Turn the zoom magnification knob the desired magnification and field view.
ILLARY2. In most situations, it is recommenthat you focus at the lowest magnification, then move to a high
distance. distancemagnification and re - focus a necessary.
both eyes the3. If the image is not clear to both ey at the same time, the diopter ring need adjustment.
DIOPTER RING AD3USTMENTCover.
1. To adjust the eyepiece for viewingor without eyeglasses and for differences in acuity between
eleft eye knob untiland left eyes, follow the following steps :
Productiona. Observe an image through the
ng until the incide andeyepiece and bring a specific perinto focus using the focus knobb. By turning the diopter rring adjustment for the left eyepiecobring the same point into sharp
from thefocus.
Aging thec. Then bring the same point into focus through the right eyepiec
pve theby turning the right diopter ring
removed. With more than one viewer, eac viewer should note their own
Comparisondiopter ring position for the left
Sensorsand right eyepieces, then befor viewing set the diopter ring
Maximumadjustments to that setting.
CHANGING THE BULB1. Disconnect the power cord from thelectrical outlet.
2. When the bulb is cool, remove the oblique illuminator cap and remov the halogen bulb with cap.3. Replace with a new halogen bulb. 4. Open the window in the base plate and replace the halogen lamp or
fluorescent lamp of transmitted
\n\nIllumination \nControls \n**Model AY11230**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular \nmicroscopes designed for biological studies such as specimen \nexamination. They can also be used for examining bacteria and for \ngeneral clinical and medical studies. Simple design and use and the \nvertical tube make them is useful for school classroom instruction. \n\n**CONSTRUCTION**", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**USING THE 5-HOLE DIAPHRAGM**\n\n\n\nDiopter \nAdjustment \n\n\n\n**OPERATION (cont.)**\n\n**Model AY11240** **Model AY11238**\n\n7. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n8. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. 6. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n7. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. \n\nFocus \nKnob \nEyepiece \nVertical \nPole Eyepiece \n\nDiopter \nAdjustment \n\nPrism \nCap \n\nFocus \nKnob \n\nLens \nHousing \n\nOblique \nIlluminator \nIllumination \nControls \nRotary \nCase \n\n1. To obtain the best contrast for observing, match the hole size to \n the objective that is being used to view the specimen. \n2. Each hole has a corresponding number from 1 to 5. 1 is the \n smallest hole; 5 is the largest hole. \n Use the following guidelines to match the hole number to the \n objective that you have selected: \n 40x objective: Use #5 hole \n 10x objective: Use #4 or #3 hole \n 4x objective: Use #2 or #1 hole \n\nLens \nSpring \nClips \nSpring \nClips \nStage \nStage \n\n**Model AY11232**\n\n**COARSE KNOB ADJUSTMENT - Model AY11240**\n**MICROSCOPE USAGE**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut \n (See Fig.1). \n2. To adjust the knob loosen or tighten the nut. \n NOTE: Adjusting the nut too tight will make focusing difficult. \n Adjusting the nut too loose will cause the tube to slide. \n\nBARSKA Model AY11228 and Model AY11232 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. \n\n\n\n**CONSTRUCTION**\n\nBARSKA Model AY11228 is a fixed power stereo microscope. It is \nconstructed with two optical paths at the same angle. It is \nequipped with transmitted illumination and oblique illumination. \nBy using this instrument, the user can observe and enlarge the \nright side stereo image. BARSKA Model AY11232 is a zoom stereo \nmicroscope. The object being viewed is enlarged through two \nidentical sized sets of right and left eye lenses. The zoom provides \ndifferent magnification and features an inversion system which \nallows the image to be viewed normally and right side up. \n\nHeavy-Light \nAdjustment Nut \n\n**Fig. 1- Coarse Adjustment Knob**\n\n**6**", - "page_start": 3, - "page_end": 3, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Maintenance.............................................................................................................................................................................................
Model AY11240 / Model AY11238...............................................................................................................................................................................Model AY11228 / Model AY11232....................................................
Model AY11230 / Model AY11234...............................................................................................................................................................................Model AY11236............................................................................................................................................................................................
\n\n\n\n\n\n**MODEL AY11240/AY11238**\n\nEyepiece \n\nEyepiece Monocular Tube \n\nEyepiece \nSet Screw \n\nRotating Head \n\nStage Height \nLimit Adjustment \nBarrel \n\nRevolving \nTurret \n\nCoarse \nAdjustment \nKnob \nStand \nRevolving Turret \n\nObjectives \n\nObjectives \nSpring \nClips \nCoarse \nAdjustment \nKnob Fine \nAdjustment \nKnob \nSpring Clips \n\n**IMPORTANT NOTES**\nStage \nStand \n\n5-Hole \nDiaphragm \nand Condenser \nFine \nAdjustment \nKnob \nStage \n\nCongratulations on your purchase of this high quality BARSKA \nmicroscope. With proper care, this microscope will provide many \nyears of use. Please read the following instructions before \noperating this instrument. \n1. Do not attempt to disassemble the instrument. This product has \n been carefully assembled at the factory and should only be \n examined by a factory-trained technician. \n2. This instrument should only be used in an environment with an \n indoor temperature range of 32oF to 104oF. \n3. Do not use this instrument in an environment with a lot of dust. \n**Cover the instrument when not in use.**\n4. Do not subject the instrument to shock. \n\n5-Hole \nDiaphragm \nand Condenser \nConcave \nMirror \nPower \nCord Lamp \n\nLamp \nOn/Off \nSwitch \n\n**Model AY11240** **Model AY11238**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11240 and Model AY11238 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. \n\n**MAINTENANCE**\n\nProper care and storage of this instrument is essential. Please read \nthe following guidelines: \n1. Keep the instrument in a dry and moisture-free location. \n2. Do not expose to acid, alkali fumes or moisture. \n3. Keep optical parts clean and free of dust. To clean optical parts \n gently wipe with lens cleaning tissue and a mixture of alcohol \n and diethyl ether. Depending on weather conditions, the \n following are the recommended mixture ratios: \n Wet weather: 1:2 \n Dry Weather: 1:1 \n4. After use, cover the instrument with the plastic dust cover. \n5. If instrument is to be stored for an extended period of time, \n remove the eyepiece and oculars and store in a moisture-proof \n container. \n\n**CONSTRUCTION**", - "page_start": 1, - "page_end": 1, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**SPECIFICATIONS**\n1. Length of mechanical tube: 160mm \n2. Conjugate distance between object and image: 195mm \n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion) \n4. Illumination: Input 110V or 200V; Output: 20W \n5. Fine adjustment range: .002mm \n6. Coarse Adjustment Range: 20mm \n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm \n8. Condenser Elevation Range: 15mm \n9. Iris diaphragm aperture: 2mm-30mm \n\n**PARTS LIST**\n\n\n \n \n \n \n [html]NameMicroscope Stand4x ( parfocal distance adjusted )\n
Qty
1
110 ×
1Achromatic Objective
40 × ( s ) ( parfocal distance adjustable )1
\n\n2 10x Wide Field Eyepiece w/Pointer \n\nAbbe Condenser NA1.25 1 \n**Objective Specifications**\n1 Plastic Dust Cover \n\n\n \n \n \n \n [html]Achromatic Objective\n
ClassificationOptical SystemMagnificationNumerical ApertureWorking Distance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40 × Spring Adjustable Focus0.650.57mm
Oil Immer -100x Spring Adjustable1.250.18mm
\n\nSpare 6V20W Halogen Bulb \n1 \n\n1 Lens Cleaning Tissue \n\n1 Cedar Oil \n\n1 1A Fuse (spare) \n\n1 Specification \n\nInspection Certificate 1 \n\nPacking List 1 \n\n**OPERATION**\n\nNote: For oil immersion, please use the index of refraction 1.515 oil \n**Eyepiece Specifications**\n\n1. Remove all components from package. Identify all parts before \n assembling instrument. \n2. Attach 4x, 10x and 40x objectives by screwing into revolving \n turret. Tighten and secure to maximum finger pressure only. \n3. Place the specimen on the stage and secure with spring clips. \n NOTE: The cover glass must face upward (the thinner glass is \n the cover glass), otherwise when the 40x objective is used the \n specimen cannot be observed. Observation is best when the \n thickness of the cover glass is 0.1-1.1mm and the cover glass \n is 0.17mm. \n4. Plug power cord into an electrical outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the lowest magnification objective \n first. The 10x objective provides a larger field of view making it \n easier to search the specimen. \n\n**Classification Magnification**\n**Field of View (FOV)**\n**Diameter**\n\nPlain Field \nEyepiece \n10x 18mm \n\n**Total Magnification**\n\n\n \n \n \n \n [html]Eyepiece\n
Magnification
10 ×
Objective4 ×
40 ×10 ×
100 ×40 × ( s )
400x100 × ( oil, s )
", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**CONSTRUCTION**\n\nBARSKA Model AY11230 is a fixed power trinocular stereo \nmicroscope. It is constructed with two optical paths at the same \nangle. It is equipped with transmitted illumination and oblique \nillumination. By using this instrument, the user can observe and \nenlarge the right side stereo image. BARSKA Model AY11234 is a \nzoom trinocular stereo microscope. The object being viewed is \nenlarged through two identical sized sets of right and left eye \nlenses. The zoom provides different magnification and features an \ninversion system which allows the image to be viewed normally \nand right side up. \n\n**10**", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - } - ] - }, - { - "references": { - "source_file": "Microscope Manual.pdf", - "query": "The illumination of my AY11236 microscope is not very strong, what can I do to solve this?", - "target_page": 10, - "target_passage": "1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5 ×2 ×Working Distance ( mm )
1561024430WF10x / 20mm
7 ×- 45 ×3.5 ×- 22.5x5.3 ×- 33.8 ×0.5 ×- 57.5x14 ×- 90 ×Field of View Objective Dia. ( mm )
28.6 - 4.457.2 - 8.838.1 - 5.919.0 - 2.914.3 - 2.2WF12.5 ×/ 18mm
8.8 ×- 56x4.4x - 28x6.6x - 42x8.3. 2x - 84x17.6 × 112 ×Field of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15x / 16mm
10.5 × d5.3 ×- 33.8x7.9 ×– 58.6x5.7 × 101821 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.530.5 - 4.815.3 - 2411.5 - 1.8WF20x / 12mm
14 ×- 90 ×7 ×- 45 ×10.5 × 67.5 ×21 ×- 135x28 ×- 180 ×Field of View Objective Dia. ( mm )
17.0 - 234.0 - 5.422.7 – 3.611.3 - 1.88.5 - 1.4WF25x / 9mm
17.5 × 4112.538.8 ×- 56.3 ×13 ×- 84.4 ×16.3 × 169x35 ×- 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 - 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5x2xWorking Distance ( mm )
1561024430WF10 ×/ 20mm
7x - 45x3.5x - 2.5x5.3x - 33.8x10.5 × 167.5x14 ×- 90xField of View Objective Dia. ( mm )
28.6 – 4.457.2 - 8.838.1 - 5.919.0 – 2.914.3 – 2.2WF12.5x / 18mm
8.8 ×– 56x4.4 × 2886.6 ×– 42x13.2 × L84x17.6 × LLLField of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15 ×/ 16mm
10.5 × 67.5x5.3x - 33.8x7.9 ×– 58.6x15.7 × L101x21 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.230.5 - 4.815.3 – 2411.5 – 1.8WF20 ×/ 12mm
14 ×- 90 ×7x - 45 ×10.5 × 67.5x21 ×- 135 ×28 ×- 180 >Field of View Objective Dia. ( mm )
17.0 – 2.734.0 - 5.422.7 - 3.611.3 – 1.88.5 - 1.4WF25x / 9mm
17.5 × 112.5 :8.8x - 56.3x13 ×- 84.4 ×26.3 × 1169 ×35x - 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 – 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11228\n
Model AY11232NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x obj.)]
110 × Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 ea. spare )12.10W Halogen Lamp 12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11228**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11232**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11228**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10 ×, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11232**\n**Optical Specifications - Model AY11232**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11230\n
Model AY11234NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x ob ).)
110x Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 earnings12.10W Halogen Lamp12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11230**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11234**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11230**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10x, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11234**\n**Optical Specifications - Model AY11234**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**OPERATION (cont.)** **MODEL AY11236**\n\nInterpupillary Slide Adjustment \n**Model AY11230**\nEyepiece \n\nRotating Head \n\nRevolving Turret \nStand \n\nObjectives \n\nStage \n\nCoarse \nAdjustment \nKnob \nFine \nAdjustment \nKnob \nStage Clip \nAdjustment \n\nCondenser \nFocusing \nKnob \n\nLamp \nOn/Off \nSwitch \n\nPower \nCord \n\nLamp \n\n**Model AY11236**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound \nmicroscope designed for biological studies such as specimen \nexamination. It can also be used for examining bacteria and \nfor general clinical and medical studies and other scientific uses. \n\n\n \n \n \n \n [html]\n
Model AY11234FOCUSING
1. Turn the focusing knob avou until a clear image isNumber of fluoring
2. If the image is unclear, ar height of the elevator upExpecimen agnification
then turn the focusing kConcentrations
ZOOM MAGNIFICATIONn can be
1. Turn the zoom magnificat the desired magnification view.PUPILLARY
2. In most situations, it is rethat you focus at the lowthe observer ' s lary distance. Illary distance
magnification, then move magnification and re - focu necessary.Authority expectations
3. If the image is not clear t at the same time, the did need adjustment.DIOPTER RING ADJUSTM
ctive cover. the working1. To adjust the eyepiece foor without eyeglasses and differences in acuity betw and left eyes, follow the steps :
focus knob until ar and sharp.a. Observe an image threyepiece and bring a sinto focus using the fob. By turning the diopter
Tablebring the same point if
remove the and removec. Then bring the same p focus through the righ by turning the right diff
cap.logen bulb. e base plate and
d. With more than one vi viewer should note the diopter ring position fc and right eyepieces, th viewing set the diopter adjustments to that se
\n\n**CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope. \nIt is constructed with two optical paths at the same angle. It is \nequipped with transmitted illumination. By using this instrument, \nthe user can observe specimens at magnification from 40x to \n1000x by selecting the desired objective lens. Coarse and fine \nfocus adjustments provide accuracy and image detail. The rotating \nhead allows the user to position the eyepieces for maximum \nviewing comfort and easy access to all adjustment knobs. \n\n1. The vertical tube can be used for \n instructional viewing or to \n\nphotograph \ndigital camera or \nunit. \n2. Loosen the retention screw, then rotate \n the adjustment ring to change the \n\n the image witrh a \n micro TV \n\n length of the vertical tube. \n3. Make sure that both the images in \n\n**13**", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**SPECIFICATIONS**\n1. Length of mechanical tube: 160mm \n2. Conjugate distance between object and image: 195mm \n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion) \n4. Illumination: Input 110V or 200V; Output: 20W \n5. Fine adjustment range: .002mm \n6. Coarse Adjustment Range: 20mm \n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm \n8. Condenser Elevation Range: 15mm \n9. Iris diaphragm aperture: 2mm-30mm \n\n**PARTS LIST**\n\n\n \n \n \n \n [html]NameMicroscope Stand4x ( parfocal distance adjusted )\n
Qty
1
110 ×
1Achromatic Objective
40 × ( s ) ( parfocal distance adjustable )1
\n\n2 10x Wide Field Eyepiece w/Pointer \n\nAbbe Condenser NA1.25 1 \n**Objective Specifications**\n1 Plastic Dust Cover \n\n\n \n \n \n \n [html]Achromatic Objective\n
ClassificationOptical SystemMagnificationNumerical ApertureWorking Distance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40 × Spring Adjustable Focus0.650.57mm
Oil Immer -100x Spring Adjustable1.250.18mm
\n\nSpare 6V20W Halogen Bulb \n1 \n\n1 Lens Cleaning Tissue \n\n1 Cedar Oil \n\n1 1A Fuse (spare) \n\n1 Specification \n\nInspection Certificate 1 \n\nPacking List 1 \n\n**OPERATION**\n\nNote: For oil immersion, please use the index of refraction 1.515 oil \n**Eyepiece Specifications**\n\n1. Remove all components from package. Identify all parts before \n assembling instrument. \n2. Attach 4x, 10x and 40x objectives by screwing into revolving \n turret. Tighten and secure to maximum finger pressure only. \n3. Place the specimen on the stage and secure with spring clips. \n NOTE: The cover glass must face upward (the thinner glass is \n the cover glass), otherwise when the 40x objective is used the \n specimen cannot be observed. Observation is best when the \n thickness of the cover glass is 0.1-1.1mm and the cover glass \n is 0.17mm. \n4. Plug power cord into an electrical outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the lowest magnification objective \n first. The 10x objective provides a larger field of view making it \n easier to search the specimen. \n\n**Classification Magnification**\n**Field of View (FOV)**\n**Diameter**\n\nPlain Field \nEyepiece \n10x 18mm \n\n**Total Magnification**\n\n\n \n \n \n \n [html]Eyepiece\n
Magnification
10 ×
Objective4 ×
40 ×10 ×
100 ×40 × ( s )
400x100 × ( oil, s )
", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**MODEL AY11230/AY11234**\n\n**Model AY11228**\nVertical \nTube Vertical \nTube \nDiopter \nAdjustment \nDiopter \nAdjustment Eyepiece \nEyepiece \n\nPrism \nCap \n\nPrism \nCap \nFocus \nKnob \n\nMagnification \nAdjustment \nKnob \n\nRotary \nCase \nFocus \nKnob \nLens \nHousing \n\nOblique \nIlluminator \nLens \n\nTightening \nKnob Oblique \nIlluminator \nSpring \nClips \n\nSpring \nClips \nStage \nIllumination \nControls \nStage \n\n\n\n\n**Model AY11234**\n\n\n \n \n \n \n [html]\n
Model AY11232
FOCUSING
1. Turn the focusing knob away or to you until a clear image is viewed.2. If the image is unclear, adjust the height of the elevator up or down, then turn the focusing knob again
TableZOOM MAGNIFICATION
Age1. Turn the zoom magnification knob the desired magnification and field view.
ILLARY2. In most situations, it is recommenthat you focus at the lowest magnification, then move to a high
distance. distancemagnification and re - focus a necessary.
both eyes the3. If the image is not clear to both ey at the same time, the diopter ring need adjustment.
DIOPTER RING AD3USTMENTCover.
1. To adjust the eyepiece for viewingor without eyeglasses and for differences in acuity between
eleft eye knob untiland left eyes, follow the following steps :
Productiona. Observe an image through the
ng until the incide andeyepiece and bring a specific perinto focus using the focus knobb. By turning the diopter rring adjustment for the left eyepiecobring the same point into sharp
from thefocus.
Aging thec. Then bring the same point into focus through the right eyepiec
pve theby turning the right diopter ring
removed. With more than one viewer, eac viewer should note their own
Comparisondiopter ring position for the left
Sensorsand right eyepieces, then befor viewing set the diopter ring
Maximumadjustments to that setting.
CHANGING THE BULB1. Disconnect the power cord from thelectrical outlet.
2. When the bulb is cool, remove the oblique illuminator cap and remov the halogen bulb with cap.3. Replace with a new halogen bulb. 4. Open the window in the base plate and replace the halogen lamp or
fluorescent lamp of transmitted
\n\nIllumination \nControls \n**Model AY11230**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular \nmicroscopes designed for biological studies such as specimen \nexamination. They can also be used for examining bacteria and for \ngeneral clinical and medical studies. Simple design and use and the \nvertical tube make them is useful for school classroom instruction. \n\n**CONSTRUCTION**", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "\n \n \n \n \n [html]Model AY11240Model AY11238NameNameMicroscope StandMicroscope StandAchromatic ObjectiveAchromatic ObjectivePlain Concave Mirror10x Wide Field EyepiecePlastic Dust CoverPlastic Dust Cover10x Wide Field EyepieceSpare BulbLens Cleaning TissueLens Cleaning TissueSpecificationSpecificationInspection CertificateInspection CertificatePacking ListPacking List\n
QtyQty
11
4 ×14 ×1
10x110 ×1
40x ( s )140 × ( s )1
11
11
11
11
11
11
11
\n\n**Model AY11238**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Attach 4x, 10x and 40x objectives \n to revolving turret. 3. Place the \n specimen on the stage and \n secure with spring clips. NOTE: The \n cover glass must face upward (the \n thinner glass is the cover glass), \n otherwise when the 40x objective is \n used the specimen cannot be \n observed. Observation is best when \n the thickness of the cover glass is \n 0.1-1.1mm and the cover glass is \n 0.17mm. \n4. Plug power cord into an electrical \n outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the \n lowest magnification objective \n first. The 4x objective provides a \n larger field of view to search \n specimen. \n\n\n \n \n \n \n [html]\n
Objective1UX
4 ×40 ×
10 ×100 ×
40 × ( s )400 ×
\n\n\n \n \n \n \n [html]Achromatic Objective\n
_SystemPlaqifillationApertureDistance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40x Spring Adjustable Focus0.650.57mm
\n\n**OPERATION**\n\n**Model AY11240**", - "page_start": 2, - "page_end": 2, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Maintenance.............................................................................................................................................................................................
Model AY11240 / Model AY11238...............................................................................................................................................................................Model AY11228 / Model AY11232....................................................
Model AY11230 / Model AY11234...............................................................................................................................................................................Model AY11236............................................................................................................................................................................................
\n\n\n\n\n\n**MODEL AY11240/AY11238**\n\nEyepiece \n\nEyepiece Monocular Tube \n\nEyepiece \nSet Screw \n\nRotating Head \n\nStage Height \nLimit Adjustment \nBarrel \n\nRevolving \nTurret \n\nCoarse \nAdjustment \nKnob \nStand \nRevolving Turret \n\nObjectives \n\nObjectives \nSpring \nClips \nCoarse \nAdjustment \nKnob Fine \nAdjustment \nKnob \nSpring Clips \n\n**IMPORTANT NOTES**\nStage \nStand \n\n5-Hole \nDiaphragm \nand Condenser \nFine \nAdjustment \nKnob \nStage \n\nCongratulations on your purchase of this high quality BARSKA \nmicroscope. With proper care, this microscope will provide many \nyears of use. Please read the following instructions before \noperating this instrument. \n1. Do not attempt to disassemble the instrument. This product has \n been carefully assembled at the factory and should only be \n examined by a factory-trained technician. \n2. This instrument should only be used in an environment with an \n indoor temperature range of 32oF to 104oF. \n3. Do not use this instrument in an environment with a lot of dust. \n**Cover the instrument when not in use.**\n4. Do not subject the instrument to shock. \n\n5-Hole \nDiaphragm \nand Condenser \nConcave \nMirror \nPower \nCord Lamp \n\nLamp \nOn/Off \nSwitch \n\n**Model AY11240** **Model AY11238**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11240 and Model AY11238 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. \n\n**MAINTENANCE**\n\nProper care and storage of this instrument is essential. Please read \nthe following guidelines: \n1. Keep the instrument in a dry and moisture-free location. \n2. Do not expose to acid, alkali fumes or moisture. \n3. Keep optical parts clean and free of dust. To clean optical parts \n gently wipe with lens cleaning tissue and a mixture of alcohol \n and diethyl ether. Depending on weather conditions, the \n following are the recommended mixture ratios: \n Wet weather: 1:2 \n Dry Weather: 1:1 \n4. After use, cover the instrument with the plastic dust cover. \n5. If instrument is to be stored for an extended period of time, \n remove the eyepiece and oculars and store in a moisture-proof \n container. \n\n**CONSTRUCTION**", - "page_start": 1, - "page_end": 1, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "**USING THE 5-HOLE DIAPHRAGM**\n\n\n\nDiopter \nAdjustment \n\n\n\n**OPERATION (cont.)**\n\n**Model AY11240** **Model AY11238**\n\n7. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n8. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. 6. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n7. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. \n\nFocus \nKnob \nEyepiece \nVertical \nPole Eyepiece \n\nDiopter \nAdjustment \n\nPrism \nCap \n\nFocus \nKnob \n\nLens \nHousing \n\nOblique \nIlluminator \nIllumination \nControls \nRotary \nCase \n\n1. To obtain the best contrast for observing, match the hole size to \n the objective that is being used to view the specimen. \n2. Each hole has a corresponding number from 1 to 5. 1 is the \n smallest hole; 5 is the largest hole. \n Use the following guidelines to match the hole number to the \n objective that you have selected: \n 40x objective: Use #5 hole \n 10x objective: Use #4 or #3 hole \n 4x objective: Use #2 or #1 hole \n\nLens \nSpring \nClips \nSpring \nClips \nStage \nStage \n\n**Model AY11232**\n\n**COARSE KNOB ADJUSTMENT - Model AY11240**\n**MICROSCOPE USAGE**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut \n (See Fig.1). \n2. To adjust the knob loosen or tighten the nut. \n NOTE: Adjusting the nut too tight will make focusing difficult. \n Adjusting the nut too loose will cause the tube to slide. \n\nBARSKA Model AY11228 and Model AY11232 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. \n\n\n\n**CONSTRUCTION**\n\nBARSKA Model AY11228 is a fixed power stereo microscope. It is \nconstructed with two optical paths at the same angle. It is \nequipped with transmitted illumination and oblique illumination. \nBy using this instrument, the user can observe and enlarge the \nright side stereo image. BARSKA Model AY11232 is a zoom stereo \nmicroscope. The object being viewed is enlarged through two \nidentical sized sets of right and left eye lenses. The zoom provides \ndifferent magnification and features an inversion system which \nallows the image to be viewed normally and right side up. \n\nHeavy-Light \nAdjustment Nut \n\n**Fig. 1- Coarse Adjustment Knob**\n\n**6**", - "page_start": 3, - "page_end": 3, - "source_file": "Microscope Manual.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia3.pdf", - "query": "What event marks the beginning of the field of artificial intelligence?", - "target_page": 22, - "target_passage": "The field of AI research was founded at a workshop at Dartmouth College in 1956.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the \nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks.[314] \n28 countries including the United States, China, and the European Union issued a declaration at the start \nof the summit, calling for international co-operation to manage the challenges and risks of artificial \nintelligence.[315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety \ncommitments on the development of AI.[317][318] \n\n**History**\n\nThe study of mechanical or \"formal\" reasoning began with philosophers and mathematicians in antiquity. \nThe study of logic led directly to Alan Turing's theory of computation, which suggested that a machine, \nby shuffling symbols as simple as \"0\" and \"1\", could simulate any conceivable form of mathematical \nreasoning.[319][320] This, along with concurrent discoveries in cybernetics, information theory and \nneurobiology, led researchers to consider the possibility of building an \"electronic brain\".[r] They \ndeveloped several areas of research that would become part of AI,[322] such as McCullouch and Pitts \ndesign for \"artificial neurons\" in 1943,[115] and Turing's influential 1950 paper 'Computing Machinery \nand Intelligence', which introduced the Turing test and showed that \"machine intelligence\" was \nplausible.[323][320] \n\nThe field of AI research was founded at a workshop at Dartmouth College in 1956.[s][6] The attendees \nbecame the leaders of AI research in the 1960s.[t] They and their students produced programs that the \npress described as \"astonishing\":[u] computers were learning checkers strategies, solving word problems \nin algebra, proving logical theorems and speaking English.[v][7] Artificial intelligence laboratories were \nset up at a number of British and U.S. universities in the latter 1950s and early 1960s.[320] \n\nResearchers in the 1960s and the 1970s were convinced that their methods would eventually succeed in \ncreating a machine with general intelligence and considered this the goal of their field.[327] In 1965 \nHerbert Simon predicted, \"machines will be capable, within twenty years, of doing any work a man can \ndo\".[328] In 1967 Marvin Minsky agreed, writing that \"within a generation ... the problem of creating \n'artificial intelligence' will substantially be solved\".[329] They had, however, underestimated the difficulty \nof the problem.[w] In 1974, both the U.S. and British governments cut off exploratory research in \nresponse to the criticism of Sir James Lighthill[331] and ongoing pressure from the U.S. Congress to fund \nmore productive projects.[332] Minsky's and Papert's book*Perceptrons*was understood as proving that \nartificial neural networks would never be useful for solving real-world tasks, thus discrediting the \napproach altogether.[333] The \"AI winter\", a period when obtaining funding for AI projects was difficult, \nfollowed.[9] \n\nIn the early 1980s, AI research was revived by the commercial success of expert systems,[334] a form of \nAI program that simulated the knowledge and analytical skills of human experts. By 1985, the market for \nAI had reached over a billion dollars. At the same time, Japan's fifth generation computer project inspired \nthe U.S. and British governments to restore funding for academic research.[8] However, beginning with \nthe collapse of the Lisp Machine market in 1987, AI once again fell into disrepute, and a second, longer- \nlasting winter began.[10]", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] \n\nArtificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Up to this point, most of AI's funding had gone to projects that used high-level symbols to represent \nmental objects like plans, goals, beliefs, and known facts. In the 1980s, some researchers began to doubt \nthat this approach would be able to imitate all the processes of human cognition, especially perception, \nrobotics, learning and pattern recognition,[335] and began to look into \"sub-symbolic\" approaches.[336] \nRodney Brooks rejected \"representation\" in general and focussed directly on engineering machines that \nmove and survive.[x] Judea Pearl, Lofti Zadeh, and others developed methods that handled incomplete \nand uncertain information by making reasonable guesses rather than precise logic.[86][341] But the most \nimportant development was the revival of \"connectionism\", including neural network research, by \nGeoffrey Hinton and others.[342] In 1990, Yann LeCun successfully showed that convolutional neural \nnetworks can recognize handwritten digits, the first of many successful applications of neural \nnetworks.[343] \n\nAI gradually restored its reputation in the late 1990s and early 21st century by exploiting formal \nmathematical methods and by finding specific solutions to specific problems. This \"narrow\" and \"formal\" \nfocus allowed researchers to produce verifiable results and collaborate with other fields (such as statistics, \neconomics and mathematics).[344] By 2000, solutions developed by AI researchers were being widely \nused, although in the 1990s they were rarely described as \"artificial intelligence\" (a tendency known as \nthe AI effect).[345] However, several academic researchers became concerned that AI was no longer \npursuing its original goal of creating versatile, fully intelligent machines. Beginning around 2002, they \nfounded the subfield of artificial general intelligence (or \"AGI\"), which had several well-funded \ninstitutions by the 2010s.[4] \n\nDeep learning began to dominate industry benchmarks in 2012 and was adopted throughout the field.[11] \nFor many specific tasks, other methods were abandoned.[y] Deep learning's success was based on both \nhardware improvements (faster computers,[347] graphics processing units, cloud computing[348]) and \naccess to large amounts of data[349] (including curated datasets,[348] such as ImageNet). Deep learning's \nsuccess led to an enormous increase in interest and funding in AI.[z] The amount of machine learning \nresearch (measured by total publications) increased by 50% in the years 2015–2019.[306] \n\nIn 2016, issues of fairness and the misuse of technology were catapulted into center stage at machine \nlearning conferences, publications vastly increased, funding became available, and many researchers re- \nfocussed their careers on these issues. The alignment problem became a serious field of academic \nstudy.[283] \n\nIn the late teens and early 2020s, AGI companies began to deliver programs that created enormous \ninterest. In 2015, AlphaGo, developed by DeepMind, beat the world champion Go player. The program \ntaught only the game's rules and developed a strategy by itself. GPT-3 is a large language model that was \nreleased in 2020 by OpenAI and is capable of generating high-quality human-like text.[350] ChatGPT, \nlaunched on November 30, 2022, became the fastest-growing consumer software application in history, \ngaining over 100 million users in two months.[351] It marked what is widely regarded as AI's breakout \nyear, bringing it into the public consciousness.[352] These programs, and others, inspired an aggressive AI \nboom, where large companies began investing billions of dollars in AI research. According to AI Impacts, \nabout $50 billion annually was invested in \"AI\" around 2022 in the U.S. alone and about 20% of the new", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia3.pdf" - }, - { - "text": "U.S. Computer Science PhD graduates have specialized in \"AI\".[353] About 800,000 \"AI\"-related U.S. job \nopenings existed in 2022.[354] According to PitchBook research, 22% of newly funded startups in 2024 \nclaimed to be AI companies.[355] \n\n**Philosophy**\n\nPhilosophical debates have historically sought to determine the nature of intelligence and how to make \nintelligent machines.[356] Another major focus has been whether machines can be conscious, and the \nassociated ethical implications.[357] Many other topics in philosophy are relevant to AI, such as \nepistemology and free will.[358] Rapid advancements have intensified public discussions on the \nphilosophy and ethics of AI.[357] \n\n**Defining artificial intelligence**\nAlan Turing wrote in 1950 \"I propose to consider the question 'can machines think'?\"[359] He advised \nchanging the question from whether a machine \"thinks\", to \"whether or not it is possible for machinery to \nshow intelligent behaviour\".[359] He devised the Turing test, which measures the ability of a machine to \nsimulate human conversation.[323] Since we can only observe the behavior of the machine, it does not \nmatter if it is \"actually\" thinking or literally has a \"mind\". Turing notes that we can not determine these \nthings about other people but \"it is usual to have a polite convention that everyone thinks.\"[360] \n\nRussell and Norvig agree with Turing that intelligence must be \ndefined in terms of external behavior, not internal structure.[1] \nHowever, they are critical that the test requires the machine to \nimitate humans. \"Aeronautical engineering texts\", they wrote, \"do \nnot define the goal of their field as making 'machines that fly so \nexactly like pigeons that they can fool other pigeons.' \"[362] AI \nfounder \nthat \"Artificial \nintelligence \nis not, by definition, simulation of human \nintelligence\".[363] \n\nJohn McCarthy agreed, writing \n\nThe Turing test can provide some \nevidence of intelligence, but it \npenalizes non-human intelligent \nbehavior.[361] \n\nMcCarthy defines intelligence as \"the computational part of the \nability to achieve goals in the world\".[364] Another AI founder, \nMarvin Minsky similarly describes it as \"the ability to solve hard \nproblems\".[365] The leading AI textbook defines it as the study of \nagents that perceive their environment and take actions that maximize their chances of achieving defined \ngoals.[1] These definitions view intelligence in terms of well-defined problems with well-defined \nsolutions, where both the difficulty of the problem and the performance of the program are direct \nmeasures of the \"intelligence\" of the machine—and no other philosophical discussion is required, or may \nnot even be possible. \n\nAnother definition has been adopted by Google,[366] a major practitioner in the field of AI. This definition \nstipulates the ability of systems to synthesize information as the manifestation of intelligence, similar to \nthe way it is defined in biological intelligence.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia3.pdf" - }, - { - "text": "360. Turing (1950), Under \"The Argument from Consciousness\". \n361. Kirk-Giannini, Cameron Domenico; Goldstein, Simon (16 October 2023). \"AI is closer than \n\never to passing the Turing test for 'intelligence'. What happens when it does?\" (https://theco \nnversation.com/ai-is-closer-than-ever-to-passing-the-turing-test-for-intelligence-what-happe \nns-when-it-does-214721).*The Conversation*. Archived (https://web.archive.org/web/202409 \n25040612/https://theconversation.com/ai-is-closer-than-ever-to-passing-the-turing-test-for-in \ntelligence-what-happens-when-it-does-214721) from the original on 25 September 2024. \nRetrieved 17 August 2024. \n362. Russell & Norvig (2021), p. 3. \n363. Maker (2006). \n364. McCarthy (1999). \n365. Minsky (1986). \n366. \"What Is Artificial Intelligence (AI)?\" (https://cloud.google.com/learn/what-is-artificial-intellige \n\nnce).*Google Cloud Platform*. Archived (https://web.archive.org/web/20230731114802/http \ns://cloud.google.com/learn/what-is-artificial-intelligence) from the original on 31 July 2023. \nRetrieved 16 October 2023. \n\n367. \"One of the Biggest Problems in Regulating AI Is Agreeing on a Definition\" (https://carnegiee \nndowment.org/posts/2022/10/one-of-the-biggest-problems-in-regulating-ai-is-agreeing-on-a- \ndefinition?lang=en).*carnegieendowment.org*. Retrieved 31 July 2024. \n\n368. \"AI or BS? How to tell if a marketing tool really uses artificial intelligence\" (https://www.thedr \num.com/opinion/2023/03/30/ai-or-bs-how-tell-if-marketing-tool-really-uses-artificial-intelligen \nce).*The Drum*. Retrieved 31 July 2024. \n\n369. Nilsson (1983), p. 10. \n370. Haugeland (1985), pp. 112–117. \n371. Physical symbol system hypothesis: Newell & Simon (1976, p. 116) Historical significance: \n\nMcCorduck (2004, p. 153), Russell & Norvig (2021, p. 19) \n\n372. Moravec's paradox: Moravec (1988, pp. 15–16), Minsky (1986, p. 29), Pinker (2007, \n\npp. 190–191) \n\n373. Dreyfus' critique of AI: Dreyfus (1972), Dreyfus & Dreyfus (1986) Historical significance and \n\nphilosophical implications: Crevier (1993, pp. 120–132), McCorduck (2004, pp. 211–239), \nRussell & Norvig (2021, pp. 981–982), Fearn (2007, chpt. 3) \n\n374. Crevier (1993), p. 125. \n375. Langley (2011). \n376. Katz (2012). \n377. Neats vs. scruffies, the historic debate: McCorduck (2004, pp. 421–424, 486–489), Crevier \n(1993, p. 168), Nilsson (1983, pp. 10–11), Russell & Norvig (2021, p. 24) A classic example \nof the \"scruffy\" approach to intelligence: Minsky (1986) A modern example of neat AI and its \naspirations in the 21st century: Domingos (2015) \n\n378. Pennachin & Goertzel (2007). \n379. Roberts (2016). \n380. Russell & Norvig (2021), p. 986. \n381. Chalmers (1995). \n382. Dennett (1991). \n383. Horst (2005). \n384. Searle (1999). \n385. Searle (1980), p. 1. \n386. Russell & Norvig (2021), p. 9817.", - "page_start": 49, - "page_end": 49, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Harari, Yuval Noah (2023). \"AI and the future of humanity\" (https://www.youtube.com/watch?v= \nLWiM-LuRe6w).*YouTube*. Archived (https://web.archive.org/web/20240930110823/https://w \nww.youtube.com/watch?v=LWiM-LuRe6w) from the original on 30 September 2024. \nRetrieved 5 October 2024. \n\nHaugeland, John (1985).*Artificial Intelligence: The Very Idea*. Cambridge, Mass.: MIT Press. \n\nISBN 978-0-2620-8153-5.", - "page_start": 56, - "page_end": 56, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Edward Fredkin argues that \"artificial intelligence is the next step in evolution\", an idea first proposed by \nSamuel Butler's \"Darwin among the Machines\" as far back as 1863, and expanded upon by George \nDyson in his 1998 book*Darwin Among the Machines: The Evolution of Global Intelligence*.[398] \n\n\n\n**In fiction**\n\nThought-capable artificial beings have appeared as \nstorytelling devices since antiquity,[399] and have been a \npersistent theme in science fiction.[400] \n\nA common trope in these works began with Mary Shelley's \n*Frankenstein*, where a human creation becomes a threat to \nits masters. This includes such works as Arthur C. Clarke's \nand Stanley Kubrick's*2001: A Space Odyssey*(both 1968), \nwith HAL 9000, the murderous computer in charge of the \n*Discovery One*spaceship, as well as*The Terminator*(1984) \nand*The Matrix*(1999). In contrast, the rare loyal robots \nsuch as Gort from*The Day the Earth Stood Still*(1951) and \nBishop from*Aliens*(1986) are less prominent in popular culture.[401] \n\nThe word \"robot\" itself was coined by Karel \nČapek in his 1921 play*R.U.R.*, the title \nstanding for \"Rossum's Universal Robots\". \n\nIsaac Asimov introduced the Three Laws of Robotics in many stories, most notably with the \"Multivac\" \nsuper-intelligent computer. Asimov's laws are often brought up during lay discussions of machine \nethics;[402] while almost all artificial intelligence researchers are familiar with Asimov's laws through \npopular culture, they generally consider the laws useless for many reasons, one of which is their \nambiguity.[403] \n\nSeveral works use AI to force us to confront the fundamental question of what makes us human, showing \nus artificial beings that have the ability to feel, and thus to suffer. This appears in Karel Čapek's*R.U.R.*, \nthe films*A.I. Artificial Intelligence*and*Ex Machina*, as well as the novel*Do Androids Dream of Electric*\n*Sheep?*, by Philip K. Dick. Dick considers the idea that our understanding of human subjectivity is altered \nby technology created with artificial intelligence.[404] \n\n**See also**\n\nArtificial intelligence and elections – Use and impact of AI on political elections \nArtificial intelligence content detection – Software to detect AI-generated content \nBehavior selection algorithm – Algorithm that selects actions for intelligent agents \nBusiness process automation – Automation of business processes \nCase-based reasoning – Process of solving new problems based on the solutions of similar \npast problems \nComputational intelligence – Ability of a computer to learn a specific task from data or \nexperimental observation \nDigital immortality – Hypothetical concept of storing a personality in digital form \nEmergent algorithm – Algorithm exhibiting emergent behavior \nFemale gendering of AI technologies – Gender biases in digital technology", - "page_start": 27, - "page_end": 27, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Some authors have suggested in practice, that the definition of AI is vague and difficult to define, with \ncontention as to whether classical algorithms should be categorised as AI,[367] with many companies \nduring the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not \nactually use AI in a material way\".[368] \n\n**Evaluating approaches to AI**\nNo established unifying theory or paradigm has guided AI research for most of its history.[aa] The \nunprecedented success of statistical machine learning in the 2010s eclipsed all other approaches (so much \nso that some sources, especially in the business world, use the term \"artificial intelligence\" to mean \n\"machine learning with neural networks\"). This approach is mostly sub-symbolic, soft and narrow. Critics \nargue that these questions may have to be revisited by future generations of AI researchers. \n\n**Symbolic AI and its limits**\nSymbolic AI (or \"GOFAI\")[370] simulated the high-level conscious reasoning that people use when they \nsolve puzzles, express legal reasoning and do mathematics. They were highly successful at \"intelligent\" \ntasks such as algebra or IQ tests. In the 1960s, Newell and Simon proposed the physical symbol systems \nhypothesis: \"A physical symbol system has the necessary and sufficient means of general intelligent \naction.\"[371] \n\nHowever, the symbolic approach failed on many tasks that humans solve easily, such as learning, \nrecognizing an object or commonsense reasoning. Moravec's paradox is the discovery that high-level \n\"intelligent\" tasks were easy for AI, but low level \"instinctive\" tasks were extremely difficult.[372] \nPhilosopher Hubert Dreyfus had argued since the 1960s that human expertise depends on unconscious \ninstinct rather than conscious symbol manipulation, and on having a \"feel\" for the situation, rather than \nexplicit symbolic knowledge.[373] Although his arguments had been ridiculed and ignored when they \nwere first presented, eventually, AI research came to agree with him.[ab][16] \n\nThe issue is not resolved: sub-symbolic reasoning can make many of the same inscrutable mistakes that \nhuman intuition does, such as algorithmic bias. Critics such as Noam Chomsky argue continuing research \ninto symbolic AI will still be necessary to attain general intelligence,[375][376] in part because sub- \nsymbolic AI is a move away from explainable AI: it can be difficult or impossible to understand why a \nmodern statistical AI program made a particular decision. The emerging field of neuro-symbolic artificial \nintelligence attempts to bridge the two approaches. \n\n**Neat vs. scruffy**\n\n\"Neats\" hope that intelligent behavior is described using simple, elegant principles (such as logic, \noptimization, or neural networks). \"Scruffies\" expect that it necessarily requires solving a large number of \nunrelated problems. Neats defend their programs with theoretical rigor, scruffies rely mainly on \nincremental testing to see if they work. This issue was actively discussed in the 1970s and 1980s,[377] but \neventually was seen as irrelevant. Modern AI has elements of both.", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
q. Sometimes called a “ robopocalypse ”[ 299 ]
r. “ Electronic brain ” was the term used by the press around this time. EQTRECT3
s. Darriel Crevier wrote, \" the conterence is genorrally recognized as the official birthdate of the new science.\" 32.4 \" Russell and Nonyig called the conference \" the inception of artificial intelligence :\" 0.55
t. Russell and Nonigs wrote \" for the next 20 years the field would be clominated by these people and their students............................
u. Russell and Norvig wrote, “ It was astonishing wherever a computer did anything kind of smarteah ”...
v. The programs described are Arthur Samuel ' s checkers program for the IBM 70L Daniel Bobrow ' s STUDENT, Newell and Simon ' s Logic Theorica and Terry Winograrae ' s SHBDL1.
w. Russell and Nonvig write. “ in almost all cases, these early systems failed on more difficult problems ”[ 33 ]
x. Embodied approaches to ARTIT were championed by Hans Morave2 / 2RT and Rodney Brooks ( SSSIII ) and went by many names : Nouvelle ALTDevelopmental robotics [ 54 ]
y. Matters Worge arrate in The Adartic “ Wherenes for decaders, computer - science fields such as natural - target processing, compader vision, and robotics used externely different methods, now they all use a programming method calleie
z. Jack Clark wrote in Bloomberg : “ After a half - decade of quiet breakthroughts in artificial infeliogence, 2015 has been a landmark year. Computers are smater and learning baber than ever ”, and noted that the number of software projecte
aa. Nils Nilsson wrote in 256S : “ Simply put, there is wide disagreement in the field about what AI is all about 1999
ab. Dankei Crevier wrote that \" time has proven the accuracy and perceptiveness of some of Dreyfus ' s comments. Had he formulated them less aggressively, constructive actions they suggested might have been taken much earlier.\"[ 7.9 ]
ac. Search presented thickefolistion of “ citrong all ” in 12090 EPH Toxaries ’ original fromtolation was “ The appropriately programmed computer really to a mind, in the sense that computers given the right programmes can be let - being an
", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia3.pdf" - }, - { - "text": "McCarthy, John; Minsky, Marvin; Rochester, Nathan; Shannon, Claude (1955). \"A Proposal for \n\nthe Dartmouth Summer Research Project on Artificial Intelligence\" (https://web.archive.org/w \neb/20070826230310/http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html). \nArchived from the original (http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth. \nhtml) on 26 August 2007. Retrieved 30 August 2007. \n\nMcCarthy, John (2007), \"From Here to Human-Level AI\",*Artificial Intelligence*, p. 171 \nMcCarthy, John (1999),*What is AI?*(http://jmc.stanford.edu/artificial-intelligence/what-is-ai/inde \nx.html), archived (https://web.archive.org/web/20221204051737/http://jmc.stanford.edu/artifi \ncial-intelligence/what-is-ai/index.html) from the original on 4 December 2022, retrieved \n4 December 2022 \n\nMcCauley, Lee (2007). \"AI armageddon and the three laws of robotics\".*Ethics and Information*\n*Technology*.**9**(2): 153–164. CiteSeerX 10.1.1.85.8904 (https://citeseerx.ist.psu.edu/viewdo \nc/summary?doi=10.1.1.85.8904). doi:10.1007/s10676-007-9138-2 (https://doi.org/10.1007% \n2Fs10676-007-9138-2). S2CID 37272949 (https://api.semanticscholar.org/CorpusID:372729 \n49). \n\nMcGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge \n\ndiscovery\".*The Knowledge Engineering Review*.**20**(1): 39–61. \ndoi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). \nS2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656). \n\nMcGaughey, E (2022),*Will Robots Automate Your Job Away? Full Employment, Basic Income,*\n*and Economic Democracy*(https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \np. 51(3) Industrial Law Journal 511–559, doi:10.2139/ssrn.3044448 (https://doi.org/10.213 \n9%2Fssrn.3044448), S2CID 219336439 (https://api.semanticscholar.org/CorpusID:2193364 \n39), SSRN 3044448 (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \narchived (https://web.archive.org/web/20210131074722/https://papers.ssrn.com/sol3/paper \ns.cfm?abstract_id=3044448) from the original on 31 January 2021, retrieved 27 May 2023 \nMerkle, Daniel; Middendorf, Martin (2013). \"Swarm Intelligence\". In Burke, Edmund K.; Kendall, \nGraham (eds.).*Search Methodologies: Introductory Tutorials in Optimization and Decision*\n*Support Techniques*. Springer Science & Business Media. ISBN 978-1-4614-6940-7. \nMinsky, Marvin (1967),*Computation: Finite and Infinite Machines*, Englewood Cliffs, N.J.: \n\nPrentice-Hall \n\nMoravec, Hans (1988).*Mind Children*(https://archive.org/details/mindchildrenfutu00mora). \n\nHarvard University Press. ISBN 978-0-6745-7616-2. Archived (https://web.archive.org/web/2 \n0200726131644/https://archive.org/details/mindchildrenfutu00mora) from the original on 26 \nJuly 2020. Retrieved 18 November 2019. \n\nMorgenstern, Michael (9 May 2015). \"Automation and anxiety\" (https://www.economist.com/new \ns/special-report/21700758-will-smarter-machines-cause-mass-unemployment-automation-a \nnd-anxiety).*The Economist*. Archived (https://web.archive.org/web/20180112214621/https:// \nwww.economist.com/news/special-report/21700758-will-smarter-machines-cause-mass-une \nmployment-automation-and-anxiety) from the original on 12 January 2018. Retrieved \n13 January 2018. \n\nMüller, Vincent C.; Bostrom, Nick (2014). \"Future Progress in Artificial Intelligence: A Poll Among \nExperts\" (http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF).*AI Matters*.**1**(1): 9–11. \ndoi:10.1145/2639475.2639478 (https://doi.org/10.1145%2F2639475.2639478). \nS2CID 8510016 (https://api.semanticscholar.org/CorpusID:8510016). Archived (https://web. \narchive.org/web/20160115114604/http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF) \nfrom the original on 15 January 2016.", - "page_start": 60, - "page_end": 60, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia3.pdf", - "query": "What would a superintelligence need?", - "target_page": 27, - "target_passage": "possess intelligence far surpassing that of the brightest and most gifted human mind.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**AI welfare and rights**\n\nIt is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel), \nand if so, to what degree.[388] But if there is a significant chance that a given machine can feel and suffer, \nthen it may be entitled to certain rights or welfare protection measures, similarly to animals.[389][390] \nSapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may \nprovide another moral basis for AI rights.[389] Robot rights are also sometimes proposed as a practical \nway to integrate autonomous agents into society.[391] \n\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI \nsystems. Similarly to the legal status of companies, it would have conferred rights but also \nresponsibilities.[392] Critics argued in 2018 that granting rights to AI systems would downplay the \nimportance of human rights, and that legislation should focus on user needs rather than speculative \nfuturistic scenarios. They also noted that robots lacked the autonomy to take part to society on their \nown.[393][394] \n\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI \nsentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot \nanalogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created \nand carelessly exploited.[390][389] \n\n**Superintelligence and the singularity**\n\nA superintelligence is a hypothetical agent that would possess intelligence far surpassing that of the \nbrightest and most gifted human mind.[379] If research into artificial general intelligence produced \nsufficiently intelligent software, it might be able to reprogram and improve itself. The improved software \nwould be even better at improving itself, leading to what I. J. Good called an \"intelligence explosion\" and \nVernor Vinge called a \"singularity\".[395] \n\nHowever, technologies cannot improve exponentially indefinitely, and typically follow an S-shaped \ncurve, slowing when they reach the physical limits of what the technology can do.[396] \n\n**Transhumanism**\n\nRobot designer Hans Moravec, cyberneticist Kevin Warwick and inventor Ray Kurzweil have predicted \nthat humans and machines may merge in the future into cyborgs that are more capable and powerful than \neither. This idea, called transhumanism, has roots in the writings of Aldous Huxley and Robert \nEttinger.[397]", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Jumper, John; Evans, Richard; Pritzel, Alexander; et al. (26 August 2021). \"Highly accurate \n\nprotein structure prediction with AlphaFold\" (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC \n8371605).*Nature*.**596**(7873): 583–589. Bibcode:2021Natur.596..583J (https://ui.adsabs.ha \nrvard.edu/abs/2021Natur.596..583J). doi:10.1038/s41586-021-03819-2 (https://doi.org/10.10 \n38%2Fs41586-021-03819-2). PMC 8371605 (https://www.ncbi.nlm.nih.gov/pmc/articles/PM \nC8371605). PMID 34265844 (https://pubmed.ncbi.nlm.nih.gov/34265844). \nS2CID 235959867 (https://api.semanticscholar.org/CorpusID:235959867). \n\nLeCun, Yann; Bengio, Yoshua; Hinton, Geoffrey (28 May 2015). \"Deep learning\" (https://www.na \nture.com/articles/nature14539).*Nature*.**521**(7553): 436–444. Bibcode:2015Natur.521..436L \n(https://ui.adsabs.harvard.edu/abs/2015Natur.521..436L). doi:10.1038/nature14539 (https:// \ndoi.org/10.1038%2Fnature14539). PMID 26017442 (https://pubmed.ncbi.nlm.nih.gov/26017 \n442). S2CID 3074096 (https://api.semanticscholar.org/CorpusID:3074096). Archived (https:// \nweb.archive.org/web/20230605235832/https://www.nature.com/articles/nature14539) from \nthe original on 5 June 2023. Retrieved 19 June 2023. \n\nLeffer, Lauren, \"The Risks of Trusting AI: We must avoid humanizing machine-learning models \nused in scientific research\",*Scientific American*, vol. 330, no. 6 (June 2024), pp. 80–81. \nLepore, Jill, \"The Chit-Chatbot: Is talking with a machine a conversation?\",*The New Yorker*, 7 \n\nOctober 2024, pp. 12–16. \n\nMaschafilm (2010). \"Content: Plug & Pray Film – Artificial Intelligence – Robots\" (http://www.plu \ngandpray-film.de/en/content.html).*plugandpray-film.de*. Archived (https://web.archive.org/w \neb/20160212040134/http://www.plugandpray-film.de/en/content.html) from the original on 12 \nFebruary 2016. \n\nMarcus, Gary, \"Artificial Confidence: Even the newest, buzziest systems of artificial general \n\nintelligence are stymmied by the same old problems\",*Scientific American*, vol. 327, no. 4 \n(October 2022), pp. 42–45. \n\nMitchell, Melanie (2019).*Artificial intelligence: a guide for thinking humans*. New York: Farrar, \n\nStraus and Giroux. ISBN 978-0-3742-5783-5. \n\nMnih, Volodymyr; Kavukcuoglu, Koray; Silver, David; et al. (26 February 2015). \"Human-level \n\ncontrol through deep reinforcement learning\" (https://www.nature.com/articles/nature14236). \n*Nature*.**518**(7540): 529–533. Bibcode:2015Natur.518..529M (https://ui.adsabs.harvard.edu/ \nabs/2015Natur.518..529M). doi:10.1038/nature14236 (https://doi.org/10.1038%2Fnature142 \n36). PMID 25719670 (https://pubmed.ncbi.nlm.nih.gov/25719670). S2CID 205242740 (http \ns://api.semanticscholar.org/CorpusID:205242740). Archived (https://web.archive.org/web/20 \n230619055525/https://www.nature.com/articles/nature14236) from the original on 19 June \n2023. Retrieved 19 June 2023. Introduced DQN, which produced human-level performance \non some Atari games. \n\nPress, Eyal, \"In Front of Their Faces: Does facial-recognition technology lead police to ignore \n\ncontradictory evidence?\",*The New Yorker*, 20 November 2023, pp. 20–26. \n\n\"Robots could demand legal rights\" (http://news.bbc.co.uk/2/hi/technology/6200005.stm).*BBC*\n\n*News*. 21 December 2006. Archived (https://web.archive.org/web/20191015042628/http://ne \nws.bbc.co.uk/2/hi/technology/6200005.stm) from the original on 15 October 2019. Retrieved \n3 February 2011. \n\nRoivainen, Eka, \"AI's IQ: ChatGPT aced a [standard intelligence] test but showed that \nintelligence cannot be measured by IQ alone\",*Scientific American*, vol. 329, no. 1 \n(July/August 2023), p. 7. \"Despite its high IQ, ChatGPT fails at tasks that require real \nhumanlike reasoning or an understanding of the physical and social world.... ChatGPT \nseemed unable to reason logically and tried to rely on its vast database of... facts derived \nfrom online texts.\"", - "page_start": 68, - "page_end": 68, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**References**\n\n1. Russell & Norvig (2021), pp. 1–4. \n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr \nom/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC \nH/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006) \n\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the \n\nland? On the interpretations, illustrations, and implications of artificial intelligence\".*Business*\n*Horizons*.**62**: 15–25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. \n2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). \nS2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736). \n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32–33, 1020–1021) \n\nProposal for the modern version: Pennachin & Goertzel (2007) \nWarnings of overspecialization in AI from leading researchers: Nilsson (1995), McCarthy \n(2007), Beal & Winston (2009) \n5. Russell & Norvig (2021, §1.2). \n6. Dartmouth workshop: Russell & Norvig (2021, p. 18), McCorduck (2004, pp. 111–136), NRC \n\n(1999, pp. 200–201) \nThe proposal: McCarthy et al. (1955) \n\n7. Successful programs of the 1960s: McCorduck (2004, pp. 243–252), Crevier (1993, pp. 52– \n\n107), Moravec (1988, p. 9), Russell & Norvig (2021, pp. 19–21) \n\n8. Funding initiatives in the early 1980s: Fifth Generation Project (Japan), Alvey (UK), \n\nMicroelectronics and Computer Technology Corporation (US), Strategic Computing Initiative \n(US): McCorduck (2004, pp. 426–441), Crevier (1993, pp. 161–162, 197–203, 211, 240), \nRussell & Norvig (2021, p. 23), NRC (1999, pp. 210–211), Newquist (1994, pp. 235–248) \n9. First AI Winter, Lighthill report, Mansfield Amendment: Crevier (1993, pp. 115–117), Russell \n\n& Norvig (2021, pp. 21–22), NRC (1999, pp. 212–213), Howe (1994), Newquist (1994, \npp. 189–201) \n\n10. Second AI Winter: Russell & Norvig (2021, p. 24), McCorduck (2004, pp. 430–435), Crevier \n\n(1993, pp. 209–210), NRC (1999, pp. 214–216), Newquist (1994, pp. 301–318) \n11. Deep learning revolution, AlexNet: Goldman (2022), Russell & Norvig (2021, p. 26), \n\nMcKinsey (2018) \n\n12. Toews (2023). \n13. Problem-solving, puzzle solving, game playing, and deduction: Russell & Norvig (2021, \n\nchpt. 3–5), Russell & Norvig (2021, chpt. 6) (constraint satisfaction), Poole, Mackworth & \nGoebel (1998, chpt. 2, 3, 7, 9), Luger & Stubblefield (2004, chpt. 3, 4, 6, 8), Nilsson (1998, \nchpt. 7–12) \n\n14. Uncertain reasoning: Russell & Norvig (2021, chpt. 12–18), Poole, Mackworth & Goebel \n\n(1998, pp. 345–395), Luger & Stubblefield (2004, pp. 333–381), Nilsson (1998, chpt. 7–12) \n15. Intractability and efficiency and the combinatorial explosion: Russell & Norvig (2021, p. 21) \n16. Psychological evidence of the prevalence of sub-symbolic reasoning and knowledge: \n\nKahneman (2011), Dreyfus & Dreyfus (1986), Wason & Shapiro (1966), Kahneman, Slovic \n& Tversky (1982) \n\n17. Knowledge representation and knowledge engineering: Russell & Norvig (2021, chpt. 10), \nPoole, Mackworth & Goebel (1998, pp. 23–46, 69–81, 169–233, 235–277, 281–298, 319– \n345), Luger & Stubblefield (2004, pp. 227–243), Nilsson (1998, chpt. 17.1–17.4, 18) \n\n18. Smoliar & Zhang (1994). \n19. Neumann & Möller (2008). \n20. Kuperman, Reichley & Bailey (2006).", - "page_start": 30, - "page_end": 30, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Harari, Yuval Noah (2023). \"AI and the future of humanity\" (https://www.youtube.com/watch?v= \nLWiM-LuRe6w).*YouTube*. Archived (https://web.archive.org/web/20240930110823/https://w \nww.youtube.com/watch?v=LWiM-LuRe6w) from the original on 30 September 2024. \nRetrieved 5 October 2024. \n\nHaugeland, John (1985).*Artificial Intelligence: The Very Idea*. Cambridge, Mass.: MIT Press. \n\nISBN 978-0-2620-8153-5.", - "page_start": 56, - "page_end": 56, - "source_file": "wikipedia3.pdf" - }, - { - "text": "U.S. Computer Science PhD graduates have specialized in \"AI\".[353] About 800,000 \"AI\"-related U.S. job \nopenings existed in 2022.[354] According to PitchBook research, 22% of newly funded startups in 2024 \nclaimed to be AI companies.[355] \n\n**Philosophy**\n\nPhilosophical debates have historically sought to determine the nature of intelligence and how to make \nintelligent machines.[356] Another major focus has been whether machines can be conscious, and the \nassociated ethical implications.[357] Many other topics in philosophy are relevant to AI, such as \nepistemology and free will.[358] Rapid advancements have intensified public discussions on the \nphilosophy and ethics of AI.[357] \n\n**Defining artificial intelligence**\nAlan Turing wrote in 1950 \"I propose to consider the question 'can machines think'?\"[359] He advised \nchanging the question from whether a machine \"thinks\", to \"whether or not it is possible for machinery to \nshow intelligent behaviour\".[359] He devised the Turing test, which measures the ability of a machine to \nsimulate human conversation.[323] Since we can only observe the behavior of the machine, it does not \nmatter if it is \"actually\" thinking or literally has a \"mind\". Turing notes that we can not determine these \nthings about other people but \"it is usual to have a polite convention that everyone thinks.\"[360] \n\nRussell and Norvig agree with Turing that intelligence must be \ndefined in terms of external behavior, not internal structure.[1] \nHowever, they are critical that the test requires the machine to \nimitate humans. \"Aeronautical engineering texts\", they wrote, \"do \nnot define the goal of their field as making 'machines that fly so \nexactly like pigeons that they can fool other pigeons.' \"[362] AI \nfounder \nthat \"Artificial \nintelligence \nis not, by definition, simulation of human \nintelligence\".[363] \n\nJohn McCarthy agreed, writing \n\nThe Turing test can provide some \nevidence of intelligence, but it \npenalizes non-human intelligent \nbehavior.[361] \n\nMcCarthy defines intelligence as \"the computational part of the \nability to achieve goals in the world\".[364] Another AI founder, \nMarvin Minsky similarly describes it as \"the ability to solve hard \nproblems\".[365] The leading AI textbook defines it as the study of \nagents that perceive their environment and take actions that maximize their chances of achieving defined \ngoals.[1] These definitions view intelligence in terms of well-defined problems with well-defined \nsolutions, where both the difficulty of the problem and the performance of the program are direct \nmeasures of the \"intelligence\" of the machine—and no other philosophical discussion is required, or may \nnot even be possible. \n\nAnother definition has been adopted by Google,[366] a major practitioner in the field of AI. This definition \nstipulates the ability of systems to synthesize information as the manifestation of intelligence, similar to \nthe way it is defined in biological intelligence.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Finding a provably correct or optimal solution is intractable for many important problems.[15] Soft \ncomputing is a set of techniques, including genetic algorithms, fuzzy logic and neural networks, that are \ntolerant of imprecision, uncertainty, partial truth and approximation. Soft computing was introduced in \nthe late 1980s and most successful AI programs in the 21st century are examples of soft computing with \nneural networks. \n\n**Narrow vs. general AI**\n\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and \nsuperintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these \nsolutions will lead indirectly to the field's long-term goals.[378][379] General intelligence is difficult to \ndefine and difficult to measure, and modern AI has had more verifiable successes by focusing on specific \nproblems with specific solutions. The sub-field of artificial general intelligence studies this area \nexclusively. \n\n**Machine consciousness, sentience, and mind**\n\nThe philosophy of mind does not know whether a machine can have a mind, consciousness and mental \nstates, in the same sense that human beings do. This issue considers the internal experiences of the \nmachine, rather than its external behavior. Mainstream AI research considers this issue irrelevant because \nit does not affect the goals of the field: to build machines that can solve problems using intelligence. \nRussell and Norvig add that \"[t]he additional project of making a machine conscious in exactly the way \nhumans are is not one that we are equipped to take on.\"[380] However, the question has become central to \nthe philosophy of mind. It is also typically the central question at issue in artificial intelligence in fiction. \n\n**Consciousness**\n\nDavid Chalmers identified two problems in understanding the mind, which he named the \"hard\" and \n\"easy\" problems of consciousness.[381] The easy problem is understanding how the brain processes \nsignals, makes plans and controls behavior. The hard problem is explaining how this*feels*or why it \nshould feel like anything at all, assuming we are right in thinking that it truly does feel like something \n(Dennett's consciousness illusionism says this is an illusion). While human information processing is easy \nto explain, human subjective experience is difficult to explain. For example, it is easy to imagine a color- \nblind person who has learned to identify which objects in their field of view are red, but it is not clear \nwhat would be required for the person to*know what red looks like*.[382] \n\n**Computationalism and functionalism**\n\nComputationalism is the position in the philosophy of mind that the human mind is an information \nprocessing system and that thinking is a form of computing. Computationalism argues that the \nrelationship between mind and body is similar or identical to the relationship between software and \nhardware and thus may be a solution to the mind–body problem. This philosophical position was inspired \nby the work of AI researchers and cognitive scientists in the 1960s and was originally proposed by \nphilosophers Jerry Fodor and Hilary Putnam.[383] \n\nPhilosopher John Searle characterized this position as \"strong AI\": \"The appropriately programmed \ncomputer with the right inputs and outputs would thereby have a mind in exactly the same sense human \nbeings have minds.\"[ac] Searle challenges this claim with his Chinese room argument, which attempts to", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" - }, - { - "text": "McCarthy, John; Minsky, Marvin; Rochester, Nathan; Shannon, Claude (1955). \"A Proposal for \n\nthe Dartmouth Summer Research Project on Artificial Intelligence\" (https://web.archive.org/w \neb/20070826230310/http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html). \nArchived from the original (http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth. \nhtml) on 26 August 2007. Retrieved 30 August 2007. \n\nMcCarthy, John (2007), \"From Here to Human-Level AI\",*Artificial Intelligence*, p. 171 \nMcCarthy, John (1999),*What is AI?*(http://jmc.stanford.edu/artificial-intelligence/what-is-ai/inde \nx.html), archived (https://web.archive.org/web/20221204051737/http://jmc.stanford.edu/artifi \ncial-intelligence/what-is-ai/index.html) from the original on 4 December 2022, retrieved \n4 December 2022 \n\nMcCauley, Lee (2007). \"AI armageddon and the three laws of robotics\".*Ethics and Information*\n*Technology*.**9**(2): 153–164. CiteSeerX 10.1.1.85.8904 (https://citeseerx.ist.psu.edu/viewdo \nc/summary?doi=10.1.1.85.8904). doi:10.1007/s10676-007-9138-2 (https://doi.org/10.1007% \n2Fs10676-007-9138-2). S2CID 37272949 (https://api.semanticscholar.org/CorpusID:372729 \n49). \n\nMcGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge \n\ndiscovery\".*The Knowledge Engineering Review*.**20**(1): 39–61. \ndoi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). \nS2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656). \n\nMcGaughey, E (2022),*Will Robots Automate Your Job Away? Full Employment, Basic Income,*\n*and Economic Democracy*(https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \np. 51(3) Industrial Law Journal 511–559, doi:10.2139/ssrn.3044448 (https://doi.org/10.213 \n9%2Fssrn.3044448), S2CID 219336439 (https://api.semanticscholar.org/CorpusID:2193364 \n39), SSRN 3044448 (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \narchived (https://web.archive.org/web/20210131074722/https://papers.ssrn.com/sol3/paper \ns.cfm?abstract_id=3044448) from the original on 31 January 2021, retrieved 27 May 2023 \nMerkle, Daniel; Middendorf, Martin (2013). \"Swarm Intelligence\". In Burke, Edmund K.; Kendall, \nGraham (eds.).*Search Methodologies: Introductory Tutorials in Optimization and Decision*\n*Support Techniques*. Springer Science & Business Media. ISBN 978-1-4614-6940-7. \nMinsky, Marvin (1967),*Computation: Finite and Infinite Machines*, Englewood Cliffs, N.J.: \n\nPrentice-Hall \n\nMoravec, Hans (1988).*Mind Children*(https://archive.org/details/mindchildrenfutu00mora). \n\nHarvard University Press. ISBN 978-0-6745-7616-2. Archived (https://web.archive.org/web/2 \n0200726131644/https://archive.org/details/mindchildrenfutu00mora) from the original on 26 \nJuly 2020. Retrieved 18 November 2019. \n\nMorgenstern, Michael (9 May 2015). \"Automation and anxiety\" (https://www.economist.com/new \ns/special-report/21700758-will-smarter-machines-cause-mass-unemployment-automation-a \nnd-anxiety).*The Economist*. Archived (https://web.archive.org/web/20180112214621/https:// \nwww.economist.com/news/special-report/21700758-will-smarter-machines-cause-mass-une \nmployment-automation-and-anxiety) from the original on 12 January 2018. Retrieved \n13 January 2018. \n\nMüller, Vincent C.; Bostrom, Nick (2014). \"Future Progress in Artificial Intelligence: A Poll Among \nExperts\" (http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF).*AI Matters*.**1**(1): 9–11. \ndoi:10.1145/2639475.2639478 (https://doi.org/10.1145%2F2639475.2639478). \nS2CID 8510016 (https://api.semanticscholar.org/CorpusID:8510016). Archived (https://web. \narchive.org/web/20160115114604/http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF) \nfrom the original on 15 January 2016.", - "page_start": 60, - "page_end": 60, - "source_file": "wikipedia3.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" - }, - { - "text": "360. Turing (1950), Under \"The Argument from Consciousness\". \n361. Kirk-Giannini, Cameron Domenico; Goldstein, Simon (16 October 2023). \"AI is closer than \n\never to passing the Turing test for 'intelligence'. What happens when it does?\" (https://theco \nnversation.com/ai-is-closer-than-ever-to-passing-the-turing-test-for-intelligence-what-happe \nns-when-it-does-214721).*The Conversation*. Archived (https://web.archive.org/web/202409 \n25040612/https://theconversation.com/ai-is-closer-than-ever-to-passing-the-turing-test-for-in \ntelligence-what-happens-when-it-does-214721) from the original on 25 September 2024. \nRetrieved 17 August 2024. \n362. Russell & Norvig (2021), p. 3. \n363. Maker (2006). \n364. McCarthy (1999). \n365. Minsky (1986). \n366. \"What Is Artificial Intelligence (AI)?\" (https://cloud.google.com/learn/what-is-artificial-intellige \n\nnce).*Google Cloud Platform*. Archived (https://web.archive.org/web/20230731114802/http \ns://cloud.google.com/learn/what-is-artificial-intelligence) from the original on 31 July 2023. \nRetrieved 16 October 2023. \n\n367. \"One of the Biggest Problems in Regulating AI Is Agreeing on a Definition\" (https://carnegiee \nndowment.org/posts/2022/10/one-of-the-biggest-problems-in-regulating-ai-is-agreeing-on-a- \ndefinition?lang=en).*carnegieendowment.org*. Retrieved 31 July 2024. \n\n368. \"AI or BS? How to tell if a marketing tool really uses artificial intelligence\" (https://www.thedr \num.com/opinion/2023/03/30/ai-or-bs-how-tell-if-marketing-tool-really-uses-artificial-intelligen \nce).*The Drum*. Retrieved 31 July 2024. \n\n369. Nilsson (1983), p. 10. \n370. Haugeland (1985), pp. 112–117. \n371. Physical symbol system hypothesis: Newell & Simon (1976, p. 116) Historical significance: \n\nMcCorduck (2004, p. 153), Russell & Norvig (2021, p. 19) \n\n372. Moravec's paradox: Moravec (1988, pp. 15–16), Minsky (1986, p. 29), Pinker (2007, \n\npp. 190–191) \n\n373. Dreyfus' critique of AI: Dreyfus (1972), Dreyfus & Dreyfus (1986) Historical significance and \n\nphilosophical implications: Crevier (1993, pp. 120–132), McCorduck (2004, pp. 211–239), \nRussell & Norvig (2021, pp. 981–982), Fearn (2007, chpt. 3) \n\n374. Crevier (1993), p. 125. \n375. Langley (2011). \n376. Katz (2012). \n377. Neats vs. scruffies, the historic debate: McCorduck (2004, pp. 421–424, 486–489), Crevier \n(1993, p. 168), Nilsson (1983, pp. 10–11), Russell & Norvig (2021, p. 24) A classic example \nof the \"scruffy\" approach to intelligence: Minsky (1986) A modern example of neat AI and its \naspirations in the 21st century: Domingos (2015) \n\n378. Pennachin & Goertzel (2007). \n379. Roberts (2016). \n380. Russell & Norvig (2021), p. 986. \n381. Chalmers (1995). \n382. Dennett (1991). \n383. Horst (2005). \n384. Searle (1999). \n385. Searle (1980), p. 1. \n386. Russell & Norvig (2021), p. 9817.", - "page_start": 49, - "page_end": 49, - "source_file": "wikipedia3.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Addical Intellapence and its Lise in the Public Sector [ Mpps : Clears ] copical copilsays - content / subSSTELSH2. LIAE - Pleases Online, soft ] ( PDF ). Parints OECD Observatory of Public Sector Immodism. Attrievel ( Mb ): Their ], Profilel
Bertini, Mt Dol Bimbs, A, Tomiai, C, ( 2006 ), “ Automatic annotation and semantic retrieval of video sequence using multimedia sontologies ”. Mill fof till Proceedings of the Joft ACM international conference on Multimedia. 240 ACM inta
Bostrom, Nick ( 2014 ), Superintelligence : Paths, Dengers, Strategies. Odord University Press.
Brostram, Nrital ODD3, “ What happens when outcompatient get smatter than we assess ”, “ Ithps : IVe medically, Leuthological ”, Self - Diabetics ”, Self - Diabetics ”, Self - Diabetes, Self - Diabetes, Self - Diabetes, Self - Diabetes, Sele
Brooks, Rodwey [ 20 November 2014 ]. “ attificial intelligence is a tool, not a threat ” [ https :// web. archive. crowed_O14.12.12.12.12.12.0004 / 000 (( ivww. refhindrations. contrateficial - intelliapence - tool - threat ). Anchieved
Brocks, Practitive ), TDRD, TDRphatamic Don ’ t Pay Chest ’, They Denscribe, Could mit attubtrovislopater syllyinging edg ( IPF ), Pribratics and Autonomus Systematic Tuminentia ( IL - 7, X - 15.15.15.15.15.15.15.15.15.16.15.16.15.1
Builten, Miriam C, [ 20.35 ]. Thoviant Benefigent Regulation of Ardificael Ireeligence * [ https :// dois org / 1.13.13.17 ]. ProFer_TD13 [ 8 ]. European Journal of Artial Republistics. B1 [ 12.4, 43.43.43.43.43.131 ]? lerr Z125.8 ( treps
Bushwick, Sophike ( LIV March 2023 ), “ What the Next GPT - 4 AI Case Do ” ( https :// www. scientifican etcan com / philohhat the eneught - 4 - a - can - b ), Somntifs American, archievel [ https :// www. b. succlive. b. archive. org / web. coloclasta
Builder, Samanal ( CI 3. unive 2843 ) “ Dawnin among the Machineec *[ https :// tests : vitzoka. acr. ctchmlss : tellship? elugF - 12 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 4 - 5thly from ). Letters to fecilitis. They Prefest. ChrothuritisNew Zealand, Acthed [ t
Buttaczo, C : ( July 2001 ), “ Artificial corecioness : Utopia or real possibility ”*, Computer, 34 ( T ) 24 – 30. doi : 30.1109 / 2.5000 ( Intps :// doi. org / 10.11099 / 292.93500 ).
Cambria, Esk ; White, Bebo ( May 2014 ). ‘ Jumping NLP Curves : A Review of Natural Language Processing Research ( Review Articide )’, EEC conputational intelligence Maguzine 9 ( 2 ). 48 – 57 d ; 48 – 57 d ; 43 L33.59MC1.2924.2927 ( https )/ bloode
Cellan - Jones, Rony ( 2 December 2014 ), “ Stephen Hawking warns antificial intelligence could end mankind ” [ https :// www. bbc. com / hews / lechnology 30292540 ]. BbC News. Archived [ http
", - "page_start": 53, - "page_end": 53, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia3.pdf", - "query": "Where can I find the Inspect tool to evaluate the safety of our models?", - "target_page": 21, - "target_passage": "The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations available under a MIT open-source licence which is freely available on GitHub", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence.", - "page_start": 33, - "page_end": 33, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**Description of Exhibit**", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Figure 8.2 Viewing the New Instances in the Individuals by Class tab", - "page_start": 65, - "page_end": 65, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "***Figure 62. Work on Inventories screen –Reject - Status = check***\n\n\n\n***Figure 63. Work on Inventories screen – Propose Rejection - Status = awaiting_rejection_check***", - "page_start": 38, - "page_end": 38, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "C Supplementary materials for models \n\nWe present in this section the model characteristics \nwe collected for the 46 evaluated models. \n\nFor evaluating prompt-based models such as \nintfloat/e5-mistral-instruct-7b, we provide the \nprompts we used in Table 8. \n\nD Evaluation results \n\nThis section presents the results obtained for each \nmodel on each task. To be relevant, we used the \nsame metrics as in MTEB, which varies from one \ntype of task to another:", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "(1) The tachometer provides indication of \nengine speed, N, by percent of the maximum", - "page_start": 141, - "page_end": 141, - "source_file": "00-80T-80.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**3.6.2 The Catalogue details view**\n\nThis page presents a detailed view of the issues per catalogue. The “Download as report” drop-down \nmenu provides a list of all available catalogues. As a next step, the user can choose whether to see \nthe catalogue dashboard, the distribution availability or dataset schema violations. The catalogue \ndashboard is the default view when visiting this page.", - "page_start": 50, - "page_end": 50, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "2004 \nAnnual Report \nYear Ended March 31, 2005", - "page_start": 0, - "page_end": 0, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Figure A-7 Results window \n\nIn the Application Console view, browse to the project1 project page by selecting the \nproject from the project list, as shown in Figure A-8. Scroll down the list to find your \nproject. Click**project1**. \n\n6.", - "page_start": 224, - "page_end": 224, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "legal2_opengouvernementlicense.pdf", - "query": "What was the age category of most new opiate/crack users during the crime peak in the mid-1990s?", - "target_page": 9, - "target_passage": "mplying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "New opiate and crack-cocaine users: characteristics and trends 4", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Figure 10: New treatment presentations for opiate/crack use.**\n\n\n\nFigure 10 shows that, rather than increasing in the current year, new presentations for \nopiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a \ndecrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics \nhave been missed before (see Morgan, 2014), and the potential social harm that a fresh \nincrease in new OCUs could cause, further analysis was conducted on the most recent data to \ntry and determine whether the apparent flattening in trends was actually caused by the early \nstages of a significant surge in new users. \n\nThe treatment data was broken down by age to check whether the slight fall in total new \npresentations in 2014/15 masked an increase in younger treatment presentations. This showed \ninstead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to \n3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a \nfaster rate over the last year than for those aged over-25. Furthermore, separate statistics \nproduced for those in treatment aged 18-and-under also show a fall in aggregate numbers in \ntreatment for opiates and crack. \n\nWe also looked at trends at the local level, given that previous epidemics have started in very \nspecific areas and have taken several years to spread nationally. This means that the start of an \nepidemic can be hidden in the national data because it has not reached enough areas to \nregister. \n\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment \nbefore. So unlike our definition of ‘new’ elsewhere it includes individuals who have been to treatment previously. \n\nNew opiate and crack-cocaine users: characteristics and trends 27", - "page_start": 26, - "page_end": 26, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Executive summary**\n\nThis paper uses a range of datasets and methodologies to: \n\n obtain working estimates for the number of individuals in England who started using \n\nopiates/crack from 2005 to 2013;1 \n\n examine the characteristics of these individuals. \n\nThe main findings of the paper are as follows. \n\n \n\nIt is estimated that around 5,000 to 8,000 individuals started using opiates or crack- \ncocaine in 2013. There is a high degree of uncertainty around this figure due to the \nsparse data on this population, but sense-checks based on treatment and criminal justice \nsystem data suggest the true figure is unlikely to be much larger than 10,000. \n\n Data also suggest that the number of current opiate/crack initiates involved with crime \n\nmay be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. \n\n However, the findings also suggest that between 2011 and early 2014, the number of \n\nnew opiate/crack-cocaine users stopped decreasing and instead stabilised at a \n(historically) low level. Further analysis was conducted to try and determine whether this \nwas a precursor to a new rise in initiates. Though the data are not totally conclusive, the \nresults suggest that a marked increase in new opiate/crack-cocaine users in the near \nfuture is unlikely. If anything, findings suggested that the downward trend may be set to \nresume. \n\n Analysis also revealed some possible changes in characteristics of the new opiate/crack- \ncocaine initiates. There is a trend in the treatment data towards new initiates coming to \ntreatment earlier in their drug-using careers than previous cohorts and also to have \n\n1 At the time of writing, data was unavailable for the period after November 2013. \n2 \n3 787 if adjusted for the missing month. \nIt is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data. \n\nNew opiate and crack-cocaine users: characteristics and trends", - "page_start": 2, - "page_end": 2, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "This report has attempted to draw together available data and evidence to estimate the number \nof new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look \nbriefly at their characteristics. This is important as previous research has suggested that – \nmostly through the actions of a minority - this group has the potential to have a large impact on \ncrime trends and therefore to impose significant societal costs. \n\nThough data on this population is imperfect, a number of different data sources and \nmethodologies are available to estimate OCU incidence. From these, three key conclusions \nemerge: \n\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s \n\nand early 1990s and has even dropped 20-45% since 2005. \n\n This means numbers of new users in 2013 may be around 5,000-8,000 with an \n\napproximate upper bound of 10,000; and numbers involved with prolific criminality will be \nlower still. \n\n The downward trend in new OCUs has flattened since about 2011, but available data do \nnot suggest that this is the precursor to a new increase. If anything, the downward trend \nmay resume in 2014, though the situation requires further monitoring. \n\nFor local areas then, this report suggests that it is still important to identify new OCUs as the \narrestee data showed that a proportion of these are likely to offend over a long period of time. \nBut also, there was some evidence of a shift to older initiates, which may require a slightly \ndifferent treatment approach.", - "page_start": 29, - "page_end": 29, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Table 9: Table showing the age breakdown of individuals testing positive for opiates-only or**\n**positive-for-both as a proportion of all individuals first testing positive in that year.**\n\n\n \n \n \n \n [html]\n
Year of first testAge 18 - 24Age 25 – 29Age 30 - 34Age 35 – 39Age 40 overTotal
200426 %27 %24 %16 %7 %100 %
200523 %27 %24 %17 %9 %100 %
200625 %26 %22 %17 %11 %100 %
200724 %25 %21 %16 %13 %100 %
200821 %23 %21 %18 %16 %100 %
200923 %22 %20 %17 %18 %100 %
201022 %21 %20 %17 %20 %100 %
201122 %19 %20 %16 %22 %100 %
201219 %20 %22 %17 %23 %100 %
201317 %20 %22 %16 %25 %100 %
\n\nComparing 2004 with 2013 shows that the younger age groups have seen falls in both the \nnumber and the proportion of new positive testers. However, the proportion of those aged 40+ \nhas consistently risen and now constitutes the largest group of all new individuals testing \npositive. \n\nThis means that the 4,281 individuals testing positive for the first time in 2013 has a very \ndifferent age profile to that we would expect from a cohort of recent initiates. It is far older, \nsuggesting again that many of those are actually pre-existing users only tested (positively) for \nthe first time in 2013. This adds further weight to the back-of-the-envelope modelling evidence \ndemonstrating that a substantial proportion of the 4,281 new positive testers in 2013 are likely to \nbe longer-term users who have only been first arrested in 2013, rather than genuinely new \nOCUs. \n\nIn the next section, analysis will examine whether there has been a possible shift towards an \nolder profile amongst new initiates. But even taking this into account, it is unlikely that the \nmajority of those 4,281 individuals are recent initiates. This can be seen clearly in Figure 8 \nbelow, which compares the age-of-initiation curve from Figure 11 (in the next section) to the \n2013 ‘new-individuals’ cohort in the DIP data.", - "page_start": 19, - "page_end": 19, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "cocaine users. In addition, the sharp decline in total DIP tests in 2013 may be due in part to the \nfact that DIP ceased to be a nationally funded programme in April 2013. \n\nThese data do show, however, that from 2006 onwards, between a third and half of all \nacquisitive crime arrests involved a drug test and between 15 per cent and 35 per cent of those \ntests (depending on the year) resulted in a positive result for opiates-only or for both opiates and \ncocaine (hereafter labelled `positive-for-both’). \n\nThe reason for highlighting only the opiates-only and the `positive-for-both’ test results is that \nthe primary group of interest in this report are opiate and crack-cocaine users. To capture this \ngroup, cocaine-only tests must be excluded because DIP tests cannot distinguish between \npowder- and crack-cocaine, so a cocaine-only positive test could indicate either. Previous \nevidence has demonstrated that while there is much overlap between heroin and crack-cocaine \ncohorts (i.e. many of those who use heroin also use crack-cocaine), powder-cocaine users have \na quite different profile and are far less likely to be involved with acquisitive crime. Excluding the \ncocaine-only tests means we can be guaranteed not to capture any powder-cocaine users (who \nare not also using opiates or crack), but it also means we may miss some crack-cocaine-only \nusers, hence the figures may under-estimate the true population of OCUs slightly. \n\nThe fifth row in Table 1 shows that the total number of opiate and opiate/cocaine tests over the \nperiod was 364,537. Table 2 shows descriptive statistics for the individuals providing these tests \n(noting that the same individual may be included several times if they gave multiple positive \ntests). \n\n**Table 2: Descriptive statistics on all positive opiate-only/positive-for-both tests.**\n\nOpiate/opiate+cocaine positive tests in England 2004–2013 (all positive tests including repeats \nby the same individual) \n\n\n \n \n \n \n [html]AgeYear of birth\n
Number of tests364.537Number of tests364.537
Mean32Mean1977
Median31Median1977
Mode28Mode1979
Minimum18Minimum1960
Maximum53Maximum1995
\n\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these \nindividuals were in their mid-to-late teens during the crime peak of the mid-1990s.9 Given \nevidence suggesting that the average age of initiation for opiate/crack use is around 18–20 \n(Millar et al., 2001), this age profile would tentatively suggest that OCU incidence also peaked in \nthe 1990s and that this created a large cohort of users who would be approaching 40 today. \n\nThe minimum and maximum years of birth are fixed by construction, because anyone born", - "page_start": 8, - "page_end": 8, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Figure 11: Number of recent (within two years) OCU initiates presenting to treatment in 2005**\n**and 2013, by age of individual at first presentation.**\n\n\n\nThe mode age of initiation has shifted from around 18 to around 25 and there is an older age \nprofile throughout. Rises in average age of initiation have also been reported recently in cohorts \nof Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible \nexplanations. \n\n There is a genuine shift towards new initiates being older, and for them to present to \n\ntreatment much faster than in previous years. \n\n There is a consistent, but small number of individuals who mis-report their age of onset \n\nwhen attending treatment i.e. who report that they have only been using opiates/crack for \na short period when in fact they have been using for a far longer period, and that this is \nstarting to really bias the numbers for recent cohorts because attendees from the original \nepidemic are becoming smaller. \n\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of \nolder initiates, although mis-reporting may also explain that phenomenon. Either way though, as \nthis analysis has made clear throughout, absolute numbers of new OCUs appear to be small – \nprobably fewer than 10,000 per annum and the numbers of those involved with crime will be \nsmaller still. In addition, despite a flattening in the probable trend in new users, there is currently \nno sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to \nresume, though clearly it remains important to monitor the situation. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableNo. of and how parameters
", - "page_start": 28, - "page_end": 28, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "initiated use at an older age. Currently it is not possible to determine whether this is a \nreporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users. \n\n The report has several important policy implications. Even though numbers of new \ninitiates involved with crime have dropped to the low thousands, putting downward \npressure on crime, identification and early diversion to treatment remains paramount. \nFrontier Economics have estimated that the average4 lifetime crime cost of an injecting \ndrug user is £445,000, so the potential for social harm – even from a small number of \nindividuals – remains large and potentially long-lasting. This means local areas need to \nmanage both the (relatively large) stock of current users, and the (much smaller) flow of \nnew initiates, whose treatment needs may be different. There is no evidence of any new \nepidemic in this country, but given the impact of the epidemic of the 80s and early 90s on \ncrime, ongoing monitoring of recent trends is required to spot early signs of any emerging \nproblems. \n\n**Aims and Methodology**\n\nPrevious Home Office research has demonstrated the importance of opiate/crack-cocaine use \nin driving aggregate trends in acquisitive crime (Morgan, 2014). While established estimates \nexist of the total number of opiate/crack-cocaine users (OCUs) in England (Hay et al., 2013), \nthere are no estimates for the number of new OCUs each year (throughout this paper the \nnumber of new OCUs is also referred to as**‘incidence’**). This is important for three main \nreasons. \n\ni)**Stock and flows:**Simply knowing the stock of OCUs tells us nothing about the flows in \nand out – i.e. if the stock were constant each year that could mean that no one starts \nusing these drugs and no one quits or it could mean all existing users quit but that they \nare wholly replaced by new users, or any similar scenario in between. Clearly the policy \nresponse would need to be quite different for each of these cases, so knowing the true \nsituation is important. \n\nii)**Early-warning system:**Research by the Home Office and others has shown that there \nis generally a lag between the start of a heroin/crack epidemic and the point at which it \nbecomes visible on administrative datasets. Closing this gap is important for policy, and \npart of the reason for its existence is the lack of incidence estimates. Evidence also \nsuggests epidemics spread from area to area, so it is important to monitor local as well \nas national trends. \n\niii)**The social harm that can arise:**Though research suggests that not all OCUs resort to \n\nacquisitive crime to help finance their drug use, numerous studies show that a \nproportion consistently do and these individuals can be extremely prolific offenders \n(Morgan, 2014). One study by Frontier Economics estimated that the average lifetime \ncost to society of an injecting drug user was £445,000 from crime alone. Hence \nanalysing and identifying new OCUs is a policy priority (Frontier Economics, 2010). \n\nThere are two inter-connected reasons why regular national incidence estimates have not been \nattempted before5. The first is that data on this issue are sparse given the ‘hidden’ nature of \nopiate/crack markets and that date of first use is not something that gets recorded at the \nmoment it actually occurs. The second reason, which flows from the first, is that current \n\n4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few \n\nindividuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to \nacquisitive crime at all (Morgan, 2014). \n\n5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at \nvarious different levels of geography, see for example: De Angelis et al., 2004, Millar et al., 2001 and Hickman et al., 2001.", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. \n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\n\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the \naverage age at positive test is 32, the peak is quite flat, with high numbers of positive tests still \nbeing recorded by individuals in their late 30s and even into their 40s.", - "page_start": 9, - "page_end": 9, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Figure 8: Comparison of new DIP and treatment cohorts, by age**\n\n\n\nThe DIP cohort has a far older age profile even than the 2014 cohort of treatment initiates, who \nthemselves have a far older age-of-initiation profile than previous treatment cohorts. As such, it \nseems highly unlikely that all, or even most, of the 4,281 positive testers in 2013 are new \ninitiates. \n\nOf course, even if just the small number of DIP testers (78716) who were aged under 25 in 2013 \nwere considered to be new initiates, this would still need to be multiplied up by three factors to \nprovide an estimate for total new initiates: i) the non-arrest rate (to account for the fact that only \na proportion of crime-involved initiates will get arrested in a given year); ii) the fact that DIP’s \ncoverage (in terms of age, geography and PNC-referenced individuals) is not 100 per cent; iii) \nthe likelihood that up to half of all new initiates will not be involved with crime at all. As an \nillustration, multiplying up 787 by these factors produces a figure close to 10,000.17 \n\nThese calculations are speculative and based on a number of assumptions. They are intended \nas a sense-check on the results for the next section. The fragility of the modelling should not \ndetract from the simple fact that the absolute number of new positive testers in 2013 is low \nrelative to the estimated size of the total population. This alone suggests that numbers of new \nusers in 2013 is markedly lower than in previous years. \n\n16 The figure in Table 8 is 721, but adjusting for the missing month of data this becomes 787. \n17 Assuming an arrest rate of 17% (see appendix), and that 50% of OCUs do not commit acquisitive crime (Gossop et al., \n2003) and the coverage figures shown in the appendix. \n\nNew opiate and crack-cocaine users: characteristics and trends 21", - "page_start": 20, - "page_end": 20, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal2_opengouvernementlicense.pdf", - "query": "According to the National Database Treatment Monitoring System, how many people started using opiates/crack between 2005 and 2014?", - "target_page": 22, - "target_passage": " Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "This section uses treatment data from the National Database Treatment Monitoring System \n(NDTMS) to estimate the number of new OCUs annually. The NDTMS captures data on the \nnumbers of people presenting to services with problem drug misuse and information about the \ndrug treatment they receive. All drug treatment agencies in England provide a basic level of \ninformation to the NDTMS on their activities each month. The data for this report included all \nunique individuals presenting to treatment with opiates or crack-cocaine listed as their primary \ndrug between 2005 and 2014. All individuals whose age of first use was listed as below ten or \nbefore 2005 were then excluded. Excluding individuals who started using opiates/crack before \n2005 resulted in a large number of records being left out, due to the fact that the majority of the \ntreatment population, even in 2013/14, initiated in the 1980s and 1990s when heroin and crack \nuse surged in the UK. However, this exclusion is necessary for the incidence methodology, as \nexplained later in this section. The remaining dataset included 52,829 individuals, as shown in \nTable 10. \n\n**Table 10: Descriptive statistics from the NDTMS data.**\n\n\n \n \n \n \n [html]\n
Heason for exclusionNumber of individuals excluded
Total number of individuals analysedInitial sample prior to exclusion0
243.588No age at first use recorded or age was below 10 or higher than age at first treatment443
243.145Year of first use before 2005190.316
52.829Percentage of total sample initiating 2005 – 14n / a
21.7 %
\n\nThe majority of those presenting for treatment between 2005 and 2014 started using \nopiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an \nopiate/crack initiation date between 2005 and 2014. This suggests an average of just under \n5,000 new starters per year during this period. But this would be an under-estimate of incidence \nbecause it is likely that some of those who began use between 2005 and 2014 would not yet \nhave come to treatment during that period. \n\nTo correct for this, we use two variants of a methodology employed by researchers in Millar et \nal. (2001) and Hickman et al. (2001). These papers discuss the methodology in detail. \n\nIn brief, the method uses the lag-to-treatment distribution for the sample coupled with the \nnumber of new treatment presentations in a given year to estimate OCU incidence in that year. \nSo, when presenting to treatment, all individuals are asked to provide the year in which they first \nbegan using their primary drug, which for this analysis was limited to opiates and/or crack- \nNew opiate and crack-cocaine users: characteristics and trends 22", - "page_start": 21, - "page_end": 21, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Figure 10: New treatment presentations for opiate/crack use.**\n\n\n\nFigure 10 shows that, rather than increasing in the current year, new presentations for \nopiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a \ndecrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics \nhave been missed before (see Morgan, 2014), and the potential social harm that a fresh \nincrease in new OCUs could cause, further analysis was conducted on the most recent data to \ntry and determine whether the apparent flattening in trends was actually caused by the early \nstages of a significant surge in new users. \n\nThe treatment data was broken down by age to check whether the slight fall in total new \npresentations in 2014/15 masked an increase in younger treatment presentations. This showed \ninstead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to \n3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a \nfaster rate over the last year than for those aged over-25. Furthermore, separate statistics \nproduced for those in treatment aged 18-and-under also show a fall in aggregate numbers in \ntreatment for opiates and crack. \n\nWe also looked at trends at the local level, given that previous epidemics have started in very \nspecific areas and have taken several years to spread nationally. This means that the start of an \nepidemic can be hidden in the national data because it has not reached enough areas to \nregister. \n\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment \nbefore. So unlike our definition of ‘new’ elsewhere it includes individuals who have been to treatment previously. \n\nNew opiate and crack-cocaine users: characteristics and trends 27", - "page_start": 26, - "page_end": 26, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Executive summary**\n\nThis paper uses a range of datasets and methodologies to: \n\n obtain working estimates for the number of individuals in England who started using \n\nopiates/crack from 2005 to 2013;1 \n\n examine the characteristics of these individuals. \n\nThe main findings of the paper are as follows. \n\n \n\nIt is estimated that around 5,000 to 8,000 individuals started using opiates or crack- \ncocaine in 2013. There is a high degree of uncertainty around this figure due to the \nsparse data on this population, but sense-checks based on treatment and criminal justice \nsystem data suggest the true figure is unlikely to be much larger than 10,000. \n\n Data also suggest that the number of current opiate/crack initiates involved with crime \n\nmay be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. \n\n However, the findings also suggest that between 2011 and early 2014, the number of \n\nnew opiate/crack-cocaine users stopped decreasing and instead stabilised at a \n(historically) low level. Further analysis was conducted to try and determine whether this \nwas a precursor to a new rise in initiates. Though the data are not totally conclusive, the \nresults suggest that a marked increase in new opiate/crack-cocaine users in the near \nfuture is unlikely. If anything, findings suggested that the downward trend may be set to \nresume. \n\n Analysis also revealed some possible changes in characteristics of the new opiate/crack- \ncocaine initiates. There is a trend in the treatment data towards new initiates coming to \ntreatment earlier in their drug-using careers than previous cohorts and also to have \n\n1 At the time of writing, data was unavailable for the period after November 2013. \n2 \n3 787 if adjusted for the missing month. \nIt is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data. \n\nNew opiate and crack-cocaine users: characteristics and trends", - "page_start": 2, - "page_end": 2, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Figure 9: Estimated incidence trend, 2005–2013.**\n\n\n\nBefore discussing the trend implied by this chart, it is important first to sense-check the general \nlevel of new users implied. Analysis from the previous section suggested that the number of \nnew OCUs for 2013 was unlikely to be much higher than 10,000 with only a proportion of those \ninvolved with crime. The 2013 estimate implied by Model 1 is 8,290 and for Model 2 it is 5,092, \nso both are in line with the earlier analysis. The NDTMS data only covers England, not England \nand Wales, and our estimates will of course miss any OCUs who never come to treatment. \nHence the estimates for both models may be slightly conservative in that sense. But putting all \nthe partial evidence together, it can be said with a degree of certainty that the total number of \nindividuals who begin using opiates or crack-cocaine each year is probably not markedly higher \nthan 10,000, and that fewer than half of these are likely to be involved in significant amounts of \nacquisitive crime. \n\nTo put this into historical context, an incidence rate of 10,000 works out at a rate of 0.18 \nindividuals per 1,000 population. Published estimates of incidence in Manchester during the \nepidemic period of the late 1980s and early 1990s included rates above two per 1,000 \npopulation, i.e. more than 11 times higher (Millar et al., 2001). \n\nTurning to the trend implied by Figure 9: both models imply that numbers of new OCUs in 2013 \nare lower than in 2005. Model 1 implies that they have fallen by around a fifth during that period \nand Model 2 suggests a fall of around 45%. But secondly, the way the methodology works \nmeans that the most recent years are the least reliable because they use the least amount of \ndata. This is why the distance between the estimates from the two models widens for the more \nrecent years. It means that it is difficult to say for certain whether the period of flattening from \n2011 onwards, which occurs in both estimated trends but is more obvious in Model 1, is a blip in \nan otherwise downward trend or the start of a turning point. Either way, a flattening of the trend", - "page_start": 25, - "page_end": 25, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. \n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\n\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the \naverage age at positive test is 32, the peak is quite flat, with high numbers of positive tests still \nbeing recorded by individuals in their late 30s and even into their 40s.", - "page_start": 9, - "page_end": 9, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "This report has attempted to draw together available data and evidence to estimate the number \nof new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look \nbriefly at their characteristics. This is important as previous research has suggested that – \nmostly through the actions of a minority - this group has the potential to have a large impact on \ncrime trends and therefore to impose significant societal costs. \n\nThough data on this population is imperfect, a number of different data sources and \nmethodologies are available to estimate OCU incidence. From these, three key conclusions \nemerge: \n\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s \n\nand early 1990s and has even dropped 20-45% since 2005. \n\n This means numbers of new users in 2013 may be around 5,000-8,000 with an \n\napproximate upper bound of 10,000; and numbers involved with prolific criminality will be \nlower still. \n\n The downward trend in new OCUs has flattened since about 2011, but available data do \nnot suggest that this is the precursor to a new increase. If anything, the downward trend \nmay resume in 2014, though the situation requires further monitoring. \n\nFor local areas then, this report suggests that it is still important to identify new OCUs as the \narrestee data showed that a proportion of these are likely to offend over a long period of time. \nBut also, there was some evidence of a shift to older initiates, which may require a slightly \ndifferent treatment approach.", - "page_start": 29, - "page_end": 29, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Table 7: Number of unique individuals testing positive for opiates-only or positive-for-both,**\n**by year of first positive test.**\n\n\n \n \n \n \n [html]Number of arraper infortabel with police poteinpide coctededape year\n
First test year2004200520062007200820092010201120122013Adjusted 2013
200412.2463.1713.2993.0902.9922.5732.3111.7661.5131.0921.191
200510.5393.0202.5392.4782.0831.8441.3501.156862940
200614.7503.8963.2802.7012.5071.8191.6101.1401.244
200713.3913.0632.2912.0911.5671.3349541.041
200813.6292.6702.2631.6121.3669781.067
200911.6552.2111.4311.125847924
201010.3911.3851.052733800
20117.9131.017643701
20126.022823898
20134.2814.670
Total12.24613.71021.06922.91625.44223.97323.61818.84316.19512.35313.476
\n\nThere are several observations to be drawn from these tables. First, it is clear that a proportion \nof opiate-using offenders offend over long periods of time. Nearly ten per cent (8.9%) of \nindividuals who tested positive for opiates at charge in 2004 also tested positive nearly a \ndecade later in 2013 (on arrest). And reading vertically, of the 12,253 individuals testing positive \nin 2013, 1,092 (8.9%) had also tested positive almost a decade earlier. \n\nSecond, in relation to incidence, these numbers also allow for some back-of-the-envelope \nmodelling to address the extent to which the figure of 4,281 individuals, who are new positive \ntesters in 2013, is an under- or over-estimate of the number of new OCUs in total. Taking the \nfigures for 2008, when DIP was fully up and running, we know that around 25,000 unique \nindividuals had positive tests that year. This can be combined with available estimates of the \ntotal OCU population (Hay et al., 2013) and the proportion who are likely to be offending \n(Gossop et al., 2003; Morgan, 2014) to give an approximate arrest rate. i.e. if there were about \n150,000 crime-involved OCUs through the period, this implies an arrest rate of about 17 per \nNew opiate and crack-cocaine users: characteristics and trends 18", - "page_start": 17, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Table 9: Table showing the age breakdown of individuals testing positive for opiates-only or**\n**positive-for-both as a proportion of all individuals first testing positive in that year.**\n\n\n \n \n \n \n [html]\n
Year of first testAge 18 - 24Age 25 – 29Age 30 - 34Age 35 – 39Age 40 overTotal
200426 %27 %24 %16 %7 %100 %
200523 %27 %24 %17 %9 %100 %
200625 %26 %22 %17 %11 %100 %
200724 %25 %21 %16 %13 %100 %
200821 %23 %21 %18 %16 %100 %
200923 %22 %20 %17 %18 %100 %
201022 %21 %20 %17 %20 %100 %
201122 %19 %20 %16 %22 %100 %
201219 %20 %22 %17 %23 %100 %
201317 %20 %22 %16 %25 %100 %
\n\nComparing 2004 with 2013 shows that the younger age groups have seen falls in both the \nnumber and the proportion of new positive testers. However, the proportion of those aged 40+ \nhas consistently risen and now constitutes the largest group of all new individuals testing \npositive. \n\nThis means that the 4,281 individuals testing positive for the first time in 2013 has a very \ndifferent age profile to that we would expect from a cohort of recent initiates. It is far older, \nsuggesting again that many of those are actually pre-existing users only tested (positively) for \nthe first time in 2013. This adds further weight to the back-of-the-envelope modelling evidence \ndemonstrating that a substantial proportion of the 4,281 new positive testers in 2013 are likely to \nbe longer-term users who have only been first arrested in 2013, rather than genuinely new \nOCUs. \n\nIn the next section, analysis will examine whether there has been a possible shift towards an \nolder profile amongst new initiates. But even taking this into account, it is unlikely that the \nmajority of those 4,281 individuals are recent initiates. This can be seen clearly in Figure 8 \nbelow, which compares the age-of-initiation curve from Figure 11 (in the next section) to the \n2013 ‘new-individuals’ cohort in the DIP data.", - "page_start": 19, - "page_end": 19, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Table 5: Table showing trends in total positive opiates-only or positive-for-both., in unique**\n**individuals testing positive, and in new individuals testing positive.**\n\n\n\n\n \n \n \n \n [html]Total paidse for quitar jointer than loss\n
Year2004200520062007200820092010201120122013TotalAdjusted 2013Adjusted Total
Total positive tests17.17419.15733.81337.29141.23238.37638.05128.47623.96518.473296.00820.152297.687
Number of unique individuals with a positive lest five year12.24613.71021.06922.91625.44223.97323.61818.84316.19512.353190.36513.476191.488
Number of new individuals with a positive loss12.24610.53914.75013.39113.62911.65510.3917.9136.0224.281104.8174.670105.206
Cumulative number of new individuals testing positive12.24622.78537.53550.92664.55576.21086.60194.514100.536104.817nia105.206n / a
% new100 %77 %70 %58 %54 %49 %44 %42 %37 %35 %n / a35 %n / a
\n\nOf central interest for this paper is the third row which shows numbers of individuals testing \npositive for opiates only or were positive-for-both for the first time. All the previous caveats \nabout DIP trends need to be borne in mind when looking at those figures. Clearly the rise in new \npositive testers in the early period will be affected by the changes to DIP coverage through \nthose years, as possibly will the sharp fall in positive testers in the latter period. However, \ngraphing the data (see the red line in Figure 7 below) shows that the fall from 14,750 new \npositive testers in 2006 to 4,281 in 2013, is not only large (the drop is around 70 per cent even if \nwe use the adjusted figure for 2013) but also more or less linear. This means that there is no \nimmediate reason to suggest that the 2013 figures are artificially low due to changes in DIP \ncoverage (i.e. the fact that DIP ceased to be a centrally funded programme in April of that year). \nTaken together, the data from the period post-2006 (when DIP had achieved a high level of \ncoverage) certainly appear to show that the number of new crime-involved OCUs is unlikely to \nbe rising and may be falling markedly, see Figure 7. \n\n11 Individuals may have more than one positive test in a given year, which is why the numbers for tests are higher than the \nnumbers for individuals. Similarly, even new individuals not previously testing positive in a given year, may have multiple \npositive tests in the first year in which they test positive. \n\nNew opiate and crack-cocaine users: characteristics and trends 15", - "page_start": 14, - "page_end": 14, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "The analysis showed that of the 149 Drug Action Team areas in England, 72 per cent had \ndecreases in new OCU treatment numbers in the year to September 2014 compared to the \nprevious year. Furthermore, of the 42 areas showing an increase, only 11 also showed a rise for \nthe 12 months to September 2010 compared with the 12 months to September 2014, and most \nof these involved small numbers of individuals. \n\nOverall then, the very recent data on treatment presentations do not currently suggest that the \nnumber of new OCUs is on the verge of increasing, merely that it flattened for a period. \n\nA number of factors could explain the flattening. Most importantly, if there was some sort of \nshock that caused a one-off reduction in the lag-time to treatment this could make it appear as if \nincidence was rising when in fact new users may be falling but a greater percentage may simply \nbe turning up to treatment faster. Such a shock may have occurred given the reduction in heroin \nsupply seen from the end of 2010 through to 2012 (see Ahmad et al,. 2016). If users unable to \nobtain heroin used this enforced abstinence as a spur to seek treatment and hence to present to \ntreatment services earlier than they otherwise would have done, this could cause a one-off \n‘concertina effect’ in which treatment numbers initially flatten or even rise but then fall again. \nThis would also explain why the downward trend has apparently resumed: evidence suggests \nthe reduction in supply has also ended. \n\nHowever, further analysis revealed some other possibilities based on the characteristics of \nthose attending opiate/crack treatment for the first time in recent years. The Appendix includes a \nseries of graphs with age-of-onset distributions for those who first attended treatment in 2013, \nand then 2012, and so on back to 2004. These show that the majority of those who presented to \ntreatment in 2004 initiated use in the mid-1990s in line with the likely peak of the epidemic. But \nby 2012 a far greater number of individuals presenting to treatment say they started using \nopiates/crack only a year or two before.23 In other words, there appears to be a shift towards a \nshorter lag between initiation and treatment. This shift looks even more dramatic when using \nproportions rather than absolute numbers, see the Appendix. \n\nFurthermore, these individuals (those who seem to have both initiated recently and presented to \ntreatment within a year or two of initiation) show a notably different age-of-initiation profile \ncompared to the established profile in the literature, which peaks around 18–22 (Donmall & \nJones, 2005). These individuals have a notably older age profile: see figure 11 chart, which \ncompares recent initiates who presented to treatment in 2005 with recent initiates who \npresented to treatment in 2013. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
\n\n23 This shift does not appear to be related to the reduction in heroin supply occurring around 2010/11. As Appendix 1 \ndemonstrates, the pattern emerges far earlier. \n\nNew opiate and crack-cocaine users: characteristics and trends", - "page_start": 27, - "page_end": 27, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal2_opengouvernementlicense.pdf", - "query": "What proportion of opiate users tested in 2004 were still positive a decade later?", - "target_page": 18, - "target_passage": "Nearly ten per cent (8.9%) of individuals who tested positive for opiates at charge in 2004 also tested positive nearly a decade later in 2013 (on arrest)", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "**Table 9: Table showing the age breakdown of individuals testing positive for opiates-only or**\n**positive-for-both as a proportion of all individuals first testing positive in that year.**\n\n\n \n \n \n \n [html]\n
Year of first testAge 18 - 24Age 25 – 29Age 30 - 34Age 35 – 39Age 40 overTotal
200426 %27 %24 %16 %7 %100 %
200523 %27 %24 %17 %9 %100 %
200625 %26 %22 %17 %11 %100 %
200724 %25 %21 %16 %13 %100 %
200821 %23 %21 %18 %16 %100 %
200923 %22 %20 %17 %18 %100 %
201022 %21 %20 %17 %20 %100 %
201122 %19 %20 %16 %22 %100 %
201219 %20 %22 %17 %23 %100 %
201317 %20 %22 %16 %25 %100 %
\n\nComparing 2004 with 2013 shows that the younger age groups have seen falls in both the \nnumber and the proportion of new positive testers. However, the proportion of those aged 40+ \nhas consistently risen and now constitutes the largest group of all new individuals testing \npositive. \n\nThis means that the 4,281 individuals testing positive for the first time in 2013 has a very \ndifferent age profile to that we would expect from a cohort of recent initiates. It is far older, \nsuggesting again that many of those are actually pre-existing users only tested (positively) for \nthe first time in 2013. This adds further weight to the back-of-the-envelope modelling evidence \ndemonstrating that a substantial proportion of the 4,281 new positive testers in 2013 are likely to \nbe longer-term users who have only been first arrested in 2013, rather than genuinely new \nOCUs. \n\nIn the next section, analysis will examine whether there has been a possible shift towards an \nolder profile amongst new initiates. But even taking this into account, it is unlikely that the \nmajority of those 4,281 individuals are recent initiates. This can be seen clearly in Figure 8 \nbelow, which compares the age-of-initiation curve from Figure 11 (in the next section) to the \n2013 ‘new-individuals’ cohort in the DIP data.", - "page_start": 19, - "page_end": 19, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. \n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\n\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the \naverage age at positive test is 32, the peak is quite flat, with high numbers of positive tests still \nbeing recorded by individuals in their late 30s and even into their 40s.", - "page_start": 9, - "page_end": 9, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Table 7: Number of unique individuals testing positive for opiates-only or positive-for-both,**\n**by year of first positive test.**\n\n\n \n \n \n \n [html]Number of arraper infortabel with police poteinpide coctededape year\n
First test year2004200520062007200820092010201120122013Adjusted 2013
200412.2463.1713.2993.0902.9922.5732.3111.7661.5131.0921.191
200510.5393.0202.5392.4782.0831.8441.3501.156862940
200614.7503.8963.2802.7012.5071.8191.6101.1401.244
200713.3913.0632.2912.0911.5671.3349541.041
200813.6292.6702.2631.6121.3669781.067
200911.6552.2111.4311.125847924
201010.3911.3851.052733800
20117.9131.017643701
20126.022823898
20134.2814.670
Total12.24613.71021.06922.91625.44223.97323.61818.84316.19512.35313.476
\n\nThere are several observations to be drawn from these tables. First, it is clear that a proportion \nof opiate-using offenders offend over long periods of time. Nearly ten per cent (8.9%) of \nindividuals who tested positive for opiates at charge in 2004 also tested positive nearly a \ndecade later in 2013 (on arrest). And reading vertically, of the 12,253 individuals testing positive \nin 2013, 1,092 (8.9%) had also tested positive almost a decade earlier. \n\nSecond, in relation to incidence, these numbers also allow for some back-of-the-envelope \nmodelling to address the extent to which the figure of 4,281 individuals, who are new positive \ntesters in 2013, is an under- or over-estimate of the number of new OCUs in total. Taking the \nfigures for 2008, when DIP was fully up and running, we know that around 25,000 unique \nindividuals had positive tests that year. This can be combined with available estimates of the \ntotal OCU population (Hay et al., 2013) and the proportion who are likely to be offending \n(Gossop et al., 2003; Morgan, 2014) to give an approximate arrest rate. i.e. if there were about \n150,000 crime-involved OCUs through the period, this implies an arrest rate of about 17 per \nNew opiate and crack-cocaine users: characteristics and trends 18", - "page_start": 17, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Table 5: Table showing trends in total positive opiates-only or positive-for-both., in unique**\n**individuals testing positive, and in new individuals testing positive.**\n\n\n\n\n \n \n \n \n [html]Total paidse for quitar jointer than loss\n
Year2004200520062007200820092010201120122013TotalAdjusted 2013Adjusted Total
Total positive tests17.17419.15733.81337.29141.23238.37638.05128.47623.96518.473296.00820.152297.687
Number of unique individuals with a positive lest five year12.24613.71021.06922.91625.44223.97323.61818.84316.19512.353190.36513.476191.488
Number of new individuals with a positive loss12.24610.53914.75013.39113.62911.65510.3917.9136.0224.281104.8174.670105.206
Cumulative number of new individuals testing positive12.24622.78537.53550.92664.55576.21086.60194.514100.536104.817nia105.206n / a
% new100 %77 %70 %58 %54 %49 %44 %42 %37 %35 %n / a35 %n / a
\n\nOf central interest for this paper is the third row which shows numbers of individuals testing \npositive for opiates only or were positive-for-both for the first time. All the previous caveats \nabout DIP trends need to be borne in mind when looking at those figures. Clearly the rise in new \npositive testers in the early period will be affected by the changes to DIP coverage through \nthose years, as possibly will the sharp fall in positive testers in the latter period. However, \ngraphing the data (see the red line in Figure 7 below) shows that the fall from 14,750 new \npositive testers in 2006 to 4,281 in 2013, is not only large (the drop is around 70 per cent even if \nwe use the adjusted figure for 2013) but also more or less linear. This means that there is no \nimmediate reason to suggest that the 2013 figures are artificially low due to changes in DIP \ncoverage (i.e. the fact that DIP ceased to be a centrally funded programme in April of that year). \nTaken together, the data from the period post-2006 (when DIP had achieved a high level of \ncoverage) certainly appear to show that the number of new crime-involved OCUs is unlikely to \nbe rising and may be falling markedly, see Figure 7. \n\n11 Individuals may have more than one positive test in a given year, which is why the numbers for tests are higher than the \nnumbers for individuals. Similarly, even new individuals not previously testing positive in a given year, may have multiple \npositive tests in the first year in which they test positive. \n\nNew opiate and crack-cocaine users: characteristics and trends 15", - "page_start": 14, - "page_end": 14, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Table 3: Descriptive statistics for the DIP positive opiate-only/positive-for-both tests in which**\n**an individual can be identified with a PNC number.**\n\n\n \n \n \n \n [html]England 2004 – 2013AgeYear of birth\n
Number of tests296.008Number of tests296.008
Mean32Mean1977
Median31Median1977
Mode28Mode1979
Minimum18Minimum1960
Maximum53Maximum1995
\n\nThe age and year of birth distributions are also similar and are shown in the Appendix. Thus, for \nthe majority of the analysis that follows, tests with no PNC number were excluded.10 \n\nThe charts and tables above use data from all positive tests, so will include cases where the \nsame individual has tested positively on more than one occasion. The following data look just at \nthe first test for each individual testing positive for opiates-only or positive-for-both. \n\n**Table 4: Descriptive statistics on first positive opiate-only/positive-for-both tests.**\n\n\n \n \n \n \n [html]For rest passible gradetergrates - carainetes ( urinage intolviduals )AgeYear of birth\n
Number of tests104.817Number of tests104.817
Mean31Mean1977
Median30Median1977
Mode27Mode1980
Minimum18Minimum1960
Maximum53Maximum1995
\n\nThere were just over 100,000 unique individuals who tested positive for opiates-only or positive- \nfor-both between 2004 and 2013. The distribution of the 296,008 positive tests these individuals \ngave, shows that the vast majority (55%) were only tested once (see Figure 4), which is likely to \nbe why the age statistics are quite similar between Table 3 and Table 4. However, within this \n\n10 Examining the data it is also clear that some areas recorded a higher proportion of cases without a PNC number than \nothers. Thus excluding these cases further affects the variation in geographic coverage across time. See Appendix for more. \n\nNew opiate and crack-cocaine users: characteristics and trends 12", - "page_start": 11, - "page_end": 11, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "cent (25,000/150,000).14 It is then possible to model how many of the original population of \ncrime-involved OCUs would be likely to test positive in any given year. For example, if there \nwere 150,000 crime-involved OCUs in 2008, the chances of one of that group having a first test \nin 2013, providing they remained a crime-involved OCU throughout the period 2004–2013 is \ngiven by: \n\n(1*–*probability of arrest)^8 = chance of not getting caught between 2004 and 2012 \n\nMultiplied by: \n\nProbability that they do get arrested in 2013 \n\nThis can then be calculated for a range of plausible values for the initial number of OCUs, and \nhence range of arrest rates, to give a range of plausible values for the number of new testers in \n2013 who were actually longer-term users. The results of this modelling suggest that we would \nexpect about 2,400–7,000 new positive tests from individuals who are actually longer-term \nOCUs.15 So the fact we only see 4,281 in the real data suggests that genuinely new initiates \nmay be a minority within this figure, as many (probably most) will be from the original cohort. \n\nThis is further reinforced by the next set of analyses, which break down the data on new positive \ntests per year by age. Table 8 shows how numbers of unique individuals testing positive for the \nfirst time break down by year and by age group. The age breakdowns are shown first in \nabsolute numbers and in the second table as a proportion of all those with a first test in that \nyear. \n\n**Table 8: Unique individuals testing positive for opiates-only or positive-for-both, by age and**\n**by year of first test.**\n\n\n \n \n \n \n [html]\n
Year of first lestAge 18 - 24Age 25 - 29Age 30 - 34Age 35 – 39Age 40 overTotal
20043.1503.3192.9381.95888112.246
20052.3912.8322.5481.79197710.539
20063.6353.7683.2752.4911.58014.749
20073.1823.3592.8692.1781.80313.391
20082.9123.1972.8572.4252.23813.629
20092.7112.5942.3041.9982.04811.655
20102.2872.1802.1051.7442.07510.391
20111.7721.5191.6221.2741.7267.913
20121.1361.1791.3001.0301.3776.022
20137218509387041.0684.281
Total23.89724.79722.75617.59315.773104.816
", - "page_start": 18, - "page_end": 18, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "cocaine users. In addition, the sharp decline in total DIP tests in 2013 may be due in part to the \nfact that DIP ceased to be a nationally funded programme in April 2013. \n\nThese data do show, however, that from 2006 onwards, between a third and half of all \nacquisitive crime arrests involved a drug test and between 15 per cent and 35 per cent of those \ntests (depending on the year) resulted in a positive result for opiates-only or for both opiates and \ncocaine (hereafter labelled `positive-for-both’). \n\nThe reason for highlighting only the opiates-only and the `positive-for-both’ test results is that \nthe primary group of interest in this report are opiate and crack-cocaine users. To capture this \ngroup, cocaine-only tests must be excluded because DIP tests cannot distinguish between \npowder- and crack-cocaine, so a cocaine-only positive test could indicate either. Previous \nevidence has demonstrated that while there is much overlap between heroin and crack-cocaine \ncohorts (i.e. many of those who use heroin also use crack-cocaine), powder-cocaine users have \na quite different profile and are far less likely to be involved with acquisitive crime. Excluding the \ncocaine-only tests means we can be guaranteed not to capture any powder-cocaine users (who \nare not also using opiates or crack), but it also means we may miss some crack-cocaine-only \nusers, hence the figures may under-estimate the true population of OCUs slightly. \n\nThe fifth row in Table 1 shows that the total number of opiate and opiate/cocaine tests over the \nperiod was 364,537. Table 2 shows descriptive statistics for the individuals providing these tests \n(noting that the same individual may be included several times if they gave multiple positive \ntests). \n\n**Table 2: Descriptive statistics on all positive opiate-only/positive-for-both tests.**\n\nOpiate/opiate+cocaine positive tests in England 2004–2013 (all positive tests including repeats \nby the same individual) \n\n\n \n \n \n \n [html]AgeYear of birth\n
Number of tests364.537Number of tests364.537
Mean32Mean1977
Median31Median1977
Mode28Mode1979
Minimum18Minimum1960
Maximum53Maximum1995
\n\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these \nindividuals were in their mid-to-late teens during the crime peak of the mid-1990s.9 Given \nevidence suggesting that the average age of initiation for opiate/crack use is around 18–20 \n(Millar et al., 2001), this age profile would tentatively suggest that OCU incidence also peaked in \nthe 1990s and that this created a large cohort of users who would be approaching 40 today. \n\nThe minimum and maximum years of birth are fixed by construction, because anyone born", - "page_start": 8, - "page_end": 8, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "population there exists a small group of frequent repeat users. 1,828 individuals (1.7% of this \npopulation) accounted for just over ten per cent of all positive tests (30,471 tests in total). These \nindividuals provided between 16 and 57 positive tests over the period 2004 to 2013. \n\n**Figure 4: Proportion of positive tests by number of times an individual tested positive.**", - "page_start": 12, - "page_end": 12, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "Despite this, there are still a few things these data can tell us about the numbers and trends in \nnew OCUs. Firstly, despite the downward bias outlined above, it is clear that there are not \nenough new crime-involved OCUs entering the population to cause this trend to increase or \neven flatten. Secondly, it is assumed that the probability of arrest stays roughly constant through \nthe period, the trend in the number of new positive testers, who are actually captured from the \noriginal cohort, will gradually flatten, whereas the decline in new OCUs in the DIP data is almost \nlinear, suggesting that numbers entering the population are also falling. But most important is \nthat the absolute number of new positive testers in 2013 is only 4,281. Given that this figure is \nlikely to include some individuals who are actually long-standing OCUs, but who have evaded \narrest to that point, then the number of genuinely new arrested OCUs in 2013 must be lower \nthan 4,281, possibly markedly lower. \n\nTo investigate this further, the next two tables break down annual totals for all tests and all \nunique individuals, by the year of first test. \n\n**Table 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive**\n**test.**\n\n\n \n \n \n \n [html]Number of tests per year ( positive opedequide + cocaine )\n
Year of first test2004200520062007200820092010201120122013Adjusted 2013
200417.1745.6047.0916.7846.5095.2924.8633.3412.6291.8001.964
200513.5536.0665.1104.9413.9833.5492.3231.9471.3831.509
200620.6567.7846.1525.1394.6293.2572.6491.8061.970
200717.6135.7474.3093.8552.6192.1191.5551.696
200817.8834.9704.0262.6262.1801.5621.704
200914.6834.0542.3831.8241.3181.438
201013.0752.3321.6381.1541.259
20119.5951.7141.0131.105
20127.2651.3591.483
20135.5236.025
Total17.17419.15733.81337.29141.23238.37638.05128.47623.96518.47320.152
", - "page_start": 16, - "page_end": 16, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "New opiate and crack-cocaine users: characteristics and trends 4", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia5.pdf", - "query": "Who led the Fronde des princes?", - "target_page": 4, - "target_passage": "It was headed by the highest-ranking French nobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of Montpensier, known as la Grande Mademoiselle; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of Conti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and François, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, and Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
TableTablePPComponentsof
0.00TableParameterP
\n\n\n\n1655 portrait of Louis, the Victor of \nthe Fronde, portrayed as the god \nJupiter \n\nAll these events were witnessed by Louis and \nlargely explained his later distrust of Paris and the higher aristocracy.[27] \"In one sense, \nLouis's childhood came to an end with the outbreak of the Fronde. It was not only that life \nbecame insecure and unpleasant – a fate meted out to many children in all ages – but that \nLouis had to be taken into the confidence of his mother and Mazarin on political and \nmilitary matters of which he could have no deep understanding\".[28] \"The family home \nbecame at times a near-prison when Paris had to be abandoned, not in carefree outings to \nother chateaux but in humiliating flights\".[28] The royal family was driven out of Paris \ntwice in this manner, and at one point Louis XIV and Anne were held under virtual arrest \nin the royal palace in Paris. The Fronde years planted in Louis a hatred of Paris and a \nconsequent determination to move out of the ancient capital as soon as possible, never to \nreturn.[29] \n\n\n\nJust as the first*Fronde*(the*Fronde parlementaire*of 1648–1649) ended, a second one (the \n*Fronde des princes*of 1650–1653) began. Unlike that which preceded it, tales of sordid \nintrigue and half-hearted warfare characterized this second phase of upper-class \ninsurrection. To the aristocracy, this rebellion represented a protest for the reversal of their \npolitical demotion from vassals to courtiers. It was headed by the highest-ranking French \nnobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of \nMontpensier, known as*la Grande Mademoiselle*; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of \nConti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and \nFrançois, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, \nand Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld. \n\nPortrait by Justus van Egmont \nbetween the years 1649–1652. \n\nQueen Anne played the most important role in defeating the Fronde because she wanted to transfer absolute authority to her son. \nIn addition, most of the princes refused to deal with Mazarin, who went into exile for a number of years. The*Frondeurs*claimed \nto act on Louis's behalf, and in his real interest, against his mother and Mazarin. \n\nQueen Anne had a very close relationship with the Cardinal, and many observers believed that Mazarin became Louis XIV's \nstepfather by a secret marriage to Queen Anne.[30] However, Louis's coming-of-age and subsequent coronation deprived them of \nthe*Frondeurs*' pretext for revolt. The*Fronde*thus gradually lost steam and ended in 1653, when Mazarin returned triumphantly \nfrom exile. From that time until his death, Mazarin was in charge of foreign and financial policy without the daily supervision of \nAnne, who was no longer regent.[31]", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia5.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Goubert, Pierre ( 15FT ) Louids XIV and Twenty Million Ferrchmen. social history from Annales School. SEM STB - D - 2047 - 275L - 7
Jones, Colin. The Great Nation : France from Louis XIV to Napoleon ( 1725 – 1739 ) ( 2002 )
Klaids, 2eseph. Printed propaganda under Louis XV : absolute monarchy and public opinion ( Princeton University Press, 2015 ).
Le Roy Ladune, Emmanuel. The Ancien Relgime : A Hotory of France 2610 – 274 [ 15999 ], survey by leader of the Amales School ( SBN 06121212869
Levis, W. H. The Splendid Century : Life in the France of Louis XIV ( L953 ) ISBN 083,[ S ][ 20 ]
Miford, Nancy ( 2966 ), The Sun King : Louis JIV at Versalles ( 2012 ed.), New York Review of Books. SSBN STB - 2 - SR05 - T493 - 3.
Prest, Julia, and Guy Rowlands, eds. The Third Reign of Louis XIV, α. L6R2 – D725 ( Taylor & Francis, 2015 )
Rothkrug, Lionel, Opposalion to Louis XV : The Political and Social Origins of French Enlightenment ( Princeton University Prees, 2015 ).
Rowlands, Guy, The Dynastic State and the Army under Louis XV / Royal Service and Private Interest, 2902 – 2702
Rubin, David Lee, ed. Sun King : The Ascendancy of French Culture during the Reign of Louis XV. Washington : Folger Books and Cranbury. Associated University Presses, 1592.
Rule, John C., Louis XIV and the craft of kingship 1969.
Shennan, J. H. Louis XIV ( 1993 )
Thompson, lan. The Sun King ’ s Garderr. Louis AV, Andrel Le Nithe And the Creation of the Garders of Versailles. London : Sloomsbury Publishing, 2006 SSBV 3.5822 – 4532 – 4532 – 4532 – 5
Treasure, Geoffrey, The Making of Modern Europe, 2648 – 2780 ( Grd ed. 2003 ), pp. 230 – 296.
Wilkinson, Rich. Louis XIV ( Routledge, 2007 ). ISBN 978 - 0 - 4153 - 5815 - 6
Clehat, Jean - Prillippe, Ler roi stratege : Louis XV et la direction de la guerre, Δ92 - C725 ( Presses universitaines de Remnes, 2023 ).
Crois, Alan. “ Vingt millions de Francais et Louis XV.” Hevue dihistoire moderne contemporaine 2 ( 2003 ): ZT = 48.
Engerand, Fermand, editor ( 2893 ) ( in Frentsh ) Inventalies des tablesus do - fry religie ent DTBI et. CTD part Vicralias baby Partic Emotic Lensus Capy ( high ( plakas, brf30ys ) CLEAR ( highleskGCGTARTL ( 2, mgan ) Actives ( http :// wet. art
\n\n**External links**\n\nRanum, Orest, ed. (1972).*The Century of Louis XIV*(http://www.palgrave.com/in/book/9781349004997). Archived \n(https://web.archive.org/web/20180207182952/https://www.palgrave.com/in/book/9781349004997) from the \noriginal on 7 February 2018. Retrieved 7 July 2017. {{cite book}}: |work= ignored (help) \nWorks by or about Louis XIV (https://archive.org/search.php?query=%28+%22Louis+XIV%22+OR+%22Louis+the \n+Great%22+OR+%22Sun+King%22+OR+%28%221638-1715%22+AND+Louis%29+%29) at the Internet Archive \nWorks by Louis XIV (https://librivox.org/author/9631) at LibriVox (public domain audiobooks) \nLouis XIV (http://www.history.com/topics/louis-xiv) Archived (https://web.archive.org/web/20170622232619/http://w \nww.history.com/topics/louis-xiv) 22 June 2017 at the Wayback Machine at*History.com*\nFull text of marriage contract (https://web.archive.org/web/20070616071522/http://www.smae.diplomatie.gouv.fr/ch \noiseul/ressource/pdf/D16590004.pdf), France National Archives transcription (in French) \n*Le Siècle de Louis XIV*by Voltaire, 1751, hosted by French Wikisource", - "page_start": 33, - "page_end": 33, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Perez, Stanis (July–September 2003). \"Les rides d'Apollon: l'évolution des portraits de Louis XIV\" (https://doi.org/10.3 \n\n917%2Frhmc.503.0062) [Apollo's Wrinkles: The Evolution of Portraits of Louis XIV].*Revue d'Histoire Moderne et*\n*Contemporaine*.**50**(3): 62–95. doi:10.3917/rhmc.503.0062 (https://doi.org/10.3917%2Frhmc.503.0062). \nISSN 0048-8003 (https://search.worldcat.org/issn/0048-8003). JSTOR 20530984 (https://www.jstor.org/stable/205 \n30984). \n\nPetitfils, Jean-Christian (2002).*Louis XIV*(in French). Paris: Perrin. OCLC 423881843 (https://search.worldcat.org/ocl \nc/423881843). \n\nPetitfils, Jean-Christian (2011).*Louise de La Vallière*(in French). Tempus Perrin. ISBN 978-2-2620-3649-2. \nPrest, Julia (2001). \"Dancing King: Louis XIV's Roles in Molière's Comedies-ballets, from Court to Town\".*Seventeenth*\n\n*Century*.**16**(2): 283–298. doi:10.1080/0268117X.2001.10555494 (https://doi.org/10.1080%2F0268117X.2001.10 \n555494). ISSN 0268-117X (https://search.worldcat.org/issn/0268-117X). S2CID 164147509 (https://api.semantics \ncholar.org/CorpusID:164147509). \n\nRégnier, Christian (2009). \"Famous French diabetics\" (http://www.medicographia.com/2010/01/famous-french-diabetic \ns/Famous).*Medicographia*.**31**(3). ISSN 0243-3397 (https://search.worldcat.org/issn/0243-3397). \n\nReinhardt, Nicole (2016).*Voices of Conscience: Royal Confessors and Political Counsel in Seventeenth-Century*\n*Spain and France*. Oxford University Press. ISBN 978-0-1910-0870-2. \n\nRogers Neill Sehnaoui, Caroline (Cally) (2013).*Victorious Charles: A Ladies' Man: A Biography of King Charles VII of*\n*France (1403–1461)*(https://books.google.com/books?id=DJsDL6W-y5MC&pg=PA4). Strategic Book Publishing. \nISBN 978-1-6251-6049-2. \n\nRoosen, William J.*The Age of Louis XIV: The Rise of Modern Diplomacy*(1976) online (https://archive.org/details/age \noflouisxivris0000roos). \n\nSabatier, Gérard (2000). \"La Gloire du Roi: Iconographie de Louis XIV de 1661 a 1672\" (https://www.persee.fr/doc/he \n\ns_0752-5702_2000_num_19_4_2134).*Histoire, Économie et Société*(in French).**19**(4): 527–560. \ndoi:10.3406/hes.2000.2134 (https://doi.org/10.3406%2Fhes.2000.2134). Archived (https://web.archive.org/web/20 \n200522101240/https://www.persee.fr/doc/hes_0752-5702_2000_num_19_4_2134) from the original on 22 May \n2020. Retrieved 9 October 2020. \n\nSchama, Simon (1990).*Citizens: A Chronicle of the French Revolution*(https://archive.org/details/citizenschronicl00sc \n\nha_0) (Reprint ed.). Vintage. ISBN 978-0-6797-2610-4. \n\nSymcox, Geoffrey, ed. (1974).*War, Diplomacy, and Imperialism, 1618–1763*. Walker & Co. ISBN 978-0-8027-2056-6. \nSonnino, Paul (1998). \"Prelude to the Fronde: The French Delegation at the Peace of Westphalia\". In Duchhardt, \nHeinz (ed.).*Der Westfälische Friede: Diplomatie–Politische Zäsur–Kulturelles Umfeld–Rezeptionsgeschichte*. \nMünchen: Oldenberg Verlag GmbH. ISBN 978-3-4865-6328-3. \n\nSpielvogel, Jackson J. (2016).*Western Civilization: A Brief History, Volume I: To 1715*(https://books.google.com/book \ns?id=eskaCgAAQBAJ&pg=PT419). Cengage Learning. ISBN 978-1-3058-8842-5. \n\nSturdy, David J. (1998).*Louis XIV*. St Martin's Press. ISBN 978-0-3122-1427-2. \nWilson, Peter H. (2000).*Absolutism in Central Europe*. Routledge. ISBN 978-0-4152-3351-4. \nWolf, John B. (1968).*Louis XIV*(https://archive.org/details/louisxiv00wolf). W.W. Norton & Co., Inc.: a standard \n\nscholarly biography; \n\nYoung, William (2004).*International Politics and Warfare in the Age of Louis XIV and Peter the Great*. iUniverse. \nISBN 978-0-5953-2992-2. \n\nWijn, J.W. (1950).*Het Staatsche Leger: Deel VII (The Dutch States Army: Part VII)*(in Dutch). Martinus Nijhoff. \n\n**Further reading**", - "page_start": 32, - "page_end": 32, - "source_file": "wikipedia5.pdf" - }, - { - "text": "experiences during the*Fronde*, when men of high birth readily took up the rebel cause against their king, who was actually the \nkinsman of some. This victory over the nobility may thus have ensured the end of major civil wars in France until the French \nRevolution about a century later. \n\n\n\n**France as the pivot of warfare**\n\nUnder Louis, France was the leading European power, and most wars pivoted around its \naggressiveness. No European state exceeded it in population, and no one could match its \nwealth, central location, and very strong professional army. It had largely avoided the \ndevastation of the Thirty Years' War. Its weaknesses included an inefficient financial \nsystem that was hard-pressed to pay for its military adventures, and the tendency of most \nother powers to gang up against it. \n\nDuring Louis's reign, France fought three major wars: the Franco-Dutch War, the Nine \nYears' War, and the War of the Spanish Succession. There were also two lesser conflicts: \nthe War of Devolution and the War of the Reunions.[64] The wars were very expensive but \ndefined Louis XIV's foreign policy, and his personality shaped his approach. Impelled \"by \na mix of commerce, revenge, and pique\", Louis sensed that war was the ideal way to \nenhance his glory. In peacetime, he concentrated on preparing for the next war. He taught \nhis diplomats that their job was to create tactical and strategic advantages for the French \nmilitary.[6] By 1695, France retained much of its dominance but had lost control of the seas \nto England and Holland, and most countries, both Protestant and Catholic, were in alliance \nagainst it. Sébastien Le Prestre de Vauban, France's leading military strategist, warned \nLouis in 1689 that a hostile \"Alliance\" was too powerful at sea. He recommended that \nFrance fight back by licensing French merchant ships to privateer and seize enemy \nmerchant ships while avoiding its navies: \n\nLouis XIV \n\nFrance has its declared enemies Germany and all the states that it embraces; Spain with all its dependencies in \nEurope, Asia, Africa and America; the Duke of Savoy [in Italy], England, Scotland, Ireland, and all their colonies \nin the East and West Indies; and Holland with all its possessions in the four corners of the world where it has \ngreat establishments. France has ... undeclared enemies, indirectly hostile, hostile, and envious of its greatness, \nDenmark, Sweden, Poland, Portugal, Venice, Genoa, and part of the Swiss Confederation, all of which states \nsecretly aid France's enemies by the troops that they hire to them, the money they lend them and by protecting \nand covering their trade.[65] \n\nVauban was pessimistic about France's so-called friends and allies: \n\nFor lukewarm, useless, or impotent friends, France has the Pope, who is indifferent; the King of England \n[James II] expelled from his country; the Grand Duke of Tuscany; the Dukes of Mantua, Modena, and Parma [all \nin Italy]; and the other faction of the Swiss. Some of these are sunk in the softness that comes of years of \npeace, the others are cool in their affections....The English and Dutch are the main pillars of the Alliance; they \nsupport it by making war against us in concert with the other powers, and they keep it going by means of the \nmoney that they pay every year to... Allies.... We must therefore fall back on privateering as the method of \nconducting war which is most feasible, simple, cheap, and safe, and which will cost least to the state, the more \nso since any losses will not be felt by the King, who risks virtually nothing....It will enrich the country, train many \ngood officers for the King, and in a short time force his enemies to sue for peace.[66] \n\n**Edict of Fontainebleau**", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia5.pdf" - }, - { - "text": "12. Philip II of Spain[156] \n\n6. Philip III of Spain[153] \n\n13. Anna of Austria[156] \n\n3. Anne of Austria \n\n14. Charles II, Archduke of Inner Austria[157] \n\n7. Margaret of Austria[153] \n\n15. Maria Anna of Bavaria[157] \n\n1. Robert II of Worms and Rheingau (Robert of Hesbaye), 770–807 \n2. Robert III of Worms and Rheingau, 808–834 \n3. Robert IV the Strong, 820–866 \n4. Robert I of France, 866–923 \n5. Hugh the Great, 895–956 \n6. Hugh Capet, 941–996 \n7. Robert II of France, 972–1031 \n8. Henry I of France, 1008–1060 \n9. Philip I of France, 1053–1108 \n10. Louis VI of France, 1081–1137 \n11. Louis VII of France, 1120–1180 \n12. Philip II of France, 1165–1223 \n13. Louis VIII of France, 1187–1226 \n14. Louis IX of France, 1214–1270 \n15. Robert, Count of Clermont, 1256–1317 \n16. Louis I, Duke of Bourbon, 1279–1342 \n17. James I, Count of La Marche, 1319–1362 \n18. John I, Count of La Marche, 1344–1393 \n19. Louis, Count of Vendôme, 1376–1446 \n20. Jean VIII, Count of Vendôme, 1428–1478 \n21. François, Count of Vendôme, 1470–1495 \n22. Charles de Bourbon, Duke of Vendôme, 1489–1537 \n23. Antoine, King of Navarre, Duke of Vendôme, 1518–1562 \n24. Henry IV, King of France and of Navarre, 1553–1610 \n25. Louis XIII, King of France and Navarre, 1601–1643 \n26. Louis XIV, King of France and Navarre, 1638–1715", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia5.pdf" - }, - { - "text": "\n \n \n \n \n [html]By NN, a gardenerBy Louise de La Valliere ( 6 August 2644 – 6 June 1710 )By Francoise - Athenais, marguise de Montespan ( 5 October 2641 – 27 May 1707 )by Claude de Vin, Mademoiselle des CEillets ( 2637 – 18 May 1687 )by Angelique de Fontanges ( 1661 – 28 June 1682 )\n
NameBirthDeathNotes
Daughter1660unknownShe married N de la Queue, a sentry,[ 35 ]]
Charles de La Baume Le Blanc19 December 166315 July 1665 ( aged 1 )Not legitimised.
Philippe de La Baume Le Blanc7 January 16651666 ( aged 1 )Not legitimised.
Marie Anne de Bourbon2 October 16663 May 1739 ( aged 73 )Legitimised on 14 May 1667. Married Louis Armand I, Prince of Cont.
Louis, Count of Vermandois3 October 166718 November 1683 ( aged 16 )Legitimised on 20 February 1609. Held the office of Admiral of France.
Louise Francoise de Bourbonat the end of March 166923 February 1672 ( aged 2 )
Louis Auguste, Duke of Maine31 March 167014 May 1736 ( aged 66 )Legitimised on 20 December 3473. Healt euronous officers, of which Colonel General of the Suisses et Groores, Governor of Languedoc, General of life Galleys, and Grand Madese of Addery, Also Duke of Aumake, Count of Eu and Prince of Dombe C
Louis Cesar, Count of Vexin20 June 167210 January 1683 ( aged 10 )Legitimised on 20 December 1673.
Louise Francoise de Bourbon1 June 167316 June 1743 ( aged 70 )Legitimised on 20 December 1673. Married Loais III, Prince of Conde. Had issue.
Louise Marie Anne de Bourbon12 November 167415 September 1681 ( aged 6 )Legitimised in January 1676.
Francoise Marie de Bourbon9 February 16771 February 1749 ( aged 72 )Legitimised in November 1681. Married Philippe II, Duke of Orleans, the Regent of France under Louis XV. Had issue.
Louis Alexandre, Count of Toulouse6 June 16781 December 1737 ( aged 59 )Legilimised on 22 November 268L. Held numerous offices, of which : Administ of France, Governor of Guyeenne, Governor of Brittany, and Grand Huntaman citFrance, Also Duke of Damilie, of Ramboullet and of Penthieve. Had issue.
Louise de Maisonblanchec. 17 June 167612 September 1718 ( aged 42 )In 1696 she married Bernard de Prez, Baron de La Queue.[ 159 ]
SonJanuary 1680January 1680 ( stillborn )
DaughterMarch 1681March 1681 ( stillborn )Her existence is uncertain.
\n\n**See also**\n\nCharles de Lorme, personal medical doctor to Louis XIV \nFundamental laws of the Kingdom of France \nHouse of France \nLevée (ceremony) \nList of French monarchs \nOutline of France \nLouis XIV style \nNicolas Fouquet \nFrench forestry Ordinance of 1669 \nPotager du Roi", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia5.pdf" - }, - { - "text": "The Queen sought a lasting peace between Catholic nations, but only after a French victory over \nher native Spain. She also gave a partial Catholic orientation to French foreign policy. This was \nfelt by the Netherlands, France's Protestant ally, which negotiated a separate peace with Spain in \n1648.[18] \n\nIn 1648, Anne and Mazarin successfully negotiated the Peace of Westphalia, which ended the \nThirty Years' War.[19] Its terms ensured Dutch independence from Spain, awarded some autonomy \nto the various German princes of the Holy Roman Empire, and granted Sweden seats on the \nImperial Diet and territories controlling the mouths of the Oder, Elbe, and Weser Rivers.[20] \nFrance, however, profited most from the settlement. Austria, ruled by the Habsburg Emperor \nFerdinand III, ceded all Habsburg lands and claims in Alsace to France and acknowledged her*de*\n*facto*sovereignty over the Three Bishoprics of Metz, Verdun, and Toul.[21] Moreover, \nmany petty German states sought French protection, eager to emancipate themselves from \nHabsburg domination. This anticipated the formation of the 1658 League of the Rhine, \nwhich further diminished Imperial power. \n\nBaptismal certificate, 1638 \n\n\n\n**Early acts**\n\nAs the Thirty Years' War came to an end, a civil war known as the Fronde erupted in \nFrance. It effectively checked France's ability to exploit the Peace of Westphalia. Anne and \nMazarin had largely pursued the policies of Cardinal Richelieu, augmenting the Crown's \npower at the expense of the nobility and the*Parlements*. Anne was more concerned with \ninternal policy than foreign affairs; she was a very proud queen who insisted on the divine \nrights of the King of France.[22] \n\nAll this led her to advocate a forceful policy in all matters relating to the King's authority, \nin a manner that was much more radical than the one proposed by Mazarin. The Cardinal \ndepended totally on Anne's support and had to use all his influence on the Queen to temper \nsome of her radical actions. Anne imprisoned any aristocrat or member of parliament who \nchallenged her will; her main aim was to transfer to her son an absolute authority in the \nmatters of finance and justice. One of the leaders of the Parlement of Paris, whom she had \njailed, died in prison.[23] \n\nLouis XIV, then Dauphin of France, \nin 1642, one year before his \naccession to the throne, by Philippe \nde Champaigne \n\n\n\nThe*Frondeurs*, political heirs of the disaffected feudal aristocracy, sought to protect their \nincreasingly centralized royal government. \ntraditional feudal privileges from \nFurthermore, they believed their traditional influence and authority was being usurped by \nthe recently ennobled bureaucrats (the*Noblesse de Robe*, or \"nobility of the robe\"), who \nadministered the kingdom and on whom the monarchy increasingly began to rely. This \nbelief intensified the nobles' resentment. \n\nthe \n\nIn 1648, Anne and Mazarin attempted to tax members of the*Parlement de Paris*. The \nmembers refused to comply and ordered all of the king's earlier financial edicts burned. \nBuoyed by the victory of*Louis, duc d'Enghien*(later known as*le Grand Condé*) at the \nBattle of Lens, Mazarin, on Queen Anne's insistence, arrested certain members in a show \nof force.[24] The most important arrest, from Anne's point of view, concerned Pierre \nBroussel, one of the most important leaders in the*Parlement de Paris*. \nLouis XIV in 1643, by Claude Deruet", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia5.pdf" - }, - { - "text": "The French alliance was deeply unpopular in England, and only more so after the \ndisappointing battles against Michiel de Ruyter's fleet. Charles II of England made peace with \nthe Dutch in the February 1674 Treaty of Westminster. However, French armies held \nsignificant advantages over their opponents; an undivided command, talented generals like \nTurenne, Condé and Luxembourg and vastly superior logistics. Reforms introduced by \nLouvois, the Secretary of War, helped maintain large field armies that could be mobilised \nmuch more quickly, allowing them to mount offensives in early spring before their opponents \nwere ready.[46] \n\nLouis XIV, 1670, by Claude \nLefèbvre", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia5.pdf" - }, - { - "text": "**Issue**\n\n\n \n \n \n \n [html]By Maria Therea, Inflama of Spain, Acthduchess of Austria, Queen of France and of Navamy 20 September 2030 – 30 July 2603 )\n
NameBirthDeathNotes
< underline > Louis, le Grand Dauphin 1 November 166114 April 1711Fils de France. Dauphin of France ( 2661 – 2711 ). Had issue. Father of Louis, Dauphin of France, Philip V of Spain and Chartes, Duke of Berry Grandfather of Louis XV of France
Anne Elisabeth18 November 166230 December 1662Fille de France. Died in infancy.
Marie Anne16 November 166426 December 1664Fille de France. Died in infancy.
Marie Therese2 January 16671 March 1672Fille de France. Known as Madame Royale and la Petite Madame. Died in childhood.
Philippe Charles, Duke of Anjou5 August 166810 July 1671Fils de France. Died in childhood.
Louis Francois, Duke of Anjou14 June 16724 November 1672< underline > Fils de France. Died in infancy.
", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia5.pdf" - }, - { - "text": "**Works cited**\n\nAnselme de Sainte-Marie, Père (1726).*Histoire généalogique et chronologique de la maison royale de France*(http \n\ns://gallica.bnf.fr/ark:/12148/bpt6k76026j) [*Genealogical and chronological history of the royal house of France*] (in \nFrench). Vol. 1 (3rd ed.). Paris: La compagnie des libraires. Archived (https://web.archive.org/web/2022033108174 \n8/https://gallica.bnf.fr/ark:/12148/bpt6k76026j) from the original on 31 March 2022. Retrieved 30 August 2018. \n\nAntoine, Michel (1989).*Louis XV*(in French). Paris: Fayard. ISBN 978-2-2130-2277-2. \nBailey, Gauvin Alexander (2018).*Architecture and Urbanism in the French Atlantic Empire: State, Church and Society,*\n*1604–1830*. Kingston, Ontario: McGill-Queen's University Press. ISBN 978-0-7735-5376-7. \n\nBarentine, John C. (2016).*Uncharted Constellations: Asterisms, Single-Source and Rebrands*. Springer Publishing. \n\nISBN 978-3-3192-7619-9. \n\nBarnes, Linda L. (2005).*Needles, Herbs, Gods, and Ghosts: China, Healing, and the West to 1848*. Harvard \nUniversity Press. ISBN 978-0-6740-1872-3. \n\nBeem, Charles (2018).*Queenship in Early Modern Europe*(https://books.google.com/books?id=301GEAAAQBAJ). \n\nRed Globe Press. ISBN 978-1-1370-0506-9. Archived (https://web.archive.org/web/20231124053309/https://book \ns.google.com/books?id=301GEAAAQBAJ) from the original on 24 November 2023. Retrieved 30 October 2023. \n\nBély, Lucien (2001).*The History of France*. Paris: Editions Jean-Paul Gisserot. ISBN 978-2-8774-7563-1. \nBlack, Jeremy (2011).*Beyond the Military Revolution: War in the Seventeenth Century World*. Palgrave Macmillan. \nISBN 978-0-2302-5156-4. \n\nBlanning, Tim (2008).*The Pursuit of Glory: The Five Revolutions That Made Modern Europe*. Penguin Books. \n\nISBN 978-0-1431-1389-8. \n\nBluche, François (1986).*Louis XIV*(in French). Paris: Hachette Littératures. ISBN 978-2-0101-3174-5. \nBluche, François (1990).*Louis XIV*. Translated by Greengrass, Mark. New York: Franklin Watts. p. 11. ISBN 978-0- \n5311-5112-9. \n\nBluche, François (2005).*Dictionnaire du Grand Siècle 1589–1715*(in French). Fayard. ISBN 978-2-2136-2144-9. \nBryant, Mark (2004). \"Partner, Matriarch, and Minister: Mme de Maintenon of France, Clandestine Consort, 1680– \n1715\". In Campbell Orr, Clarissa (ed.).*Queenship in Europe 1660–1815: The Role of the Consort*. Cambridge \nUniversity Press. pp. 77–106. ISBN 978-0-5218-1422-5. \n\nBuckley, Veronica (2008).*Madame de Maintenon: The Secret Wife of Louis XIV*. London: Bloomsbury. ISBN 978-0- \n\n7475-8098-0. \n\nBurke, Peter (1992). \"The Fabrication of Louis XIV\".*History Today*.**42**(2). \nClaydon, Tony (2007).*Europe and the Making of England, 1660–1760*. Cambridge University Press. ISBN 978-0- \n5218-5004-9. \n\nDelon, Michel (2013).*Encyclopedia of the Enlightenment*(https://books.google.com/books?id=QEpJAgAAQBAJ). \nRoutledge. ISBN 978-1-1359-5998-2. \n\nDunlop, Ian (2000).*Louis XIV*. London: Pimlico. ISBN 978-0-7126-6709-8. \nDurant, Will; Durant, Ariel (1963).*The Story of Civilization*. Vol. 8: The Age of Louis XIV. Boston: Simon & Schuster. \nDvornik, Francis (1962).*The Slavs in European History and Civilization*(https://books.google.com/books?id=LACpYP \n-g1y8C). Rutgers University Press. ISBN 978-0-8135-0799-6. Archived (https://web.archive.org/web/20231017044 \n641/https://books.google.com/books?id=LACpYP-g1y8C) from the original on 17 October 2023. Retrieved \n21 August 2021. \n\nEdmunds, Martha (2002).*Piety and Politics*. University of Delaware Press. ISBN 0-8741-3693-8. \nEdwards (2007). \"Edict of Versailles (1787)\" (https://books.google.com/books?id=6_2wkP4j-EsC&pg=PA212). In \n\nFremont-Barnes, Gregory (ed.).*Encyclopedia of the Age of Political Revolutions and New Ideologies, 1760–1815*. \nGreenwood Publishing. ISBN 978-0-3130-4951-4. \n\nFraser, Antonia (2006).*Love and Louis XIV: The Women in the Life of the Sun King*. New York: Random House, Inc. \nISBN 978-1-4000-3374-4.", - "page_start": 30, - "page_end": 30, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia5.pdf", - "query": "What was one of Louis XIV's most ill-famed decrees?", - "target_page": 6, - "target_passage": "One of Louis's more infamous decrees was the Grande Ordonnance sur les Colonies of 1685, the Code Noir (black code)", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "was persuaded to change his fiscal policy. Though willing enough to tax the nobles, Louis \nfeared the political concessions which they would demand in return. Only towards the \nclose of his reign under the extreme exigency of war, was he able, for the first time in \nFrench history, to impose direct taxes on the aristocracy. This was a step toward equality \nbefore the law and toward sound public finance, though it was predictably diminished by \nconcessions and exemptions won by the insistent efforts of nobles and bourgeois.[35] \n\nLouis and Colbert also had wide-ranging plans to grow French commerce and trade. \nColbert's mercantilist administration established new \nindustries and encouraged \nmanufacturers and inventors, such as the Lyon silk manufacturers and the Gobelins \ntapestry manufactory. He invited manufacturers and artisans from all over Europe to \nFrance, such as Murano glassmakers, Swedish ironworkers, and Dutch shipbuilders. He \naimed to decrease imports while increasing French exports, hence reducing the net outflow \nof precious metals from France. \n\nEngraving of Louis XIV \n\nLouis instituted reforms in military administration through Michel le Tellier and his son \nFrançois-Michel le Tellier, successive Marquis de Louvois. They helped to curb the \nindependent spirit of the nobility, imposing order on them at court and in the army. Gone were the days when generals protracted \nwar at the frontiers while bickering over precedence and ignoring orders from the capital and the larger strategic picture, with the \nold military aristocracy (*noblesse d'épée*, nobility of the sword) monopolizing senior military positions and the higher ranks. \nLouvois modernized the army and reorganised it into a professional, disciplined, well-trained force. He was devoted to the \nsoldiers' material well-being and morale, and even tried to direct campaigns. \n\n\n\n**Relations with the major colonies**\n\nLouis's legal reforms were enacted in his numerous Great Ordinances. Prior to that, France \nwas a patchwork of legal systems, with as many traditional legal regimes as there were \nprovinces, and two co-existing legal systems—customary law in the north and Roman civil \nlaw in the south.[36] The*Grande Ordonnance de Procédure Civile*of 1667, the*Code*\n*Louis*, was a comprehensive legal code imposing a uniform regulation of civil procedure \nthroughout the kingdom. Among other things, it prescribed baptismal, marriage and death \nrecords in the state's registers, not the church's, and it strictly regulated the right of the \n*Parlements*to remonstrate.[37] The*Code Louis*later became the basis for the Napoleonic \ncode, which in turn inspired many modern legal codes. \n\nLouis and his family portrayed as \nRoman gods in a 1670 painting by \nJean Nocret. L to R: Louis's aunt, \nHenriette-Marie; his brother, \nPhilippe, duc d'Orléans; the Duke's \ndaughter, Marie Louise d'Orléans, \nand wife, Henriette-Anne Stuart; the \nQueen-mother, Anne of Austria; \nthree daughters of Gaston \nd'Orléans; Louis XIV; the Dauphin \nLouis; Queen Marie-Thérèse;*la*\n*Grande Mademoiselle*. \n\nOne of Louis's more infamous decrees was the*Grande Ordonnance sur les Colonies*of \n1685, the*Code Noir*(black code). Although it sanctioned slavery, it attempted to humanise \nthe practice by prohibiting the separation of families. Additionally, in the colonies, only \nRoman Catholics could own slaves, and these had to be baptised. \n\nLouis ruled through a number of councils:", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Alternatively, Louis's critics attribute the social upheaval culminating in the French Revolution to his failure to reform French \ninstitutions while the monarchy was still secure. Other scholars counter that there was little reason to reform institutions that \nlargely worked well under Louis. They also maintain that events occurring almost 80 years after his death were not reasonably \nforeseeable to Louis and that in any case, his successors had sufficient time to initiate reforms of their own.[135] \n\nLouis has often been criticised for his vanity. The memoirist Saint-Simon, who claimed \nthat Louis slighted him, criticised him thus: \n\nThere was nothing he liked so much as flattery, or, to put it more plainly, \nadulation; the coarser and clumsier it was, the more he relished it. \n\n\n\nFor his part, Voltaire saw Louis's vanity as the cause for his bellicosity: \n\nIt is certain that he passionately wanted glory, rather than the conquests \nthemselves. In the acquisition of Alsace and half of Flanders, and of all of \nFranche-Comté, what he really liked was the name he made for himself.[136] \n\nNonetheless, Louis has also received praise. The anti-Bourbon Napoleon described him not only as \"a great king\", but also as \"the \nonly King of France worthy of the name\".[137] Leibniz, the German Protestant philosopher, commended him as \"one of the \ngreatest kings that ever was\".[138] And Lord Acton admired him as \"by far the ablest man who was born in modern times on the \nsteps of a throne\".[139] The historian and philosopher Voltaire wrote: \"His name can never be pronounced without respect and \nwithout summoning the image of an eternally memorable age\".[140] Voltaire's history,*The Age of Louis XIV*, named Louis's reign \nas not only one of the four great ages in which reason and culture flourished, but the greatest ever.[141][142] \n\n**Quotes**\n\nNumerous quotes have been attributed to Louis XIV by legend. \n\nThe well-known \"I am the state\" (*\"L'État, c'est moi.\"*) was reported from at least the late 18th century.[143] It was widely repeated \nbut also denounced as apocryphal by the early 19th century.[144][b][145]", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia5.pdf" - }, - { - "text": "**Louis XIV**\n\n**Louis XIV**(Louis-Dieudonné; 5 September 1638 – 1 September 1715), also \nknown as**Louis the Great**(*Louis le Grand*) or the**Sun King**(*le Roi Soleil*), \nwas King of France from 1643 until his death in 1715. His verified reign of 72 \nyears and 110 days is the longest of any sovereign.[1][a] An emblematic \ncharacter of the Age of Absolutism in Europe,[3] Louis XIV's legacy is widely \ncharacterized by French colonial expansion, the conclusion of Eighty Years' \nWar involving the Habsburgs, and his architectural bequest, marked by \ncommissioned works of art and buildings. His pageantry, opulent lifestyle and \nornate cultivated image earned him enduring admiration. Louis XIV raised \nFrance to be the exemplar nation-state of the early modern period, and \nestablished a cultural prestige which lasted through the subsequent centuries, \nand continues today. \n\n**Louis XIV**\n\n\n \n \n \n \n [html]lavish whom• The Marquis of Louvois ( 1683 – 1691 )\n
King of France ( more...)Reign14 May 1643 – 1 September 1715
Coronation7 June 1654 Reims CathedralPredecessor
< underline > Louis XIII SuccessorLouis XV
RegentAnne of Austria ( 1643 – 1651 )Chief ministers See list
Control• Cardinal Mazarin ( 1643 – 1661 )• Jean – Baptiste Colbert ( 1661 – 1683 )
Born
5 September 1638Chateau de Saint - Germain - en - Laye, Saint - Germain - en - Laye, FranceDied
1 September 1715 ( aged 76 ) Palace of Versailles,Versailles, FranceBurial
9 September 1715Basilica of Saint - DenisSpouses
Maria Theresa of Spain ( m, 1660 ; died 1683 )Francoise d ’ Aubigne, Marguise de Maintenon ( nrivate )( m, 1683 )
\n\n**Early years**", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia5.pdf" - }, - { - "text": "rewarded converts to Catholicism.[68] This discrimination did not encounter much \nProtestant resistance, and a steady conversion of Protestants occurred, especially among \nthe noble elites. \n\nIn 1681, Louis dramatically increased his persecution of Protestants. The principle of*cuius*\n*regio, eius religio*generally also meant that subjects who refused to convert could \nemigrate, but Louis banned emigration and effectively insisted that all Protestants must be \nconverted. Secondly, following the proposal of René de Marillac and the Marquis of \nLouvois, he began quartering dragoons in Protestant homes. Although this was within his \nlegal rights, the*dragonnades*inflicted severe financial strain on Protestants and atrocious \nabuse. Between 300,000 and 400,000 Huguenots converted, as this entailed financial \nrewards and exemption from the*dragonnades*.[69] \n\n\n\n\n\nOn 15 October 1685, Louis issued the Edict of \nFontainebleau, which cited the redundancy of \nprivileges for Protestants given their scarcity after \nthe \nof \nFontainebleau revoked the Edict of Nantes and \nrepealed all the privileges that arose therefrom.[4] \nBy his edict, Louis no longer tolerated the existence \nof Protestant groups, pastors, or churches in France. \nNo further churches were to be constructed, and those already existing were to be \ndemolished. Pastors could choose either exile or secular life. Those Protestants who had \nresisted conversion were now to be baptised forcibly into the established church.[70] \n\nextensive conversions. The Edict \n\nLouis XIV in 1685, the year he \nrevoked the Edict of Nantes \n\nProtestant peasants rebelled \nagainst the officially sanctioned \n*dragonnades*(conversions enforced \nby dragoons, labeled \"missionaries \nin boots\") that followed the Edict of \nFontainebleau. \n\nHistorians have debated Louis's reasons for issuing the Edict of Fontainebleau. He may \nhave been seeking to placate Pope Innocent XI, with whom relations were tense and whose \naid was necessary to determine the outcome of a succession crisis in the Electorate of \nCologne. He may also have acted to upstage Emperor Leopold I and regain international \nprestige after the latter defeated the Turks without Louis's help. Otherwise, he may simply \nhave desired to end the remaining divisions in French society dating to the Wars of Religion by fulfilling his coronation oath to \neradicate heresy.[71][72] \n\nMany historians have condemned the Edict of Fontainebleau as gravely harmful to France.[73] In support, they cite the emigration \nof about 200,000 highly skilled Huguenots (roughly one quarter of the Protestant population, or 1% of the French population) \nwho defied royal decrees and fled France for various Protestant states, weakening the French economy and enriching that of \nProtestant states. On the other hand, some historians view this as an exaggeration. They argue that most of France's preeminent \nProtestant businessmen and industrialists converted to Catholicism and remained.[74] \n\nWhat is certain is that the reaction to the Edict was mixed. Even while French Catholic leaders exulted, Pope Innocent XI still \nargued with Louis over Gallicanism and criticized the use of violence. Protestants across Europe were horrified at the treatment of \ntheir co-religionists, but most Catholics in France applauded the move. Nonetheless, it is indisputable that Louis's public image in \nmost of Europe, especially in Protestant regions, was dealt a severe blow.", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Louis ruled through a number of councils: \n\nConseil d'en haut (\"High Council\", concerning the most important matters of \nstate)—composed of the king, the crown prince, the controller-general of \nfinances, and the secretaries of state in charge of various departments. The \nmembers of that council were called ministers of state. \nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces). \nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments). \nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an \nhonorary post in most cases)—this was one of the few posts in the council available to the high aristocracy.[38] \n\n**Early wars in the Low Countries**\n\n**Spain**\n\nThe death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had \nmarried Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees.[39] The marriage \ntreaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants.[39] Mazarin", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia5.pdf" - }, - { - "text": "important both for its role in ending the war between France and Spain, because many of the claims and objectives of Louis's \nforeign policy for the next 50 years would be based upon this marriage, and because it was through this marriage that the Spanish \nthrone would ultimately be delivered to the House of Bourbon.[32] \n\n**Personal reign and reforms**\n\n**Coming of age and early reforms**\n\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of \nMazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring \nthat he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government \nof my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers] \nwill assist me with your counsels when I ask for them. I request and order you to seal no orders except by my \ncommand . . . I order you not to sign anything, not even a passport . . . without my command; to render \naccount to me personally each day and to favor no one\".[33] Capitalizing on the widespread public yearning \nfor peace and order after decades of foreign and civil strife, the young king consolidated central political \nauthority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent, \nthe historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of \nLouis\".[34] \n\nLouis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on \nbankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in \n1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. \nAlthough Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's \nafter him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le- \nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds. \n\nRoyal \nMonogram \n\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the \nremote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the*Parlement*found him guilty \nand sentenced him to exile; and finally Louis altered the sentence to life imprisonment.", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Louis XIV was born on 5 September 1638 in the Château de Saint-Germain-en- \nLaye, to Louis XIII and Anne of Austria. He was named Louis Dieudonné \n(Louis the God-given)[7] and bore the traditional title of French heirs apparent: \n*Dauphin*.[8] At the time of his birth, his parents had been married for 23 years. \nHis mother had experienced four stillbirths between 1619 and 1631. Leading \ncontemporaries thus regarded him as a divine gift and his birth a miracle of \nGod.[9] \n\nLouis's relationship with his mother was uncommonly affectionate for the time. \nContemporaries and eyewitnesses claimed that the Queen would spend all her \ntime with Louis.[10] Both were greatly interested in food and theatre, and it is \nhighly likely that Louis developed these interests through his close relationship \nwith his mother. This long-lasting and loving relationship can be evidenced by \nexcerpts in Louis's journal entries, such as: \n\n\"Nature was responsible for the first knots which tied me to my \nmother. But attachments formed later by shared qualities of the \nspirit are far more difficult to break than those formed merely by \nblood.\"[11] \n\n\n \n \n \n \n [html]\n
Louis, Grand Dauphin
Marie Therese, Madame
Royale
Philippe Charles, Duke of
< underline > Anjou
INegitimate :
Marie Anne, Princess of Conti
Louis, Count of Vermandois
Louis Auguste, Duke of Maine
Louis Cesar, Count of Vexin
Louise Francoise, Princess of
Conde
Louise Marie Anne,
Mademoiselle de Tours
Louise, Baroness of La
Queue
Francoise Marie, Duchess of
Orleans
Louis Alexandre, Count of
Toulouse
\n\nIt was his mother who gave Louis his belief in the absolute and divine power of \nhis monarchical rule.[12] \n\nDuring his childhood, he was taken care of by the governesses Françoise de \nLansac and Marie-Catherine de Senecey. In 1646, Nicolas V de Villeroy \nbecame the young king's tutor. Louis XIV became friends with Villeroy's young \nchildren, particularly François de Villeroy, and divided his time between the \nPalais-Royal and the nearby Hotel de Villeroy. \n\n**House**\n\n**Father**\n\n**Mother**\n\n**Religion**\n\n**Signature**\n**Minority and the*Fronde***\n\n\n\n**Accession**\n\nSensing imminent death in the spring of 1643, King Louis XIII decided to put his affairs in \norder for his four-year-old son Louis XIV. Not trusting the judgement of his Spanish wife \nQueen Anne, who would normally have become the sole regent of France, the king \ndecreed that a regency council would rule on his son's behalf, with Anne at its head.[13] \n\nLouis XIII died on 14 May 1643. On 18 May[14] Queen Anne had her husband's will \nannulled by the*Parlement de Paris*, a judicial body of nobles and high-ranking clergy,[15] \nand she became sole regent. She exiled her husband's ministers Chavigny and Bouthilier \nand appointed the Count of Brienne as her minister of foreign affairs.[16] Anne kept the \ndirection of religious policy strongly in hand until her son's majority in 1661.", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia5.pdf" - }, - { - "text": "From 1647 to 1711, the three chief physicians to the king (Antoine Vallot, Antoine \nd'Aquin, and Guy-Crescent Fagon) recorded all of his health problems in the*Journal de*\n*Santé du Roi*(*Journal of the King's Health*), a daily report of his health. On 18 November \n1686, Louis underwent a painful operation for an anal fistula that was performed by the \nsurgeon Charles Felix de Tassy, who prepared a specially shaped curved scalpel for the \noccasion. The wound took more than two months to heal.[124] \n\nLouis XIV (seated) with his son*le*\n*Grand Dauphin*(to the left), his \ngrandson Louis, Duke of Burgundy \n(to the right), his great-grandson \nLouis Duke of Anjou, and Madame \nde Ventadour, Anjou's governess, \nwho commissioned this painting; \nbusts of Henry IV and Louis XIII are \nin the background. \n\nLouis died of gangrene at Versailles on 1 September 1715, four days before his 77th \nbirthday, after 72 years on the throne. Enduring much pain in his last days, he finally \n\"yielded up his soul without any effort, like a candle going out\", while reciting the psalm \n*Deus, in adjutorium me festina*(*O Lord, make haste to help me*).[125] His body was laid to \nrest in Saint-Denis Basilica outside Paris. It remained there undisturbed for about 80 years \nuntil revolutionaries exhumed and destroyed all of the remains found in the Basilica.[126] \nIn 1848, at Nuneham House, a piece of Louis's mummified heart, taken from his tomb and \nkept in a silver locket by Lord Harcourt, Archbishop of York, was shown to the Dean of \nWestminster, William Buckland, who ate a part of it.[127] \n\nCardinal Armand Gaston Maximilien de Rohan gave Last Rites (confession, viaticum, and \nunction) to king Louis XIV.[128] \n\n\n\n**Succession**\n\n*The Death of Louis XIV at the*\n*Palace of Versailles*, Thomas Jones \nBarker, 1835-1840 \n\nLouis outlived most of his immediate legitimate family. His last surviving legitimate son, \nLouis, Dauphin of France, died in 1711. Barely a year later, the Duke of Burgundy, the \neldest of the Dauphin's three sons and then heir-apparent to Louis, followed his father. \nBurgundy's elder son, Louis, Duke of Brittany, joined them a few weeks later. Thus, on his \n\ndeathbed, Louis's heir-apparent was his five-year-old great-grandson, Louis, Duke of Anjou, Burgundy's younger son. \n\nLouis foresaw an underaged successor and sought to restrict the power of his nephew Philip II, Duke of Orléans, who, as his \nclosest surviving legitimate relative in France, would probably become regent to the prospective Louis XV. Accordingly, the king \ncreated a regency council as Louis XIII had in anticipation of Louis XIV's own minority, with some power vested in his", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia5.pdf" - }, - { - "text": "illegitimate son Louis-Auguste de Bourbon, Duke of Maine.[129] Orléans, however, had Louis's will annulled by the*Parlement of*\n*Paris*after his death and made himself sole regent. He stripped Maine and his brother, Louis-Alexandre, Count of Toulouse, of \nthe rank of Prince of the Blood, which Louis had granted them, and significantly reduced Maine's power and privileges.[130] \n\n**Line of succession in 1715**\n\nLine of succession to the French throne upon the death of Louis XIV in 1715. Louis XIV's only surviving legitimate grandson, \nPhilip V, was not included in the line of succession due to having renounced the French throne after the war of the Spanish \nSuccession, which lasted for 13 years after the death of Charles II of Spain in 1700.[131] \n\n*Louis XIII (1601–1643)*\n\n**Louis XIV***(1638–1715)*\n*Louis, Grand Dauphin (1661–1711)*\n\n*Louis, Duke of Burgundy (1682–1712)*\n*Louis, Duke of Brittany (1707–1712)*\n**(1)**Louis, Duke of Anjou (1710–1774) \n\nPhilip V of Spain (1683–1746) \n*Charles, Duke of Berry (1686–1714)*\n*Philippe I, Duke of Orléans (1640–1701)*\n\n**(2)**Philippe II, Duke of Orléans (1674–1723) \n**(3)**Louis, Duke of Chartres (1703–1752) \n\nFurther down the French line of succession in 1715 was the House of Condé, followed by the House of Conti (a cadet branch of \nthe House of Condé). Both of these royal houses were descended in the male line from Henri II, Prince of Condé, a second cousin \nof French King Louis XIII (the father of Louis XIV) in the male line. \n\n**Legacy**\n\n**Reputation**\n\nAccording to Philippe de Courcillon's*Journal*, Louis on his deathbed advised his heir with these words: \n\nDo not follow the bad example which I have set you; I have often undertaken war too lightly and have sustained it for \nvanity. Do not imitate me, but be a peaceful prince, and may you apply yourself principally to the alleviation of the \nburdens of your subjects.[132] \n\nSome historians point out that it was a customary demonstration of piety in those days to \nexaggerate one's sins. Thus they do not place much emphasis on Louis's deathbed \ndeclarations in assessing his accomplishments. Rather, they focus on military and \ndiplomatic successes, such as how he placed a French prince on the Spanish throne. This, \nthey contend, ended the threat of an aggressive Spain that historically interfered in \ndomestic French politics. These historians also emphasise the effect of Louis's wars in \nexpanding France's boundaries and creating more defensible frontiers that preserved \nFrance from invasion until the Revolution.[132] \n\nTerritorial expansion of France \nunder Louis XIV (1643–1715) is \ndepicted in orange. \n\nArguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his] \nsubjects.\" For example, he patronised the arts, encouraged industry, fostered trade and \ncommerce, and sponsored the founding of an overseas empire. Moreover, the significant \nreduction in civil wars and aristocratic rebellions during his reign are seen by these \nhistorians as the result of Louis's consolidation of royal authority over feudal elites. In their analysis, his early reforms centralised \nFrance and marked the birth of the modern French state. They regard the political and military victories as well as numerous \ncultural achievements as how Louis helped raise France to a preeminent position in Europe.[133] Europe came to admire France \nfor its military and cultural successes, power, and sophistication. Europeans generally began to emulate French manners, values, \ngoods, and deportment. French became the universal language of the European elite. \n\nLouis's detractors have argued that his considerable foreign, military and domestic expenditure impoverished and bankrupted \nFrance. His supporters, however, distinguish the state, which was impoverished, from France, which was not. As supporting \nevidence, they cite the literature of the time, such as the social commentary in Montesquieu's*Persian Letters*.[134]", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Siamese court, which granted Mergui as a naval base to France. However, the death of \nNarai, King of Ayutthaya, the execution of his pro-French minister Constantine Phaulkon, \nand the siege of Bangkok in 1688 ended this era of French influence.[55] \n\nFrance also attempted to participate actively in Jesuit missions to China. To break the \nPortuguese dominance there, Louis sent Jesuit missionaries to the court of the Kangxi \nEmperor in 1685: Jean de Fontaney, Joachim Bouvet, Jean-François Gerbillon, Louis Le \nComte, and Claude de Visdelou.[56] Louis also received a Chinese Jesuit, Michael Shen \nFu-Tsung, at Versailles in 1684.[57] Furthermore, Louis's librarian and translator Arcadio \nHuang was Chinese.[58][59] \n\nSiamese embassy of King Narai to \nLouis XIV in 1686, led by Kosa Pan. \nEngraving by Nicolas Larmessin. \n**Height of power**\n\n\n\n**Centralisation of power**\n\nBy the early 1680s, Louis had greatly augmented French influence in the world. \nDomestically, he successfully increased the influence of the crown and its authority over \nthe church and aristocracy, thus consolidating absolute monarchy in France. \n\nLouis initially supported traditional Gallicanism, which limited papal authority in France, \nand convened an Assembly of the French clergy in November 1681. Before its dissolution \neight months later, the Assembly had accepted the Declaration of the Clergy of France, \nwhich increased royal authority at the expense of papal power. Without royal approval, \nbishops could not leave France, and appeals could not be made to the pope. Additionally, \ngovernment officials could not be excommunicated for acts committed in pursuance of \ntheir duties. Although the king could not make ecclesiastical law, all papal regulations \nwithout royal assent were invalid in France. Unsurprisingly, the Pope repudiated the \nDeclaration.[4] \n\nBy attaching nobles to his court at Versailles, Louis \nachieved \nthe French \naristocracy. According to historian Philip Mansel, \nthe king turned the palace into: \n\nPortrait of Louis XIV (gray pastel on \npaper by Charles Le Brun, 1667, \nLouvre Museum) \n\nincreased control over \n\n\n\nan irresistible combination of marriage market, employment agency and \nentertainment capital of aristocratic Europe, boasting the best theatre, opera, \nmusic, gambling, sex and (most important) hunting.[60] \n\nLouis receiving the Doge of Genoa \nat Versailles on 15 May 1685, \nfollowing the Bombardment of \nGenoa. (*Reparation faite à*\n*Louis XIV par le Doge de Gênes. 15*\n*mai 1685*by Claude Guy Halle, \nVersailles.) \n\nApartments were built to house those willing to pay court to the king.[61] However, the \npensions and privileges necessary to live in a style appropriate to their rank were only \npossible by waiting constantly on Louis.[62] For this purpose, an elaborate court ritual was \ncreated wherein the king became the centre of attention and was observed throughout the \nday by the public. With his excellent memory, Louis could then see who attended him at \ncourt and who was absent, facilitating the subsequent distribution of favours and positions. \nAnother tool Louis used to control his nobility was censorship, which often involved the opening of letters to discern their \nauthor's opinion of the government and king.[61] Moreover, by entertaining, impressing, and domesticating them with extravagant \nluxury and other distractions, Louis not only cultivated public opinion of him, but he also ensured the aristocracy remained under \nhis scrutiny.", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia5.pdf", - "query": "What did Louis XIV do to avoid the Spanish War of Succession in 1698?", - "target_page": 13, - "target_passage": "In an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided Spain's Italian territories between Louis's son le Grand Dauphin and Archduke Charles, with the rest of the empire awarded to Joseph Ferdinand.", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "experiences during the*Fronde*, when men of high birth readily took up the rebel cause against their king, who was actually the \nkinsman of some. This victory over the nobility may thus have ensured the end of major civil wars in France until the French \nRevolution about a century later. \n\n\n\n**France as the pivot of warfare**\n\nUnder Louis, France was the leading European power, and most wars pivoted around its \naggressiveness. No European state exceeded it in population, and no one could match its \nwealth, central location, and very strong professional army. It had largely avoided the \ndevastation of the Thirty Years' War. Its weaknesses included an inefficient financial \nsystem that was hard-pressed to pay for its military adventures, and the tendency of most \nother powers to gang up against it. \n\nDuring Louis's reign, France fought three major wars: the Franco-Dutch War, the Nine \nYears' War, and the War of the Spanish Succession. There were also two lesser conflicts: \nthe War of Devolution and the War of the Reunions.[64] The wars were very expensive but \ndefined Louis XIV's foreign policy, and his personality shaped his approach. Impelled \"by \na mix of commerce, revenge, and pique\", Louis sensed that war was the ideal way to \nenhance his glory. In peacetime, he concentrated on preparing for the next war. He taught \nhis diplomats that their job was to create tactical and strategic advantages for the French \nmilitary.[6] By 1695, France retained much of its dominance but had lost control of the seas \nto England and Holland, and most countries, both Protestant and Catholic, were in alliance \nagainst it. Sébastien Le Prestre de Vauban, France's leading military strategist, warned \nLouis in 1689 that a hostile \"Alliance\" was too powerful at sea. He recommended that \nFrance fight back by licensing French merchant ships to privateer and seize enemy \nmerchant ships while avoiding its navies: \n\nLouis XIV \n\nFrance has its declared enemies Germany and all the states that it embraces; Spain with all its dependencies in \nEurope, Asia, Africa and America; the Duke of Savoy [in Italy], England, Scotland, Ireland, and all their colonies \nin the East and West Indies; and Holland with all its possessions in the four corners of the world where it has \ngreat establishments. France has ... undeclared enemies, indirectly hostile, hostile, and envious of its greatness, \nDenmark, Sweden, Poland, Portugal, Venice, Genoa, and part of the Swiss Confederation, all of which states \nsecretly aid France's enemies by the troops that they hire to them, the money they lend them and by protecting \nand covering their trade.[65] \n\nVauban was pessimistic about France's so-called friends and allies: \n\nFor lukewarm, useless, or impotent friends, France has the Pope, who is indifferent; the King of England \n[James II] expelled from his country; the Grand Duke of Tuscany; the Dukes of Mantua, Modena, and Parma [all \nin Italy]; and the other faction of the Swiss. Some of these are sunk in the softness that comes of years of \npeace, the others are cool in their affections....The English and Dutch are the main pillars of the Alliance; they \nsupport it by making war against us in concert with the other powers, and they keep it going by means of the \nmoney that they pay every year to... Allies.... We must therefore fall back on privateering as the method of \nconducting war which is most feasible, simple, cheap, and safe, and which will cost least to the state, the more \nso since any losses will not be felt by the King, who risks virtually nothing....It will enrich the country, train many \ngood officers for the King, and in a short time force his enemies to sue for peace.[66] \n\n**Edict of Fontainebleau**", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia5.pdf" - }, - { - "text": "and Lionne, however, made the renunciation conditional on \nthe full payment of a Spanish dowry of 500,000 écus.[40] \nThe dowry was never paid and would later play a part \npersuading his maternal first cousin Charles II of Spain to \nleave his empire to Philip, Duke of Anjou (later Philip V of \nSpain), the grandson of Louis XIV and Maria Theresa. \n\nThe War of Devolution did not focus on the payment of the \ndowry; rather, the lack of payment was what Louis XIV \nused as a pretext \nfor nullifying Maria Theresa's \nrenunciation of her claims, allowing the land to \"devolve\" \nto him. In Brabant (the location of the land in dispute), \nchildren of \ntraditionally were not \ndisadvantaged by their parents' remarriages and still \ninherited property. Louis's wife was Philip IV's daughter by \nhis first marriage, while the new king of Spain, Charles II, was his son by a subsequent \nmarriage. Thus, Brabant allegedly \"devolved\" to Maria Theresa, justifying France to attack \nthe Spanish Netherlands. \n\nLouis XIV in 1670, \nengraved portrait by Robert \nNanteuil \nfirst marriages \n\nThe future Philip V being introduced \nas King of Spain by his grandfather, \nLouis XIV \n\n\n\n**Relations with the Dutch**\n\nDuring the Eighty Years' War with Spain, France supported the Dutch Republic as part \nof a general policy of opposing Habsburg power. Johan de Witt, Dutch Grand \nPensionary from 1653 to 1672, viewed this as crucial for Dutch security and a \ncounterweight against his domestic Orangist opponents. Louis provided support in the \n1665-1667 Second Anglo-Dutch War but used the opportunity to launch the War of \nDevolution in 1667. This captured Franche-Comté and much of the Spanish \nNetherlands; French expansion in this area was a direct threat to Dutch economic \ninterests.[41] \n\nThe Battle of Tolhuis, Louis XIV crosses \nthe Lower Rhine at Lobith on 12 June \n1672; Rijksmuseum Amsterdam \n\nThe Dutch opened talks with Charles II of England on a common diplomatic front \nagainst France, leading to the Triple Alliance, between England, the Dutch and \nSweden. The threat of an escalation and a secret treaty to divide Spanish possessions \nwith Emperor Leopold, the other major claimant to the throne of Spain, led Louis to relinquish many of his gains in the 1668 \nTreaty of Aix-la-Chapelle.[42] \n\n\n\nLouis placed little reliance on his agreement with Leopold and as it was now clear French and Dutch aims were in direct conflict, \nhe decided to first defeat the Republic, then seize the Spanish Netherlands. This required breaking up the Triple Alliance; he paid \nSweden to remain neutral and signed the 1670 Secret Treaty of Dover with Charles, an Anglo-French alliance against the Dutch \nRepublic. In May 1672, France invaded the Republic, supported by Münster and the Electorate of Cologne.[43] \n\nRapid French advance led to a coup that toppled De Witt and brought William III to power. \nLeopold viewed French expansion into the Rhineland as an increasing threat, especially after \nthey seized the strategic Duchy of Lorraine in 1670. The prospect of Dutch defeat led Leopold \nto an alliance with Brandenburg-Prussia on 23 June, followed by another with the Republic on \n25th.[44] Although Brandenburg was forced out of the war by the June 1673 Treaty of Vossem, \nin August an anti-French alliance was formed by the Dutch, Spain, Emperor Leopold and the \nDuke of Lorraine.[45]", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia5.pdf" - }, - { - "text": "In July 1695, the city of Namur, occupied for three years by the French, was besieged by an allied \narmy led by William III. Louis XIV ordered the surprise destruction of a Flemish city to divert the \nattention of these troops. This led to the bombardment of Brussels, in which more than 4,000 \nbuildings were destroyed, including the entire city centre. The strategy failed, as Namur fell three \nweeks later, but harmed Louis XIV's reputation: a century later, Napoleon deemed the \nbombardment \"as barbarous as it was useless\".[85] \n\nPeace was broached by Sweden in 1690. By 1692, both sides evidently wanted peace, and secret \nbilateral talks began, but to no avail.[86] Louis tried to break up the alliance against him by dealing \nwith individual opponents but did not achieve his aim until 1696 when the Savoyards agreed to the \nTreaty of Turin and switched sides. Thereafter, members of the League of Augsburg rushed to the \npeace table, and negotiations for a general peace began in earnest, culminating in the Peace of \nRyswick of 1697.[87] \n\nMarshal de Luxembourg \n\n**Peace of Ryswick**\n\nThe Peace of Ryswick ended the War of the League of Augsburg and disbanded the Grand Alliance. By manipulating their \nrivalries and suspicions, Louis divided his enemies and broke their power. \n\nThe treaty yielded many benefits for France. Louis secured permanent French sovereignty over all of Alsace, including \nStrasbourg, and established the Rhine as the Franco-German border (as it is to this day). Pondichéry and Acadia were returned to \nFrance, and Louis's*de facto*possession of Saint-Domingue was recognised as lawful. However, he returned Catalonia and most of \nthe Reunions. \n\nFrench military superiority might have allowed him to press for more advantageous terms. Thus, his generosity to Spain with \nregard to Catalonia has been read as a concession to foster pro-French sentiment and may ultimately have induced King Charles II \nto name Louis's grandson Philip, Duke of Anjou, heir to the Spanish throne.[88] In exchange for financial compensation, France \nrenounced its interests in the Electorate of Cologne and the Palatinate. Lorraine, which had been occupied by the French since \n1670, was returned to its rightful Duke Leopold, albeit with a right of way to the French military. William and Mary were \nrecognised as joint sovereigns of the British Isles, and Louis withdrew support for James II. The Dutch were given the right to \ngarrison forts in the Spanish Netherlands that acted as a protective barrier against possible French aggression. Though in some \nrespects the Treaty of Ryswick may appear a diplomatic defeat for Louis since he failed to place client rulers in control of the \nPalatinate or the Electorate of Cologne, he did fulfil many of the aims laid down in his 1688 ultimatum.[89] In any case, peace in \n1697 was desirable to Louis, since France was exhausted from the costs of the war. \n\n**War of the Spanish Succession**\n\n\n \n \n \n \n [html]\n
Comparison
Causes and build - up to the war
By the time of the Peace of Ryswick, the Spanish succession haywars. King Charles. II ruled a vast empire comprising Spair Spanish colonies. He produced no children, however, and conse
", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia5.pdf" - }, - { - "text": "impact of this victory won the support of Portugal and Savoy. Later, the Battle of Ramillies \ndelivered the Low Countries to the Allies, and the Battle of Turin forced Louis to evacuate \nItaly, leaving it open to Allied forces. Marlborough and Eugene met again at the Battle of \nOudenarde, which enabled them to invade France. \n\n\n\nFrance established contact with Francis II Rákóczi and promised support if he took up the \ncause of Hungarian independence. \n\nThe Franco-Spanish army led by the \nDuke of Berwick defeated decisively \nthe Alliance forces of Portugal, \nEngland, and the Dutch Republic at \nthe Battle of Almansa. \n\nDefeats, famine, and mounting debt greatly weakened France. Between 1693 and 1710, \nover two million people died in two famines, made worse as foraging armies seized food \nsupplies from the villages.[98] In desperation, Louis ordered a disastrous invasion of the \nEnglish island of Guernsey in the autumn of 1704 with the aim of raiding their successful \nharvest. By the winter of 1708–09, he was willing to accept peace at nearly any cost. He \nagreed that the entire Spanish empire should be surrendered to Archduke Charles, and also \nconsented to return to the frontiers of the Peace of Westphalia, giving up all the territories \nhe had acquired over 60 years. But he could not promise that Philip V would accept these \nterms, so the Allies demanded that Louis single-handedly attack his grandson to force \nthese terms on him. If he could not achieve this within the year, the war would resume. \nLouis would not accept these terms.[99] \n\n\n\n\n\n**Turning point**\n\nThe Battle of Ramillies where the \nFrench fought the Dutch and British, \n23 May 1706 \n\nThe final phases of the War of the Spanish Succession demonstrated that the Allies could \nnot maintain Archduke Charles in Spain just as surely as France could not retain the entire \nSpanish inheritance for Philip V. The Allies were definitively expelled from central Spain \nby the Franco-Spanish victories at the Battles of Villaviciosa and Brihuega in 1710. \nFrench forces elsewhere remained obdurate despite their defeats. The Allies suffered a \nPyrrhic victory at the Battle of Malplaquet with 21,000 casualties, twice that of the \nFrench.[100] Eventually, France recovered its military pride with the decisive victory at \nDenain in 1712. \n\nFrench military successes near the end of the war took place against the background of a \nchanged political situation in Austria. In 1705, Emperor Leopold I died. His elder son and \nsuccessor, Joseph I, followed him in 1711. His heir was none other than Archduke Charles, \nwho secured control of all of his brother's Austrian landholdings. If the Spanish empire \nthen fell to him, it would have resurrected a domain as vast as Holy Roman Emperor \nCharles V's in the 16th century. To the maritime powers of Great Britain and the Dutch \nRepublic, this would have been as undesirable as a Franco-Spanish union.[101] \nLouis XIV depicted on a Louis d'or in \n1709 \n\n\n\n**Conclusion of peace**\n\nAs a result of the fresh British perspective on the European balance of power, Anglo- \nFrench talks began, culminating in the 1713 Peace of Utrecht between Louis, Philip V of \nSpain, Anne of Great Britain, and the Dutch Republic. In 1714, after losing Landau and \nFreiburg, the Holy Roman Emperor also made peace with France in the Treaties of Rastatt \nand Baden. \n\nIn the general settlement, Philip V retained Spain and its colonies, while Austria received \nthe Spanish Netherlands and divided Spanish Italy with Savoy. Britain kept Gibraltar and \nMenorca. Louis agreed to withdraw his support for James Stuart, son of James II and \npretender to the thrones of Great Britain and Ireland, and ceded Newfoundland, Rupert's \nLand, and Acadia in the Americas to Anne. Britain gained the most from the treaty, but the \nfinal terms were much more favourable to France than those being discussed in peace \n\nMap of France after the death of \nLouis XIV", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia5.pdf" - }, - { - "text": "The Nine Years' War, which lasted from 1688 to 1697, initiated a period of decline in \nLouis's political and diplomatic fortunes. It arose from two events in the Rhineland. First, \nin 1685, the Elector Palatine Charles II died. All that remained of his immediate family \nwas Louis's sister-in-law, Elizabeth Charlotte. German law ostensibly barred her from \nsucceeding to her brother's lands and electoral dignity, but it was unclear enough for \narguments in favour of Elizabeth Charlotte to have a chance of success. Conversely, the \nprincess was demonstrably entitled to a division of the family's personal property. Louis \npressed her claims to land and chattels, hoping the latter, at least, would be given to her.[76] \nThen, in 1688, Maximilian Henry of Bavaria, Archbishop of Cologne, an ally of France, \ndied. The archbishopric had traditionally been held by the Wittelsbachs of Bavaria, but the \nBavarian claimant to replace Maximilian Henry, Prince Joseph Clemens of Bavaria, was at \nthat time not more than 17 years old and not even ordained. Louis sought instead to install \nhis own candidate, Wilhelm Egon von Fürstenberg, to ensure the key Rhenish state \nremained an ally.[77] \n\nIn light of his foreign and domestic policies during the early 1680s, which were perceived \nas aggressive, Louis's actions, fostered by the succession crises of the late 1680s, created \nconcern and alarm in much of Europe. This led to the formation of the 1686 League of \nAugsburg by the Holy Roman Emperor, Spain, Sweden, Saxony, and Bavaria. Their stated \nintention was to return France to at least the borders agreed to in the Treaty of \nNijmegen.[78] Emperor Leopold I's persistent refusal to convert the Truce of Ratisbon into \na permanent treaty fed Louis's fears that the Emperor would turn on France and attack the \nReunions after settling his affairs in the Balkans.[79] \n\n\n\nAnother event Louis found threatening was England's Glorious Revolution of 1688. \nAlthough King James II was Catholic, his two Anglican daughters, Mary and Anne, \nensured the English people a Protestant succession. But when James II's son James Francis \nEdward Stuart was born, he took precedence in succession over his sisters. This seemed to \nherald an era of Catholic monarchs in England. Protestant lords called on the Dutch Prince \nWilliam III of Orange, grandson of Charles I of England, to come to their aid. He sailed for England with troops despite Louis's \nwarning that France would regard it as a provocation. Witnessing numerous desertions and defections, even among those closest \nto him, James II fled England. Parliament declared the throne vacant, and offered it to James's daughter Mary II and his son-in- \nlaw and nephew William. Vehemently anti-French, William (now William III of England) pushed his new kingdoms into war, thus \ntransforming the League of Augsburg into the Grand Alliance. Before this happened, Louis expected William's expedition to \nEngland to absorb his energies and those of his allies, so he dispatched troops to the Rhineland after the expiry of his ultimatum to \nthe German princes requiring confirmation of the Truce of Ratisbon and acceptance of his demands about the succession crises. \nThis military manoeuvre was also intended to protect his eastern provinces from Imperial invasion by depriving the enemy army \nof sustenance, thus explaining the preemptive scorched earth policy pursued in much of southwestern Germany (the \"Devastation \nof the Palatinate\").[80] \n\nLouis in 1690", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia5.pdf" - }, - { - "text": "important both for its role in ending the war between France and Spain, because many of the claims and objectives of Louis's \nforeign policy for the next 50 years would be based upon this marriage, and because it was through this marriage that the Spanish \nthrone would ultimately be delivered to the House of Bourbon.[32] \n\n**Personal reign and reforms**\n\n**Coming of age and early reforms**\n\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of \nMazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring \nthat he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government \nof my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers] \nwill assist me with your counsels when I ask for them. I request and order you to seal no orders except by my \ncommand . . . I order you not to sign anything, not even a passport . . . without my command; to render \naccount to me personally each day and to favor no one\".[33] Capitalizing on the widespread public yearning \nfor peace and order after decades of foreign and civil strife, the young king consolidated central political \nauthority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent, \nthe historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of \nLouis\".[34] \n\nLouis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on \nbankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in \n1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. \nAlthough Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's \nafter him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le- \nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds. \n\nRoyal \nMonogram \n\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the \nremote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the*Parlement*found him guilty \nand sentenced him to exile; and finally Louis altered the sentence to life imprisonment.", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Louis ruled through a number of councils: \n\nConseil d'en haut (\"High Council\", concerning the most important matters of \nstate)—composed of the king, the crown prince, the controller-general of \nfinances, and the secretaries of state in charge of various departments. The \nmembers of that council were called ministers of state. \nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces). \nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments). \nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an \nhonorary post in most cases)—this was one of the few posts in the council available to the high aristocracy.[38] \n\n**Early wars in the Low Countries**\n\n**Spain**\n\nThe death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had \nmarried Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees.[39] The marriage \ntreaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants.[39] Mazarin", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia5.pdf" - }, - { - "text": "succeeded to his father's throne.[90] The signatories, however, omitted to consult the ruler \nof these lands, and Charles II was passionately opposed to the dismemberment of his \nempire. In 1699, he re-confirmed his 1693 will that named Joseph Ferdinand as his sole \nsuccessor.[91] \n\nSix months later, Joseph Ferdinand died. Therefore, in 1700, Louis and William III \nconcluded a fresh partitioning agreement, the Treaty of London. This allocated Spain, the \nLow Countries, and the Spanish colonies to the Archduke. The Dauphin would receive all \nof Spain's Italian territories.[92] Charles II acknowledged that his empire could only remain \nundivided by bequeathing it entirely to a Frenchman or an Austrian. Under pressure from \nhis German wife, Maria Anna of Neuburg, Charles II named Archduke Charles as his sole \nheir. \n\n\n\n\n\n**Acceptance of the will of Charles II and consequences**\n\nOn his deathbed in 1700, Charles II of Spain \nunexpectedly \nclear \ndemonstration of French military superiority for \nmany decades before this time, the pro-French \nfaction at the court of Spain, and even Pope \nInnocent XII convinced him that France was more likely to preserve his empire intact. He \nthus offered the entire empire to the Dauphin's second son Philip, Duke of Anjou, provided \nit remained undivided. Anjou was not in the direct line of French succession, thus his \naccession would not cause a Franco-Spanish union.[92] If Anjou refused, the throne would \nbe offered to his younger brother Charles, Duke of Berry. If the Duke of Berry declined it, \nit would go to Archduke Charles, then to the distantly related House of Savoy if Charles \ndeclined it.[93] \n\nchanged his will. The \n\nPhilip V of Spain \n\nLouis was confronted with a difficult choice. He could agree to a partition of the Spanish \npossessions and avoid a general war, or accept Charles II's will and alienate much of \nEurope. He may initially have been inclined to abide by the partition treaties, but the \nDauphin's insistence persuaded him otherwise.[94] Moreover, Louis's foreign minister, \nJean-Baptiste Colbert, marquis de Torcy, pointed out that war with the Emperor would \nalmost certainly ensue whether Louis accepted the partition treaties or Charles II's will. He \nemphasised that, should it come to war, William III was unlikely to stand by France since \nhe \"made a treaty to avoid war and did not intend to go to war to implement the treaty\".[91] Indeed, in the event of war, it might be \npreferable to be already in control of the disputed lands. Eventually, therefore, Louis decided to accept Charles II's will. Philip, \nDuke of Anjou, thus became Philip V, King of Spain. \n\nLouis in 1701 \n\nMost European rulers accepted Philip as king, some reluctantly. Depending on one's views of the war's inevitability, Louis acted \nreasonably or arrogantly.[95] He confirmed that Philip V retained his French rights despite his new Spanish position. Admittedly, \nhe may only have been hypothesising a theoretical eventuality and not attempting a Franco-Spanish union. But his actions were \ncertainly not read as disinterested. Moreover, Louis sent troops to the Spanish Netherlands to evict Dutch garrisons and secure \nDutch recognition of Philip V. In 1701, Philip transferred the*asiento*(the right to supply slaves to Spanish colonies) to France, as \na sign of the two nations' growing connections. As tensions mounted, Louis decided to acknowledge James Stuart, the son of \nJames II, as King of England, Scotland and Ireland on the latter's death, infuriating William III. These actions enraged Britain and \nthe Dutch Republic.[96] With the Holy Roman Emperor and the petty German states, they formed another Grand Alliance and \ndeclared war on France in 1702. French diplomacy secured Bavaria, Portugal, and Savoy as Franco-Spanish allies.[97] \n\n**Commencement of fighting**", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia5.pdf" - }, - { - "text": "The French were nevertheless forced to retreat from most of the Dutch Republic, which deeply shocked Louis; he retreated to St \nGermain for a time, where no one, except a few intimates, was allowed to disturb him.[47] French military advantages allowed \nthem however to hold their ground in Alsace and the Spanish Netherlands while retaking Franche-Comté. By 1678, mutual \nexhaustion led to the Treaty of Nijmegen, which was generally settled in France's favour and allowed Louis to intervene in the \nScanian War. Despite the military defeat, his ally Sweden regained much of what it had lost under the 1679 treaties of Saint- \nGermain-en-Laye, Fontainebleau and Lund imposed on Denmark–Norway and Brandenburg.[48] Yet Louis's two primary goals, \nthe destruction of the Dutch Republic and the conquest of the Spanish Netherlands, had failed.[49] \n\nLouis was at the height of his power, but at the cost of uniting his opponents; this increased as he continued his expansion. In \n1679, he dismissed his foreign minister Simon Arnauld, marquis de Pomponne, because he was seen as having compromised too \nmuch with the allies. Louis maintained the strength of his army, but in his next series of territorial claims avoided using military \nforce alone. Rather, he combined it with legal pretexts in his efforts to augment the boundaries of his kingdom. Contemporary \ntreaties were intentionally phrased ambiguously. Louis established the Chambers of Reunion to determine the full extent of his \nrights and obligations under those treaties. \n\nCities and territories, such as Luxembourg and Casale, were prized for their strategic \npositions on the frontier and access to important waterways. Louis also sought \nStrasbourg, an important strategic crossing on the left bank of the Rhine and theretofore \na Free Imperial City of the Holy Roman Empire, annexing it and other territories in \n1681. Although a part of Alsace, Strasbourg was not part of Habsburg-ruled Alsace and \nwas thus not ceded to France in the Peace of Westphalia. \n\n**Silver coin of Louis XIV, dated**\n**1674**\n\n\n\n\n \n \n \n \n [html]\n
Strategy, negative minimally, By nch occupationObverse. The Latin inscription isLVDOVICVS xIIID ( EI ) GRA ( TIA ) (“ LouisReverse. The Latin inscription is rRAN ( cuE ) ET NAVARRAE REX 1674
Size and power c opinion wasXIV, by the grace of God *).(“ King of France j and of Navarre, 1674 ”).
\n\n\n\n**Non-European relations and the colonies**\n\nFrench colonies multiplied in Africa, the Americas, and Asia during Louis's reign, and \nFrench explorers made important discoveries in North America. In 1673, Louis Jolliet and \nJacques Marquette discovered the Mississippi River. In 1682, René-Robert Cavelier, Sieur \nde La Salle, followed the Mississippi to the Gulf of Mexico and claimed the vast \nMississippi basin in Louis's name, calling it*Louisiane*. French trading posts were also \nestablished in India, at Chandernagore and Pondicherry, and in the Indian Ocean at Île \nBourbon. Throughout these regions, Louis and Colbert embarked on an extensive program \nof architecture and urbanism meant to reflect the styles of Versailles and Paris and the \n'gloire' of the realm.[52] \n\nThe Persian embassy to Louis XIV \nsent by Soltan Hoseyn in 1715. \n*Ambassade de Perse auprès de*\n*Louis XIV*, studio of Antoine Coypel.", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia5.pdf" - }, - { - "text": "was persuaded to change his fiscal policy. Though willing enough to tax the nobles, Louis \nfeared the political concessions which they would demand in return. Only towards the \nclose of his reign under the extreme exigency of war, was he able, for the first time in \nFrench history, to impose direct taxes on the aristocracy. This was a step toward equality \nbefore the law and toward sound public finance, though it was predictably diminished by \nconcessions and exemptions won by the insistent efforts of nobles and bourgeois.[35] \n\nLouis and Colbert also had wide-ranging plans to grow French commerce and trade. \nColbert's mercantilist administration established new \nindustries and encouraged \nmanufacturers and inventors, such as the Lyon silk manufacturers and the Gobelins \ntapestry manufactory. He invited manufacturers and artisans from all over Europe to \nFrance, such as Murano glassmakers, Swedish ironworkers, and Dutch shipbuilders. He \naimed to decrease imports while increasing French exports, hence reducing the net outflow \nof precious metals from France. \n\nEngraving of Louis XIV \n\nLouis instituted reforms in military administration through Michel le Tellier and his son \nFrançois-Michel le Tellier, successive Marquis de Louvois. They helped to curb the \nindependent spirit of the nobility, imposing order on them at court and in the army. Gone were the days when generals protracted \nwar at the frontiers while bickering over precedence and ignoring orders from the capital and the larger strategic picture, with the \nold military aristocracy (*noblesse d'épée*, nobility of the sword) monopolizing senior military positions and the higher ranks. \nLouvois modernized the army and reorganised it into a professional, disciplined, well-trained force. He was devoted to the \nsoldiers' material well-being and morale, and even tried to direct campaigns. \n\n\n\n**Relations with the major colonies**\n\nLouis's legal reforms were enacted in his numerous Great Ordinances. Prior to that, France \nwas a patchwork of legal systems, with as many traditional legal regimes as there were \nprovinces, and two co-existing legal systems—customary law in the north and Roman civil \nlaw in the south.[36] The*Grande Ordonnance de Procédure Civile*of 1667, the*Code*\n*Louis*, was a comprehensive legal code imposing a uniform regulation of civil procedure \nthroughout the kingdom. Among other things, it prescribed baptismal, marriage and death \nrecords in the state's registers, not the church's, and it strictly regulated the right of the \n*Parlements*to remonstrate.[37] The*Code Louis*later became the basis for the Napoleonic \ncode, which in turn inspired many modern legal codes. \n\nLouis and his family portrayed as \nRoman gods in a 1670 painting by \nJean Nocret. L to R: Louis's aunt, \nHenriette-Marie; his brother, \nPhilippe, duc d'Orléans; the Duke's \ndaughter, Marie Louise d'Orléans, \nand wife, Henriette-Anne Stuart; the \nQueen-mother, Anne of Austria; \nthree daughters of Gaston \nd'Orléans; Louis XIV; the Dauphin \nLouis; Queen Marie-Thérèse;*la*\n*Grande Mademoiselle*. \n\nOne of Louis's more infamous decrees was the*Grande Ordonnance sur les Colonies*of \n1685, the*Code Noir*(black code). Although it sanctioned slavery, it attempted to humanise \nthe practice by prohibiting the separation of families. Additionally, in the colonies, only \nRoman Catholics could own slaves, and these had to be baptised. \n\nLouis ruled through a number of councils:", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed2.pdf", - "query": "Does nerve transection or crushing affect small afferents within the dorsal root ganglion in the same way?", - "target_page": 5, - "target_passage": "Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) injuries resulted in a rightward shift in population distributions of the cross-sectional area of nucleated, FB-labelled DRG neurons when compared with contralateral DRG, consistent with a loss of small afferents post–nerve injury.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
[ 53 ]
Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000 ; 422 : 172 – 80.
[ 54 ]
Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons : diagnosis and prevention. J Hand Surg Eur Vol 2011 ; 36 : 730 – 4.
[ 55 ]
Uncekin D, Furier A, Islam S, Abdo H, Lonnetterg P, Lox D, Herling - Leffer J, Heaggthon J, Kharchenko O, Kharcherko Pai, Linnansson S, Emfors P : Unbiased classification of sensory neuron types by large - scale single - cell RNA sequencingi
[ 56 ]
Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent awotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997.388 - 307 - 12.
[ 57 ]
Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974 ; 248 : 740 – 43.
[ 58 ]
WangCr, Gx L. PluenY, GengX, Xx, M, YangN, YvLL, BengY, ZhurC, Yang Y, Zhox Y, Gvan X, Luo W, LuG, DongK, YvLG, LanL, TlengZ, Fleolifation of MrgprD by TRP - A1 promotes neuropathic pain, FASEB, J 2019.33 : 1360 – 73.
[ 59 ]
Wang H, Zyka MJ. Mrgprd - expressing polymodal nociceptive neurons imervate most. known classes of substantia gelatinosa neurons. J Neurosoi 2009 ; 29 : 13202 – 9.
[ 60 ]
Wang R, Guo W, Ossipox MH, Vanderah TW, Porreca F, La J. Glial cell line - derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and preventis the expression of experimental neuropathic pa
[ 61 ]
Wang X, Archibald ML, Sitevens K, Baidridge WH, Chauhan BC. Qyan fluorescent protein ( CFP ) expressing cells in the refina of Thy1 - CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010 ; 468 : 110 – 4.
[ 62 ]
Warwick C, Cassidy C, Hachisulia J, Wright MC, Baunbauer HM, Adelman PC, LaskH, Shrahian TO, Ross SE, Koerbe HR, MrgordOre Ineage neurons mediate optogenetic alodynia through an emergent polynaptic circuit, PAN 2021 ; HS2 ; 2120 – 31.
", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "Figure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous \ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN \nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3-mm intervals through the entirety of a 30-mm-thick tissue section. Scale bar 5 \n100 mm. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) \nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov–Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , \n0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG \nvolumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot \ndetection feature. Scale bar 5 100 mm. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov–Smirnov tests of \ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, \nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F2,145 8.26, P 5 0.004; n 5 4 to 5 mice; ˇS´ıd ´ak multiple comparisons tests:**P , 0.01. ANOVA, \nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. \n\n3.3. Spared nerve injury induces a loss of Trpm81 and \ncalcitonin gene-related peptide1 but not myelinated dorsal \nroot ganglion neurons \n\nloss of Trpm81 (cold- \ninduced loss. To investigate potential \nsensitive), calcitonin gene-related peptide1 (CGRP) (peptider- \ngic), and myelinated subpopulations of DRG neurons following \nnerve injury, we applied our FB-labelling approach in Trpm8FlpO; \nRC::FLTG (FlpO-dependent tdTom expression), CalcaCreERT2; \nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP \nmice, respectively (Figs. 4A–D). Trpm8-tdTom was expressed Loss restricted to nonpeptidergic nociceptors would not fully \naccount for the degree of total neuron loss that we observed. \nTherefore, we studied a range of other subpopulations, both \nsmall and large in diameter, for their vulnerability to injury-", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed2.pdf" - }, - { - "text": "December 2024· Volume 165· Number 12 \n\ncell death and apoptosis with more than 10 genes were \nexamined. Filtered count data of expressed and nondifferentially \nexpressed genes were used as a background. \n\n2.8. Dorsal root ganglion culture \n\nobserved 7809 6 153 neurons per DRG; this was not significantly \ndifferent to the number of neurons in the contralateral DRG \n(7917 6 349), whereas cell number approximately halved by \n8 weeks postinjury to 3963 6 410 neurons per DRG (Fig. 1C). \nSeparating analysis into intact vs axotomized afferents revealed \nthat only axotomized afferents were lost, with no difference \nobserved in numbers of intact afferents (Fig. 1D). Between 1 and \n8 weeks after injury, we observed a 61.0 6 7.0% decrease in the \nnumber of GFP1 neurons. This loss of injured afferents resulted \nin a loss of neuron-containing (ie, excluding white matter regions) \nDRG volume (Fig. 1E), but not neuron density (Fig. 1F). Cell loss \npredominantly occurred between 1 and 2 weeks postinjury and \nstabilized after this timepoint. Population distributions of the \ncross-sectional area of nucleated, \ntdTomato-expressing cell \nprofiles were not significantly different at 1 vs 8 weeks post- \nSNItrans, in contrast to GFP-expressing/injured afferents, in which \na loss of a population of small afferents at 8 weeks postinjury was \nobserved (Fig. 1G). \n\nDorsal root ganglia were dissected from MrgDCreERT2;Ai32 and \nCalcaCreERT2;Ai32 mice .1 week after dosing with tamoxifen and \nenzymatically digested at 37˚˚C for 80 minutes in dispase type II \n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington \nBiochemical), as described previously.63 Mechanically dissoci- \nated cells were plated onto laminin/poly-D-lysine (R&D Systems, \nMinneapolis, MN) treated coverslips in complete Neurobasal Plus \nmedium (Neurobasal Plus media supplemented with 2% (vol/vol) \nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic–antimycotic \n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth \nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, \nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor \n(GDNF, PeproTech) were added to the media under some \nconditions. Cytosine b-D-arabinofuranoside (4 mM) was added to \nthe media for 24 hours the day after plating to reduce the \nproliferation of nonneuronal cells. Media was refreshed 3 times \nper week thereafter. Cultures were fixed for 10 minutes at room \ntemperature with 4% paraformaldehyde and subsequently \nprocessed by immunocytochemistry (described earlier). \n\nSNItrans resulted in a mixed population of axotomized and intact \nafferents within the L4 DRG. Therefore, we developed an approach \nto restrict our analysis to axotomized afferents, without relying on \ntransgenic labelling, and used this as a complementary approach to \nconfirm our findings. We injected the neuronal tracer FB into the \nglabrous, tibial innervation territory of both hindpaws 1 week before \ncommon peroneal and tibial transection (SNItrans) or crush (SNIcrush) \nsurgeries (Figs. 2A and B). FastBlue-uptake was complete across \nneurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ \nC84), so this approach allowed us to profile a sample of the \naxotomized afferents. Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) \ninjuries resulted in a rightward shift in population distributions of the \ncross-sectional area of nucleated, FB-labelled DRG neurons when \ncompared with contralateral DRG, consistent with a loss of small \nafferents post–nerve injury.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "Figure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgDChR2-YFP L4 \nDRGs 4 weeks after SNI, contralateral or ipsilateral to injury. Images are projections of optical sections at 3-mm intervals through the entirety of 30-mm-thick tissue \nsections. Scale bars 5 100 mm. (C) Quantification of total number of MrgD-YFP1 cells per L4 DRG 4 weeks after SNI revealed a significant loss in ipsilateral DRG. \nTwo-way RM ANOVA with ˇS´ıd ´ak multiple comparisons tests; Side x Treatment interaction: F1,5 5 9.23, P 5 0.029; n 5 3 mice. (D) The experimental approach \nused to generate data presented in (E–G). (E and F) MrgD-YFP expression and FB labelling in the L4 DRG, 14 days after SNI or crush surgery or contralateral to \ninjury. White boxes represent regions enlarged in (F). Scale bars 5 100 mm (E) or 20 mm (F). (G) The proportion of FB-labelled DRG neurons decreased after spared \nnerve crush injury, and co-labelling is almost completely absent after SNI. Two-way RM ANOVA with ˇS´ıd ´ak multiple comparisons tests; side 3 injury interaction: \nF1,4 5 7.80, P 5 0.049; n 5 3 mice. Posttests:*P , 0.05,**P , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; SNI, spared nerve injury; FB, \nFastBlue; RM, repeated measures.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed2.pdf" - }, - { - "text": "Peripheral nerve injury results in a biased loss of \nsensory neuron subpopulations \nAndrew H. Coopera, Allison M. Barryb, Paschalina Chrysostomidoua, Romane Loligniera, Jinyi Wanga, \nMagdalena Redondo Canalesa, Heather F. Tittertona, David L. Bennettb, Greg A. Weira,*\n\nAbstract \nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability \nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury \nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label \nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared \nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron \nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of \nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) \nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic \nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG \nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and pain. \n\n1. Introduction \n\nDorsal root ganglion (DRG) neurons represent a molecularly \nand functionally heterogeneous population. Under normal \nconditions, \nthe \nsomatosensory nervous system to detect a myriad of sensory \nstimuli that result in the perceptions of touch, temperature, \nitch, and pain. Following nerve injury, physiological changes in \nDRG neurons lead to hyperexcitability,57 which is a key \npathological driver of neuropathic pain.20,63 Concomitant \nmolecular changes in discrete subpopulations also occur, \nand these have recently been comprehensively described in \nsingle-cell37,44 and subpopulation-specific sequencing stud- \nies.3 These studies describe a transient and generalized \nreduction in the expression of subpopulation-specific genes \nfollowing nerve injury.3,37,44 \n\nthis diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - }, - { - "text": "Figure 1. SNItrans induces death of small primary afferent neurons, accompanied by a reduction in volume, not cell density, of the dorsal root ganglion. (A) \nApproach to differentially labelled intact afferents with tdTomato and damaged afferents with GFP after peripheral nerve injury using the AvilFlpO;Atf3CreERT2;RC:: \nFLTG mouse line and schematic of experimental timeline. (B) Representative image of GFP, tdTomato, and NeuN expression in an L4 DRG, 2 weeks after SNItrans. \nScale bars 5 100 mm. (C and D) Stereological quantification of the total number of DRG neurons (C) or number of axotomized and intact neurons (D) in the L4 DRG \n1, 2, 4, and 8 weeks after SNItrans or contralateral (contra) to injury. (C) One-way ANOVA with Tukey posttests; F4,10 5 37.98, P , 0.001. (D) Two-way RM ANOVA; \nTimepoint 3 Color interaction F4,10 5 39.04, P , 0.001, n 5 3 mice; Tukey posttests (between injured groups): †P , 0.05 vs contra, ‡P , 0.05 vs 1-week. (E) \nVolume of DRG-containing cells (ie, excluding white matter tracts) following SNItrans. One-way ANOVA with Tukey posttests; F4,10 5 21.25, P , 0.001, n 5 3. (F) \nNeuronal density within the DRG following SNItrans. One-way ANOVA; F4,10 5 2.77, P 5 0.09, n 5 3. (G) Population distribution of uninjured and injured afferents by \ncross-sectional area, 1 and 8 weeks post-SNItrans. Kolmogorov–Smirnov tests of cumulative distributions; Uninjured: D 5 0.08, P 5 0.18; Injured: D 5 0.32, P , \n0.001; n 5 310 to 427 neurons from 3 mice.*P , 0.05,**P , 0.01,***P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green \nfluorescent protein. \n\nprotein) neurons 28 days after sham surgery or SNItrans (Figs. 3A \nand B). SNItrans, but not sham, resulted in a significant decrease \n(54.0 6 6.6%) in the total number of MrgD-YFP1 neurons in L4 \nDRG (Fig. 3C).", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.9. Statistical analysis \nData are expressed as mean 6 SEM unless otherwise specified, \nand P values of less than 0.05 were considered significant. Power \ncalculations were performed using G*Power 3.1.9.7.15 A \nquantitative Venn diagram was created using BioVenn.25 All \nother statistical analyses were performed in Prism 10 (GraphPad \nSoftware, Inc, Boston, MA) or R using paired t tests or 1- or 2-way \nRM ANOVAs (repeated measures analysis of variance), where \nappropriate. Normality was assessed by the Shapiro–Wilk test. If \nˇS´ıd ´ak or \nthe main analysis of variance effect was significant, \nTukey multiple comparisons tests were performed. To compare \npopulation distributions of soma cross-sectional area or volume, \nKolmogorov–Smirnov tests were performed. \n\nAs a third complementary approach, we applied semiauto- \nmated volumetric analyses of nuclei size following tissue clearing. \nIn this study, whole DRGs were cleared 4 weeks after SNItrans for \nnuclei counting in “complete” tissue (Figs. 2E–H). Nuclei were \nlabelled by TDP-43, in line with the study by West et al.,67 and \nwere quantified using Imaris software (Fig. 2F, Video 1). We \nobserved a slight but significant rightward shift in nuclear spot \nvolume population distribution 4 weeks after SNItrans (Fig. 2G). In \naddition, there was a significant reduction in the number of small \nbut not medium or large nuclear spots, in support of a loss of \nsmall-diameter neuron populations (Fig. 2H). \n\n3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent \n\nTo assess the gross loss of neurons from DRG following nerve \ninjury, we generated the AvilFlpO;Atf3CreERT2;RC::FLTG mouse \nline in which na¨ıve and axotomized sensory neurons were \ndifferentially labelled. In this mouse line, all neurons express \nin the na¨ıve state and switch to \ntdTomato (Flp-dependent) \nexpressing green fluorescent protein (GFP) upon axonal damage \nand concurrent tamoxifen treatment (Flp- and Cre-dependent) \n(Figs. 1A and B). Following pilot experiments to optimize \ntamoxifen dosing regimen, this approach was both highly efficient \nand specific (with the caveat that it was necessary to wait for \nseveral days after nerve injury for Cre-induced GFP expression): \n14 days after SNItrans surgery, GFP was expressed by 99.1 6 \n0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we \nobserved GFP in only 4.6 6 0.7% of contralateral DRG neurons \n(Figs. S2A–D, http://links.lww.com/PAIN/C84). We then used \na stereological approach to quantify the total number of neurons \nin L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNItrans, as \nto injury. One week after SNItrans, we \nwell as contralateral", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "– 31.[ 48 ]Schulte A, Degenbeck J, Aue A, Schinder - Ute M, Schioti F, Schneider M, Monoranu CM, Bishner M, Pharn M, Antonadeis G, Blunn R, Rithnei HL, Human dorsal root ganglia after plexus injury ; elther preservation or loss of the multicellular uni[ 49 ]Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, BlumR, Aus A, Unbiased analysis of the dorsal root ganglion after peripheral nerve injury : ro neuronal loss, no gliosis, but satellite glial cell plasticity, PAIN 2023 ; 164 : 728 -[ 50 ]Shi TuS, Tandrup T, Bergman E, Xu ZOD, Ulthake B, Hiskteit T. Effect of peripheral nerve injury on dorsal root ganglion neurons in the C57 BL / SJ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "Neuronal \nloss has been proposed as a key contributor to poor \nfunctional recovery following nerve injury,54 and biased survival of \ntypes might be expected to contribute to \ndifferent afferent \nmodality-specific sensory deficits. Beyond loss of function, does \nDRG neuron loss contribute to chronic pain, in either an adaptive or \nmaladaptive manner? Intrathecal delivery of GDNF is neuro- \nprotective and reverses the reduction in the number of IB4-binding \nDRG neurons and central terminals seen following transection.5 \nTreatment is concurrently analgesic and abrogates pain-related \nbehaviors.7,60 However, the pleiotropic nature of GDNF makes it \nimpossible to directly attribute the analgesic effects to the reversal \nof neuron loss. Indeed, it is possible that GDNF exerts its effect by \nactions on intact nonpeptidergic nociceptive afferents,52 activation \nof which is known to drive aversive behaviors in the neuropathic \nstate.62 These data leave the contribution of nonpeptidergic \nnociceptor loss to behavior in the GDNF treatment paradigm \nambiguous. Other pharmacological approaches have been found \neffective at reversing a neuronal \nloss in rodent models, but the \nimpact on pain behavior was not studied.21,22 \n\nWhile we made efforts to profile the loss of several molecularly \ndiscrete sensory neuron populations, we acknowledge that not all \nsubtypes were profiled. Furthermore, recent single-cell RNA \nsequencing has given us a more granular appreciation of the \nheterogeneity of sensory neurons.42 Future studies could \nleverage our experimental approach and new transgenic lines \nto characterize the loss of neurons in more detail. Such \nexperiments may be pertinent before embarking on molecular \nor functional profiling of populations post–nerve injury. \n\nRodents develop marked mechanical and thermal hypersen- \nsitivity rapidly following nerve injury and before timepoints at \nwhich neuron loss is observed.10 This lack of a temporal \ncorrelation may suggest a limited contribution to evoked hyper- \nsensitivities. The temporal profile of ongoing tonic pain (eg, pain \naversiveness as measured by condition place preference \nassays26) is less defined and so is its correlation to the timing of \nneuron loss. \n\n4.5. Conclusions \n\nIn sum, we have provided data from multiple complementary \nexperimental approaches to support the hypothesis that DRG \nneurons are lost following nerve injury in mice. We describe \na substantial loss, which is biased towards specific subpopula- \ntions and particularly present in small-diameter nonpeptidergic \nnociceptive neurons. \n\nThere are many anatomical sites within the somatosensory \nnervous system where differential \nloss of sensory neuron \npopulations could impact neurobiology. For example, loss of \ncutaneous afferents may afford more opportunity for plasticity in \nreinnervation patterns, such as collateral sprouting of uninjured or \nsurviving afferents, and the types of nerve endings made by \ndifferent molecular subpopulations.17,27 It also seems likely that the \ndeath of many neurons within a DRG could contribute to the \nexpansion and activation of immune cell types, which are known to \nplay a major role in neuropathic pain.30,69 Finally, under normal \nconditions, peripheral sensory input is integrated into the dorsal \nhorn of the spinal cord by complex interneuron circuitry. Many \nspinal circuits are engaged by convergent input from different \nafferent types.9,41,70 Therefore, selective loss of input from discrete \nafferent types could undoubtedly impact the normal processing of \nremaining afferent signals.34 Experimentally abrogating neuronal \nloss may be a fruitful approach to assess the contribution to \nnervous system plasticity (adaptive or maladaptive) following injury. \nIn this regard, our in vitro readout would be a useful experimental \n\nConflict of interest statement", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed2.pdf" - }, - { - "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2864 \n\n2.2. Spared nerve transection and crush surgeries \nneuron loss after nerve injury and to test the hypothesis that loss is \nnot equally distributed across molecular populations. \n\n2. Methods \n\n2.1. Animals \n\nMice were housed in groups in humidity- and temperature-controlled \nrooms with free access to food and water, on a 12-hour light–dark \ncycle, and with environmental enrichment. Animal procedures were \nperformed under a UK Home Office Project Licence and in \naccordance with the UK Home Office (Scientific Procedures) Act \n(1986). All studies were approved by the Ethical Review Process \nApplications Panel of the University of Glasgow or Oxford and conform \nto the ARRIVE guidelines. Experiments were performed on adult male \nand female mice aged 7 to 16 weeks at the start of the experiments. All \nexperimental cohorts contained a mix of male and female mice, apart \nfrom the cohort of MrgprdCreERT2;Ai32 mice that underwent SNIcrush \nsurgery, which was exclusively female. Details of transgenic lines are \nprovided in Table 1. Tamoxifen was administered by i.p. injection of \n20 mg/mL tamoxifen (Sigma-Aldrich) dissolved in wheat germ oil \n(doses described in Table 1). There were 2 instances where animals \nwere excluded from data analysis: One (cyan fluorescent protein) \nThy1-CFP died of unknown causes not related to the procedure and \nbefore the experimental endpoint, and one MrgDCreERT2;Ai32 \nexhibited no fluorophore expression and was therefore deemed to \nhave been incorrectly genotyped. Group sizes were based on the \nextent of neuronal \nloss 28d following sciatic nerve transection \nidentified by Shi et al.50 Given a 5 0.05, power 5 0.8, and an effect \nsize of 4.81, power analysis projects that a group size of 3 mice would \nbe needed. \n\nSpared nerve injury (transection of the common peroneal and \ntibial branches of \nthe sciatic nerve; SNItrans) and common \nperoneal and tibial crush injury (SNIcrush), in which nerve axons \nwere severed but \nthe epineurium remained intact, were \nperformed as previously described.12 Anesthesia was induced \nwith 3% to 5% isoflurane and then maintained at 1.5% to 2% as \nrequired. Analgesia, consisting of carprofen (10 mg/kg) and \nbuprenorphine (0.05 mg/kg) (Glasgow) or carprofen (5 mg/kg) \nand local bupivacaine (2 mg/kg) (Oxford) was provided perioper- \natively. The left hindpaw was secured with tape in hip abduction, \nand the operative field (lateral surface of the thigh) was shaved. \nOphthalmic ointment was applied to the eyes, and the shaved \narea was swabbed with chlorhexidine solution. A longitudinal \nincision was made in the skin at the lateral mid-thigh. Using blunt \ndissection, an opening was made through the biceps femoris, \nexposing the sciatic nerve and the 3 peripheral branches (sural, \ntibial, and common peroneal nerves). For SNItrans, the common \nperoneal and tibial nerves were ligated using a 6-0 Vicryl suture \n(Ethicon, Raritan, NJ), and a 1- to 2-mm piece distal to the suture \nwas removed using spring scissors. For SNIcrush, the exposed \ntibial and common peroneal nerves were clamped using a pair of \nfine hemostats (Fine Science Tools, Heidelberg, Germany) closed \nleaving the nerve branches intact but \nto their second clip, \ntranslucent. The muscle was closed with one 6-0 Vicryl suture \n(Ethicon), and the skin incision was closed with one 10 mm \nwound clip (Alzet, Cupertino, CA). Animals were monitored daily \nfor self-mutilation, and no animals required sacrifice due to tissue \ndamage.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "legal5_eubiodiversity_cc4.pdf", - "query": "What are the EU's key nature conservation commitments for 2030?", - "target_page": 6, - "target_passage": "1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea area and integrate ecological corridors, as part of a true Trans-European Nature Network. 2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU primary and old-growth forests. 3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "States and the European Environment Agency, will put forward in 2020 criteria and \nguidance for identifying and designating additional areas, including a definition of strict \nprotection, as well as for appropriate management planning. In doing so, it will indicate \nhow other effective area-based conservation measures and greening of cities could \ncontribute to the targets. \n\nThe targets relate to the EU as a whole and could be broken down according to the EU \nbio-geographical regions and sea basins or at a more local level.**Every Member State**\n**will have to do its fair share of the effort**based on objective ecological criteria, \nrecognising that each country has a different quantity and quality of biodiversity. \nParticular focus will be placed on protecting and restoring the tropical and sub-tropical \nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally \nhigh biodiversity value. \n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature \nNetwork, it will be important to set up**ecological corridors**to prevent genetic isolation, \nallow for species migration, and maintain and enhance healthy ecosystems. In this \ncontext, investments in green and blue infrastructure27 and cooperation across borders \namong Member States should be promoted and supported, including through the \nEuropean Territorial Cooperation. \n\nThe Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately.", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "build on the headline ambition to ensure that by 2050**all of the world’s ecosystems are**\n**restored, resilient, and adequately protected.**The world should commit to the net-gain \nprinciple to give nature back more than it takes. As part of this, the world should commit \nto no human-induced extinction of species, at minimum where avoidable. \n\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to \nensure that**Europe's biodiversity will be on the path to recovery by 2030**for the \nbenefit of people, the planet, the climate and our economy, in line with the 2030 Agenda \nfor Sustainable Development and with the objectives of the Paris Agreement on Climate \nChange. It addresses the five main drivers of biodiversity loss, sets out an enhanced \ngovernance framework to fill remaining gaps, ensures the full implementation of EU \nlegislation, and pulls together all existing efforts. This strategy is enterprising and \nincentivising in spirit and action. It reflects the fact that**protecting and restoring nature**\n**will need more than regulation alone**. It will require action by citizens, businesses, \nsocial partners and the research and knowledge community, as well as strong \npartnerships between local, regional, national and European level. This strategy is in line \nwith the ambitions and commitment set out in President von der Leyen’s Political \nGuidelines and in the European Green Deal. \n\nAdopted in the heart of the COVID-19 pandemic, this strategy will also be a central \nelement of the EU’s recovery plan. It will be crucial to prevent and build resilience to \nfuture zoonosis outbreaks and \ninvestment \nto provide \nopportunities for restoring the EU’s economy. \n\nimmediate business and \n\nAll new initiatives and proposals will be underpinned by the Commission’s better \nregulation tools. Based on public consultations and on the identification of the \nenvironmental, social and economic impacts, impact assessments will contribute to \nensuring that all initiatives achieve their objectives in the most effective and least \nburdensome way and live up to a green oath to “do no harm”. \n\n**2. PROTECTING AND RESTORING NATURE IN THE EUROPEAN UNION**\n\nThe EU has legal frameworks, strategies and action plans to protect nature and restore \nhabitats and species. But protection has been incomplete, restoration has been small- \nscale, and the implementation and enforcement of legislation has been insufficient17. \n\nTo put biodiversity on the path to recovery by 2030, we need to step up the protection \nand restoration of nature. This should be done by improving and**widening our network**\n**of protected areas**and by developing an ambitious**EU Nature Restoration Plan**. \n\n**2.1. A coherent network of protected areas**\n\nBiodiversity fares better in protected areas. However, the current network of legally \nprotected areas, including those under strict protection, is not sufficiently large to \nsafeguard biodiversity. Evidence shows that the targets defined under the Convention on \nBiological Diversity are insufficient to adequately protect and restore nature18. Global \n\n17 Mid-term review of the EU Biodiversity Strategy to 2020 (COM(2015) 478 and SWD(2015) 187); \nFitness Check of the EU Nature Legislation (Birds and Habitats Directives) (SWD(2016) 472); Fitness \nCheck of the EU Water Legislation (SWD(2019) 439). \n\n\n \n \n \n \n [html]\n
while scTableTableTableTableTable
", - "page_start": 3, - "page_end": 3, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "**2.2. An EU Nature Restoration Plan: restoring ecosystems across**\n\n**land and sea**\n\nProtecting the nature we have will not be enough to bring nature back into our lives. To \nreverse biodiversity loss, the world needs to be more ambitious on nature restoration. \nWith a**new EU Nature Restoration Plan**, Europe will lead the way. \n\nThe plan will help improve the health of existing and new protected areas, and bring \ndiverse and resilient nature back to all landscapes and ecosystems. This means reducing \npressures on habitats and species, and ensuring all use of ecosystems is sustainable. It \nalso means supporting the recovery of nature, limiting soil sealing and urban sprawl, and \ntackling pollution and invasive alien species. The plan will create jobs, reconcile \neconomic activities with nature growth and help ensure the long-term productivity and \nvalue of our natural capital. \n\n*2.2.1. Strengthening the EU legal framework for nature restoration*\n\nNature restoration is already partially required from the Member States in existing EU \nlegislation28. However,**significant implementation and regulatory gaps hinder**\n**progress**. For instance, there is no requirement for Member States to have biodiversity \nrestoration plans. There are not always clear or binding targets and timelines and no \ndefinition or criteria on restoration or on the sustainable use of ecosystems. There is also \nno requirement to comprehensively map, monitor or assess ecosystem services, health or \nrestoration efforts. These issues are exacerbated by the gaps in implementation that \nprevent the existing legislation from achieving its objectives29. Stronger implementation \nsupport and enforcement is required. To ensure that nature restoration across land and sea \npicks up, increases the EU’s resilience, and contributes to climate change mitigation and \nadaptation as a key nature-based solution, this strategy puts forward two strands of \nactions: \n\n Firstly, and subject to an impact assessment, the Commission will put forward a \nproposal for legally binding**EU nature restoration targets**in 2021 to restore \ndegraded ecosystems, in particular those with the most potential to capture and \nstore carbon and to prevent and reduce the impact of natural disasters. This will \nidentify the conditions in which the targets must be met, as well as the most \neffective measures to reach them. The impact assessment will also look at the \npossibility of an EU-wide methodology to map, assess and achieve good \ncondition of ecosystems so they can deliver benefits such as climate regulation, \nwater regulation, soil health, pollination and disaster prevention and protection. \n\n \n\nIn that context, the Commission will request and support Member States to raise \nthe level of implementation of existing legislation within clear deadlines. It will \nin particular request Member States to ensure**no deterioration in conservation**\n**trends and status**of all protected habitats and species by 203030. In addition, \nMember States will have to ensure that at least 30% of species and habitats not \n\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework \nDirective (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive \n(2008/56/EC). \n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water \n\n\n \n \n \n \n [html]\n
TableTable
TableAlbiological
1.Specifications
", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "policies. In addition, by integrating policy coherence for sustainable development in all \nits policies, the EU will reduce the pressure on biodiversity worldwide. In all of its \ninternational cooperation, the EU should promote sustainable agricultural and fisheries \npractices and actions to protect and restore the world’s forests. Particular attention will \nalso be paid to sustainable water resource management, the restoration of degraded land, \nand the protection and restoration of biodiverse areas with high ecosystem services and \nclimate mitigation potential. A better protection of natural ecosystems, coupled with \nefforts to reduce wildlife trade and consumption, will also help prevent and build up \nresilience to possible future diseases and pandemics. The EU will enhance its support to \nglobal efforts to apply the**One Health approach**83, which recognises the intrinsic \nconnection between human health, animal health and healthy resilient nature. \n\nThe EU will step up support to partner countries across the world to achieve the new \nglobal targets, fight environmental crime, and tackle the drivers of biodiversity loss. In \nAfrica, the EU will launch the**NaturAfrica**initiative to protect wildlife and key \necosystems while offering opportunities in green sectors for local populations. Similar \nprojects will be developed in other regions. The EU will also support the Western \nBalkans and EU Neighbourhood countries in their efforts to protect biodiversity. \n\nIn all of its work, the EU will strengthen the links between**biodiversity protection and**\n**human rights**, gender, health, education, conflict sensitivity, the rights-based approach, \nland tenure and the role of indigenous peoples and local communities. \n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and \ncivil society around the world. For example, in March 2020, the Commission launched \nthe**Global Biodiversity Coalition**of national parks, aquariums, botanic gardens, zoos, \nnatural history and sciencemuseums to help raise awareness around the world on the need \nto protect and nurture biodiversity. The Commission will consider launching or joining \nother High Ambition Coalitions to help develop the post-2020 framework. \n\n**5. CONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and \ncontinuity of human life on Earth. The commitments proposed in this strategy pave the \nway for ambitious and necessary changes – changes that will ensure the wellbeing and \neconomic prosperity of present and future generations in a healthy environment. The \nimplementation of these commitments will take into account the diversity of challenges \nacross sectors, regions and Member States, recognise the need to ensure social justice, \nfairness and inclusiveness in line with the European Pillar of Social Rights, and will \nrequire a sense of responsibility and strong joint efforts from the EU, its Member States, \nstakeholders and citizens. \n\nThe Commission invites the European Parliament and the Council to endorse this \nstrategy ahead of the 15th Conference of the Parties to the Convention on Biological \nDiversity. To ensure full political ownership of this strategy, the Commission will \nsuggest a standing progress point at the Council and at the European Parliament. It will \nreview the strategy by 2024 to assess progress and whether further action is needed to \nmeet its objectives. \n\n\n \n \n \n \n [html]\n
1.
Differentiations
Employees
", - "page_start": 22, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "encouraging cooperation in**education for environmental sustainability**in 2021. This \nwill provide guidance for schools and teachers on how to cooperate and exchange \nexperiences across Member States on biodiversity teaching. The Commission will also \nprovide support materials and facilitate the exchange of good practices in EU networks of \nteacher-training programmes. \n\n**4. THE EUROPEAN UNION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA**\n\nBiodiversity is a priority of the EU’s external action and an integral part of efforts to \nmeet the United Nations Sustainable Development Goals. It will be mainstreamed \nthroughout bilateral and multilateral engagements, through the EU’s ‘Green Deal \ndiplomacy’, and forthcoming green alliances76. The Commission will work closely with \nthe European Parliament and Member States to ensure a high level of EU ambition and \nmobilise all efforts for the good of the world’s biodiversity. \n\n**4.1. Raising the level of ambition and commitment worldwide**\n\nProtecting biodiversity is a global challenge and the next decade will be decisive. Global \nefforts under the United Nations Convention on Biological Diversity have largely been \ninsufficient. Nature cannot afford any half measures or lack of ambition. \n\nIn this spirit, the EU is ready to lead all efforts – working with like-minded partners in**a**\n**high-ambition coalition on biodiversity**– to agree an ambitious new global framework \nfor post-2020 at the upcoming 15th Conference of the Parties to the Convention on \nBiological Diversity. \n\nWith this strategy, the Commission proposes ambitious commitments for the EU to bring \nto the table. The EU should also support governments and stakeholders across the globe \nto significantly step up their ambition and their action. \n\nThe Commission proposes that the EU ensures that the post-2020 global framework \nincludes, at a minimum, the elements outlined below: \n\n Overarching global goals for biodiversity for 2050, in line with the United \nNations 2030 Agenda for Sustainable Development and the vision of ‘living in \nharmony with nature’. The ambition should be that,**by 2050, all of the world’s**\n**ecosystems are restored, resilient, and adequately protected.**The world \nshould commit to the net-gain principle to give nature back more than it takes. \nThe world should commit to no human-induced extinction of species, at \nminimum where avoidable. \n\n Ambitious**global 2030 targets in line with EU commitments**in this strategy. \nThese should clearly address the drivers of biodiversity loss and be specific, \nmeasurable, actionable, relevant and time-bound. \n\n A much**stronger implementation, monitoring and review**process. Parties \nshould revise their National Biodiversity Strategies and Action Plans by the end \nof 2021, or as a minimum, submit national commitments for the most important \ntargets. There should be a**regular review cycle**to look at progress towards the", - "page_start": 19, - "page_end": 19, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "efforts are needed and the EU itself needs to do more and better for nature and build a \ntruly**coherent Trans-European Nature Network**. \n\nEnlarging protected areas is also an economic imperative. Studies on marine systems \nestimate that every euro invested in marine protected areas would generate a return of at \nleast €319. Similarly, the Nature Fitness Check20 showed that the benefits of Natura 2000 \nare valued at between €200-300 billion per year. The investment needs of the network are \nexpected to support as many as 500,000 additional jobs21. \n\nFor the good of our environment and our economy, and to support the EU’s recovery \nfrom the COVID-19 crisis, we need to protect more nature. In this spirit,**at least 30% of**\n**the land and 30% of the sea should be protected in the EU**. This is a minimum of an \nextra 4% for land and 19% for sea areas as compared to today22. The target is fully in line \nwith what is being proposed23 as part of the post-2020 global biodiversity framework \n(see Section 4). \n\nWithin this, there should be specific focus on areas of very high biodiversity value or \npotential. These are the most vulnerable to climate change and should be granted special \ncare in the form of strict protection24. Today, only 3% of land and less than 1% of marine \nareas are strictly protected in the EU. We need to do better to protect these areas. In this \nspirit, at least one third of protected areas – representing**10% of EU land and 10% of**\n**EU sea – should be strictly protected**. This is also in line with the proposed global \nambition. \n\nAs part of this focus on strict protection, it will be crucial to define, map, monitor and \n**strictly protect all the EU’s remaining primary and old-growth forests**25. It will also \nbe important to advocate for the same globally and ensure that EU actions do not result in \ndeforestation in other regions of the world. Primary and old-growth forests are the richest \nforest ecosystems that remove carbon from the atmosphere, while storing significant \ncarbon stocks. Significant areas of other carbon-rich ecosystems, such as peatlands, \ngrasslands, wetlands, mangroves and seagrass meadows should also be strictly protected, \ntaking into account projected shifts in vegetation zones. \n\nMember States will be responsible for designating the additional protected and strictly \nprotected areas26. Designations should either help to complete the Natura 2000 network \nor be under national protection schemes. All protected areas will need to have clearly \ndefined conservation objectives and measures. The Commission, working with Member \n\n19 Brander et al. (2015), The benefits to people of expanding Marine Protected Areas. \n20 Fitness Check of the EU Nature Legislation (SWD(2016) 472). \n21 Member States’ Prioritised Action Frameworks 2020; Mutafoglu et al. (2017), Natura 2000 and Jobs: \nScoping Study. \n\n22 Latest EU-27 statistics (European database of nationally designated protected areas) v. 2019, and \nNatura 2000 dataset ‘end 2018’. Today, 26% of the EU’s land area is already protected, with 18% as \npart of Natura 2000 and 8% under national schemes. Of EU seas, 11% are protected, with 8% in Natura \n2000 and 3% under additional national protection. To note: offshore wind projects will be possible if in \ncompliance with relevant environmental and nature protection legislation. \n23 Zero draft of the post-2020 global biodiversity framework (CBD/WG2020/2/3), available at \nhttps://www.cbd.int/conferences/post2020/wg2020-02/documents. \n24 Strict protection does not necessarily mean the area is not accessible to humans, but leaves natural \n\nprocesses essentially undisturbed to respect the areas’ ecological requirements. \n\n25 https://www.cbd.int/forest/definitions.shtml; Natura 2000 and Forests. \n26 Additional Natura 2000 designations will be implemented with support from EU funds and \nenforcement as appropriate. \n\n4", - "page_start": 4, - "page_end": 4, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "*3.3.2. Investments, pricing and taxation*\n\nTackling biodiversity loss and restoring ecosystems will require significant public and \nprivate investments at national and European level. This will mean making the most of \nall relevant EU programmes and financing instruments. The Commission will strengthen \nits**biodiversity proofing framework**69,*inter alia*by using in an appropriate way the \ncriteria established under the EU taxonomy, to ensure that EU funding supports \nbiodiversity-friendly investments. \n\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and \ngreen infrastructure,**at least €20 billion a year70 should be unlocked for spending on**\n**nature**. This will require mobilising private and public funding at national and EU \nlevel71, including through a range of different programmes in the next long-term EU \nbudget. Moreover, as nature restoration will make a major contribution to climate \nobjectives, a significant proportion of the 25% of the EU budget dedicated to climate \naction will be invested on biodiversity and nature-based solutions. \n\nUnder Invest EU, a dedicated natural-capital and circular-economy initiative will be \nestablished to mobilise at least €10 billion over the next 10 years, based on public/private \nblended finance. Nature and biodiversity is also a priority for the European Green Deal \nInvestment Plan. To help unlock the investment needed, the EU must provide long-term \ncertainty for investors and help embed sustainability in the financial system. The EU \n**sustainable finance taxonomy**will help guide investment towards a green recovery and \nthe deployment of nature-based solutions. In 2021, the Commission will adopt a \ndelegated act under the Taxonomy Regulation72 to establish a common classification of \neconomic activities that substantially contribute to protecting and restoring biodiversity \nand ecosystems. This will be further supported by a**Renewed Sustainable Finance**\n**Strategy**later this year which will help ensure that the financial system contributes to \nmitigating existing and future risks to biodiversity and better reflect how biodiversity \nloss affects companies’ profitability and long-term prospects73. \n\nThe Commission will further promote tax systems and pricing that reflect environmental \ncosts, including biodiversity loss. This should encourage changes in national fiscal \nsystems to shift the tax burden from labour to pollution, under-priced resources, and \nother environmental externalities. The ‘**user pays’ and ‘polluter pays’ principles**have \nto be applied to prevent and correct environmental degradation. \n\nPublic authorities’ purchasing power represents 14% of EU GDP and can serve as a \npowerful driver of demand for the products and services of companies that invest in or \ncontribute to nature-based solutions. To tap into this potential, when proposing further \n\n69 See Common framework and guidance documents for biodiversity proofing of the EU budget. \n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a \nStudy on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data \nsubmitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will \nupdate the estimate, notably based on Member States’ Prioritised Action Frameworks under the \nHabitats Directive. \n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European \nMaritime and Fisheries Fund, LIFE and external action funds. \n\n72 See EU taxonomy for sustainable activities. \n73 World Wildlife Fund (2019), The Nature of Risk – A Framework for Understanding Nature-Related \nRisk to Business. \n\n17", - "page_start": 17, - "page_end": 17, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "principle79 and taking into account the call of the European Parliament80. In parallel, the \nEU will continue to fund research on the impact of deep-sea mining activities and on \nenvironmentally-friendly \ntechnologies. The EU should also advocate for more \ntransparency in international bodies such as the International Seabed Authority. \n\n*4.2.2. Trade policy*\n\n**Trade policy will actively support and be part of the ecological transition**. In this \nspirit, the Commission will ensure full implementation and enforcement of the \nbiodiversity provisions in all trade agreements, including through the EU Chief Trade \nEnforcement Officer. The Commission will better assess the impact of trade agreements \non biodiversity, with follow-up action to strengthen the biodiversity provisions of \nexisting and new agreements if relevant. The Commission will also present in 2021 a \nlegislative proposal and other measures to avoid or minimise the placing of products \nassociated with deforestation or forest degradation on the EU market81, and to promote \nforest-friendly imports and value chains. The Commission will take a number of steps to \n**crack down on illegal wildlife trade**. This trade contributes to the depletion or \nextinction of entire species, is the world’s fourth most lucrative black market and is \nthought to be one of the causes behind the emergence of zoonotic diseases. It is a human, \neconomic and environmental duty to dismantle it. \n\nWith this in mind, the Commission will revise the EU Action Plan against Wildlife \nTrafficking in 2021 and propose a further**tightening of the rules on EU ivory trade**\nlater this year. It will explore a possible revision of the Environmental Crime Directive, \nincluding by looking at expanding its scope and introducing specific provisions for types \nand levels of criminal sanctions. It will consider strengthening the coordinating and \ninvestigative capacities of the European Anti-Fraud Office (OLAF) to work with \nMember States and non-EU countries to prevent illicit trade and the entry of illicit \nproducts into the Single Market. \n\nThe Commission will continue to engage with partner countries to ensure a smooth and \nfair transition, mobilising in particular Aid for Trade to ensure that partners reap the \nbenefits of biodiversity-friendly trade. \n\n*4.2.3. International cooperation, neighbourhood policy and resource*\n\n*mobilisation*\n\nDelivering an ambitious post-2020 global biodiversity framework will require greater \ncooperation with partners, increased support and financing and phasing out of subsidies \nharmful to biodiversity. In the last decade, the EU and its Member States collectively \nupheld their commitment to**double financial flows to developing countries for**\n**biodiversity**82. The EU is ready to continue working with its partners and further \nincrease its support post-2020. This will be part of its work on biodiversity conservation, \nrestoration, sustainable use and mainstreaming in all development and partnership \n\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection \nand shall be based on the precautionary principle. \n\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)). \n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the \nWorld’s Forests (COM(2019) 352). \n\n82 Including international financing where biodiversity is the principal objective and where it is a \nsignificant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States \nfinancial reports submitted to the Convention on Biological Diversity in 2015 and 2018. \n\n21", - "page_start": 21, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "Afforestation, reforestation and tree planting to support biodiversity and ecosystem \nrestoration will be promoted through the CAP Strategic Plans, and the Cohesion Policy \nfunds. The new**European Urban Greening Platform**38 will also facilitate urban tree \nplanting, including under the LIFE programme. \n\nThe share of forest areas covered by management plans should cover all managed public \nforests and an increased number of private forests, and biodiversity-friendly practices \nsuch as closer-to-nature-forestry should continue and be further developed. To support \nthis, the Commission will develop guidelines on biodiversity-friendly afforestation and \nreforestation and closer-to-nature-forestry practices. This will be done in parallel with the \nnew EU Forest Strategy. \n\nTo gain a better picture of the health of European forests, the Commission will work with \nother data providers to further develop the**Forest Information System for Europe**. This \nwill help produce up-to-date assessments of the condition of European forests and link all \nEU forest-data web-platforms. This will also be presented as part of the EU Forest \nStrategy. \n\n*2.2.5. Win-win solutions for energy generation*\n\nDecarbonising the energy system is critical for climate neutrality, as well as for the EU’s \nrecovery from the COVID-19 crisis and long-term prosperity. More sustainably sourced \nrenewable energy will be essential to fight climate change and biodiversity loss. The EU \nwill prioritise solutions such as ocean energy, offshore wind, which also allows for fish \nstock regeneration, solar-panel farms that provide biodiversity-friendly soil cover, and \nsustainable bioenergy. \n\nTo mitigate climate and environmental risks created by the increasing use of certain \nsources for bioenergy, the revised Renewable Energy Directive39 includes strengthened \nsustainability criteria. It also promotes the shift to advanced biofuels based on residues \nand non-reusable and non-recyclable waste. This approach should continue for all forms \nof bioenergy. The use of whole trees and food and feed crops for energy production – \nwhether produced in the EU or imported – should be minimised. \n\nTo better understand and monitor the potential climate and biodiversity risks, the \nCommission is assessing the**EU and global biomass supply and demand**and related \nsustainability40. As part of its increased ambition to protect and restore forest ecosystems, \nthe Commission will publish the results of this work on the use of forest biomass for \nenergy production by the end of 2020. This will inform the Commission’s policy- \nmaking, including the review and revision, where necessary, of the level of ambition of \nthe Renewable Energy Directive, the Emissions Trading Scheme, and the Regulation on \nland use, land use change and forestry (LULUCF) set for 2021. \n\nIn line with the Renewable Energy Directive, the Commission will also develop \noperational guidance in 2021 on the**new sustainability criteria on forest biomass for**", - "page_start": 10, - "page_end": 10, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "**1. BIODIVERSITY – THE NEED FOR URGENT ACTION**\n\nFrom the world’s great rainforests to small parks and gardens, from the blue whale to \nmicroscopic fungi, biodiversity is the extraordinary variety of life on Earth. We humans \nare part of, and fully dependent on, this web of life: it gives us the food we eat, filters the \nwater we drink, and supplies the air we breathe. Nature is as important for our mental and \nphysical wellbeing as it is for our society’s ability to cope with global change, health \nthreats and disasters.**We need nature in our lives**. \n\nHealthy and resilient societies depend on giving nature the space it needs. The recent \nCOVID-19 pandemic makes the need to protect and restore nature all the more urgent. \nThe pandemic is raising awareness of the links between our own health and the health of \necosystems. It is demonstrating the need for sustainable supply chains and consumption \npatterns that do not exceed planetary boundaries. This reflects the fact that the risk of \nemergence and spread of infectious diseases increases as nature is destroyed1. Protecting \nand restoring biodiversity and well-functioning ecosystems is therefore key to**boost our**\n**resilience and prevent the emergence and spread of future diseases**. \n\n**Investing in nature protection and restoration will also be critical for Europe’s**\n**economic recovery from the COVID-19 crisis**. When restarting the economy, it is \ncrucial to avoid falling back and locking ourselves into damaging old habits. The \nEuropean Green Deal – the EU’s growth strategy – will be the compass for our recovery, \nensuring that the economy serves people and society and gives back to nature more than \nit takes away. The**business case for biodiversity**is compelling. Industry and companies \nrely on genes, species, and ecosystem services as critical inputs for production, notably \nfor medicines. Over half of global GDP depends on nature and the services it provides, \nwith three key economic sectors – construction, agriculture, and food and drink – all \nhighly dependent on it2. \n\nBiodiversity conservation has potential direct economic benefits for many sectors of the \neconomy. For example, conserving marine stocks could increase annual profits of the \nseafood industry by more than €49 billion, while protecting coastal wetlands could save \nthe insurance industry around €50 billion annually through reducing flood damage \nlosses3. The overall benefit/cost ratio of an effective global programme for the \nconservation of remaining wild nature worldwide is estimated to be at least 100 to 14. \n**Natural capital investment**, including restoration of carbon-rich habitats and climate- \nfriendly agriculture, is recognised to be among the five most important fiscal recovery \npolicies, which offer high economic multipliers and positive climate impact5. It will be \nimportant for the EU to tap into this potential to ensure prosperity, sustainability and \nresilience in the recovery. \n\n1 Intergovernmental science-policy Plaform for Biodiversity and Ecosystem Services (IPBES) (2019), \nSummary for policymakers of the global assessment report on biodiversity and ecosystem services of \nthe Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services, pp. 12-13, \nA.2. \n2 World Economic Forum (2020), Nature Risk Rising: Why the Crisis Engulfing Nature Matters for \nBusiness and the Economy. \n\n3 Barbier et al. (2018), How to pay for saving biodiversity. \n4 Balmford et al. (2002), Economic reasons for conserving wild nature. \n5 Hepburn et al. (2020), Will COVID-19 fiscal recovery packages accelerate or retard progress on \nclimate change?, Smith School Working Paper 20-02. \n\n1", - "page_start": 1, - "page_end": 1, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "legal5_eubiodiversity_cc4.pdf", - "query": "Was there a biodiversity governance framework in place in the EU before the European Commission's proposal?", - "target_page": 16, - "target_passage": "In the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "9. There is a 50% reduction in the number of Red List species threatened by invasive \n\nalien species. \n\n10. The losses of nutrients from fertilisers are reduced by 50%, resulting in the reduction \n\nofthe use of fertilisers by at least 20%. \n\n11. Cities with at least 20,000 inhabitants have an ambitious Urban Greening Plan. \n12. No chemical pesticides are used in sensitive areas such as EU urban green areas. \n13. The negative impacts on sensitive species and habitats, including on the seabed \nthrough fishing and extraction activities, are substantially reduced to achieve good \nenvironmental status. \n\n14. The by-catch of species is eliminated or reduced to a level that allows species \n\nrecovery and conservation. \n\n**3. ENABLING TRANSFORMATIVE CHANGE**\n\n**3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the \nimplementation of biodiversity commitments agreed at national, European or \ninternational level. To address the gap, the Commission will put in place**a new**\n**European biodiversity governance framework**. This will help map obligations and \ncommitments and set out a roadmap to guide their implementation. \n\nAs part of this new framework, the Commission will put in place a monitoring and \nreview mechanism. This will include a**clear set of agreed indicators**and will enable \nregular progress assessment and set out corrective action if necessary. This mechanism \nwill feed the Environmental Implementation Review and contribute to the European \nSemester. \n\nThe new governance framework will ensure co-responsibility and co-ownership by all \nrelevant actors in meeting the EU’s biodiversity commitments. It will support \nadministrative capacity building, transparency, stakeholder dialogue, and participatory \ngovernance at different levels. \n\nThe Commission will assess the progress and suitability of this approach in 2023, and \nconsider whether a legally binding approach to governance is needed. \n\n**3.2.**\n\n**Stepping up**\n**environmental legislation**\n\n**implementation and enforcement of EU**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the \nlast 30 years, the EU has put in place a solid legislative framework to protect and restore \nits natural capital. However, recent evaluations show that although legislation is fit for \npurpose, implementation on the ground is lagging behind60. This is having dramatic \nconsequences on biodiversity and comes with a substantial economic cost61.**The full**\n**implementation and enforcement of EU environmental legislation is therefore at the**\n**heart of this strategy**, for which political support and financial and human resources \nwill need to be prioritised.", - "page_start": 15, - "page_end": 15, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "encouraging cooperation in**education for environmental sustainability**in 2021. This \nwill provide guidance for schools and teachers on how to cooperate and exchange \nexperiences across Member States on biodiversity teaching. The Commission will also \nprovide support materials and facilitate the exchange of good practices in EU networks of \nteacher-training programmes. \n\n**4. THE EUROPEAN UNION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA**\n\nBiodiversity is a priority of the EU’s external action and an integral part of efforts to \nmeet the United Nations Sustainable Development Goals. It will be mainstreamed \nthroughout bilateral and multilateral engagements, through the EU’s ‘Green Deal \ndiplomacy’, and forthcoming green alliances76. The Commission will work closely with \nthe European Parliament and Member States to ensure a high level of EU ambition and \nmobilise all efforts for the good of the world’s biodiversity. \n\n**4.1. Raising the level of ambition and commitment worldwide**\n\nProtecting biodiversity is a global challenge and the next decade will be decisive. Global \nefforts under the United Nations Convention on Biological Diversity have largely been \ninsufficient. Nature cannot afford any half measures or lack of ambition. \n\nIn this spirit, the EU is ready to lead all efforts – working with like-minded partners in**a**\n**high-ambition coalition on biodiversity**– to agree an ambitious new global framework \nfor post-2020 at the upcoming 15th Conference of the Parties to the Convention on \nBiological Diversity. \n\nWith this strategy, the Commission proposes ambitious commitments for the EU to bring \nto the table. The EU should also support governments and stakeholders across the globe \nto significantly step up their ambition and their action. \n\nThe Commission proposes that the EU ensures that the post-2020 global framework \nincludes, at a minimum, the elements outlined below: \n\n Overarching global goals for biodiversity for 2050, in line with the United \nNations 2030 Agenda for Sustainable Development and the vision of ‘living in \nharmony with nature’. The ambition should be that,**by 2050, all of the world’s**\n**ecosystems are restored, resilient, and adequately protected.**The world \nshould commit to the net-gain principle to give nature back more than it takes. \nThe world should commit to no human-induced extinction of species, at \nminimum where avoidable. \n\n Ambitious**global 2030 targets in line with EU commitments**in this strategy. \nThese should clearly address the drivers of biodiversity loss and be specific, \nmeasurable, actionable, relevant and time-bound. \n\n A much**stronger implementation, monitoring and review**process. Parties \nshould revise their National Biodiversity Strategies and Action Plans by the end \nof 2021, or as a minimum, submit national commitments for the most important \ntargets. There should be a**regular review cycle**to look at progress towards the", - "page_start": 19, - "page_end": 19, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "policies. In addition, by integrating policy coherence for sustainable development in all \nits policies, the EU will reduce the pressure on biodiversity worldwide. In all of its \ninternational cooperation, the EU should promote sustainable agricultural and fisheries \npractices and actions to protect and restore the world’s forests. Particular attention will \nalso be paid to sustainable water resource management, the restoration of degraded land, \nand the protection and restoration of biodiverse areas with high ecosystem services and \nclimate mitigation potential. A better protection of natural ecosystems, coupled with \nefforts to reduce wildlife trade and consumption, will also help prevent and build up \nresilience to possible future diseases and pandemics. The EU will enhance its support to \nglobal efforts to apply the**One Health approach**83, which recognises the intrinsic \nconnection between human health, animal health and healthy resilient nature. \n\nThe EU will step up support to partner countries across the world to achieve the new \nglobal targets, fight environmental crime, and tackle the drivers of biodiversity loss. In \nAfrica, the EU will launch the**NaturAfrica**initiative to protect wildlife and key \necosystems while offering opportunities in green sectors for local populations. Similar \nprojects will be developed in other regions. The EU will also support the Western \nBalkans and EU Neighbourhood countries in their efforts to protect biodiversity. \n\nIn all of its work, the EU will strengthen the links between**biodiversity protection and**\n**human rights**, gender, health, education, conflict sensitivity, the rights-based approach, \nland tenure and the role of indigenous peoples and local communities. \n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and \ncivil society around the world. For example, in March 2020, the Commission launched \nthe**Global Biodiversity Coalition**of national parks, aquariums, botanic gardens, zoos, \nnatural history and sciencemuseums to help raise awareness around the world on the need \nto protect and nurture biodiversity. The Commission will consider launching or joining \nother High Ambition Coalitions to help develop the post-2020 framework. \n\n**5. CONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and \ncontinuity of human life on Earth. The commitments proposed in this strategy pave the \nway for ambitious and necessary changes – changes that will ensure the wellbeing and \neconomic prosperity of present and future generations in a healthy environment. The \nimplementation of these commitments will take into account the diversity of challenges \nacross sectors, regions and Member States, recognise the need to ensure social justice, \nfairness and inclusiveness in line with the European Pillar of Social Rights, and will \nrequire a sense of responsibility and strong joint efforts from the EU, its Member States, \nstakeholders and citizens. \n\nThe Commission invites the European Parliament and the Council to endorse this \nstrategy ahead of the 15th Conference of the Parties to the Convention on Biological \nDiversity. To ensure full political ownership of this strategy, the Commission will \nsuggest a standing progress point at the Council and at the European Parliament. It will \nreview the strategy by 2024 to assess progress and whether further action is needed to \nmeet its objectives. \n\n\n \n \n \n \n [html]\n
1.
Differentiations
Employees
", - "page_start": 22, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "**2.2. An EU Nature Restoration Plan: restoring ecosystems across**\n\n**land and sea**\n\nProtecting the nature we have will not be enough to bring nature back into our lives. To \nreverse biodiversity loss, the world needs to be more ambitious on nature restoration. \nWith a**new EU Nature Restoration Plan**, Europe will lead the way. \n\nThe plan will help improve the health of existing and new protected areas, and bring \ndiverse and resilient nature back to all landscapes and ecosystems. This means reducing \npressures on habitats and species, and ensuring all use of ecosystems is sustainable. It \nalso means supporting the recovery of nature, limiting soil sealing and urban sprawl, and \ntackling pollution and invasive alien species. The plan will create jobs, reconcile \neconomic activities with nature growth and help ensure the long-term productivity and \nvalue of our natural capital. \n\n*2.2.1. Strengthening the EU legal framework for nature restoration*\n\nNature restoration is already partially required from the Member States in existing EU \nlegislation28. However,**significant implementation and regulatory gaps hinder**\n**progress**. For instance, there is no requirement for Member States to have biodiversity \nrestoration plans. There are not always clear or binding targets and timelines and no \ndefinition or criteria on restoration or on the sustainable use of ecosystems. There is also \nno requirement to comprehensively map, monitor or assess ecosystem services, health or \nrestoration efforts. These issues are exacerbated by the gaps in implementation that \nprevent the existing legislation from achieving its objectives29. Stronger implementation \nsupport and enforcement is required. To ensure that nature restoration across land and sea \npicks up, increases the EU’s resilience, and contributes to climate change mitigation and \nadaptation as a key nature-based solution, this strategy puts forward two strands of \nactions: \n\n Firstly, and subject to an impact assessment, the Commission will put forward a \nproposal for legally binding**EU nature restoration targets**in 2021 to restore \ndegraded ecosystems, in particular those with the most potential to capture and \nstore carbon and to prevent and reduce the impact of natural disasters. This will \nidentify the conditions in which the targets must be met, as well as the most \neffective measures to reach them. The impact assessment will also look at the \npossibility of an EU-wide methodology to map, assess and achieve good \ncondition of ecosystems so they can deliver benefits such as climate regulation, \nwater regulation, soil health, pollination and disaster prevention and protection. \n\n \n\nIn that context, the Commission will request and support Member States to raise \nthe level of implementation of existing legislation within clear deadlines. It will \nin particular request Member States to ensure**no deterioration in conservation**\n**trends and status**of all protected habitats and species by 203030. In addition, \nMember States will have to ensure that at least 30% of species and habitats not \n\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework \nDirective (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive \n(2008/56/EC). \n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water \n\n\n \n \n \n \n [html]\n
TableTable
TableAlbiological
1.Specifications
", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "build on the headline ambition to ensure that by 2050**all of the world’s ecosystems are**\n**restored, resilient, and adequately protected.**The world should commit to the net-gain \nprinciple to give nature back more than it takes. As part of this, the world should commit \nto no human-induced extinction of species, at minimum where avoidable. \n\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to \nensure that**Europe's biodiversity will be on the path to recovery by 2030**for the \nbenefit of people, the planet, the climate and our economy, in line with the 2030 Agenda \nfor Sustainable Development and with the objectives of the Paris Agreement on Climate \nChange. It addresses the five main drivers of biodiversity loss, sets out an enhanced \ngovernance framework to fill remaining gaps, ensures the full implementation of EU \nlegislation, and pulls together all existing efforts. This strategy is enterprising and \nincentivising in spirit and action. It reflects the fact that**protecting and restoring nature**\n**will need more than regulation alone**. It will require action by citizens, businesses, \nsocial partners and the research and knowledge community, as well as strong \npartnerships between local, regional, national and European level. This strategy is in line \nwith the ambitions and commitment set out in President von der Leyen’s Political \nGuidelines and in the European Green Deal. \n\nAdopted in the heart of the COVID-19 pandemic, this strategy will also be a central \nelement of the EU’s recovery plan. It will be crucial to prevent and build resilience to \nfuture zoonosis outbreaks and \ninvestment \nto provide \nopportunities for restoring the EU’s economy. \n\nimmediate business and \n\nAll new initiatives and proposals will be underpinned by the Commission’s better \nregulation tools. Based on public consultations and on the identification of the \nenvironmental, social and economic impacts, impact assessments will contribute to \nensuring that all initiatives achieve their objectives in the most effective and least \nburdensome way and live up to a green oath to “do no harm”. \n\n**2. PROTECTING AND RESTORING NATURE IN THE EUROPEAN UNION**\n\nThe EU has legal frameworks, strategies and action plans to protect nature and restore \nhabitats and species. But protection has been incomplete, restoration has been small- \nscale, and the implementation and enforcement of legislation has been insufficient17. \n\nTo put biodiversity on the path to recovery by 2030, we need to step up the protection \nand restoration of nature. This should be done by improving and**widening our network**\n**of protected areas**and by developing an ambitious**EU Nature Restoration Plan**. \n\n**2.1. A coherent network of protected areas**\n\nBiodiversity fares better in protected areas. However, the current network of legally \nprotected areas, including those under strict protection, is not sufficiently large to \nsafeguard biodiversity. Evidence shows that the targets defined under the Convention on \nBiological Diversity are insufficient to adequately protect and restore nature18. Global \n\n17 Mid-term review of the EU Biodiversity Strategy to 2020 (COM(2015) 478 and SWD(2015) 187); \nFitness Check of the EU Nature Legislation (Birds and Habitats Directives) (SWD(2016) 472); Fitness \nCheck of the EU Water Legislation (SWD(2019) 439). \n\n\n \n \n \n \n [html]\n
while scTableTableTableTableTable
", - "page_start": 3, - "page_end": 3, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "principle79 and taking into account the call of the European Parliament80. In parallel, the \nEU will continue to fund research on the impact of deep-sea mining activities and on \nenvironmentally-friendly \ntechnologies. The EU should also advocate for more \ntransparency in international bodies such as the International Seabed Authority. \n\n*4.2.2. Trade policy*\n\n**Trade policy will actively support and be part of the ecological transition**. In this \nspirit, the Commission will ensure full implementation and enforcement of the \nbiodiversity provisions in all trade agreements, including through the EU Chief Trade \nEnforcement Officer. The Commission will better assess the impact of trade agreements \non biodiversity, with follow-up action to strengthen the biodiversity provisions of \nexisting and new agreements if relevant. The Commission will also present in 2021 a \nlegislative proposal and other measures to avoid or minimise the placing of products \nassociated with deforestation or forest degradation on the EU market81, and to promote \nforest-friendly imports and value chains. The Commission will take a number of steps to \n**crack down on illegal wildlife trade**. This trade contributes to the depletion or \nextinction of entire species, is the world’s fourth most lucrative black market and is \nthought to be one of the causes behind the emergence of zoonotic diseases. It is a human, \neconomic and environmental duty to dismantle it. \n\nWith this in mind, the Commission will revise the EU Action Plan against Wildlife \nTrafficking in 2021 and propose a further**tightening of the rules on EU ivory trade**\nlater this year. It will explore a possible revision of the Environmental Crime Directive, \nincluding by looking at expanding its scope and introducing specific provisions for types \nand levels of criminal sanctions. It will consider strengthening the coordinating and \ninvestigative capacities of the European Anti-Fraud Office (OLAF) to work with \nMember States and non-EU countries to prevent illicit trade and the entry of illicit \nproducts into the Single Market. \n\nThe Commission will continue to engage with partner countries to ensure a smooth and \nfair transition, mobilising in particular Aid for Trade to ensure that partners reap the \nbenefits of biodiversity-friendly trade. \n\n*4.2.3. International cooperation, neighbourhood policy and resource*\n\n*mobilisation*\n\nDelivering an ambitious post-2020 global biodiversity framework will require greater \ncooperation with partners, increased support and financing and phasing out of subsidies \nharmful to biodiversity. In the last decade, the EU and its Member States collectively \nupheld their commitment to**double financial flows to developing countries for**\n**biodiversity**82. The EU is ready to continue working with its partners and further \nincrease its support post-2020. This will be part of its work on biodiversity conservation, \nrestoration, sustainable use and mainstreaming in all development and partnership \n\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection \nand shall be based on the precautionary principle. \n\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)). \n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the \nWorld’s Forests (COM(2019) 352). \n\n82 Including international financing where biodiversity is the principal objective and where it is a \nsignificant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States \nfinancial reports submitted to the Convention on Biological Diversity in 2015 and 2018. \n\n21", - "page_start": 21, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "targets, with the ability to ratchet up action if needed. These reviews should be \nbased on an independent, science-based gap-analysis and foresight process, with \ncommon headline indicators for all Parties. \n\n**An enabling framework**to bring the ambition to life, across areas such as \n\nfinance, capacity, research, innovation and technology. \n\n**Fair and equitable sharing of the benefits**from the use of genetic resources \n\nlinked to biodiversity. \n\n**A principle of equality**. This includes respect for the rights and the full and \neffective participation of indigenous peoples and local communities. There should \nbe an inclusive approach with participation of all stakeholders, including women, \nyouth, civil society, local authorities, the private sector, academia and scientific \ninstitutions. \n\n**4.2. Using external action to promote the EU’s ambition**\n\n*4.2.1. International Ocean Governance*\n\nIn line with the International Ocean Governance agenda77, the EU will support the \nconclusion of an ambitious legally binding agreement on**marine biological diversity of**\n**areas beyond national jurisdiction**(BBNJ) by the end of 2020. It must set clear global \nprocedures \nidentifying, designating and effectively managing ecologically \nrepresentative marine protected areas in the high seas. It should be ratified and \nimplemented as quickly as possible. \n\nfor \n\nThe EU should also use all of its diplomatic leverage and outreach capacities to help \nbroker agreement on the designation of three vast**Marine Protected Areas in the**\n**Southern Ocean**78, two of which were co-proposed by the EU in East Antarctica and in \nthe Weddell Sea. If agreed, this would constitute one of the biggest acts of nature \nprotection in history. \n\nWork will continue with partner countries and regional organisations to put in place \nmeasures to protect and sustainably use sensitive maritime ecosystems and species, \nincluding in areas beyond national jurisdiction, with a focus on marine biodiversity \nhotspots. The EU should continue supporting Small Island Developing States and other \nrelevant partner countries to participate in meetings of regional and global organisations \nand bodies, and to implement relevant international commitments and regulations. \n\nThe EU will apply**zero tolerance towards illegal, unreported and unregulated**\n**fishing**and will combat overfishing, including through WTO negotiations on a**global**\n**agreement to ban harmful fisheries subsidies**. \n\nIn international negotiations, the EU should advocate that marine minerals in the \ninternational seabed area cannot be exploited before the**effects of deep-sea mining**on \nthe marine environment, biodiversity and human activities have been sufficiently \nresearched, the risks are understood and the technologies and operational practices are \nable to demonstrate no serious harm to the environment, in line with the precautionary", - "page_start": 20, - "page_end": 20, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "As regards the Birds and Habitats Directives, enforcement will focus on**completing the**\n**Natura 2000 network**, the effective management of all sites, species-protection \nprovisions, and species and habitats that show declining trends. The Commission will \nalso ensure that environment-related legislation with an impact on biodiversity62 is better \nimplemented, enforced and – where necessary – reviewed and revised. \n\nThe Commission will strive to**improve compliance assurance**, working closely with \nMember States and European networks of environmental agencies, inspectors, auditors, \npolice, prosecutors and judges. \n\nIn addition, the Commission will support civil society’s role as a compliance watchdog \nand will engage with Member States to improve access to justice in national courts in \nenvironmental matters for individuals and NGOs. It will also broaden standing for NGOs \nby proposing**a revision of the Aarhus Regulation63**. \n\n**3.3. Building on an integrated and whole-of-society approach**\n\n*3.3.1. Business for biodiversity*\n\nIn the partnership spirit of this strategy, all parts of the economy and society will have to \nplay their role. Industry and business have an impact on nature, but they also produce the \nimportant innovations, partnerships and expertise that can help address biodiversity loss. \n\nTo ensure environmental and social interests are fully embedded into business strategies, \nthe Commission will put forward a new initiative in 2021 on**sustainable corporate**\n**governance**. This initiative, which may take the form of a legislative proposal, will \naddress human rights and environmental duty of care and due diligence across economic \nvalue chains in a proportionate way according to different sizes of entreprises64. This will \nhelp ensure that shareholder and stakeholder interests are fully aligned with the \nobjectives set out in this strategy. In addition, in 2020, the Commission launched a \nreview of the reporting obligations of businesses under the**Non-Financial Reporting**\n**Directive**65, with a view to improving the quality and scope of non-financial disclosures, \nincluding on environmental aspects such as biodiversity. \n\nThrough its existing platforms66, the Commission will help to build a**European**\n**Business for Biodiversity**movement, taking inspiration from recent initiatives67 and \nmaking this movement an integral part of the European Climate Pact. Particular attention \nwill be paid to measures to incentivise and eliminate barriers for the take-up of nature- \nbased solutions, as these can lead to significant business and employment opportunities \nin various sectors68 and are the key to innovation for economic or societal needs that rely \non nature. \n\n62 Such as the Directives on Environmental Impact Assessment (2014/52/EU), on Strategic Environmental \nAssessment (2001/42/EC), on Environmental Liability (2004/35/CE) and on Environmental Crime \n(2008/99/EC). \n\n63 https://ec.europa.eu/environment/aarhus/ \n64 Study on due diligence requirements through the supply chain – Final Report. \n65 Directive 2014/95/EU amending Directive 2013/34/EU as regards disclosure of non-financial and \ndiversity information by certain large undertakings. \n\n66 Such as the EU Business @ Biodiversity Platform (B@B). \n67 See for example Business for Nature or One Planet Business for Biodiversity. \n68 BenDor et al. (2015), Estimating the Size and Impact of the Ecological Restoration Economy. \n\n16", - "page_start": 16, - "page_end": 16, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "*3.3.2. Investments, pricing and taxation*\n\nTackling biodiversity loss and restoring ecosystems will require significant public and \nprivate investments at national and European level. This will mean making the most of \nall relevant EU programmes and financing instruments. The Commission will strengthen \nits**biodiversity proofing framework**69,*inter alia*by using in an appropriate way the \ncriteria established under the EU taxonomy, to ensure that EU funding supports \nbiodiversity-friendly investments. \n\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and \ngreen infrastructure,**at least €20 billion a year70 should be unlocked for spending on**\n**nature**. This will require mobilising private and public funding at national and EU \nlevel71, including through a range of different programmes in the next long-term EU \nbudget. Moreover, as nature restoration will make a major contribution to climate \nobjectives, a significant proportion of the 25% of the EU budget dedicated to climate \naction will be invested on biodiversity and nature-based solutions. \n\nUnder Invest EU, a dedicated natural-capital and circular-economy initiative will be \nestablished to mobilise at least €10 billion over the next 10 years, based on public/private \nblended finance. Nature and biodiversity is also a priority for the European Green Deal \nInvestment Plan. To help unlock the investment needed, the EU must provide long-term \ncertainty for investors and help embed sustainability in the financial system. The EU \n**sustainable finance taxonomy**will help guide investment towards a green recovery and \nthe deployment of nature-based solutions. In 2021, the Commission will adopt a \ndelegated act under the Taxonomy Regulation72 to establish a common classification of \neconomic activities that substantially contribute to protecting and restoring biodiversity \nand ecosystems. This will be further supported by a**Renewed Sustainable Finance**\n**Strategy**later this year which will help ensure that the financial system contributes to \nmitigating existing and future risks to biodiversity and better reflect how biodiversity \nloss affects companies’ profitability and long-term prospects73. \n\nThe Commission will further promote tax systems and pricing that reflect environmental \ncosts, including biodiversity loss. This should encourage changes in national fiscal \nsystems to shift the tax burden from labour to pollution, under-priced resources, and \nother environmental externalities. The ‘**user pays’ and ‘polluter pays’ principles**have \nto be applied to prevent and correct environmental degradation. \n\nPublic authorities’ purchasing power represents 14% of EU GDP and can serve as a \npowerful driver of demand for the products and services of companies that invest in or \ncontribute to nature-based solutions. To tap into this potential, when proposing further \n\n69 See Common framework and guidance documents for biodiversity proofing of the EU budget. \n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a \nStudy on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data \nsubmitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will \nupdate the estimate, notably based on Member States’ Prioritised Action Frameworks under the \nHabitats Directive. \n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European \nMaritime and Fisheries Fund, LIFE and external action funds. \n\n72 See EU taxonomy for sustainable activities. \n73 World Wildlife Fund (2019), The Nature of Risk – A Framework for Understanding Nature-Related \nRisk to Business. \n\n17", - "page_start": 17, - "page_end": 17, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "States and the European Environment Agency, will put forward in 2020 criteria and \nguidance for identifying and designating additional areas, including a definition of strict \nprotection, as well as for appropriate management planning. In doing so, it will indicate \nhow other effective area-based conservation measures and greening of cities could \ncontribute to the targets. \n\nThe targets relate to the EU as a whole and could be broken down according to the EU \nbio-geographical regions and sea basins or at a more local level.**Every Member State**\n**will have to do its fair share of the effort**based on objective ecological criteria, \nrecognising that each country has a different quantity and quality of biodiversity. \nParticular focus will be placed on protecting and restoring the tropical and sub-tropical \nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally \nhigh biodiversity value. \n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature \nNetwork, it will be important to set up**ecological corridors**to prevent genetic isolation, \nallow for species migration, and maintain and enhance healthy ecosystems. In this \ncontext, investments in green and blue infrastructure27 and cooperation across borders \namong Member States should be promoted and supported, including through the \nEuropean Territorial Cooperation. \n\nThe Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately.", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "legal5_eubiodiversity_cc4.pdf", - "query": "What is the EU's tolerance for unauthorised fishing?", - "target_page": 21, - "target_passage": "The EU will apply zero tolerance towards illegal, unreported and unregulated fishing", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**energy**41. It will also review in 2021 the data on biofuels with high indirect land-use \nchange risk and establish a trajectory for their gradual phase out by 2030. \n\nThe overall objective is to ensure that EU regulatory framework on bioenergy is in line \nwith the increased ambition set out in the European Green Deal. \n\n*2.2.6. Restoring the good environmental status of marine ecosystems*\n\n**Restored and properly protected marine ecosystems**bring substantial health, social \nand economic benefits to coastal communities and the EU as a whole. The need for \nstronger action is all the more acute as marine and coastal ecosystem biodiversity loss is \nseverely exacerbated by global warming42. \n\nAchieving good environmental status of marine ecosystems, including through strictly \nprotected areas, must involve the restoration of carbon-rich ecosystems as well as \nimportant fish spawning and nursery areas. Some of today’s sea uses endanger food \nsecurity, fishers’ livelihoods, and the fishery and seafood sectors.**Marine resources**\n**must be harvested sustainably and there must be zero-tolerance for illegal practices**. \nIn this regard, the full implementation of the EU’s Common Fisheries Policy, the Marine \nStrategy Framework Directive and the Birds and Habitats Directives is essential. \n\nThe application of an ecosystem-based management approach under EU legislation43 will \nreduce the adverse impacts of fishing, extraction and other human activities, especially \non sensitive species and seabed habitats. To support this,**national maritime spatial**\n**plans**, which Member States have to deliver in 2021, should aim at covering all maritime \nsectors and activities, as well as area-based conservation-management measures.44 The \nCommission will also propose a**new action plan to conserve fisheries resources and**\n**protect marine ecosystems**by 2021. Where necessary, measures will be introduced to \nlimit the use of fishing gear most harmful to biodiversity, including on the seabed. It will \nalso look at how to reconcile the use of bottom-contacting fishing gear with biodiversity \ngoals, given it is now the most damaging activity to the seabed. This must be done in a \nfair and just way for all. The European Maritime and Fisheries Fund should also support \nthe transition to more selective and less damaging fishing techniques. \n\nHealthy fish stocks are key to the long-term prosperity of fishermen and the health of our \noceans and biodiversity. This makes it all the more important to maintain or reduce \nfishing mortality at or under**Maximum Sustainable Yield levels**. This will help achieve \na healthy population age and size distribution for fish stocks. \n\nThe**by-catch of species threatened with extinction**must also be eliminated or reduced \nto a level that allows full recovery. This should also be the case for those in bad \nconservation status or not in good environmental status. Furthermore, the by-catch of \nother species45 must be eliminated or, where this is not possible, minimised so as not to \n\n41 Article 29 of the EU Renewable Energy Directive 2018/2001. \n42 See for example Intergovernmental Panel on Climate Change (2019), Special Report on the Ocean and \nthe Cryosphere in a Changing Climate. \n43 The Common Fisheries Policy, the Marine Strategy Framework Directive (2008/56/EC) and the \nMaritime Spatial Planning Directive (2014/89/EU). \n\n\n \n \n \n \n [html]\n
TableTable
TableTableMarch 2022 a
ecostParametersSpecifications
", - "page_start": 11, - "page_end": 11, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "targets, with the ability to ratchet up action if needed. These reviews should be \nbased on an independent, science-based gap-analysis and foresight process, with \ncommon headline indicators for all Parties. \n\n**An enabling framework**to bring the ambition to life, across areas such as \n\nfinance, capacity, research, innovation and technology. \n\n**Fair and equitable sharing of the benefits**from the use of genetic resources \n\nlinked to biodiversity. \n\n**A principle of equality**. This includes respect for the rights and the full and \neffective participation of indigenous peoples and local communities. There should \nbe an inclusive approach with participation of all stakeholders, including women, \nyouth, civil society, local authorities, the private sector, academia and scientific \ninstitutions. \n\n**4.2. Using external action to promote the EU’s ambition**\n\n*4.2.1. International Ocean Governance*\n\nIn line with the International Ocean Governance agenda77, the EU will support the \nconclusion of an ambitious legally binding agreement on**marine biological diversity of**\n**areas beyond national jurisdiction**(BBNJ) by the end of 2020. It must set clear global \nprocedures \nidentifying, designating and effectively managing ecologically \nrepresentative marine protected areas in the high seas. It should be ratified and \nimplemented as quickly as possible. \n\nfor \n\nThe EU should also use all of its diplomatic leverage and outreach capacities to help \nbroker agreement on the designation of three vast**Marine Protected Areas in the**\n**Southern Ocean**78, two of which were co-proposed by the EU in East Antarctica and in \nthe Weddell Sea. If agreed, this would constitute one of the biggest acts of nature \nprotection in history. \n\nWork will continue with partner countries and regional organisations to put in place \nmeasures to protect and sustainably use sensitive maritime ecosystems and species, \nincluding in areas beyond national jurisdiction, with a focus on marine biodiversity \nhotspots. The EU should continue supporting Small Island Developing States and other \nrelevant partner countries to participate in meetings of regional and global organisations \nand bodies, and to implement relevant international commitments and regulations. \n\nThe EU will apply**zero tolerance towards illegal, unreported and unregulated**\n**fishing**and will combat overfishing, including through WTO negotiations on a**global**\n**agreement to ban harmful fisheries subsidies**. \n\nIn international negotiations, the EU should advocate that marine minerals in the \ninternational seabed area cannot be exploited before the**effects of deep-sea mining**on \nthe marine environment, biodiversity and human activities have been sufficiently \nresearched, the risks are understood and the technologies and operational practices are \nable to demonstrate no serious harm to the environment, in line with the precautionary", - "page_start": 20, - "page_end": 20, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "threaten their conservation status. To support this, data collection on by-catch for all \nsensitive species needs to be stepped up. \n\nIn addition,**fisheries-management measures**must be established in all marine protected \nareas according to clearly defined conservation objectives and on the basis of the best \navailable scientific advice. \n\n*2.2.7. Restoring freshwater ecosystems*\n\nThe EU’s legal framework on water is ambitious but implementation is lagging behind \nand enforcement must be stepped up46. Greater efforts are needed to**restore freshwater**\n**ecosystems and the natural functions of rivers**in order to achieve the objectives of the \nWater Framework Directive. This can be done by removing or adjusting barriers that \nprevent the passage of migrating fish and improving the flow of water and sediments. To \nhelp make this a reality,**at least 25,000 km of rivers will be restored into free-flowing**\n**rivers by 2030**47 through the removal of primarily obsolete barriers and the restoration of \nfloodplains and wetlands. Technical guidance and support to the Member States to \nidentify sites and help mobilise funding will be provided by the Commission in 2021, in \nconsultation with all relevant authorities48. Member State authorities should review water \nabstraction and impoundment permits to implement ecological flows in order to achieve \ngood status or potential of all surface waters and good status of all groundwater by 2027 \nat the latest, as required by the Water Framework Directive49. To that effect, the \nCommission will provide technical support to Member States on their measures by 2023. \n\nOverall, large-scale river and floodplain restoration investments50 can provide a major \neconomic boost for the restoration sector and for local socioeconomic activities such as \ntourism and recreation. At the same time, these investments can improve water \nregulation, flood protection, nursery habitats for fish, and the removal of nutrient \npollution. \n\n*2.2.8. Greening urban and peri-urban areas*\n\n**Green urban spaces**, from parks and gardens to green roofs and urban farms, provide a \nwide range of benefits for people. They also provide opportunities for businesses and a \nrefuge for nature. They reduce air, water and noise pollution, provide protection from \nflooding, droughts and heat waves, and maintain a connection between humans and \nnature51. \n\nThe recent lockdowns due to the COVID-19 pandemic have shown us the**value of green**\n**urban spaces for our physical and mental wellbeing**. While protection of some urban \n\n46 Fitness Check of the EU Water Legislation (SWD(2019) 439); Evaluation of the Urban Waste Water \nTreatment Directive (SWD(2019) 700). \n47 The target of 25,000 km is based on the Commission’s assessment of what is achievable in the EU by \n2030. \n48 The guidelines will take a wide range of issues into account, including hydropower generation, flood \nmanagement, water supply, agriculture and navigability. \n49 These measures should be planned in the 3rd River Basin Management Plans to be adopted by Member \nStates in 2021, under the Water Framework Directive. \n\n50 Fitness Check of the EU Water Legislation (SWD(2019) 439). \n51 EnRoute project. \n\n12", - "page_start": 12, - "page_end": 12, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "principle79 and taking into account the call of the European Parliament80. In parallel, the \nEU will continue to fund research on the impact of deep-sea mining activities and on \nenvironmentally-friendly \ntechnologies. The EU should also advocate for more \ntransparency in international bodies such as the International Seabed Authority. \n\n*4.2.2. Trade policy*\n\n**Trade policy will actively support and be part of the ecological transition**. In this \nspirit, the Commission will ensure full implementation and enforcement of the \nbiodiversity provisions in all trade agreements, including through the EU Chief Trade \nEnforcement Officer. The Commission will better assess the impact of trade agreements \non biodiversity, with follow-up action to strengthen the biodiversity provisions of \nexisting and new agreements if relevant. The Commission will also present in 2021 a \nlegislative proposal and other measures to avoid or minimise the placing of products \nassociated with deforestation or forest degradation on the EU market81, and to promote \nforest-friendly imports and value chains. The Commission will take a number of steps to \n**crack down on illegal wildlife trade**. This trade contributes to the depletion or \nextinction of entire species, is the world’s fourth most lucrative black market and is \nthought to be one of the causes behind the emergence of zoonotic diseases. It is a human, \neconomic and environmental duty to dismantle it. \n\nWith this in mind, the Commission will revise the EU Action Plan against Wildlife \nTrafficking in 2021 and propose a further**tightening of the rules on EU ivory trade**\nlater this year. It will explore a possible revision of the Environmental Crime Directive, \nincluding by looking at expanding its scope and introducing specific provisions for types \nand levels of criminal sanctions. It will consider strengthening the coordinating and \ninvestigative capacities of the European Anti-Fraud Office (OLAF) to work with \nMember States and non-EU countries to prevent illicit trade and the entry of illicit \nproducts into the Single Market. \n\nThe Commission will continue to engage with partner countries to ensure a smooth and \nfair transition, mobilising in particular Aid for Trade to ensure that partners reap the \nbenefits of biodiversity-friendly trade. \n\n*4.2.3. International cooperation, neighbourhood policy and resource*\n\n*mobilisation*\n\nDelivering an ambitious post-2020 global biodiversity framework will require greater \ncooperation with partners, increased support and financing and phasing out of subsidies \nharmful to biodiversity. In the last decade, the EU and its Member States collectively \nupheld their commitment to**double financial flows to developing countries for**\n**biodiversity**82. The EU is ready to continue working with its partners and further \nincrease its support post-2020. This will be part of its work on biodiversity conservation, \nrestoration, sustainable use and mainstreaming in all development and partnership \n\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection \nand shall be based on the precautionary principle. \n\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)). \n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the \nWorld’s Forests (COM(2019) 352). \n\n82 Including international financing where biodiversity is the principal objective and where it is a \nsignificant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States \nfinancial reports submitted to the Convention on Biological Diversity in 2015 and 2018. \n\n21", - "page_start": 21, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "European Agency for Safety and Health at Work – EU-OSHA \n132", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**2.2. An EU Nature Restoration Plan: restoring ecosystems across**\n\n**land and sea**\n\nProtecting the nature we have will not be enough to bring nature back into our lives. To \nreverse biodiversity loss, the world needs to be more ambitious on nature restoration. \nWith a**new EU Nature Restoration Plan**, Europe will lead the way. \n\nThe plan will help improve the health of existing and new protected areas, and bring \ndiverse and resilient nature back to all landscapes and ecosystems. This means reducing \npressures on habitats and species, and ensuring all use of ecosystems is sustainable. It \nalso means supporting the recovery of nature, limiting soil sealing and urban sprawl, and \ntackling pollution and invasive alien species. The plan will create jobs, reconcile \neconomic activities with nature growth and help ensure the long-term productivity and \nvalue of our natural capital. \n\n*2.2.1. Strengthening the EU legal framework for nature restoration*\n\nNature restoration is already partially required from the Member States in existing EU \nlegislation28. However,**significant implementation and regulatory gaps hinder**\n**progress**. For instance, there is no requirement for Member States to have biodiversity \nrestoration plans. There are not always clear or binding targets and timelines and no \ndefinition or criteria on restoration or on the sustainable use of ecosystems. There is also \nno requirement to comprehensively map, monitor or assess ecosystem services, health or \nrestoration efforts. These issues are exacerbated by the gaps in implementation that \nprevent the existing legislation from achieving its objectives29. Stronger implementation \nsupport and enforcement is required. To ensure that nature restoration across land and sea \npicks up, increases the EU’s resilience, and contributes to climate change mitigation and \nadaptation as a key nature-based solution, this strategy puts forward two strands of \nactions: \n\n Firstly, and subject to an impact assessment, the Commission will put forward a \nproposal for legally binding**EU nature restoration targets**in 2021 to restore \ndegraded ecosystems, in particular those with the most potential to capture and \nstore carbon and to prevent and reduce the impact of natural disasters. This will \nidentify the conditions in which the targets must be met, as well as the most \neffective measures to reach them. The impact assessment will also look at the \npossibility of an EU-wide methodology to map, assess and achieve good \ncondition of ecosystems so they can deliver benefits such as climate regulation, \nwater regulation, soil health, pollination and disaster prevention and protection. \n\n \n\nIn that context, the Commission will request and support Member States to raise \nthe level of implementation of existing legislation within clear deadlines. It will \nin particular request Member States to ensure**no deterioration in conservation**\n**trends and status**of all protected habitats and species by 203030. In addition, \nMember States will have to ensure that at least 30% of species and habitats not \n\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework \nDirective (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive \n(2008/56/EC). \n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water \n\n\n \n \n \n \n [html]\n
TableTable
TableAlbiological
1.Specifications
", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "9. There is a 50% reduction in the number of Red List species threatened by invasive \n\nalien species. \n\n10. The losses of nutrients from fertilisers are reduced by 50%, resulting in the reduction \n\nofthe use of fertilisers by at least 20%. \n\n11. Cities with at least 20,000 inhabitants have an ambitious Urban Greening Plan. \n12. No chemical pesticides are used in sensitive areas such as EU urban green areas. \n13. The negative impacts on sensitive species and habitats, including on the seabed \nthrough fishing and extraction activities, are substantially reduced to achieve good \nenvironmental status. \n\n14. The by-catch of species is eliminated or reduced to a level that allows species \n\nrecovery and conservation. \n\n**3. ENABLING TRANSFORMATIVE CHANGE**\n\n**3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the \nimplementation of biodiversity commitments agreed at national, European or \ninternational level. To address the gap, the Commission will put in place**a new**\n**European biodiversity governance framework**. This will help map obligations and \ncommitments and set out a roadmap to guide their implementation. \n\nAs part of this new framework, the Commission will put in place a monitoring and \nreview mechanism. This will include a**clear set of agreed indicators**and will enable \nregular progress assessment and set out corrective action if necessary. This mechanism \nwill feed the Environmental Implementation Review and contribute to the European \nSemester. \n\nThe new governance framework will ensure co-responsibility and co-ownership by all \nrelevant actors in meeting the EU’s biodiversity commitments. It will support \nadministrative capacity building, transparency, stakeholder dialogue, and participatory \ngovernance at different levels. \n\nThe Commission will assess the progress and suitability of this approach in 2023, and \nconsider whether a legally binding approach to governance is needed. \n\n**3.2.**\n\n**Stepping up**\n**environmental legislation**\n\n**implementation and enforcement of EU**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the \nlast 30 years, the EU has put in place a solid legislative framework to protect and restore \nits natural capital. However, recent evaluations show that although legislation is fit for \npurpose, implementation on the ground is lagging behind60. This is having dramatic \nconsequences on biodiversity and comes with a substantial economic cost61.**The full**\n**implementation and enforcement of EU environmental legislation is therefore at the**\n**heart of this strategy**, for which political support and financial and human resources \nwill need to be prioritised.", - "page_start": 15, - "page_end": 15, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "efforts are needed and the EU itself needs to do more and better for nature and build a \ntruly**coherent Trans-European Nature Network**. \n\nEnlarging protected areas is also an economic imperative. Studies on marine systems \nestimate that every euro invested in marine protected areas would generate a return of at \nleast €319. Similarly, the Nature Fitness Check20 showed that the benefits of Natura 2000 \nare valued at between €200-300 billion per year. The investment needs of the network are \nexpected to support as many as 500,000 additional jobs21. \n\nFor the good of our environment and our economy, and to support the EU’s recovery \nfrom the COVID-19 crisis, we need to protect more nature. In this spirit,**at least 30% of**\n**the land and 30% of the sea should be protected in the EU**. This is a minimum of an \nextra 4% for land and 19% for sea areas as compared to today22. The target is fully in line \nwith what is being proposed23 as part of the post-2020 global biodiversity framework \n(see Section 4). \n\nWithin this, there should be specific focus on areas of very high biodiversity value or \npotential. These are the most vulnerable to climate change and should be granted special \ncare in the form of strict protection24. Today, only 3% of land and less than 1% of marine \nareas are strictly protected in the EU. We need to do better to protect these areas. In this \nspirit, at least one third of protected areas – representing**10% of EU land and 10% of**\n**EU sea – should be strictly protected**. This is also in line with the proposed global \nambition. \n\nAs part of this focus on strict protection, it will be crucial to define, map, monitor and \n**strictly protect all the EU’s remaining primary and old-growth forests**25. It will also \nbe important to advocate for the same globally and ensure that EU actions do not result in \ndeforestation in other regions of the world. Primary and old-growth forests are the richest \nforest ecosystems that remove carbon from the atmosphere, while storing significant \ncarbon stocks. Significant areas of other carbon-rich ecosystems, such as peatlands, \ngrasslands, wetlands, mangroves and seagrass meadows should also be strictly protected, \ntaking into account projected shifts in vegetation zones. \n\nMember States will be responsible for designating the additional protected and strictly \nprotected areas26. Designations should either help to complete the Natura 2000 network \nor be under national protection schemes. All protected areas will need to have clearly \ndefined conservation objectives and measures. The Commission, working with Member \n\n19 Brander et al. (2015), The benefits to people of expanding Marine Protected Areas. \n20 Fitness Check of the EU Nature Legislation (SWD(2016) 472). \n21 Member States’ Prioritised Action Frameworks 2020; Mutafoglu et al. (2017), Natura 2000 and Jobs: \nScoping Study. \n\n22 Latest EU-27 statistics (European database of nationally designated protected areas) v. 2019, and \nNatura 2000 dataset ‘end 2018’. Today, 26% of the EU’s land area is already protected, with 18% as \npart of Natura 2000 and 8% under national schemes. Of EU seas, 11% are protected, with 8% in Natura \n2000 and 3% under additional national protection. To note: offshore wind projects will be possible if in \ncompliance with relevant environmental and nature protection legislation. \n23 Zero draft of the post-2020 global biodiversity framework (CBD/WG2020/2/3), available at \nhttps://www.cbd.int/conferences/post2020/wg2020-02/documents. \n24 Strict protection does not necessarily mean the area is not accessible to humans, but leaves natural \n\nprocesses essentially undisturbed to respect the areas’ ecological requirements. \n\n25 https://www.cbd.int/forest/definitions.shtml; Natura 2000 and Forests. \n26 Additional Natura 2000 designations will be implemented with support from EU funds and \nenforcement as appropriate. \n\n4", - "page_start": 4, - "page_end": 4, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "States and the European Environment Agency, will put forward in 2020 criteria and \nguidance for identifying and designating additional areas, including a definition of strict \nprotection, as well as for appropriate management planning. In doing so, it will indicate \nhow other effective area-based conservation measures and greening of cities could \ncontribute to the targets. \n\nThe targets relate to the EU as a whole and could be broken down according to the EU \nbio-geographical regions and sea basins or at a more local level.**Every Member State**\n**will have to do its fair share of the effort**based on objective ecological criteria, \nrecognising that each country has a different quantity and quality of biodiversity. \nParticular focus will be placed on protecting and restoring the tropical and sub-tropical \nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally \nhigh biodiversity value. \n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature \nNetwork, it will be important to set up**ecological corridors**to prevent genetic isolation, \nallow for species migration, and maintain and enhance healthy ecosystems. In this \ncontext, investments in green and blue infrastructure27 and cooperation across borders \namong Member States should be promoted and supported, including through the \nEuropean Territorial Cooperation. \n\nThe Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately.", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "*453 European Centre for Disease Prevention and Control, https://www.ecdc.europa.eu/en*\n454 European Maritime Safety Agency EMSA (http://www.emsa.europa.eu/ ), Section on Safety and Security \nhttp://www.emsa.europa.eu/we-do/safety.html \n455 Fundamental Rights Agency FRA, https://fra.europa.eu/en, Section on ‘Trafficking and labour exploitation, e.g \nthe report from June 2021 titled: Protecting migrants in an irregular situation from labour exploitation – Role of the \nEmployers Sanctions Directive \n456 European Monitoring Centre for Drugs and Drug Addiction EMCDDA (https://www.emcdda.europa.eu/), \nSection ‘Best practice’, Policy and practice briefings: Work places, https://www.emcdda.europa.eu/best- \npractice/briefings/workplace_en \nQuite unknown and difficult to estimate: between one and nine percent of the employees take so-called neuro \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n158", - "page_start": 157, - "page_end": 157, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_SMFG_2011.pdf", - "query": "What are the missions of the Sumitomo Mitsui Financial Group?", - "target_page": 7, - "target_passage": "• To provide optimum added value to our customers and together with them achieve growth • To create sustainable shareholder value through business growth• To create sustainable shareholder value through business growth • To provide a challenging and professionally rewarding work environment for our dedicated employees• To provide a challenging and professionally rewarding work environment for our dedicated employee", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Corporate Outline (as of September 30, 2011)** **Editorial Policy**\n\nCompany Name Sumitomo Mitsui Financial Group, Inc. This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group :: \n\nBusiness Description Management of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of \n: is fulfilling as we work to create a sustainable society. \n\nnon-bank subsidiaries, as well as the performance of ancillary functions \nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is \n\nEstablished December 2, 2002 \n: \nthe essence of business itself, and our initiatives act upon this. \n\nHead Office 1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan \n: \nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s \nChairman of the Board Masayuki Oku \n: \nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report \nPresident Koichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) \n: \n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR \nCapital ¥2,337.8 billion \n: \nactivities and statistical data omitted in the CSR Report 2011 (digest version). \nStock Exchange Listings Tokyo Stock Exchange (First Section) \n: \nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in \nOsaka Securities Exchange (First Section) \nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand \nNagoya Stock Exchange (First Section) \nour CSR and other activities in greater detail. \nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange. \n\nFrom the current fiscal year, we are including third-party opinions in the website version. \n\n**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service \n\n**Scope of this Report**\n\n(cid:129) Sumitomo Mitsui Financial Group, Inc. \n\n(cid:129) Sumitomo Mitsui Banking Corporation \n\n(cid:129) SMFG Card & Credit, Inc. \n\n(cid:129) Sumitomo Mitsui Card Company, Limited \n\n(cid:129) Cedyna Financial Corporation \n\n(cid:129) Sumitomo Mitsui Finance and Leasing Co., Ltd. \n\n(cid:129) The Japan Research Institute, Limited \n\n(cid:129) SMBC Friend Securities Co., Ltd. \n\n(cid:129) SMBC Nikko Securities Inc. \n\n(cid:129) THE MINATO BANK, LTD. \n\n(cid:129) Kansai Urban Banking Corporation \n\n(cid:129) Other Group companies \n\nCompany name abbreviations and other special terminology \n\nThroughout this report,**“Sumitomo Mitsui Financial Group”**or**“SMFG”**refers to the holding company alone.**“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates. \n\n\n\n**Reference guidelines**\nGlobal Reporting Initiative (GRI) Sustainability Reporting Guidelines 2006 (G3) \n\n*Global Reporting Initiative (GRI): Established as an international standard for sustainability reporting, compilers set up an international \norganization (GRI) in 1997 to encourage its adoption worldwide. \n\n**CSR disclosure**\n**through**\n**specific examples**\n\n**CSR report 2011 (digest version)**\n\nCovers CSR baselines and CSR activities at SMFG and its Group companies, \nCovers CSR baselines and CSR activities at SMFG and its Group companies, \ncentered on specific examples \ncentered on specific examples \n\n**CSR report 2011**\n**(digest version with examples of activities and**\n**statistical performance, online PDF file)**", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "i \nt \no \nm \no \nM \n\nL \nt \nd \n. \n\nL \nm \ni \n\ni \nt \ne \nd i \nt \ns \nu \ni \n\nL \nt \nd \n. \n\nF \nn \na \nn \nc \ne \n\ni \nI \nn \nc \n. \n\n**SMFG CSR promotion structure**\n\n**Group CSR Committee**\n\n**Chairman**: Director in charge of SMFG \nCorporate Planning Department \n**Committee members**: General Managers of SMFG, \nSumitomo Mitsui Banking Corporation, \nSMFG Card & Credit, Sumitomo Mitsui Card, \nCedyna, Sumitomo Mitsui Finance and Leasing, \nThe Japan Research Institute, \nSMBC Friend Securities, SMBC Nikko Securities, \nTHE MINATO BANK and \nKansai Urban Banking Corporation \n**Administered by**: Group CSR Department of SMFG \n**Strategic advisor**: \nJRI Center for the Strategy of Emergence \nB \na \nn \nk \nn \ng \nC \no \nr \np \no \nr \na \nt \ni \no \nn \n\nS \nu \nm \n\ni \nt \no \nm \no \nM \n\ni \n\nWe intend to be a financial services group that contributes to the healthy development \nWe intend to be a financial services group that contributes to the healthy development \nof society. For this purpose, we recognize the importance of our mission to serve as a \nof society. For this purpose, we recognize the importance of our mission to serve as a \ncrucial part of the public infrastructure and also our social responsibilities. With such \ncrucial part of the public infrastructure and also our social responsibilities. With such \nrecognition, we under take business operations that contribute to the steady \nrecognition, we under take business operations that contribute to the steady \ndevelopment of Japan and the rest of the world, and endeavor, as a good corporate \ndevelopment of Japan and the rest of the world, and endeavor, as a good corporate \ncitizen, to make a positive contribution to society. \ncitizen, to make a positive contribution to society. \n\ni \nt \ns \nu \n\n3.**Contributing to**\n\ni \n\n**CSR Liaison Committee**\n**Social Development**\n\n4.**Free and Active**\n\nWe intend to be a financial services group for which all officers and employees work \nWe intend to be a financial services group for which all officers and employees work \nwith pride and commitment. For this purpose, we respect people and develop \nwith pride and commitment. For this purpose, we respect people and develop \nemployees with extensive professional knowledge and capabilities, thereby creating a \nemployees with extensive professional knowledge and capabilities, thereby creating a \nfree and active business environment. \nfree and active business environment. \n\n**Business Environment**\n\n5.**Compliance**\n\nWe intend to be a financial services group that always keeps in mind the importance of \nWe intend to be a financial services group that always keeps in mind the importance of \ncompliance. For this purpose, we reflect our awareness of Business Ethics in our business \ncompliance. For this purpose, we reflect our awareness of Business Ethics in our business \nactivities at all times. In addition, we respond promptly to directives from auditors and \nactivities at all times. In addition, we respond promptly to directives from auditors and \ninspectors. Through these actions, we observe all laws and regulations, and uphold moral \ninspectors. Through these actions, we observe all laws and regulations, and uphold moral \nstandards in our business practices. \nstandards in our business practices. \n\n**Participation in global initiatives**\n\nRecent years have seen a growing range of international initiatives to deal with threats to the sustainability of the global environment. \nRecent years have seen a growing range of international initiatives to deal with threats to the sustainability of the global environment. \nAs a global citizen, the SMFG Group, mindful of its societal influence as a financial institution, follows the guidelines and principles of \nAs a global citizen, the SMFG Group, mindful of its societal influence as a financial institution, follows the guidelines and principles of \nthe following initiatives and organizations: \nthe following initiatives and organizations:", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n**Keeping**\n**our shareholders**\n**informed**\n\nSpecific Examples of CSR Activities \n\n**Together with Our Shareholders**\n**and Markets**\n\nWebsite \n\nAnnual report \n\n**Contributing to the development of sounder financial markets**\n\nSRI Indexes on which SMFG is listed Examples of Group disclosure activities \n\nQuarterly and interim financial reports, \nQuarterly and interim financial reports, \n\nresults announcements, securities \nresults announcements, securities \n\nreports, legal disclosure statements, \nreports, legal disclosure statements, \n\nregular publications, etc. \nregular publications, etc. \n\nWe believe that the SMFG Group can contribute \nWe believe that the SMFG Group can contribute \nAnnual and interim reports (in Japanese \nAnnual and interim reports (in Japanese \nfurther to the creation of a sustainable society \nfurther to the creation of a sustainable society \nand English) \nand English) \n\n\n\nBased on this approach, SMFG goes \nBased on this approach, SMFG goes \n\n**We aim to further**\n**strengthen communication**\n**with our shareholders**\n**and investors**\n\nbeyond legal requirements in enriching its \nbeyond legal requirements in enriching its \n\ndisclosure of information on management \ndisclosure of information on management \n\npolicy and operational strategy. These \npolicy and operational strategy. These \n\ninitiatives have won the support of many \ninitiatives have won the support of many \n\nmarket participants. We were selected as \nmarket participants. We were selected as \n\nSMFG is committed to ensuring financial \nSMFG is committed to ensuring financial a winner of the Awards for Excellence in \na winner of the Awards for Excellence in \n\nsoundness through appropriate policy-making \nsoundness through appropriate policy-making Corporate Disclosure for fiscal 2011 by The \nCorporate Disclosure for fiscal 2011 by The \n\nand business operations. At the same time, \nand business operations. At the same time, Securities Analysts Association of Japan. \nSecurities Analysts Association of Japan. \n\nwe disclose corporate information in a \nwe disclose corporate information in a \n\ntimely and precise way to shareholders and \ntimely and precise way to shareholders and \n\ncompanies’ corporate social responsibility \ncompanies’ corporate social responsibility \n\n**Together with our investors:**\n**Creating a platform for**\n**social contribution through**\n**the financial markets**\n\nactivities, and uses the information it gathers \nactivities, and uses the information it gathers \n\nto create a basic file on companies managing \nto create a basic file on companies managing \n\nsocially responsible investment funds*3*3. \nsocially responsible investment fund \n\n**SMFG has listed**\n**its shares on SRI indexes**\n\nthrough its activities in financial markets. \nthrough its activities in financial markets. \n\nFor example, SMBC Friend Securities markets \nFor example, SMBC Friend Securities markets SRI indexes are for socially responsible \nSRI indexes are for socially responsible \n\n while \n“Environmental Sustainability Bond”*1*1 while \n“Environmental Sustainability Bond” investments in which major investment \ninvestments in which major investment \n\nSMBC Nikko Securities markets “WB Green \nSMBC Nikko Securities markets “WB Green decisions are based on environmental and \ndecisions are based on environmental and \n\n. These are bonds \nBonds (Green Bonds)”*2*2. These are bonds \nBonds (Green Bonds)” social factors as well as the target company’s s \nsocial factors as well as the target company \n\n\n\n\n\nmarkets. We believe full disclosure not only \nmarkets. We believe full disclosure not only \n\nhelps foster a more correct understanding \nhelps foster a more correct understanding \n\nand evaluation of the Group, but also \nand evaluation of the Group, but also \n\ncontributes to the development of sounder \ncontributes to the development of sounder", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "financial institutions in the disaster-affected areas \nfinancial institutions in the disaster-affected areas \n\n\n\n\n\n\n\n\n\n\nAnd today \nAnd today Besshi copper mine in the Meiji era \nBesshi copper mine in the Meiji era \n\nMitsui Charity Hospital at its establishment \nMitsui Charity Hospital at its establishment \n\n\n\n**Creating systems for sustainability**\n\n**Environmental measures**\n\nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \n\nleverage its role as a leading financial services group. This is a priority field for the future. \nleverage its role as a leading financial services group. This is a priority field for the future. \n\nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \n\nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \n\ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \n\ntechnological breakthroughs, with a particular focus on the Asian region. \ntechnological breakthroughs, with a particular focus on the Asian region. \n\n\n\n**Further measures needed**\n\n\n\n\n\n**Symbiosis and diversity**\n\n**Global challenges**\n\nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \n\noperations both in Japan and overseas. Initiatives include aggressive development of advisory \noperations both in Japan and overseas. Initiatives include aggressive development of advisory \n\nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \n\nas well as contributions to the international community and the environmental business, chiefly \nas well as contributions to the international community and the environmental business, chiefly \n\nthrough branches and representative offices overseas. \nthrough branches and representative offices overseas. \n\nWe will continue to discuss and review various approaches to issues facing the international \nWe will continue to discuss and review various approaches to issues facing the international \n\ncommunity so as to build up trust internationally as a global player. \ncommunity so as to build up trust internationally as a global player. \n\n**Further measures needed**\n\nShare expertise in corporate social responsibility \nShare expertise in corporate social responsibility ● \n\nwith the international community \nwith the international community \n\nImprove financial services in preparation for the \nImprove financial services in preparation for the ● \n\nglobalization of operations in Japan (multilingual \nglobalization of operations in Japan (multilingual \n\nsupport) \nsupport) \n\nPromote diversity \nPromote diversity ● \n\nIn the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**Social Contribution Activities**\n\n**1**\n★★ \n\n**Helping build prosperity**\n**in Asia and the world**\n\n**7** **8**\n★★ \n\n**2**\n★★ \n\n★★ \n\n★★ \n**3**\n**4**\n★★ \n★★ \n**10**\n★★ \n★★ \n**5**\n★★ \n★★ \n★★ \n\nThe SMFG Group is engaged in a range of activities \nThe SMFG Group is engaged in a range of activities \n\nthat contribute to development at both the regional \nthat contribute to development at both the regional \n\nand international level. In addition to overseas units’ \nand international level. In addition to overseas units’ \n\nindependent initiatives, which are geared to host \nindependent initiatives, which are geared to host \n\ncountry issues and characteristics, the Group supports \ncountry issues and characteristics, the Group supports \n\nprojects that have contributed to achievement of the \nprojects that have contributed to achievement of the \n\nUnited Nations’ global Millennium Development Goals, \nUnited Nations’ global Millennium Development Goals, \n\nsuch as poverty eradication, health improvement and \nsuch as poverty eradication, health improvement and \n\nstatus improvement for education and women in \nstatus improvement for education and women in \n\ndeveloping countries. Our support takes the form of \ndeveloping countries. Our support takes the form of \n\ndonations to non-profit and non-governmental \ndonations to non-profit and non-governmental \n\norganizations, through the employee volunteer fund. \norganizations, through the employee volunteer fund. \n\n(The map shows areas where fund money is used, \n(The map shows areas where fund money is used, \n\n**Europe**\n**7**\n\n**Donations to charity groups**\n\nEmployees of Sumitomo Mitsui Banking Corporation Europe \nEmployees of Sumitomo Mitsui Banking Corporation Europe \n(SMBCE) conducted volunteer activities in their time off. \n(SMBCE) conducted volunteer activities in their time off. \nSMBCE contributes to charitable organizations through an \nSMBCE contributes to charitable organizations through an \nin-house fund and also uses a matching gifts program under \nin-house fund and also uses a matching gifts program under \nwhich it donates a \nwhich it donates a \ncertain amount for \ncertain amount for \nevery donation made \nevery donation made \nby its employees. \nby its employees. \n\n**The United States**\n**10**\n\n**SMBC GLOBAL FOUNDATION**\n\nBased in the United States, SMBC Global Foundation has \nBased in the United States, SMBC Global Foundation has \nprovided scholarships to more than 5,000 university students \nprovided scholarships to more than 5,000 university students \nin Asian countries since its establishment in 1994. In the \nin Asian countries since its establishment in 1994. In the \nUnited States, it supports educational trips to Japan \nUnited States, it supports educational trips to Japan \norganized by a high school located in Harlem, New York City, \norganized by a high school located in Harlem, New York City, \nand volunteer employees of SMBC and JRI to participate in \nand volunteer employees of SMBC and JRI to participate in \nschool beautification programs. The foundation also provides \nschool beautification programs. The foundation also provides \nmatching gifts for SMBC employees. \nmatching gifts for SMBC employees. \n\n\n\n\n\n\n\n**6**\n\nMiddle East & Asia \n★★ \n\n symbol). Please see our website for \nmarked with a ★ symbol). Please see our website for \nmarked with a \nmore details. \nmore details. \n**South Korea** **Vietnam**\n**1** **4**\n\n**Support for a South Korean students’**\n**Japanese-language theater competition**\nAs a way of increasing understanding of Japanese culture, \nAs a way of increasing understanding of Japanese culture, \nSMBC \ns Seoul Branch donates funds to make possible the \nSMBC’s Seoul Branch donates funds to make possible the \nholding of a competition \nholding of a competition \ninvolving theatrical perfor- \ninvolving theatrical perfor \nmances in the Japanese \nmances in the Japanese \nlanguage by South Korean \nlanguage by South Korean \nstudents of Japanese. \nstudents of Japanese.", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "and evaluation of the Group, but also \nand evaluation of the Group, but also \n\ncontributes to the development of sounder \ncontributes to the development of sounder \n\nShareholders’ meeting \n materials financial markets. \nfinancial markets. \n\nfor fund procurement that are also intended \nfor fund procurement that are also intended \n\nas tools for contributing to protecting and \nas tools for contributing to protecting and \n\nconserving the global environment. For \nconserving the global environment. For \n\ncustomers who wish to invest in companies \ncustomers who wish to invest in companies \n\nthat contribute to a sustainable society, \nthat contribute to a sustainable society, \n\nwe offer a wide range of socially responsible \nwe offer a wide range of socially responsible \n\ninvestment vehicles. \ninvestment vehicles. \n\nJapan Research Institute analyzes applicant \nTheThe Japan Research Institute analyzes applicant \n\nfinancial standing. SMFG \nfinancial standing. s proactive corporate \nSMFG’s proactive corporate \n\nsocial responsibility activities have won \nsocial responsibility activities have won \n\nplaudits from the markets. As the right-hand \nplaudits from the markets. As the right-hand \n\ngraphic shows, SMFG is listed on globally \ngraphic shows, SMFG is listed on globally \n\neading SRI indexes. We believe that this is \nleading SRI indexes. We believe that this is \n\nan endorsement by the market of the Group’s s \nan endorsement by the market of the Grou \n\nfuture corporate social responsibility \nfuture corporate social responsibility \n\nactivities. \nactivities. \n\nInvestor briefings twice a year \nInvestor briefings twice a year \n\nDow Jones Sustainability Asia/Pacific Index \n(DJSI Asia Pacific) \nDow Jones Sustainability Asia/Pacific 40 Index \n(DJSI Asia Pacific 40) \nFTSE4Good Global Index \nFTSE4Good Global 100 Index \nESI(Ethibel Sustainability Index) Excellence Global \n\n・ \n\n・ \n\n・ \n・ \n・ \n\nDow Jones Sustainability Index \nThis index was jointly developed by Dow Jones of the \nUnited States, and the Swiss SRI research company \nSAM Group. It was the first SRI index in the world. \nFTSE 4 Good Global Index Series \nThe FTSE 4 Good Global Index Series was created by \nFTSE International Limited, a joint venture set up by \nthe Financial Times newspaper of the United Kingdom \nand the London Stock Exchange. \nEthibel Sustainability Index \nAn index compiled by the Belgian SRI company Ethibel \n\n■ \n\n**Listing on the New York**\n**Stock Exchange**\n\n*1 In December 2010, SMBC Friend Securities sold a total of AUD25 million in “Environmental Sustainability Bond.” \n*2 This fund is provided by SMBC Nikko Securities under the full name Bond for Contributing to Environmental Protection. \n*3 As of the end of June 2011, approximately ¥63.5 billion in total had been invested in nine publicly offered socially responsible investment (SRI) trust funds. \n\n\n\n\n\n\n\n\n\n\n\n\n\nIn November 2010, the Sumitomo Mitsui \nIn November 2010, the Sumitomo Mitsui \n\nFinancial Group listed on the New York \nFinancial Group listed on the New York \n\nStock Exchange. This move, we believe, not \nStock Exchange. This move, we believe, not \n\nonly significantly increases convenience for \nonly significantly increases convenience for \n\nour overseas shareholders and investors, \nour overseas shareholders and investors, \n\nbut also broadens our customer base as it \nbut also broadens our customer base as it \n\nfurther increases the transparency of our \nfurther increases the transparency of our \n\nfinancial position. Listing on the New York \nfinancial position. Listing on the New York \n\nStock Exchange as a socially responsible \nStock Exchange as a socially responsible \n\ncorporation accelerates our evolution into a \ncorporation accelerates our evolution into a \n\nglobal player. \nglobal player.", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "As one of Japa \ns leading financial services groups, \nAs one of Japan’s leading financial services groups, \nthe SMFG Group is taking the lead in aggressively addressing the four priority issues \nthe SMFG Group is taking the lead in aggressively addressing the four priority issues \nwe have identified as significantly impacting the nation. \nwe have identified as significantly impacting the nation. \n**Priority Issues for Us**\n\n\n\n**Ensuring peace of mind for the future**\n\n**Shrinking and aging population**\n\n\n\n**Measures for Japan’s regeneration**\n\n**Reconstruction**\n**after the earthquake**\n**and tsunami**\nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create \nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create \n\nframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle \nframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle \n\nplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound \nplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound The March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power \nThe March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power \n\nbalance between work and care needs, given that many group employees will later need to nurse ailing relatives. \nbalance between work and care needs, given that many group employees will later need to nurse ailing relatives. generation capacity and severed manufacturing supply chains across the nation. This was in addition \ngeneration capacity and severed manufacturing supply chains across the nation. This was in addition \n\nto the severe damage sustained by agriculture and fisheries in the Northeast. \nto the severe damage sustained by agriculture and fisheries in the Northeast. *Estimates by the Statistics Bureau, Ministry of Internal Affairs and Communications (October 1, 2011) \n\nThe disaster also threw into relief many social issues facing the nation. By leveraging our role as \nThe disaster also threw into relief many social issues facing the nation. By leveraging our role as \n\n**Further measures needed**\na leading financial services group, we are committing our full range of resources to dealing with the \na leading financial services group, we are committing our full range of resources to dealing with the \n\nenormous task of regional reconstruction after the earthquake, in partnership with stakeholders \nenormous task of regional reconstruction after the earthquake, in partnership with stakeholders \n\nincluding enterprises, local governments and non-profit organizations. \nincluding enterprises, local governments and non-profit organizations. \n\n\n**Further measures needed**\n\n\n\nSupport businesses involved in health, medical and \nSupport businesses involved in health, medical and ● \n\nnursing care \nnursing care \n\nExpand range of financial products and services for the \nExpand range of financial products and services for the ● \n\nelderly (planning for asset management for old age) \nelderly (planning for asset management for old age) \n\nFoster a better work-life balance \nFoster a better work-life balance ● \n\n\n\nWide-ranging financial support for the reconstruction of infrastructure \nWide-ranging financial support for the reconstruction of infrastructure ● \n\nOngoing disaster recovery activities by employee volunteers \nOngoing disaster recovery activities by employee volunteers ● \n\nComprehensive support for industrial recovery in partnership with local governments and \nComprehensive support for industrial recovery in partnership with local governments and ● \n\nfinancial institutions in the disaster-affected areas \nfinancial institutions in the disaster-affected areas", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "give the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this \n\ncorporate social responsibility \ncorporate social responsibility DNA embedded in the business \nDNA embedded in the business \n\nphilosophies of both the Sumitomo \nphilosophies of both the Sumitomo and Mitsui groups over the 400 \nand Mitsui groups over the 400 \n\nyears of their existence, we will \nyears of their existence, we will continue to play our part in solving \ncontinue to play our part in solving \n\nproblems facing the international \nproblems facing the international community through our financial \ncommunity through our financial \n\noperations. \nservice operations. \nservice \n\nGive further support for businesses involved in greenhouse gas \nGive further support for businesses involved in greenhouse gas ● \n\nreduction, water supply, new energy and resource initiatives \nreduction, water supply, new energy and resource initiatives \n\nDo more to safeguard biodiversity, in our capacity as a \nDo more to safeguard biodiversity, in our capacity as a ● \n\nfinancial institution \nfinancial institution \n\nShare our information assets and know-how globally in the \nShare our information assets and know-how globally in the ● \n\nenvironmental business \nenvironmental business \n\n\n\n**CSR REPORT 2011**10", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**CSR report 2011**\n**(digest version with examples of activities and**\n**statistical performance, online PDF file)**\n\n**Comprehensive**\n**disclosure of**\n**CSR activities**\nCovers environment-related statistical data and gives more detailed \nCovers environment-related statistical data and gives more detailed \ninformation on CSR activities \ninformation on CSR activities \n\n\n\n\n\n**About this Report**\n\nPeriod Covered \n\nApril 1, 2010 to March 31, 2011 ( “Fiscal 2010” ) \nNote: Certain items in this report refer to activities taking place after April 2011. \n\n: \n\n**CSR report (online version, Japanese only)**\n\nPublication Date of \nJapanese Document \n\n**Enriched**\n**CSR disclosure**\n\nDecember 2011 \n: \nwww.smfg.co.jp/responsibility \n\nContact \n\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. \n1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 \nTEL: +81-3-3282-8111 \n\n: \n\nThis is the official version of our CSR report. Covers the full spectrum of \nThis is the official version of our CSR report. Covers the full spectrum of \nCSR activities at SMFG \nCSR activities at SMFG", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_SMFG_2011.pdf", - "query": "Did Katsutoshi Konuma participate in the August 2011 expert roundtable on the role of the Sumitomo Mitsui Financial Group's new Food and Agricultural Assessment Loan? ", - "target_page": 8, - "target_passage": "Key comments of participants Together with Our Customers Katsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "financial institutions in the disaster-affected areas \nfinancial institutions in the disaster-affected areas \n\n\n\n\n\n\n\n\n\n\nAnd today \nAnd today Besshi copper mine in the Meiji era \nBesshi copper mine in the Meiji era \n\nMitsui Charity Hospital at its establishment \nMitsui Charity Hospital at its establishment \n\n\n\n**Creating systems for sustainability**\n\n**Environmental measures**\n\nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \n\nleverage its role as a leading financial services group. This is a priority field for the future. \nleverage its role as a leading financial services group. This is a priority field for the future. \n\nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \n\nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \n\ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \n\ntechnological breakthroughs, with a particular focus on the Asian region. \ntechnological breakthroughs, with a particular focus on the Asian region. \n\n\n\n**Further measures needed**\n\n\n\n\n\n**Symbiosis and diversity**\n\n**Global challenges**\n\nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \n\noperations both in Japan and overseas. Initiatives include aggressive development of advisory \noperations both in Japan and overseas. Initiatives include aggressive development of advisory \n\nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \n\nas well as contributions to the international community and the environmental business, chiefly \nas well as contributions to the international community and the environmental business, chiefly \n\nthrough branches and representative offices overseas. \nthrough branches and representative offices overseas. \n\nWe will continue to discuss and review various approaches to issues facing the international \nWe will continue to discuss and review various approaches to issues facing the international \n\ncommunity so as to build up trust internationally as a global player. \ncommunity so as to build up trust internationally as a global player. \n\n**Further measures needed**\n\nShare expertise in corporate social responsibility \nShare expertise in corporate social responsibility ● \n\nwith the international community \nwith the international community \n\nImprove financial services in preparation for the \nImprove financial services in preparation for the ● \n\nglobalization of operations in Japan (multilingual \nglobalization of operations in Japan (multilingual \n\nsupport) \nsupport) \n\nPromote diversity \nPromote diversity ● \n\nIn the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "housing for the elderly, expected to be a \nhousing for the elderly, expected to be a \n\nfuture growth area. \nfuture growth area. \n\nW hile c o n t inuing t o t a ilo r bu sine s s \nW hile c o n t inuin g t o t a ilo r b u s in e s s \n\nactivities to the needs of the community at \nactivities to the needs of the community at \n\nlarge and ensuring a friendly banking \nlarge and ensuring a friendly banking \n\nenvironment for our customers, the SMFG \nenvironment for our customers, the SMFG \n\nGroup also plans to support the creation of \nGroup also plans to support the creation of \n\n\n\n\n\n**Roundtable session: SMBC Food and Agricultural Assessment Loan**\n\nA roundtable session with experts held in August 2011 \nconsidered the role of the new SMBC Food and Agricultural \nAssessment Loan in improving the food supply chain that \nlinks food and fishery producers with food processors and \nconsumers. Opinions were also exchanged on what other \nfuture role the bank might assume in this regard, given \nthe current situation and issues facing the food industry \nand agriculture \nin Japan. \n\n**Key comments of participants**\n\nKatsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd. \n“We want to deliver value by creating demand and quality combined with safety, peace \nof mind and trust.” \n\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences, \nThe University of Tokyo \n“Eating should be something that generates emotion. New potential exists in the world of cuisine.” \nDaisuke Yamamoto, Vice Senior Consultant, Research Department, \nThe Japan Research Institute, Limited \n“As consumer tastes go through a time of great change, I think it is important to \nprioritize ingredients and the attitude of customers toward eating.” \nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of \nthe Corporate Banking Unit & Middle Market Banking Unit, SMBC \n“An important concept is multilateral dialogue as the number of parties involved in food \nproduction increases throughout the supply chain.” \nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC \n\nThe Minato Bank has created a position \nThe Minato Bank has created a position \n\ntitled “Service Care Manager” at each of \ntitled “Service Care Manager” at each of \n\nits branches, filled by at least one branch \nits branches, filled by at least one branch \n\nmanagerial staffer, as part of measures to \nmanagerial staffer, as part of measures to \n\nmake branch visits more pleasant for \nmake branch visits more pleasant for \n\ncustomers, following earlier nuts-and-bolts \ncustomers, following earlier nuts-and-bolts \n\nimprovements. \nimprovements. \n\nService Care Managers are dedicated to \nService Care Managers are dedicated to \n\nimproving support and services for the \nimproving support and services for the \n\ncustomer at each branch. Their training \ncustomer at each branch. Their training \n\nincludes simulations of the problems faced \nincludes simulations of the problems faced \n\nby persons with disabilities, awareness \nby persons with disabilities, awareness \n\nraising and support methods for the elderly \nraising and support methods for the elderly \n\nand persons with disabilities. \nand persons with disabilities.", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**Corporate Outline (as of September 30, 2011)** **Editorial Policy**\n\nCompany Name Sumitomo Mitsui Financial Group, Inc. This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group :: \n\nBusiness Description Management of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of \n: is fulfilling as we work to create a sustainable society. \n\nnon-bank subsidiaries, as well as the performance of ancillary functions \nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is \n\nEstablished December 2, 2002 \n: \nthe essence of business itself, and our initiatives act upon this. \n\nHead Office 1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan \n: \nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s \nChairman of the Board Masayuki Oku \n: \nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report \nPresident Koichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) \n: \n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR \nCapital ¥2,337.8 billion \n: \nactivities and statistical data omitted in the CSR Report 2011 (digest version). \nStock Exchange Listings Tokyo Stock Exchange (First Section) \n: \nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in \nOsaka Securities Exchange (First Section) \nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand \nNagoya Stock Exchange (First Section) \nour CSR and other activities in greater detail. \nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange. \n\nFrom the current fiscal year, we are including third-party opinions in the website version. \n\n**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service \n\n**Scope of this Report**\n\n(cid:129) Sumitomo Mitsui Financial Group, Inc. \n\n(cid:129) Sumitomo Mitsui Banking Corporation \n\n(cid:129) SMFG Card & Credit, Inc. \n\n(cid:129) Sumitomo Mitsui Card Company, Limited \n\n(cid:129) Cedyna Financial Corporation \n\n(cid:129) Sumitomo Mitsui Finance and Leasing Co., Ltd. \n\n(cid:129) The Japan Research Institute, Limited \n\n(cid:129) SMBC Friend Securities Co., Ltd. \n\n(cid:129) SMBC Nikko Securities Inc. \n\n(cid:129) THE MINATO BANK, LTD. \n\n(cid:129) Kansai Urban Banking Corporation \n\n(cid:129) Other Group companies \n\nCompany name abbreviations and other special terminology \n\nThroughout this report,**“Sumitomo Mitsui Financial Group”**or**“SMFG”**refers to the holding company alone.**“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates. \n\n\n\n**Reference guidelines**\nGlobal Reporting Initiative (GRI) Sustainability Reporting Guidelines 2006 (G3) \n\n*Global Reporting Initiative (GRI): Established as an international standard for sustainability reporting, compilers set up an international \norganization (GRI) in 1997 to encourage its adoption worldwide. \n\n**CSR disclosure**\n**through**\n**specific examples**\n\n**CSR report 2011 (digest version)**\n\nCovers CSR baselines and CSR activities at SMFG and its Group companies, \nCovers CSR baselines and CSR activities at SMFG and its Group companies, \ncentered on specific examples \ncentered on specific examples \n\n**CSR report 2011**\n**(digest version with examples of activities and**\n**statistical performance, online PDF file)**", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**Social Contribution**\n**Activities**\n\nGarbage was analyzed in the Kugenuma Beach cleanup event, in which SMFG and its Group companies participated \n**SMFG as a corporate citizen: Working to create a prosperous society for all**\n\nbranches at their own initiative. A wide variety \nbranches at their own initiative. A wide variety \n\n**SMFG and**\n**its Group companies**\n**participate in neighborhood**\n**cleanup programs** **Supporting education in**\n**developing countries,**\n**together with our customers**\n**and employees**\n\n**Donations through**\n**“The World Bank**\n**Green Fund”**\n\nof social contribution activities, such as the \nof social contribution activities, such as the \nMitsui Sumitomo VISA Card \ncollection of used stamps and PET bottle \ncollection of used stamps and PET bottle \n\ncaps, were carried out for global causes. \ncaps, were carried out for global causes. \n\nSumitomo Mitsui \nCard staff \nPOINT UP Mall \nSMBC Nikko Securities will continue activi- \nSMBC Nikko Securities will continue activi \n\nties that contribute to society and prioritize \nties that contribute to society and prioritize \n\ncommunication between employees. \ncommunication between employees. \n\nPromoting usage through \nthe point-allocation system \nDonation of used books \n\n\n\n\nSumitomo Mitsui \nCardholders \n\nBOOKOFF CORP Group \n\nBuying used books \n\nPurchase price \n\nBuilding libraries in developing countries \nthrough the NGO Room to Read \n\nIn the fall of 2010, SMBC Nikko Securities \nIn the fall of 2010, SMBC Nikko Securities \n\nestablished its “Green Week” for strength- \nestablished its “Green Week” for strength \n\nening environmental protection and social \nening environmental protection and social \n\ncontribution activities, with the aim of \ncontribution activities, with the aim of \n\npromoting communication within regional \npromoting communication within regional \n\nsociety and among participating employees \nsociety and among participating employees \n\nand their families, while deepening under- \nand their families, while deepening under \n\nstanding of environmental protection through \nstanding of environmental protection through \n\nEmployees and their families pitch in to clean up \n the bed of the Ara River in Tokyo \nparticipation in social contribution activities. \nparticipation in social contribution activities. \n\nBetween November 13 and December 5, \nBetween November 13 and December 5, \nEnvironmental protection activities \n2010, environmental protection programs \n2010, environmental protection programs \nForestry management volunteering experience in Osaka \n(Izumi no Mori) \nwere rolled out by cross-organizational \nwere rolled out by cross-organizational \n117 participants \n“Green Committees” in four locations in \n“Green Committees” in four locations in \n\nIn fiscal 2010, 150 volunteers from the \nIn fiscal 2010, 150 volunteers from the \n\nSMFG Group participated in beach cleanup \nSMFG Group participated in beach cleanup \n\nactivities in Kanagawa and Hyogo prefectures \nactivities in Kanagawa and Hyogo prefectures \n\non “SMFG Clean-up Day.” This initiative is \non “SMFG Clean-up Day.” This initiative is \n\nnot simply a matter of picking up garbage. It \nnot simply a matter of picking up garbage. It \n\nalso involves inspections and analysis of \nalso involves inspections and analysis of \n\ngarbage to identify pointers for providing \ngarbage to identify pointers for providing \n\nsolutions for environmental issues in the \nsolutions for environmental issues in the \n\nfuture. \nfuture. \n\nIn addition to beach cleanup activities in \nIn addition to beach cleanup activities in \n\nChiba and Hyogo prefectures by SMBC \nChiba and Hyogo prefectures by SMBC \n\nFriend Securities, Group companies of \nFriend Securities, Group companies of \n\nCedyna, Sumitomo Mitsui Finance & Leasing, \nCedyna, Sumitomo Mitsui Finance & Leasing, \n\nthe Japan Research Institute and SMBC \nthe Japan Research Institute and SMBC \n\nCardholders and employees of Sumitomo \nCardholders and employees of Sumitomo", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\n**New queue-number display system**\n**installed at bank counters**\n\n**Together with Our Customers**\n\nColors and special designs are used to make \n\nqueue-number displays more visible to all customers \n\n(The Minato Bank) \n\n\n\n**We work as a team to improve customer satisfaction and product quality, and, while supporting the customer,**\n**contribute to the sustainable development of society as a whole.**\n\n\n\n\n\n\n\n\n\nA further measure is installation of handheld \nA further measure is installation of handheld \n\n**Making banking**\n**a more pleasant experience**\n**for all customers**\n\nhearing support devices at all branches \nhearing support devices at all branches \n\n(except housing loan promotion offices), to \n(except housing loan promotion offices), to \n\nallay the concerns of hearing-impaired \nallay the concerns of hearing-impaired \n\ncustomers who find it difficult to converse \ncustomers who find it difficult to converse \n\nWith the old-age dependency ratio soaring, \nWith the old-age dependency ratio soaring, and follow spoken instructions. By using the \nand follow spoken instructions. By using the \n\nthe SMFG Group aims to provide friendly, \nthe SMFG Group aims to provide friendly, devices as communication tools, bank \ndevices as communication tools, bank \n\neasy-to-use banking services for all its \neasy-to-use banking services for all its employees can respect customer privacy \nemployees can respect customer privacy \n\nand do not have to talk loudly. \nand do not have to talk loudly. \n\ncustomers. \ncustomers. \nSome Group companies are likewise making \nSome Group companies are likewise making Further measures include posting of “green \nFurther measures include posting of “green \n\ntheir facilities barrier-free at bank branches \ntheir facilities barrier-free at bank branches \n\n\n\nThe SMBC Food and Agricultural Assessment \nThe SMBC Food and Agricultural Assessment \n\nLoan comes with conditions, depending on \nLoan comes with conditions, depending on \n\nthe results of an evaluation of food-producers’ \nthe results of an evaluation of food-producers’ \n\nprogress in areas such as food safety and \nprogress in areas such as food safety and \n\nenvironment-friendliness, healthiness and \nenvironment-friendliness, healthiness and \n\nnutritional value, and efficiency of distribution. \nnutritional value, and efficiency of distribution. \n\nThe Japan Research Institute researches \nThe Japan Research Institute researches \n\nm e a s u r e s i n t h e \nm e a s u r e s i n t h e \n\nTelephone handset-type ATM \n (The Minato Bank) of food and \na r e a s of food and \na r e a s \n\nfarming being taken \nfarming being taken \n\nby the loan applicant, \nby the loan applicant, \n\n**Preparing our businesses**\n**for a higher old-age**\n**dependency ratio**\n\nand drafts a simple \nand drafts a simple \n\n“diagnosis” stating \n“diagnosis” stating \n\nwhether there is room \nwhether there is room \n\nfor future improvement. Ernst & Young \nfor future improvement. Ernst & Young \n\nShinNihon LLC provides expert opinions on \nShinNihon LLC provides expert opinions on \n\near” logos at branches to reassure customers \near” logos at branches to reassure customers \n\nBut in recent years, consumers have come to \nBut in recent years, consumers have come to that the bank has facilities for conversing \nthat the bank has facilities for conversing \n\n**The financial sector’s role in**\n**improving the nation’s diet and**\n**in strengthening the agricultural**\n**and fisheries sectors**\n\nplace more priority on factors other than \nplace more priority on factors other than writing. All branches are being equipped \nin in writing. All branches are being equipped \n\nvolume and price, such as food safety and \nvolume and price, such as food safety and with white boards and special message \nwith white boards and special message", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**CSR report 2011**\n**(digest version with examples of activities and**\n**statistical performance, online PDF file)**\n\n**Comprehensive**\n**disclosure of**\n**CSR activities**\nCovers environment-related statistical data and gives more detailed \nCovers environment-related statistical data and gives more detailed \ninformation on CSR activities \ninformation on CSR activities \n\n\n\n\n\n**About this Report**\n\nPeriod Covered \n\nApril 1, 2010 to March 31, 2011 ( “Fiscal 2010” ) \nNote: Certain items in this report refer to activities taking place after April 2011. \n\n: \n\n**CSR report (online version, Japanese only)**\n\nPublication Date of \nJapanese Document \n\n**Enriched**\n**CSR disclosure**\n\nDecember 2011 \n: \nwww.smfg.co.jp/responsibility \n\nContact \n\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. \n1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 \nTEL: +81-3-3282-8111 \n\n: \n\nThis is the official version of our CSR report. Covers the full spectrum of \nThis is the official version of our CSR report. Covers the full spectrum of \nCSR activities at SMFG \nCSR activities at SMFG", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "And in this situation, the asset bubble burst \nAnd in this situation, the asset bubble burst and sense of responsibility as an employee of \nand sense of responsibility as an employee of \n\n[in the early 1990s], and the collapse of \n[in the early 1990s], and the collapse of a financial institution entrusted with essential \na financial institution entrusted with essential \n\nLehman [hit world markets] in 2008, and \nLehman [hit world markets] in 2008, and social infrastructure. I talk about “the strength \nsocial infrastructure. I talk about “the strength \n\nKoichi Miyata \nnow we have the earthquake and tsunami \nnow we have the earthquake and tsunami of our front-line staff,” but I was able to fully \nof our front-line staff,” but I was able to fully \n\ndisaster. It seems that every thing that \ndisaster. It seems that every thing that appreciate just how extraordinarily strong \nappreciate just how extraordinarily strong \nPresident \nhappens these days merely makes us more \nhappens these days merely makes us more SMFG and SMBC are thanks to this \nSMFG and SMBC are thanks to \n\n\n\n1945. Both events are also regarded globally \n1945. Both events are also regarded globally \n\nand tsunami, environmental measures, \nand tsunami, environmental measures, as being miraculous. \nas being miraculous. \n\na dd re ssi ng t he sh r i n k i ng a nd a g i ng \na dd re ssi ng t he sh r i n k i ng a nd a g i ng In 1945, foreign diplomats and businessmen \nIn 1945, foreign diplomats and businessmen \n\npopulation, and global challenges. — \npopulation, and global challenges. — visiting Japan were fully confident that the \nvisiting Japan were fully confident that the \n\n**Kunibe**: : Japan is facing a difficult period \nJapan is facing a difficult period country would recover as they surveyed the \ncountry would recover as they surveyed the \n\nwith limited prospects for economic growth \nwith limited prospects for economic growth ruins and the scorched earth around them, \nruins and the scorched earth around them, \n\ndue to a shrinking, aging population and \ndue to a shrinking, aging population and because, in the words of one of them, “People \nbecause, in the words of one of them, “People \n\ndisplay \n this display \nSumitomo Mitsui Financial Group, Inc. \nanxious. I think everyone needs to hit the \nanxious. I think everyone needs to hit the of front-line commitment. \nof front-line commitment. \n\n‘reset’ button in some sense. If we don’t,t, \n‘reset’ button in some sense. If we don Moving forward on the reconstruction of \nMoving forward on the reconstruction of \n\nmore difficulties lie ahead. \nmore difficulties lie ahead. the Tohoku region, I believe we can also \nthe Tohoku region, I believe we can also The SMFG Group has 62,000 employees, \nThe SMFG Group has 62,000 employees, \n\n**Miyata**: Indeed, prior to 1970, living \n: Indeed, prior to 1970, living contribute to the rebuilding of infrastructure \ncontribute to the rebuilding of infrastructure “stepping up to the plate and working hard \n“stepping up to the plate and working hard \n\nstandards or wage levels were very low, \nstandards or wage levels were very low, t h r o u g h pr o je c t f i n a n c e a n d o t h e r \nt h r o u g h p r o j e c t f i n a n c e a n d o t h e r \n\nTadao A ndo \na mature economy. Against this backdrop, \na mature economy. Against this backdrop, really work hard and help each other, and \nreally work hard and help each other, and \nArchitect. Professor Emeritus at the University of \nthe country was hit by the unprecedented \nthe country was hit by the unprecedented children take heed of what their parents say \nchildren take heed of what their parents say \nTokyo, Representative and Vice-chairman of the \nc a t a st rophe of t he Gre a t Ea st Japa n \nc a t a st rophe of t he Gre a t Ea st Japa n and study hard. And because there is a \nand study hard. And because there is a", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "i \nt \no \nm \no \nM \n\nL \nt \nd \n. \n\nL \nm \ni \n\ni \nt \ne \nd i \nt \ns \nu \ni \n\nL \nt \nd \n. \n\nF \nn \na \nn \nc \ne \n\ni \nI \nn \nc \n. \n\n**SMFG CSR promotion structure**\n\n**Group CSR Committee**\n\n**Chairman**: Director in charge of SMFG \nCorporate Planning Department \n**Committee members**: General Managers of SMFG, \nSumitomo Mitsui Banking Corporation, \nSMFG Card & Credit, Sumitomo Mitsui Card, \nCedyna, Sumitomo Mitsui Finance and Leasing, \nThe Japan Research Institute, \nSMBC Friend Securities, SMBC Nikko Securities, \nTHE MINATO BANK and \nKansai Urban Banking Corporation \n**Administered by**: Group CSR Department of SMFG \n**Strategic advisor**: \nJRI Center for the Strategy of Emergence \nB \na \nn \nk \nn \ng \nC \no \nr \np \no \nr \na \nt \ni \no \nn \n\nS \nu \nm \n\ni \nt \no \nm \no \nM \n\ni \n\nWe intend to be a financial services group that contributes to the healthy development \nWe intend to be a financial services group that contributes to the healthy development \nof society. For this purpose, we recognize the importance of our mission to serve as a \nof society. For this purpose, we recognize the importance of our mission to serve as a \ncrucial part of the public infrastructure and also our social responsibilities. With such \ncrucial part of the public infrastructure and also our social responsibilities. With such \nrecognition, we under take business operations that contribute to the steady \nrecognition, we under take business operations that contribute to the steady \ndevelopment of Japan and the rest of the world, and endeavor, as a good corporate \ndevelopment of Japan and the rest of the world, and endeavor, as a good corporate \ncitizen, to make a positive contribution to society. \ncitizen, to make a positive contribution to society. \n\ni \nt \ns \nu \n\n3.**Contributing to**\n\ni \n\n**CSR Liaison Committee**\n**Social Development**\n\n4.**Free and Active**\n\nWe intend to be a financial services group for which all officers and employees work \nWe intend to be a financial services group for which all officers and employees work \nwith pride and commitment. For this purpose, we respect people and develop \nwith pride and commitment. For this purpose, we respect people and develop \nemployees with extensive professional knowledge and capabilities, thereby creating a \nemployees with extensive professional knowledge and capabilities, thereby creating a \nfree and active business environment. \nfree and active business environment. \n\n**Business Environment**\n\n5.**Compliance**\n\nWe intend to be a financial services group that always keeps in mind the importance of \nWe intend to be a financial services group that always keeps in mind the importance of \ncompliance. For this purpose, we reflect our awareness of Business Ethics in our business \ncompliance. For this purpose, we reflect our awareness of Business Ethics in our business \nactivities at all times. In addition, we respond promptly to directives from auditors and \nactivities at all times. In addition, we respond promptly to directives from auditors and \ninspectors. Through these actions, we observe all laws and regulations, and uphold moral \ninspectors. Through these actions, we observe all laws and regulations, and uphold moral \nstandards in our business practices. \nstandards in our business practices. \n\n**Participation in global initiatives**\n\nRecent years have seen a growing range of international initiatives to deal with threats to the sustainability of the global environment. \nRecent years have seen a growing range of international initiatives to deal with threats to the sustainability of the global environment. \nAs a global citizen, the SMFG Group, mindful of its societal influence as a financial institution, follows the guidelines and principles of \nAs a global citizen, the SMFG Group, mindful of its societal influence as a financial institution, follows the guidelines and principles of \nthe following initiatives and organizations: \nthe following initiatives and organizations:", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "the Japan Research Institute and SMBC \nthe Japan Research Institute and SMBC \n\nCardholders and employees of Sumitomo \nCardholders and employees of Sumitomo \n\nMitsui Card joined a literary social contribution \nMitsui Card joined a literary social contribution \n\ninitiative by participating in the Books To \ninitiative by participating in the Books To \n\nThe People 2010 project operated by BOOKOFF \nThe People 2010 project operated by BOOKOFF \n\n environ- \nCORP. This project aims to provide environ \nCORP. This project aims to provide \n\nments in which children can read books in \nments in which children can read books in \n\npurpose-built facilities, through donations to \npurpose-built facilities, through donations to \n\nRoom to Read, a non-governmental organi- \nRoom to Read, a non-governmental organi \n\nzation that supports education in developing \nzation that supports education in developing \n\ncountries. These NGO donations are pegged \ncountries. These NGO donations are pegged \n\nto total numbers of used books and other \nto total numbers of used books and other \n\nitems purchased by cardholders. Through \nitems purchased by cardholders. Through \n\nthe Sumitomo Mitsui Card-operated online \nthe Sumitomo Mitsui Card-operated online \n\nshopping mall POINT UP Mall, cardholders \nshopping mall POINT UP Mall, cardholders \n\nJapan, with the participation of 280 employ- \nJapan, with the participation of 280 employ \n\nees and their families. In addition, regional \nees and their families. In addition, regional \n\ncontribution activities were carried out by \ncontribution activities were carried out by \n\nSMBC and SMBC Nikko Securities donate a \nSMBC and SMBC Nikko Securities donate a \n\nportion of the profits from marketing of the \nportion of the profits from marketing of the \n\n“The \nSMBC Nikko World Bank Bond Fund ( “The \nSMBC Nikko World Bank Bond Fund \n\n) to the Japanese \nWorld Bank Green Fund” ) to the Japanese \nWorld Bank Green Fund \n\nRed Cross Society and the Japan Committee \nRed Cross Society and the Japan Committee \n\nfor UNICEF. \nfor UNICEF. \n\ns first \nThis investment trust is the world’s first \nThis investment trust is the world \n\nfund developed in cooperation with the \nfund developed in cooperation with the \n\nWorld Bank that invests in World Bank green \nWorld Bank that invests in World Bank green \n\nbonds, according to research by Nikko \nbonds, according to research by Nikko \n\nAsset Management Co., Ltd. Funds from \nAsset Management Co., Ltd. Funds from \n\nthe World Bank green bonds support only \nthe World Bank green bonds support only \n\nWorld Bank-funded projects in developing \nWorld Bank-funded projects in developing \n\ncountries to mitigate global warming. \ncountries to mitigate global warming. \n\n*Research by Nikko Asset Management Co., Ltd. \n\nare encouraged to buy used books through \nare encouraged to buy used books through \n\nBOOKOFF, and employees collect and donate \nBOOKOFF, and employees collect and donate \n\nused books from their homes and companies. \nused books from their homes and companies. \n\n\n\n\n\n\n\nNikko Securities carry out ongoing cleanup \nNikko Securities carry out ongoing cleanup \n\nand other activities in the areas around their \nand other activities in the areas around their \n\noffices and branches. \noffices and branches. \n\nThe Minato Bank and Kansai Urban Banking \nThe Minato Bank and Kansai Urban Banking \n\nCorporation also engage in cleanup activities \nCorporation also engage in cleanup activities \n\naround Suma Beach and Lake Biwa, to \naround Suma Beach and Lake Biwa, to \n\nprotect the regional environment. \nprotect the regional environment. \n\n\n\n\n\nVolunteers at the Shonan Erosion Control Forest project \n62 participants \nHelping clean up Senju Shinbashi bridge that spans Ara River \n64 participants \nHelping clean up Nishi Araibashi bridge that spans Ara River \n37 participants", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n**Keeping**\n**our shareholders**\n**informed**\n\nSpecific Examples of CSR Activities \n\n**Together with Our Shareholders**\n**and Markets**\n\nWebsite \n\nAnnual report \n\n**Contributing to the development of sounder financial markets**\n\nSRI Indexes on which SMFG is listed Examples of Group disclosure activities \n\nQuarterly and interim financial reports, \nQuarterly and interim financial reports, \n\nresults announcements, securities \nresults announcements, securities \n\nreports, legal disclosure statements, \nreports, legal disclosure statements, \n\nregular publications, etc. \nregular publications, etc. \n\nWe believe that the SMFG Group can contribute \nWe believe that the SMFG Group can contribute \nAnnual and interim reports (in Japanese \nAnnual and interim reports (in Japanese \nfurther to the creation of a sustainable society \nfurther to the creation of a sustainable society \nand English) \nand English) \n\n\n\nBased on this approach, SMFG goes \nBased on this approach, SMFG goes \n\n**We aim to further**\n**strengthen communication**\n**with our shareholders**\n**and investors**\n\nbeyond legal requirements in enriching its \nbeyond legal requirements in enriching its \n\ndisclosure of information on management \ndisclosure of information on management \n\npolicy and operational strategy. These \npolicy and operational strategy. These \n\ninitiatives have won the support of many \ninitiatives have won the support of many \n\nmarket participants. We were selected as \nmarket participants. We were selected as \n\nSMFG is committed to ensuring financial \nSMFG is committed to ensuring financial a winner of the Awards for Excellence in \na winner of the Awards for Excellence in \n\nsoundness through appropriate policy-making \nsoundness through appropriate policy-making Corporate Disclosure for fiscal 2011 by The \nCorporate Disclosure for fiscal 2011 by The \n\nand business operations. At the same time, \nand business operations. At the same time, Securities Analysts Association of Japan. \nSecurities Analysts Association of Japan. \n\nwe disclose corporate information in a \nwe disclose corporate information in a \n\ntimely and precise way to shareholders and \ntimely and precise way to shareholders and \n\ncompanies’ corporate social responsibility \ncompanies’ corporate social responsibility \n\n**Together with our investors:**\n**Creating a platform for**\n**social contribution through**\n**the financial markets**\n\nactivities, and uses the information it gathers \nactivities, and uses the information it gathers \n\nto create a basic file on companies managing \nto create a basic file on companies managing \n\nsocially responsible investment funds*3*3. \nsocially responsible investment fund \n\n**SMFG has listed**\n**its shares on SRI indexes**\n\nthrough its activities in financial markets. \nthrough its activities in financial markets. \n\nFor example, SMBC Friend Securities markets \nFor example, SMBC Friend Securities markets SRI indexes are for socially responsible \nSRI indexes are for socially responsible \n\n while \n“Environmental Sustainability Bond”*1*1 while \n“Environmental Sustainability Bond” investments in which major investment \ninvestments in which major investment \n\nSMBC Nikko Securities markets “WB Green \nSMBC Nikko Securities markets “WB Green decisions are based on environmental and \ndecisions are based on environmental and \n\n. These are bonds \nBonds (Green Bonds)”*2*2. These are bonds \nBonds (Green Bonds)” social factors as well as the target company’s s \nsocial factors as well as the target company \n\n\n\n\n\nmarkets. We believe full disclosure not only \nmarkets. We believe full disclosure not only \n\nhelps foster a more correct understanding \nhelps foster a more correct understanding \n\nand evaluation of the Group, but also \nand evaluation of the Group, but also \n\ncontributes to the development of sounder \ncontributes to the development of sounder", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "news2.pdf", - "query": "What is the trend of flood risk in Canada in 2024?", - "target_page": 1, - "target_passage": "(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Three ways Canadian communities are reducing flood**\n**risks**\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly \nexposed. There are large-scale programs available across the country providing flood protection \nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This \nprogram is helping build the resilience of communities and homes through a variety of \npreventative actions. \n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically \nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community \nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made \nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk \nby catching and absorbing rainfall and runoff from surrounding surfaces. \n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the \nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online \nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn \ntips to reduce the risk of flooding around their properties. The portal launched in the summer of \n2023 and was viewed 27,000 times in its first year. \n\nRebate programs are a powerful motivation for homeowners to make upgrades that might \notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of \neligible material and labour costs, up to a maximum of $1,000. More than 90 properties \ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and \nwater monitors and alarms, to better prepare them for extreme weather events. \n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg. \n\nwww.newscanada.com \n\nWord Count: 281", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "1,359 \n\nApartment Units \nin Ontario \n\n42% \n\nMHC Sites \nin Ontario \n\n20% \n\nReal Estate Assets \nLocated in Ontario", - "page_start": 15, - "page_end": 15, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "2. Murphy JM*et al.*2009*UK climate projections science report: climate change projections*. Exeter, UK: \n**26**\nMet Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk. \n\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in \nCopenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference \nof the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ \n11a01.pdf. \n\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, \n30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of \nthe Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ \n10a01.pdf. \n\n5. Hewitson B*et al.*2014 Regional context. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment*\n*report of the Intergovernmental Panel on Climate Change*(eds VR Barros*et al.*), pp. 1133–1197. \nCambridge, UK: Cambridge University Press. \n\n6. Dankers R*et al.*2013 First look at changes in flood hazard in the inter-sectoral impact model \nintercomparison project ensemble.*Proc. Natl Acad. Sci. USA***111**, 3257–3261. (doi:10.1073/ \npnas.1302078110) \n\n7. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al.*), pp. \n1–32. Cambridge, UK: Cambridge University Press. \n8. Schewe J*et al.*2014 Multimodel assessment of water scarcity under climate change.*Proc. Natl*\n*Acad. Sci. USA***111**, 3245–3250. (doi:10.1073/pnas.1222460110) \n\n9. Schleussner C-F*et al.*2015 Differential climate impacts for policy-relevant limits to global \nwarming: the case of 1.5°C and 2°C.*Earth Syst. Dynam. Discuss.***6**, 2447–2505. (doi:10.5194/ \nesdd-6-2447-2015) \n\n10. James R, Washington R, Schleussner C-F, Rogeli J, Conway D. 2017 Characterizing half-a- \ndegree difference: a review of methods for identifying regional climate responses to global \nwarming targets.*WIREs Clim Change***8**, e457. (doi:10.1002/wcc.457) \n11. Haarsma RJ*et al.*2016 High resolution model intercomparison project (HighResMIP v1.0) for \nCMIP6.*Geosci. Model Dev.***9**, 4185–4208. (doi:10.5194/gmd-9-4185-2016) \n\n12. Hewitt HT, Copsey D, Culverwell ID, Harris CM, Hill RSR, Keen AB, McLaren AJ, Hunke \nEC. 2011 Design and implementation of the infrastructure of HadGEM3: the next-generation \nMet Office climate modelling system.*Geosci. Model Dev.***4**, 223–253. (doi:10.5194/gmd-4- \n223-2011). \n13. Martin GM*et al.*2011 The HadGEM2 family of met office unified model climate \n\n30. Wiltshire A, Gornall J, Booth B, Dennis E, Falloon P, Kay G, McNeall D, McSweeney C, \nBetts R. 2013 The importance of population, climate change and CO2 plant physiological \nforcing in determining future global water stress.*Glob. Environ. Change***23**, 1083–1097. \n(doi:10.1016/j.gloenvcha.2013.06.005) \n\n31. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2016 High-end climate change \nimpact on European runoff and low flows – exploring the effects of forcing biases.*Hydrol.*\n*Earth Syst. Sci.***20**, 1785–1808. (doi:10.5194/hess-20-1785) \n32. Milly PCD, Dunne KA. 2016 Potential evapotranspiration and continental drying.*Nat. Clim.*\n*Change***6**, 946–949. (doi:10.1038/nclimate3046) \n\n33. Swann ALS, Hoffman FM, Koven CD, Randerson JT. 2016 Plant responses to increasing \nCO2 reduce estimates of climate impacts on drought severity.*Proc. Natl Acad. Sci. USA***113**, \n10 019–10 024. (doi:10.1073/pnas.1604581113) \n34. Betts RA*et al.*2007 Projected increase in future river runoff through plant responses to carbon \ndioxide rise.*Nature***448**, 1037–1042. (doi:10.1038/nature06045)", - "page_start": 25, - "page_end": 25, - "source_file": "pubmed11.pdf" - }, - { - "text": "A detailed investigation of these factors is beyond the scope of this paper; nevertheless, this \nresult illustrates the important point that the nature and patterns of the climate forcing at a \nparticular level of global warming can play an important role in determining the patterns of \nregional impacts. \n\n**25**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n5. Conclusion \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nThe higher-resolution HadGEM3 simulations project consistent increases in temperature-related \nextremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the \nglobal annual mean. There is a higher degree of spatial variation in our projections compared \nwith CMIP5-based studies. \n\nIn the model projections examined here, changes relating to the water cycle are complex, both \nin their geographical pattern and in the variation between different models. The length of flooding \nevents generally increases across world in all models, but maximum rainfall can either increase or \ndecrease depending on locations. Global patterns of increase and decrease show some consistency \nbetween the different GWLs, but also some local differences. Worldwide, most impacts broadly \ntend to increase with global warming in most areas. For global mean changes, even when the sign \nof change is uncertain, individual realizations generally show reduced impact at 1.5°C compared \nwith 2°C. However, this does not always hold even at the scale of major global river basins. \n\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in \napproximately three-quarters of countries assessed. The vulnerability increase can arise from \nincreases in either flooding or drought. Reduced drought leads to decreased vulnerability in a \nlimited number of cases. \n\nMost simulations here project a general increase in mean streamflow in most of the basins \nexamined, but with a number of notable exceptions in the tropics. While flows in the Ganges are \nconsistently projected to increase by 30–110% at 2°C, Amazon flows could either increase by 3% \nor decrease by 25%. Ensemble-mean changes in river flow often do not give a full impression of \nthe magnitude of changes that may be possible, so adaptation planning in particular should not \nrely on ensemble-mean projections and instead consider a range of outcomes. The seasonal low \nstreamflows also increase in many basins, but not as many as for the mean flows—many basins \nsee decreased low flows in some or all projections. \n\nBroadly, changes in weather extremes at 1.5°C global warming could be estimated by scaling- \nback the impacts at 2°C, if this is done with individual ensemble members rather than the \nensemble mean. However, this was not always the case for impacts that depend on more complex \nprocess or interactions between more than one climate variable, such as run-off and an indicator \nof vulnerability to food insecurity. \n\nData accessibility. This article has no additional data. \nCompeting interests. We declare we have no competing interests. \nFunding. This research received funding from the European Union Seventh Framework Programme FP7/2007– \n2013 under grant agreement no. 603864 (HELIX: \n‘High-End cLimate Impacts and eXtremes’; www. \nhelixclimate.eu). The work of R.A.B., C.B., J.C., L.G., K.L. and K.R. was additionally supported by the Joint \nUK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101). \nAcknowledgements. The authors thank Ed Pope, Jason Lowe and Dann Mitchell for advice and discussion, \nAlissa Haward and Maria Pearce for project management and administration of HELIX, and two anonymous \nreviewers whose comments substantially improved the paper.", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed11.pdf" - }, - { - "text": "**19**\n\n\n\n\n\n\n\n(*a*) \n6.0 \n5.0 \n\n4.0 \n\n3.0 \n2.0 \n\n1.0 \n\n0 \n\n(*b*) \n10.0 \n\n8.0 \n\n6.0 \n\n4.0 \n\n2.0 \n\n0 \n\n(*c*) \n12.0 \n\n8.0 \n\n4.0 \n\n0.0 \n\n–4.0 \n\nIPS L-C M 5 A-L R \n\n\n\nG F D L-E S M 2 M \n\nM IR O C-E S M -C H E M \n\nA C C E SS1-0 \n\n1.5°C 2°C \n\n**Figure 13.**Global mean percentage changes relative to 1981–2010 in (a) precipitation over land, (b) mean run-off flows, (c) low \nrun-off lows (10th percentile), at 2°C and 1.5°C global warming. \n\nthis comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be \ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at \neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the \npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries. \nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food \ninsecurity generally increases with global warming, and for approximately three-quarters of \ncountries assessed, this increase is larger at 2°C than 1.5°C. \n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global \nwarming compared to 1.5°C (figure 20). This is often the case for both increases and decreases \nin flows—increasing the level of global warming magnifies the pattern of river flow changes, \nalthough not in all cases. \n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, \nbut this was not always the case, with many basins showing similar or smaller ranges at \n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed11.pdf" - }, - { - "text": "(ii) What regional climate conditions and related hydrological and ecological conditions \ncould occur at a particular level of global warming, such as 2°C? This is relevant to \nadaptation policy and planning—exploring the possible outcomes for these levels of \nwarming will help facilitate adaptation and improved resilience to account for a 1.5°C or \n2°C world. It is recognized that many adaptation decisions require information on timing \nof specific impacts or risks, but nevertheless, framing regional impacts assessments in \nterms of associated global warming levels (GWLs) may help provide context of the levels \nof climate change that may be avoidable or unavoidable (and hence require adaptation).", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "New opiate and crack-cocaine users: characteristics and trends 4", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**2**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nModel Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration \nscenario. To provide more detailed representations of climate processes and impacts, the \nspatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution \nthan the CMIP5 models. We used a set of impacts-relevant indices and a global land surface \nmodel to examine the projected changes in weather extremes and their implications for \nfreshwater availability and vulnerability to food insecurity. Uncertainties in regional climate \nresponses are assessed, examining ranges of outcomes in impacts to inform risk assessments. \nDespite some degree of inconsistency between components of the study due to the need to \ncorrect for systematic biases in some aspects, the outcomes from different ensemble members \ncould be compared for several different indicators. The projections for weather extremes \nindices and biophysical impacts quantities support expectations that the magnitude of change \nis generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with \nincreases being more intense than seen in CMIP5 projections. Precipitation-related extremes \nshow more geographical variation with some increases and some decreases in both heavy \nprecipitation and drought. There are substantial regional uncertainties in hydrological impacts \nat local scales due to different climate models producing different outcomes. Nevertheless, \nhydrological impacts generally point towards wetter conditions on average, with increased \nmean river flows, longer heavy rainfall events, particularly in South and East Asia with the \nmost extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global \nwarming. Some areas are projected to experience shorter meteorological drought events and \nless severe low flows, although longer droughts and/or decreases in low flows are projected \nin many other areas, particularly southern Africa and South America. Flows in the Amazon \nare projected to decline by up to 25%. Increases in either heavy rainfall or drought events \nimply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this \nvulnerability is projected to remain smaller than at 2°C global warming in approximately 76% \nof developing countries. At 2°C, four countries are projected to reach unprecedented levels of \nvulnerability to food insecurity. \n\n1. Introduction \n\nThe majority of climate-change impacts assessments have tended to be framed in terms of future \ntime horizons, e.g. impacts by the middle or end of the twenty-first century [1,2]. However, \nwith international climate policy now largely focused on limiting warming to specific levels of \nglobal mean temperature such as 2°C [3] or 1.5°C [4], policy-relevant climate impacts assessments \nincreasingly need to be framed in terms of such warming levels. \nThere are two major research questions concerning the impacts of climate change at 1.5°C and \n2°C global warming, which are relevant to both mitigation and adaptation policy areas. \n\n(i) How much larger are the impacts at 2°C compared to 1.5°C? This is the primary question \narising from the Paris Agreement [4] and is relevant to mitigation policy, informing \njudgements and actions on holding the global temperature rise to ‘well below 2°C’ and \n‘pursuing efforts to limit the temperature increase to 1.5°C’.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "**Foreign Currency**\nAs of January 31, 2015, we have opened one full-line store in Canada and have announced plans to open five additional full-line stores in \nCanada over the next few years. The functional currency of our Canadian operations is the Canadian Dollar. We translate assets and \nliabilities into U.S. Dollars using the exchange rate in effect at the balance sheet date, while we translate revenues and expenses using a \nweighted-average exchange rate for the period. We record these translation adjustments as a component of accumulated other \ncomprehensive loss on the Consolidated Balance Sheets. In addition, our U.S. operations incurred certain expenditures denominated in \nCanadian Dollars and our Canadian operations incurred certain expenditures denominated in U.S. Dollars. This activity results in transaction \ngains and losses that arise from exchange rate fluctuations and are recorded as gains or losses in the Consolidated Statements of Earnings. \nAs of January 31, 2015, activities associated with the foreign currency exchange risk have not had a material impact on our consolidated \nfinancial statements.", - "page_start": 56, - "page_end": 56, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "of flowering time. PNAS**115**(42), 10642–10647 (2018). \n 35. Yang, C. Y., Fraga, H., Ieperen, W. V. & Santos, J. A. Assessment of irrigated maize yield response to climate change scenarios in \nPortugal. Agric. Water Manag.**184**, 178–190 (2017). \n 36. Miller, S. A. & Moore, F. C. Climate and health damages from global concrete production. Nat. Clim. Change https:// doi. org/ 10. \n1038/ s41558- 020- 0733-0 (2020). \n 37. Kassie, B. T. et al. Exploring climate change impacts and adaptation options for maize production in the Central Rift Valley of \nEthiopia using different climate change scenarios and crop models. Clim. Change**129**, 145–158 (2015). \n 38. Tao, F. & Zhang, Z. Climate change, high-temperature stress, rice productivity, and water use in Eastern China: A new superensem- \nble-based probabilistic projection. J. Appl. Meteorol. Climatol.**52**, 531–551 (2013). \n\n 39. Glotter, M. & Elliott, J. Simulating US agriculture in a modern Dust Bowl drought. Nat. Plants**3**, 16193 (2016). \n 40. Challinor, A. J., Koehler, A. K., Ramirez-Villegas, J., Whitfield, S. & Das, B. Current warming will reduce yields unless maize \nbreeding and seed systems adapt immediately. Nat. Clim. Change**6**, 954–958 (2016). \n 41. Cammarano, D. et al. Using historical climate observations to understand future climate change crop yield impacts in the South- \neastern US. Clim. Change**134**, 311–326 (2016). \n\n 42. Etten, J. V. et al. Crop variety management for climate adaptation supported by citizen science. PNAS**116**(10), 4194–4199 (2019). \n 43. Urban, D. W., Sheffield, J. & Lobell, D. B. The impacts of future climate and carbon dioxide changes on the average and variability \nof US maize yields under two emission scenarios. Environ. Res. Lett.**10**, 045003 (2015). \n\n 44. IPCC. Summary for policymakers. In Global Warming of 1.5°C. An IPCC Special Report on the Impacts of Global Warming of 1.5°C \nAbove Pre-industrial Levels and Related Global Greenhouse Gas Emission Pathways, in the Context of Strengthening the Global \nResponse to the Threat of Climate Change, Sustainable Development, and Efforts to Eradicate Poverty 32 (World Meteorological \nOrganization, 2018). \n 45. Ruane, A. C., Goldberg, R. & Chryssanthacopoulos, J. Climate forcing datasets for agricultural modeling: Merged products for \ngap-filling and historical climate series estimation. Agr. For. Meteorol.**200**, 233–248 (2015). \n 46. Hempel, S., Frieler, K., Warszawski, L., Schewe, J. & Piontek, F. A trendpreserving bias correction-the ISI-MIP approach. Earth \nSyst. Dyn.**4**, 219–236 (2013). \n 47. Monfreda, C., Ramankutty, N. & Foley, J. A. Farming the planet: 2. Geographic distribution of crop areas, yields, physiological \n\ntypes, and net primary production in the year 2000. Glob. Biogeochem. Cycles**22**, 1022 (2008). \n\n 48. You, L.Z., et al. Spatial Production Allocation Model (SPAM) 2000 Version 3.2. http:// mapsp am. info (2015). \n 49. Hoogenboom, G., et al. Decision Support System for Agrotechnology Transfer (DSSAT) Version 4.6 (DSSAT Foundation, 2015). \nhttp:// dssat. net (2015). \n 50. Sacks, W. J., Deryng, D., Foley, J. A. & Ramankutty, N. Crop planting dates: An analysis of global patterns. Glob. Ecol. Biogeogr.**19**, \n607–620 (2010). \n 51. Batjes, H.N. A Homogenized Soil Data File for Global Environmental Research: A Subset of FAO. ISRIC and NRCS Profiles (Version \n1.0). Working Paper and Preprint 95/10b (International Soil Reference and Information Centre, 1995). \n\nhttps://doi.org/10.1038/s41598-022-22228-7", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "news2.pdf", - "query": "How flooding was prevented in Vancouver? ", - "target_page": 1, - "target_passage": "In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown’s east side, an area historically prone to flooding. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Three ways Canadian communities are reducing flood**\n**risks**\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly \nexposed. There are large-scale programs available across the country providing flood protection \nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This \nprogram is helping build the resilience of communities and homes through a variety of \npreventative actions. \n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically \nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community \nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made \nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk \nby catching and absorbing rainfall and runoff from surrounding surfaces. \n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the \nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online \nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn \ntips to reduce the risk of flooding around their properties. The portal launched in the summer of \n2023 and was viewed 27,000 times in its first year. \n\nRebate programs are a powerful motivation for homeowners to make upgrades that might \notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of \neligible material and labour costs, up to a maximum of $1,000. More than 90 properties \ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and \nwater monitors and alarms, to better prepare them for extreme weather events. \n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg. \n\nwww.newscanada.com \n\nWord Count: 281", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "During climbing", - "page_start": 167, - "page_end": 167, - "source_file": "00-80T-80.pdf" - }, - { - "text": "We have general liability, vehicle liability, employment practices liability, pollution liability, directors and \noÇcers liability, worker's compensation and employer's liability coverage, as well as umbrella liability policies \nto provide excess coverage over the underlying limits contained in these primary policies. We also carry \nproperty insurance. Although we try to operate safely and prudently and while we have, subject to limitations \nand exclusions, substantial liability insurance, no assurance can be given that we will not be exposed to \nuninsured liabilities which could have a material adverse eÅect on our Ñnancial condition, results of operations \nor cash Öows. \n\n12", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**E. CYCLONE MOORINGS.**\n\nThe extent of the cyclone problem in Australia’s north and north west was emphasised when \n\nCyclone Tracey struck Darwin in 1974. The most powerful cyclone to cross the Australian coast \n\nwas Cyclone Vance in 1999, which passed near Dampier, destroying large parts of the towns of \n\nOnslow and Exmouth further to the south. \n\nThe problem is acute, particularly in the area between Exmouth and Port Hedland, which suffers \n\ncyclones of an intensity and frequency as high as anywhere in the world. The Mermaid Base is \n\ntypically on cyclone alert three times per season. The season is November to April. \n\nTo date there have been three options available to vessel owners when a cyclone approaches:. \n\n• Run to sea \n\n• Take refuge with crew onboard, on a mooring in the most sheltered location available such \n\nas the Dampier Archipelago or the Monte Bello Islands. \n\n• Construct a cyclone shelter. \n\nMermaid has undertaken significant engineering work on the placing of vessels on partially \n\nsheltered spread moorings, allowing the vessels to be secured near to shore and the crews \n\ndemobilized to take care of their families and attend to household cyclone preparation.", - "page_start": 15, - "page_end": 15, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "It is evident that**better technical and organisational prevention at workplaces**contributed to this \nstrong reduction of accidents;**prominent examples**of**such improvements**are: \n\n**Technical safer design**of moving vehicles, for example, fork lifts, heavy trucks and machines, light \nand noise warning signals for moving vehicles; safer design of machines like automatic shutdowns or \ndisconnections, two-hand operating of machines, for example, for pressing and punching, safer cranes \nincluding better technologies for communication between co-workers, coverage of moving parts, safer \ncompany cars, for example, safety belts, safer tools, for example, for drilling or cutting; improved PPE \nlike air-supplied breathing apparatus, steel-made gloves for meat workers, trousers that resist a \nchainsaw; minimum requirements for buildings, for example, forms and size of stairs and handrails, fire \nexits and fire alarms, safer ladders and scaffolds, 126 emergency equipment like eye wash and \nemergency shower; better monitoring of acute hazards, for example, in sewage water systems, exhaust \nand ventilation technologies, to avoid fumes, dusts, chemicals or contact with hazardous biological \nagents; strong safety obligations for work in confined spaces, work at height and work in trenches; \nintroduction of explosion zones and of non-sparking tools, a comprehensive system of warning signals, \nwarning signals for slippery floors and unsafe grounds, better warning systems and equipment in", - "page_start": 61, - "page_end": 61, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Killam properties inc \n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Try it: Wrap text around pictures \n\nSome of the pictures in this document are \nplaced beside a paragraph of text. Try exploring \ntext wrapping: Select the picture here, go to \nFormat > Wrap Text, and use the up/down \narrow keys to move between the options for a \npreview of the results.", - "page_start": 6, - "page_end": 6, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Units ( 1 )Number of Properties% of Apartment NOI and Equity Income
Nova Scotia
Halifax ( 2 )4.9705447.1 %
Sydney13921.2 %
5.1095648.3 %
New Brunswick
Moncton1.593309.8 %
Fredericton1.394209.9 %
Saint John1.143135.6 %
Miramichi9610.7 %
4.2266426.0 %
Ontario ( 3 )
Ottawa49262.7 %
London26422.8 %
Cambridge22523.4 %
Toronto37821.5 %
1.3591210.4 %
Newfoundland and Labrador
St. John ' s813117.3 %
Grand Falls14821.1 %
961138.4 %
Prince Edward Island
Charlottetown906176.6 %
Summerside8620.3 %
992196.9 %
Total12.647164100.0 %
\n\n\n \n \n \n \n [html]\n
SitesNumber of Communities% of MHC NOI
Nova Scotia2.6261634.3 %
New Brunswick224134.2 %
Ontario2.1441629.3 %
Newfoundland and Labrador17022.2 %
Total5.16435100.0 %
", - "page_start": 29, - "page_end": 29, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "As of January 31, 2015 and February 1, 2014, we were in compliance with this covenant. We will continue to monitor this covenant and \nbelieve that we will remain in compliance with this covenant during 2015.", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "news2.pdf", - "query": "How can citizens in Fredericton easily access flood risk data?", - "target_page": 1, - "target_passage": "New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Three ways Canadian communities are reducing flood**\n**risks**\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly \nexposed. There are large-scale programs available across the country providing flood protection \nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This \nprogram is helping build the resilience of communities and homes through a variety of \npreventative actions. \n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically \nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community \nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made \nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk \nby catching and absorbing rainfall and runoff from surrounding surfaces. \n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the \nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online \nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn \ntips to reduce the risk of flooding around their properties. The portal launched in the summer of \n2023 and was viewed 27,000 times in its first year. \n\nRebate programs are a powerful motivation for homeowners to make upgrades that might \notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of \neligible material and labour costs, up to a maximum of $1,000. More than 90 properties \ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and \nwater monitors and alarms, to better prepare them for extreme weather events. \n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg. \n\nwww.newscanada.com \n\nWord Count: 281", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "website that tracks which councils have published public toilet open data, and which have not. A \n\nmap like this solves one specific, concrete problem in the ordinary, daily life of many people: \n\n*\"Many older people have continence concerns and only go to places where they know there is a*\n\n*toilet. \"*\n\nIt is also possible and useful to pass the message that, when it comes to participation, activism and \n\ntransparency in politics, Open Data are a concrete and pacific weapon that is both very effective and \n\nvery easy to use for everybody. Dino Amenduni explained the first point well at the end of 2010 \n\nwith words and arguments that, while tightly bound to the current situation in Italy, apply, in spirit, \n\nalso to other countries: \n\n*in order to have your voice heard, it is necessary to threaten the private interests of*\n*politicians. The ways to achieve this goal are, in my opinion... Communication*\n*guerrilla: physical violence doesn't generate change anymore. Power is in the hands of*\n*those who have data. But those data must be communicated, made usable, fun to use,*\n*shareable, in order to give the feeling that knowledge brings a concrete (economic or*\n*intangible) personal advantage*\n\nProofs that participation to generation and usage of Open Data is easy would include, instead, \n\nexamples like electionleaflets. All citizens who can use a computer scanner and have Internet access \n\ncan upload on that website the leaflets distributed by the candidates during a campaign, making \n\nmuch easier (after other, more skilled volunteers have inserted the content of the leaflets in \n\nsearchable databases) comparisons between the candidates positions or making public some \n\ndisrespectful material (racist, insulting…). \n\n**4.7. Involve NGOs, charities and business associations**\nAs a final note and recommendation of this report, we'll note that, in comparison with hackers and \n\npublic officers, there are other parties that could and should play a role in Open Data adoption much \n\nbigger than what they have had so far. \n\nNGOs and charities, as well as professionals or business associations, all have lots to gain from \n\nOpen Data but don't seem, in many cases, to have realized this yet. Members of the first category \n\nshould routinely ask for support directly to Open Data civic hackers to gather (either from \n\ngovernment or citizens) more up to date information that is specifically relevant for their \n\ncampaigns. \n\nThe other associations, instead, should be much more active both in publishing Open Data about \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableAdvance and developedStateStatisticsTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableStateGene 2011. FM Scunla Saneriors SzTableTable
", - "page_start": 31, - "page_end": 31, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "officially lobbying Public Administrations to get the PSI they could use for the same purposes. As \n\nother suggestions made here, these are activities that should start at the city and regional level, first \n\nwith custom-made education initiatives, then with specific data-based services. Engaging all these \n\nactors in the adoption of (local) Open Data will be one of the big challenges of the next years. \n\n**5. Bibliography**\nBesides those explicitly linked from the text, this report has drawn inspiration by many other \n\nresources. The most important ones are listed here, but the complete list should be much longer. We \n\nwish to thank first the authors of the works listed below and, immediately after, to all the activists, \n\ninside and outside governments worldwide, who are working on this topic. \n\n1. Are you prepared for the pitfalls of Gov 2.0? \n\n\n \n \n \n \n [html]\n
3. Canada launches data. gc. ca.- what works and what is hroken
4. Creative Commons and data bases : huge in 2011, what you can do
5. Defining. Gox. 2.0. and Open. Goxsernment
6. How. Government. Data Can. Improve Lives
7. If you like solar, tell your utility to publish this map
8. Indian. corruption. backlanh. builds. after... year_of. the. treasure. hunters.”
9. Informacion. Cisica... Just. What. in. Civic. Information?
10. Is open government just about information?
11 - LSDL : Jn. un. click. la mappa del. crimine
12. La. casta. e. online :. dategli. la. caccial
13. Linee guida UK sullopendata
14. MSc dissertation on Open Government Data in the UK
15 - Open. Data.( 2 ): Effective. Data. Use.
16. Open. Data :. quali. prospettive. per. la. pianificazione?
IT - Open Knowledge Foundation Blog * Blog Archive * Keeping Open Government Data
Open2
18. Open. data,. democracy. and. public. sector. reform
", - "page_start": 32, - "page_end": 32, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "**3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen,*before*\n\nthey are published online. The most common concerns of this type are (from Open Public Data: \n\nThen What? - Part 1): \n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as \n\nprivate property by private corporations, because the public agencies whose job was to \n\nproduce those data, can't sell them anymore. \n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of \n\nreducing trust in institutions and inhibiting decision-making even more than today. \n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account \n\nis that, once data are open, routinely used and monitored by as many independent users as possible, \n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the \n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very \n\nexpensive, studies and surveys to update a whole corpus of data in one run. \n\nBesides, and above all, even if opening data always destroyed any source of income for the public \n\noffice that used to create and maintain them, this problem would only exist for the PSI datasets that \n\nare*already*sold today. Such data, even if of strategic importance as is the case with digital \n\ncartography, are only a minimal fraction of all the PSI that could and should be opened to increase \n\ntransparency, reduce the costs of Government and stimulate the economy. In all these other cases: \n\n• the money to generate the data already arrives by some other source than sales and \n\nlicensing(but even with those data it may be possible to generate them by crowdsourcing, \n\nthereby reducing those costs!) \n\n• the only extra expense caused by publishing those data online (assuming they're already \n\navailable in some digital format, of course!), would be the hosting and bandwidth costs, that \n\nmay be greatly reduced by mirroring and other technical solutions like torrents, already \n\nwidely used to distribute Free/Open Source Software (FOSS) through the Internet. \n\n**3.6.2. Real impact of data manipulation or misunderstanding**\n\nThe fix for the risk that data is manipulated is to not only open government data and procedures, but \n\nto simplify the latter (which eventually also greatly reduces cost) as much as possible. Abundance \n\nof occasions to secretly play with data and how they are managed is a symptom of excessive, or \n\npeak complexity: again, problems and risks with Open Data are a symptom of a [pre-", - "page_start": 16, - "page_end": 16, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "based PSI analysis and presentation, not just to crime mapping: \n\nIn general, a map is just a map, not reality. It doesn't always and necessarily provide \nscientific evidence. Crime maps, for example, are NOT safety maps, as most citizens \nwould, more or less consciously, like them to be: a tool that tells them where to buy a \nhouse their according to the level of criminality in the district. \n\nWhen used in that way, crime maps can give unprepared users two false impressions: \nthe first, obvious one, is that certain areas are only criminal spaces, exclusively \ninhabited by criminals. The other is to encourage a purely egoistic vision of the city, \nwhere the need for safety becomes paranoia and intolerance and all that matters is to be \ninside some gated community. This doesn't lower crime levels at all: the only result is to \nincrease urban segregation. \n\nTo make things worse, crime data not analyzed and explained properly don't just contribute to \n\nstrengthen egoistic attitudes and lock the urban areas that are actually the most plagued by crime \n\ninto their current difficult state indefinitely. Sometimes, they may even perpetuate beliefs that are, \n\nat least in part, simply false. Of course, when those beliefs not grounded in facts already existed, \n\nopen crime data can help, by finding and proving the gaps between perception of criminality and \n\nreality. Belleri, for example, notes that residents of Milan consider the outskirts of their city more \n\ndangerous than downtown Milan, while Londoners think the opposite about London... but in both \n\ncities the truth emerging from data is exactly the opposite (at least for certain categories of crime) of \n\nwhat their residents believe. \n\n**3.6.3. Unequal access**\n\nEven ignoring crime mapping, in some worst case scenarios, data openness may be not only \n\nhindered by social divisions, but also create or enhance them. If citizens can't find and recognize \n\nreal, relevant*meaning*and practical value in data, as well as way to use them to make change \n\nhappen, there won't be any widespread, long lasting benefit from openness. How can we guarantee, \n\ninstead, that such meaning and value will be evident and usable? What are the ingredients for \n\nsuccess here? \n\nEnhancing access to PSI it's harder than it may seem because it isn't just a matter of physical \n\ninfrastructure. It is necessary that those who access Open Data are in a position to actually \n\nunderstand them and use them in their own interest. \n\nThis is far from granted also because, sometimes, the citizens who would benefit the most from \n\ncertain data are just those, already poor, marginalized and/or without the right education, who have \n\nthe least chances to actually discover and be able to use them. This is what G. Friedman was \n\n\n \n \n \n \n [html]\n
TableTableControlControl
", - "page_start": 18, - "page_end": 18, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides \n\nthat those from (properly done) Open Data are a really tiny percentage of the total. \n\nThis is a consequence of the fact that data about us end up online from the most different sources \n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never \n\nmind*prove*, that they've been used against our interest. There have been concerns, for example, that \n\ninsurance companies may charge higher fees for life insurance to those among their customers \n\nwho... put online a family tree from which it shows that they come from families with an average \n\nlife expectancy lower than usual. \n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of \n\ndata, that weren't even published by any Public Administration? Of course, publishing online \n\ncomplete, official Census data of several generations, in a way that would make such automatic \n\nanalysis possible would be a totally different matter. \n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is \n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always \n\nremember and explain that: \n\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air \n\npollution measurements....) \n\n2. The majority of data that are directly related to individuals (e.g. things like names and \n\naddress of people with specific diseases, or who were victims of some crime) have no reason \n\nto be published,**nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to \n\npublic offices, Government and Parliament members etc...) already exist in many countries \n\n4. Very often, in practice, Open Data struggles only happen about*when and how*to make \n\navailable in the most effective way for society information that was*already*recognized as \n\npublic.*What*to declare public, hence open, is indeed a serious issue (more on this in the next \n\nparagraph) but is a separate one. \n\n**3.8. Need to better define what is Public Data**\nTogether with citizens education, there is a huge challenge that Governments and the Open Data \n\nmovement will have to face (hopefully together) in 2011 and beyond. This challenge is to update \n\nand expand the definition of Public Data and to have it accepted by lawmakers and public \n\nadministrators.", - "page_start": 22, - "page_end": 22, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "government. Even ignoring data openness, this is essential for at least three other reasons. The first \n\nis to protect a public administration from having to pay*twice*for those data, if it needs it again in \n\nthe future for some other internal activity, not explicitly mentioned in the initial contract. The \n\nsecond reason is to not spend more than what is absolutely necessary to respond to public records \n\nrequests, that is to comply with Freedom of Information laws. \n\nThe final reason is to guarantee quality assurance and detection of abuses at the smallest cost, that is \n\nsharing it with all the citizens using the public services based on those data. A real world example \n\nof this point comes from the \"Where's My Villo?\" service in Brussels. Villo! is a city-wide bike- \n\nsharing scheme started in May 2009, through a partnerships with a private company: JCDecaux \n\nfinances the infrastructure and operates it, in exchange for advertising space on the bikes \n\nthemselves and on billboards at the bike sharing stations. The availability of bikes and parking \n\nspaces of each station is published online in real time on the official Villo's website. \n\nWhen the quality of service decreased, some citizens started \"Where's My Villo?\", another website \n\nthat reuses those data to measure where and how often there aren't enough available bikes and \n\nparking spaces, in a way that made it impossible for JCDecaux to deny the problems and stimulated \n\nit to fix them. Both this happy ending and the fact that it came at almost no cost to the city, because \n\ncitizens could monitor the service by themselves, were possible just because the data from the \n\nofficial website were legally and automatically reusable. \n\n**3.4. The price of digitization**\nIn practice, public data can be opened at affordable costs, in a useful and easily usable way, only if \n\nit is in digital format. As a consequence of this fact, demand for Open Data exposes a problem that \n\nalready existed and must be fixed anyway, regardless (again) of openness. Any substantial increase \n\nof efficiency and reduction of the costs of Public Administrations can only happen when data and \n\nprocedures are digitized. The problem is that such digitization (which, obviously, must happen \n\nanyway sooner or later) can be very expensive and we are only now starting to really realize how \n\nmuch. Actual, material costs are not the worst problem here. Activities like semi-automatic \n\nscanning of paper documents or typing again their content inside some database, are relatively low, \n\none-time expenses that are also very easy to calculate and budget in advance with great precision. \n\nThe real costs are those at the social, cultural, historical and workflow reorganization level. What is \n\nreally difficult, that is expensive in ways that are hard to predict, is to fit inside digital, more or less \n\n\n \n \n \n \n [html]\n
duration of developmentdilutionsDiabetes,1OTITIdUS,IldDIUSdIIUMaximumGenome ( mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, meaIIIdyDeOver
", - "page_start": 13, - "page_end": 13, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "decisions. Ideally, this training should be provided at a local level with local programs, in a way that \n\nmakes it possible to use it on local issues, for the reasons and in the ways discussed in the next \n\nparagraph. For example, visualization techniques like those used by ABC News to show the effects \n\nof the March 2011 Japan Earthquake, in which all the user has to do to compare scenes from before \n\nand after the earthquake is to move a slider, should be routinely used to explain proposals about \n\nurban planning, zoning and related topics. \n\n**4.6. Focus on local, specific issues to raise interest for Open**\n**Data**\nConsidering the continuous evidence and concerns about scarce interest and preparation of citizens \n\nto use Open Data in their political, economic and professional decisions, one of the final \n\nrecommendations of the Open Data, Open Society report confirms its importance and needs to be \n\nrepeated: it is very effective, if not simply necessary if the goal is to generate a critical mass of \n\ncitizens that demand and use Open Data in the shortest possible time, to practice all the \n\nrecommendations of this report*at the local level*, \n\nMost people encounter their local governments much more often then their national ones. When \n\nworking within a single city or region it is much easier to inform citizens, raise their interest and \n\ninvolve them, because they would be searching*local*solutions to improve*local*services and/or \n\nsave*local*money. There may also be much more opportunities to do so, especially in this period of \n\nfinancial crisis that will see substantial decreases both in credit by financial institutions and in \n\nsubsidies from central governments. Concreteness and, as they say in marketing, \"customer focus\" \n\nmust be the keys for local activists and public employees working on local Open Data: \n\n• work on specific issues and with precise objectives \n\n• focus on immediate usefulness \n\n• work on demand, on the*services*that people want. Required services define what data must \n\nbe open, not the contrary \n\nThis is the most effective, if not the only strategy, to solve one of the biggest debates in open data: \n\n*\"how do we get people to use the data that we publish?\"*. The right question, instead, is \"what data \n\ndo people want?\". Even if citizens don't realize yet that what they actually want is more Open Data, \n\nor that what they need can be done more quickly and cheaply by releasing some information in that \n\nway. \n\n\n \n \n \n \n [html]\n
A genat example of what all this means is the < underline > Great Enjtish Public Tuiliet Magc a public participation31 / 34Cagvright 2013 LIDR, Sourkin Segerion Sint Rime, This work is released ander o Cinotive Commers atribution Acrease ( htp :// creativecomerung / liceners / hy5.01 )
", - "page_start": 30, - "page_end": 30, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "What is, exactly, Public Data? A definition that is accepted almost implicitly is*\"data that is of*\n\n*public interest, that belongs to the whole community, data that every citizen is surely entitled to*\n\n*know and use\"*. This definition is so generic that accepting it together with the assumption that all \n\nsuch data should be open as preached by the Open Data movement (online, as soon as possible, in \n\nmachine readable format with an open license etc...) doesn't create any particular problem or \n\nconflict. \n\nReal problems however start as it has happened all too often so far, whenever we assume more or \n\nless consciously that \"Public Data\" in the sense defined above and data directly produced by \n\nGovernments and Public Administrations, that is what's normally called PSI (Public Sector \n\nInformation) are the same thing. \n\nThere is no doubt that Governments and Public Administrations produce huge quantities of Public \n\nData. But this is an age of privatization of many public services, from transportation to healthcare, \n\nenergy and water management. This is an age in which many activities with potentially very serious \n\nimpacts on whole communities, like processing of hazardous substances or toxic waste, happen \n\n*outside*Public Administrations. The paradox is that, as Sasaki put it, this increased privatization is \n\nhappening in the very same period in which*\" we are observing a worldwide diffusion of access to*\n\n*information laws that empower citizens to hold government agencies accountable.\"*\n\nIn such a context, \"Public Data\"is critical just because it is a much bigger set of data than what \n\nconstitutes traditional, official PSI. \"Public Data\" includes all that information*plus*the much bigger \n\namount of data describing and measuring all the activities of private companies, from bus \n\ntimetables to packaged food ingredients, aqueducts performances and composition of fumes \n\nreleased in the atmosphere, that have a*direct impact*on the health and rights of all citizens of the \n\ncommunities affected by the activities of those companies. \n\nAre such data \"Public\" today, in the sense defined at the beginning of this paragraph, that is \n\nsomething every citizen has the right to know without intermediaries or delegates, or not? Should \n\nthey be public? If yes, shouldn't law mandate that all such data be Open (that is, published online as \n\nsoon as possible, in machine readable format with an open license etc...) just like, for example, the \n\nbudget of some Ministry? Answering these questions may be one of the biggest challenges for the \n\nOpen Data community, and for society as a whole, in the next years. \n\nHere are, in order to facilitate reflection on this issue, a few recent, real world examples of \"Public \n\n\n \n \n \n \n [html]\n
Data * that are not PSI, and of the impacts of their lack of openness.TableSpecificity
", - "page_start": 23, - "page_end": 23, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "more concrete over time is damage control. In a world that produces digital data without \n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to \n\npredict, practically impossible to avoid and increasingly common. Opening public government data, \n\nthat is providing plenty of officially verified information, becomes therefore also a damage control \n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official \n\nOpen Public Data, individual citizens, political parties or other organizations will start to process \n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different \n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong \n\nconclusions. This is not some theoretical possibility far in the future, as this real world example \n\n(from a comment to an Open Data discussion in an italian blog) proves: \n\n\"*on the*[non italian]*Geonames website you can download geo-referenced data*\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n*that not one was right. What should be done in such cases?*\n\n**2.1. Wikileaks and the Open Data movement**\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published \n\nby Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence \n\nof a more or less conscious mixing of the two themes, because in a very general sense, both Open \n\nData and Wikileaks are about transparency, accountability and democracy. \n\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks \n\nscandal. \n\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and \n\ntransparency whenever government activities are concerned. Citizens must be able to know what \n\nthe state is*actually*doing but sometimes, be it for careful evaluation of all the alternatives or \n\nbecause of security, it must be possible to work behind closed doors, at least temporarily. We'll \n\ncome back to this point later in this report. \n\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness \n\nand transparency in politics, not only there are deep differences between the two ideas but, in our", - "page_start": 4, - "page_end": 4, - "source_file": "Open_Data_Report.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed2.pdf", - "query": "In these mice, which lumbar levels were the dorsal root ganglion removed from?", - "target_page": 3, - "target_passage": "L3 to L5 DRGs were removed and postfixed for another 2 hours", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "– 31.[ 48 ]Schulte A, Degenbeck J, Aue A, Schinder - Ute M, Schioti F, Schneider M, Monoranu CM, Bishner M, Pharn M, Antonadeis G, Blunn R, Rithnei HL, Human dorsal root ganglia after plexus injury ; elther preservation or loss of the multicellular uni[ 49 ]Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, BlumR, Aus A, Unbiased analysis of the dorsal root ganglion after peripheral nerve injury : ro neuronal loss, no gliosis, but satellite glial cell plasticity, PAIN 2023 ; 164 : 728 -[ 50 ]Shi TuS, Tandrup T, Bergman E, Xu ZOD, Ulthake B, Hiskteit T. Effect of peripheral nerve injury on dorsal root ganglion neurons in the C57 BL / SJ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
[ 53 ]
Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000 ; 422 : 172 – 80.
[ 54 ]
Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons : diagnosis and prevention. J Hand Surg Eur Vol 2011 ; 36 : 730 – 4.
[ 55 ]
Uncekin D, Furier A, Islam S, Abdo H, Lonnetterg P, Lox D, Herling - Leffer J, Heaggthon J, Kharchenko O, Kharcherko Pai, Linnansson S, Emfors P : Unbiased classification of sensory neuron types by large - scale single - cell RNA sequencingi
[ 56 ]
Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent awotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997.388 - 307 - 12.
[ 57 ]
Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974 ; 248 : 740 – 43.
[ 58 ]
WangCr, Gx L. PluenY, GengX, Xx, M, YangN, YvLL, BengY, ZhurC, Yang Y, Zhox Y, Gvan X, Luo W, LuG, DongK, YvLG, LanL, TlengZ, Fleolifation of MrgprD by TRP - A1 promotes neuropathic pain, FASEB, J 2019.33 : 1360 – 73.
[ 59 ]
Wang H, Zyka MJ. Mrgprd - expressing polymodal nociceptive neurons imervate most. known classes of substantia gelatinosa neurons. J Neurosoi 2009 ; 29 : 13202 – 9.
[ 60 ]
Wang R, Guo W, Ossipox MH, Vanderah TW, Porreca F, La J. Glial cell line - derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and preventis the expression of experimental neuropathic pa
[ 61 ]
Wang X, Archibald ML, Sitevens K, Baidridge WH, Chauhan BC. Qyan fluorescent protein ( CFP ) expressing cells in the refina of Thy1 - CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010 ; 468 : 110 – 4.
[ 62 ]
Warwick C, Cassidy C, Hachisulia J, Wright MC, Baunbauer HM, Adelman PC, LaskH, Shrahian TO, Ross SE, Koerbe HR, MrgordOre Ineage neurons mediate optogenetic alodynia through an emergent polynaptic circuit, PAN 2021 ; HS2 ; 2120 – 31.
", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "December 2024· Volume 165· Number 12 \n\ncell death and apoptosis with more than 10 genes were \nexamined. Filtered count data of expressed and nondifferentially \nexpressed genes were used as a background. \n\n2.8. Dorsal root ganglion culture \n\nobserved 7809 6 153 neurons per DRG; this was not significantly \ndifferent to the number of neurons in the contralateral DRG \n(7917 6 349), whereas cell number approximately halved by \n8 weeks postinjury to 3963 6 410 neurons per DRG (Fig. 1C). \nSeparating analysis into intact vs axotomized afferents revealed \nthat only axotomized afferents were lost, with no difference \nobserved in numbers of intact afferents (Fig. 1D). Between 1 and \n8 weeks after injury, we observed a 61.0 6 7.0% decrease in the \nnumber of GFP1 neurons. This loss of injured afferents resulted \nin a loss of neuron-containing (ie, excluding white matter regions) \nDRG volume (Fig. 1E), but not neuron density (Fig. 1F). Cell loss \npredominantly occurred between 1 and 2 weeks postinjury and \nstabilized after this timepoint. Population distributions of the \ncross-sectional area of nucleated, \ntdTomato-expressing cell \nprofiles were not significantly different at 1 vs 8 weeks post- \nSNItrans, in contrast to GFP-expressing/injured afferents, in which \na loss of a population of small afferents at 8 weeks postinjury was \nobserved (Fig. 1G). \n\nDorsal root ganglia were dissected from MrgDCreERT2;Ai32 and \nCalcaCreERT2;Ai32 mice .1 week after dosing with tamoxifen and \nenzymatically digested at 37˚˚C for 80 minutes in dispase type II \n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington \nBiochemical), as described previously.63 Mechanically dissoci- \nated cells were plated onto laminin/poly-D-lysine (R&D Systems, \nMinneapolis, MN) treated coverslips in complete Neurobasal Plus \nmedium (Neurobasal Plus media supplemented with 2% (vol/vol) \nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic–antimycotic \n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth \nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, \nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor \n(GDNF, PeproTech) were added to the media under some \nconditions. Cytosine b-D-arabinofuranoside (4 mM) was added to \nthe media for 24 hours the day after plating to reduce the \nproliferation of nonneuronal cells. Media was refreshed 3 times \nper week thereafter. Cultures were fixed for 10 minutes at room \ntemperature with 4% paraformaldehyde and subsequently \nprocessed by immunocytochemistry (described earlier). \n\nSNItrans resulted in a mixed population of axotomized and intact \nafferents within the L4 DRG. Therefore, we developed an approach \nto restrict our analysis to axotomized afferents, without relying on \ntransgenic labelling, and used this as a complementary approach to \nconfirm our findings. We injected the neuronal tracer FB into the \nglabrous, tibial innervation territory of both hindpaws 1 week before \ncommon peroneal and tibial transection (SNItrans) or crush (SNIcrush) \nsurgeries (Figs. 2A and B). FastBlue-uptake was complete across \nneurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ \nC84), so this approach allowed us to profile a sample of the \naxotomized afferents. Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) \ninjuries resulted in a rightward shift in population distributions of the \ncross-sectional area of nucleated, FB-labelled DRG neurons when \ncompared with contralateral DRG, consistent with a loss of small \nafferents post–nerve injury.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "Mice were briefly anesthetized during the procedure, induced with \n3% to 5% isoflurane, and then maintained at 1.5% to 2% as required. \nHindlimbs were taped with the plantar surface of the paw facing up, \nand a custom, 26G removable needle with a 30˚ bevel, attached to \na 25-mL Hamilton syringe, was inserted between the 2 distal-most \nfootpads, towards the medial aspect of the hindpaw. The needle \nwas then rotated 90˚, so the bevel faced medially. Furthermore, 4-mL \nFastBlue (FB; 2% in sterile phosphate-buffered saline (PBS); CAS# \n73819-41-7; Polysciences, Inc, Warrington, PA) per paw was then \nslowly injected, and the needle was left in place for 10 seconds, \nbefore rotating and carefully retracting to avoid backflow of FB along \nthe needle track. This prevented the FB bolus from contacting the \nsural innervation territory of the lateral hindpaw, restricting it largely to \nthe tibial innervation territory of the glabrous hindpaw skin. \n\nformaldehyde. L3 to L5 DRGs were removed and postfixed for \nanother 2 hours, cryoprotected in 30% sucrose overnight, and \nthen embedded in optimal cutting temperature media (OCT; \nTissue Tek, Alphen aan den Rijn, the Netherlands). Dorsal root \nganglia were sectioned on a Leica CM1950 cryostat at 30 mm, \nwith every section collected serially on 5 Superfrost Plus slides \n(VWR, Lutterworth, United Kingdom) and each slide containing 1 \nin every 5 sections (4-7 sections per slide). One slide per DRG was \nselected at random and was washed with PBS, before being \nincubated with appropriate primary antibodies (Table 2) diluted in \n5% normal donkey serum and 0.3% Triton X-100 in PBS for \n3 days at 4˚C. After PBS washes, slides were incubated with \nappropriate secondary antibodies (Table 2) in the same PBS/ \n(normal donkey serum) NDS/Triton-X100 solution as for prima- \nries, overnight at room temperature. Slides were washed and \ncoverslipped with VectaShield Vibrance Hardset mounting media \n(Vector Labs, Newark, CA), with 4’,6-diamidino-2-phenylindole \nincluded in mounting media where FB-labelled cells were not \nbeing examined. Sections were imaged using a Zeiss LSM900 \nAiryscan confocal microscope equipped with 405-, 488-, 561-,", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed2.pdf" - }, - { - "text": "Figure 1. SNItrans induces death of small primary afferent neurons, accompanied by a reduction in volume, not cell density, of the dorsal root ganglion. (A) \nApproach to differentially labelled intact afferents with tdTomato and damaged afferents with GFP after peripheral nerve injury using the AvilFlpO;Atf3CreERT2;RC:: \nFLTG mouse line and schematic of experimental timeline. (B) Representative image of GFP, tdTomato, and NeuN expression in an L4 DRG, 2 weeks after SNItrans. \nScale bars 5 100 mm. (C and D) Stereological quantification of the total number of DRG neurons (C) or number of axotomized and intact neurons (D) in the L4 DRG \n1, 2, 4, and 8 weeks after SNItrans or contralateral (contra) to injury. (C) One-way ANOVA with Tukey posttests; F4,10 5 37.98, P , 0.001. (D) Two-way RM ANOVA; \nTimepoint 3 Color interaction F4,10 5 39.04, P , 0.001, n 5 3 mice; Tukey posttests (between injured groups): †P , 0.05 vs contra, ‡P , 0.05 vs 1-week. (E) \nVolume of DRG-containing cells (ie, excluding white matter tracts) following SNItrans. One-way ANOVA with Tukey posttests; F4,10 5 21.25, P , 0.001, n 5 3. (F) \nNeuronal density within the DRG following SNItrans. One-way ANOVA; F4,10 5 2.77, P 5 0.09, n 5 3. (G) Population distribution of uninjured and injured afferents by \ncross-sectional area, 1 and 8 weeks post-SNItrans. Kolmogorov–Smirnov tests of cumulative distributions; Uninjured: D 5 0.08, P 5 0.18; Injured: D 5 0.32, P , \n0.001; n 5 310 to 427 neurons from 3 mice.*P , 0.05,**P , 0.01,***P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green \nfluorescent protein. \n\nprotein) neurons 28 days after sham surgery or SNItrans (Figs. 3A \nand B). SNItrans, but not sham, resulted in a significant decrease \n(54.0 6 6.6%) in the total number of MrgD-YFP1 neurons in L4 \nDRG (Fig. 3C).", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" - }, - { - "text": "Figure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous \ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN \nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3-mm intervals through the entirety of a 30-mm-thick tissue section. Scale bar 5 \n100 mm. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) \nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov–Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , \n0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG \nvolumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot \ndetection feature. Scale bar 5 100 mm. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov–Smirnov tests of \ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, \nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F2,145 8.26, P 5 0.004; n 5 4 to 5 mice; ˇS´ıd ´ak multiple comparisons tests:**P , 0.01. ANOVA, \nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. \n\n3.3. Spared nerve injury induces a loss of Trpm81 and \ncalcitonin gene-related peptide1 but not myelinated dorsal \nroot ganglion neurons \n\nloss of Trpm81 (cold- \ninduced loss. To investigate potential \nsensitive), calcitonin gene-related peptide1 (CGRP) (peptider- \ngic), and myelinated subpopulations of DRG neurons following \nnerve injury, we applied our FB-labelling approach in Trpm8FlpO; \nRC::FLTG (FlpO-dependent tdTom expression), CalcaCreERT2; \nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP \nmice, respectively (Figs. 4A–D). Trpm8-tdTom was expressed Loss restricted to nonpeptidergic nociceptors would not fully \naccount for the degree of total neuron loss that we observed. \nTherefore, we studied a range of other subpopulations, both \nsmall and large in diameter, for their vulnerability to injury-", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed2.pdf" - }, - { - "text": "Peripheral nerve injury results in a biased loss of \nsensory neuron subpopulations \nAndrew H. Coopera, Allison M. Barryb, Paschalina Chrysostomidoua, Romane Loligniera, Jinyi Wanga, \nMagdalena Redondo Canalesa, Heather F. Tittertona, David L. Bennettb, Greg A. Weira,*\n\nAbstract \nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability \nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury \nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label \nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared \nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron \nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of \nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) \nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic \nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG \nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and pain. \n\n1. Introduction \n\nDorsal root ganglion (DRG) neurons represent a molecularly \nand functionally heterogeneous population. Under normal \nconditions, \nthe \nsomatosensory nervous system to detect a myriad of sensory \nstimuli that result in the perceptions of touch, temperature, \nitch, and pain. Following nerve injury, physiological changes in \nDRG neurons lead to hyperexcitability,57 which is a key \npathological driver of neuropathic pain.20,63 Concomitant \nmolecular changes in discrete subpopulations also occur, \nand these have recently been comprehensively described in \nsingle-cell37,44 and subpopulation-specific sequencing stud- \nies.3 These studies describe a transient and generalized \nreduction in the expression of subpopulation-specific genes \nfollowing nerve injury.3,37,44 \n\nthis diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - }, - { - "text": "Neuronal \nloss has been proposed as a key contributor to poor \nfunctional recovery following nerve injury,54 and biased survival of \ntypes might be expected to contribute to \ndifferent afferent \nmodality-specific sensory deficits. Beyond loss of function, does \nDRG neuron loss contribute to chronic pain, in either an adaptive or \nmaladaptive manner? Intrathecal delivery of GDNF is neuro- \nprotective and reverses the reduction in the number of IB4-binding \nDRG neurons and central terminals seen following transection.5 \nTreatment is concurrently analgesic and abrogates pain-related \nbehaviors.7,60 However, the pleiotropic nature of GDNF makes it \nimpossible to directly attribute the analgesic effects to the reversal \nof neuron loss. Indeed, it is possible that GDNF exerts its effect by \nactions on intact nonpeptidergic nociceptive afferents,52 activation \nof which is known to drive aversive behaviors in the neuropathic \nstate.62 These data leave the contribution of nonpeptidergic \nnociceptor loss to behavior in the GDNF treatment paradigm \nambiguous. Other pharmacological approaches have been found \neffective at reversing a neuronal \nloss in rodent models, but the \nimpact on pain behavior was not studied.21,22 \n\nWhile we made efforts to profile the loss of several molecularly \ndiscrete sensory neuron populations, we acknowledge that not all \nsubtypes were profiled. Furthermore, recent single-cell RNA \nsequencing has given us a more granular appreciation of the \nheterogeneity of sensory neurons.42 Future studies could \nleverage our experimental approach and new transgenic lines \nto characterize the loss of neurons in more detail. Such \nexperiments may be pertinent before embarking on molecular \nor functional profiling of populations post–nerve injury. \n\nRodents develop marked mechanical and thermal hypersen- \nsitivity rapidly following nerve injury and before timepoints at \nwhich neuron loss is observed.10 This lack of a temporal \ncorrelation may suggest a limited contribution to evoked hyper- \nsensitivities. The temporal profile of ongoing tonic pain (eg, pain \naversiveness as measured by condition place preference \nassays26) is less defined and so is its correlation to the timing of \nneuron loss. \n\n4.5. Conclusions \n\nIn sum, we have provided data from multiple complementary \nexperimental approaches to support the hypothesis that DRG \nneurons are lost following nerve injury in mice. We describe \na substantial loss, which is biased towards specific subpopula- \ntions and particularly present in small-diameter nonpeptidergic \nnociceptive neurons. \n\nThere are many anatomical sites within the somatosensory \nnervous system where differential \nloss of sensory neuron \npopulations could impact neurobiology. For example, loss of \ncutaneous afferents may afford more opportunity for plasticity in \nreinnervation patterns, such as collateral sprouting of uninjured or \nsurviving afferents, and the types of nerve endings made by \ndifferent molecular subpopulations.17,27 It also seems likely that the \ndeath of many neurons within a DRG could contribute to the \nexpansion and activation of immune cell types, which are known to \nplay a major role in neuropathic pain.30,69 Finally, under normal \nconditions, peripheral sensory input is integrated into the dorsal \nhorn of the spinal cord by complex interneuron circuitry. Many \nspinal circuits are engaged by convergent input from different \nafferent types.9,41,70 Therefore, selective loss of input from discrete \nafferent types could undoubtedly impact the normal processing of \nremaining afferent signals.34 Experimentally abrogating neuronal \nloss may be a fruitful approach to assess the contribution to \nnervous system plasticity (adaptive or maladaptive) following injury. \nIn this regard, our in vitro readout would be a useful experimental \n\nConflict of interest statement", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed2.pdf" - }, - { - "text": "[html][ 31 ]Love MI, Huber W, Anders S. Moderated estimation of fold change and dispersion for FWA - seq data with DESeq2. Genome Bloi 2014 ; 15.550.[ 32 ]Madsten L, Mao T, Koch H, Zhuca, I, Bermyl A, Fujijawa B, Hsa VWA, Garcia A, J, Gu X, Zanella S, Kidney J, Gu H, Mac Y, Hooks BM, Boyden ES, Buzzaki G, Faminez JM, Jones AR, Swdood #, Han X, Vumer EE, Zang H - I A A toolbox of One - dependent optogenetiz[ 33 ]Madisen L, Zwingman TA, Sunkin SM, Oh SW, Zariwala HA, GuH, NgLL, Palmiter RD, Hawrylycz MJ, Jones AR, Lein ES, Zanght A robust and high - throughout Cre reporting and characterization system for the whole mouse brain. Nat Neurosi 2010 ; 13 :[ 34 ]McCoy ES, Teylor - Bleke B, Street SE, Pribisko AL, Zheng J, Zylka MJ. Peptidergic CISRPα primary sensory neurons encode heat and itch and tonically suppress sensitivity to cold. Neuron 2013 ; 78 : 138 – 51.[ 35 ]McKay Hart A. Brannstrom T. Wiberg M. Terenghi G. Primary sensory neurons and satellite cells efter peripheral arotomy in the adult rat : timecourse of cell death and elimination. Exp Brain Res 2002 ; 142 : 008 – 18.[ 36 ]Molender C, Wang H, Rivero - Melan C, Grant G. Early decline and late restration of spinal cord binding and transgarglonic transport of isolectin B4. from Griftonia simplicit / lia 1 after peripheral nerve transection or crush. Restor Nes[ 37 ]Nguyen MQ, Le Pichon OE, Rybs N. Stereotyped trenscriptomic transformation of somatosensory neurons in response to injury. Effe 2019 ; 8 : a49679.[ 38 ]Oliveira ALR. Apoptosis of sensory neurons and satellite cells after sciatic nerve transection in C57BL / 6J mice. Braz. J Med BloI Res 2001 ; 54 : 375 – 80.[ 39 ]Olson W, Abdus - Saboor I, Oui L, Burdge J, Paabe T, Ma M, Luo W. Sparse genetic tracing reveals regionally specific functional organization of mammalian nociceptors. Eife 2017 ; 6 : e20607.[ 40 ]Plummer NW, Exsyukova IY, Robertson SD, de Marchena J, Tucker CJ, Jensen P. Expanding the power of recombinase - based labeling to uncover cellular diversity. Development 2015 ; 142 : 4365 – 93.[ 41 ]Prescott SA, Ratte S. Pain processing by spinal microcircuits : afferent combinatorics. Curr Opin Neurobiol 2012 ; 22 : 631 – 9.[ 42 ]QiL, bikolsM, ShiD, Reddy P, Walker C, LazglyexaA, Vosin T, Pawlak M, Kuchroo VA, Chiu I, Glnty DD, Shamma N, A DRE genetic tookit revasis molecular, morphological, and functional diversity of somatosensory neuron sultypeis. Isofwi 200[ 43 ]Reid AJ, Mentovani C. Shawcross SG, Terenghi G, WibergM. Phenotype of distinct. primery sensory. Mferent subpopulations and caspase - S expression following axotomy. Histochem Gell Bist 2011 ; 136.71 – 8.[ 44 ]Renthal W, Tochitsky I, Yang L. Cheng YO, Li E. Kawaguchi R, Gescheird DH, Woolf Cul. Transcriptional reprogramming of district peripheral sensory reuron subtypes after axonal rijury. Neuron 2003 ; 108 : 129 – 44, eil.[ 45 ]Schindelin J. Argandia - Cerreres I, Fite E. Kaynig V. Longair M, Pietzxch T. Preibisish S. Raveden C. Saalfeid S. Estrnit B. Trevac J - Y. White Du, Hartenitein V. Elsolei K. Tonancole P. Cerdona A. Fiti an open - source platform for biologio[ 46 ]Schmalbruch H. Loss of sensory neurons after sclatic nerve section in the rat. Anal Rec 1987 ; 219 : 323 – 9.[ 47 ]Schmitz C, Hof PR. Design - based stereology in neurosclence. Neuroscience 2005 ; 130 : 813 – 31.[ 48 ]Schulte A, Degenbeck J, Aue A, Schinder - Ute M, Schioti F, Schneider M, Monoranu CM, Bishner M, Pharn M, Antonadeis G, Blunn R, Rithnei HL, Human dorsal root", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.9. Statistical analysis \nData are expressed as mean 6 SEM unless otherwise specified, \nand P values of less than 0.05 were considered significant. Power \ncalculations were performed using G*Power 3.1.9.7.15 A \nquantitative Venn diagram was created using BioVenn.25 All \nother statistical analyses were performed in Prism 10 (GraphPad \nSoftware, Inc, Boston, MA) or R using paired t tests or 1- or 2-way \nRM ANOVAs (repeated measures analysis of variance), where \nappropriate. Normality was assessed by the Shapiro–Wilk test. If \nˇS´ıd ´ak or \nthe main analysis of variance effect was significant, \nTukey multiple comparisons tests were performed. To compare \npopulation distributions of soma cross-sectional area or volume, \nKolmogorov–Smirnov tests were performed. \n\nAs a third complementary approach, we applied semiauto- \nmated volumetric analyses of nuclei size following tissue clearing. \nIn this study, whole DRGs were cleared 4 weeks after SNItrans for \nnuclei counting in “complete” tissue (Figs. 2E–H). Nuclei were \nlabelled by TDP-43, in line with the study by West et al.,67 and \nwere quantified using Imaris software (Fig. 2F, Video 1). We \nobserved a slight but significant rightward shift in nuclear spot \nvolume population distribution 4 weeks after SNItrans (Fig. 2G). In \naddition, there was a significant reduction in the number of small \nbut not medium or large nuclear spots, in support of a loss of \nsmall-diameter neuron populations (Fig. 2H). \n\n3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent \n\nTo assess the gross loss of neurons from DRG following nerve \ninjury, we generated the AvilFlpO;Atf3CreERT2;RC::FLTG mouse \nline in which na¨ıve and axotomized sensory neurons were \ndifferentially labelled. In this mouse line, all neurons express \nin the na¨ıve state and switch to \ntdTomato (Flp-dependent) \nexpressing green fluorescent protein (GFP) upon axonal damage \nand concurrent tamoxifen treatment (Flp- and Cre-dependent) \n(Figs. 1A and B). Following pilot experiments to optimize \ntamoxifen dosing regimen, this approach was both highly efficient \nand specific (with the caveat that it was necessary to wait for \nseveral days after nerve injury for Cre-induced GFP expression): \n14 days after SNItrans surgery, GFP was expressed by 99.1 6 \n0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we \nobserved GFP in only 4.6 6 0.7% of contralateral DRG neurons \n(Figs. S2A–D, http://links.lww.com/PAIN/C84). We then used \na stereological approach to quantify the total number of neurons \nin L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNItrans, as \nto injury. One week after SNItrans, we \nwell as contralateral", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed2.pdf", - "query": "Did the researcher responsible for quantifying the cells in the dorsal root ganglion know which group each mouse belonged to?", - "target_page": 4, - "target_passage": "During all image quantification, the experimenter was blind to the experimental groups.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "– 31.[ 48 ]Schulte A, Degenbeck J, Aue A, Schinder - Ute M, Schioti F, Schneider M, Monoranu CM, Bishner M, Pharn M, Antonadeis G, Blunn R, Rithnei HL, Human dorsal root ganglia after plexus injury ; elther preservation or loss of the multicellular uni[ 49 ]Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, BlumR, Aus A, Unbiased analysis of the dorsal root ganglion after peripheral nerve injury : ro neuronal loss, no gliosis, but satellite glial cell plasticity, PAIN 2023 ; 164 : 728 -[ 50 ]Shi TuS, Tandrup T, Bergman E, Xu ZOD, Ulthake B, Hiskteit T. Effect of peripheral nerve injury on dorsal root ganglion neurons in the C57 BL / SJ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
[ 53 ]
Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000 ; 422 : 172 – 80.
[ 54 ]
Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons : diagnosis and prevention. J Hand Surg Eur Vol 2011 ; 36 : 730 – 4.
[ 55 ]
Uncekin D, Furier A, Islam S, Abdo H, Lonnetterg P, Lox D, Herling - Leffer J, Heaggthon J, Kharchenko O, Kharcherko Pai, Linnansson S, Emfors P : Unbiased classification of sensory neuron types by large - scale single - cell RNA sequencingi
[ 56 ]
Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent awotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997.388 - 307 - 12.
[ 57 ]
Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974 ; 248 : 740 – 43.
[ 58 ]
WangCr, Gx L. PluenY, GengX, Xx, M, YangN, YvLL, BengY, ZhurC, Yang Y, Zhox Y, Gvan X, Luo W, LuG, DongK, YvLG, LanL, TlengZ, Fleolifation of MrgprD by TRP - A1 promotes neuropathic pain, FASEB, J 2019.33 : 1360 – 73.
[ 59 ]
Wang H, Zyka MJ. Mrgprd - expressing polymodal nociceptive neurons imervate most. known classes of substantia gelatinosa neurons. J Neurosoi 2009 ; 29 : 13202 – 9.
[ 60 ]
Wang R, Guo W, Ossipox MH, Vanderah TW, Porreca F, La J. Glial cell line - derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and preventis the expression of experimental neuropathic pa
[ 61 ]
Wang X, Archibald ML, Sitevens K, Baidridge WH, Chauhan BC. Qyan fluorescent protein ( CFP ) expressing cells in the refina of Thy1 - CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010 ; 468 : 110 – 4.
[ 62 ]
Warwick C, Cassidy C, Hachisulia J, Wright MC, Baunbauer HM, Adelman PC, LaskH, Shrahian TO, Ross SE, Koerbe HR, MrgordOre Ineage neurons mediate optogenetic alodynia through an emergent polynaptic circuit, PAN 2021 ; HS2 ; 2120 – 31.
", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "Figure 1. SNItrans induces death of small primary afferent neurons, accompanied by a reduction in volume, not cell density, of the dorsal root ganglion. (A) \nApproach to differentially labelled intact afferents with tdTomato and damaged afferents with GFP after peripheral nerve injury using the AvilFlpO;Atf3CreERT2;RC:: \nFLTG mouse line and schematic of experimental timeline. (B) Representative image of GFP, tdTomato, and NeuN expression in an L4 DRG, 2 weeks after SNItrans. \nScale bars 5 100 mm. (C and D) Stereological quantification of the total number of DRG neurons (C) or number of axotomized and intact neurons (D) in the L4 DRG \n1, 2, 4, and 8 weeks after SNItrans or contralateral (contra) to injury. (C) One-way ANOVA with Tukey posttests; F4,10 5 37.98, P , 0.001. (D) Two-way RM ANOVA; \nTimepoint 3 Color interaction F4,10 5 39.04, P , 0.001, n 5 3 mice; Tukey posttests (between injured groups): †P , 0.05 vs contra, ‡P , 0.05 vs 1-week. (E) \nVolume of DRG-containing cells (ie, excluding white matter tracts) following SNItrans. One-way ANOVA with Tukey posttests; F4,10 5 21.25, P , 0.001, n 5 3. (F) \nNeuronal density within the DRG following SNItrans. One-way ANOVA; F4,10 5 2.77, P 5 0.09, n 5 3. (G) Population distribution of uninjured and injured afferents by \ncross-sectional area, 1 and 8 weeks post-SNItrans. Kolmogorov–Smirnov tests of cumulative distributions; Uninjured: D 5 0.08, P 5 0.18; Injured: D 5 0.32, P , \n0.001; n 5 310 to 427 neurons from 3 mice.*P , 0.05,**P , 0.01,***P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green \nfluorescent protein. \n\nprotein) neurons 28 days after sham surgery or SNItrans (Figs. 3A \nand B). SNItrans, but not sham, resulted in a significant decrease \n(54.0 6 6.6%) in the total number of MrgD-YFP1 neurons in L4 \nDRG (Fig. 3C).", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" - }, - { - "text": "\n \n \n \n \n [html]Transgenic lines used in the study.\n
Used nameFull namePutative populationRefSourceTamoxifen regime
Atf3CreERT2Aff3trs1.1 ( on / ERT2 ) MwaAxotomised afferents13Gift : Dr Franziska Denk50 mg / kg on days 0.3, and 7 after surgery
AvifTpOAvifm1 ( flipo ) DdgSensory neurons1Gift : Prof David GintyN. A.
MrgDC ** ERT2MrgprdY1.1 ( mr / CRT2 )#Major class of nonpeptidergic neurons39The Jackson Laboratory ( RRID : IMSR_JAX : 031286 )General : 1.50 mg / kg in adulthood, (> 1 week before experiment ) 3D volumetric analysis : 5x i. p. ( 0.5 mg / animal / day ), beginning between P10 and P17
MrgDCMR2 – YPMrgprdrs4.1 ( COP4 ) RA : cMajor class of nonpeptidergic neurons59Mutant Mouse Resource & Research Centers ( RRID : MMRRIC_036112 - UNC )N. A.
CalcaOreERT2Calcalcalcalc11 ( sreCRT2 ) PtchPeptidergic neurons51Gift : Prof Pao - Tien Chuang1.75 mg / kg in adulthood (> 1 week before experiment )
Trpm8R ( X )Cold afferents4Gift : Dr Mark HoonN. A.
Thy1 - CFPB6. Cg - Tg ( Thy1 - CFP ) Z3Jrs / JSample of myelinated afferents10The Jackson Laboratory ( RRID : IMSR_ - IAX : 003710 )N. A.
ThO76ERT2Thre1.18 : 99 / BRT20049 / JC low threshold mechanoreceptorsGift : Prof David Ginty ; The Jackson Laboratory ( RRID : IMSR_JAX : 025614 )1.50 mg / kg in adulthood (> 2 weeks before experiment )RC : FLTG
96.0g ‐ dt ( R354 ) repaylm1.3 ( 30 % Fertisrosbs ‐ 2007 )( 95 % c )FIp ‐ mediated tdTomato ; Cre + Flp ‐ mediated GFP expression40The Jackson Laboratory ( RRID : IMSR_JAX : 026932 )N. A.Ai14
B6. Cg - Δ ( R3S4 ) 26SaAm14 ( GAIP - pToruptpHPr ) JCre - mediated tdTomato expression83The Jackson Laboratory ( RRID : IMSR_JAX : 007914 )N. A.Ai32
B6. Cg - dyR294 / 26Sgm03 ( 040 - cctinin )Cre - mediated ChR2 - eYFP expression32The Jackson Laboratory ( RRID : IMSR_JAX : 024109 )N. A.
", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed2.pdf" - }, - { - "text": "December 2024· Volume 165· Number 12 \n\ncell death and apoptosis with more than 10 genes were \nexamined. Filtered count data of expressed and nondifferentially \nexpressed genes were used as a background. \n\n2.8. Dorsal root ganglion culture \n\nobserved 7809 6 153 neurons per DRG; this was not significantly \ndifferent to the number of neurons in the contralateral DRG \n(7917 6 349), whereas cell number approximately halved by \n8 weeks postinjury to 3963 6 410 neurons per DRG (Fig. 1C). \nSeparating analysis into intact vs axotomized afferents revealed \nthat only axotomized afferents were lost, with no difference \nobserved in numbers of intact afferents (Fig. 1D). Between 1 and \n8 weeks after injury, we observed a 61.0 6 7.0% decrease in the \nnumber of GFP1 neurons. This loss of injured afferents resulted \nin a loss of neuron-containing (ie, excluding white matter regions) \nDRG volume (Fig. 1E), but not neuron density (Fig. 1F). Cell loss \npredominantly occurred between 1 and 2 weeks postinjury and \nstabilized after this timepoint. Population distributions of the \ncross-sectional area of nucleated, \ntdTomato-expressing cell \nprofiles were not significantly different at 1 vs 8 weeks post- \nSNItrans, in contrast to GFP-expressing/injured afferents, in which \na loss of a population of small afferents at 8 weeks postinjury was \nobserved (Fig. 1G). \n\nDorsal root ganglia were dissected from MrgDCreERT2;Ai32 and \nCalcaCreERT2;Ai32 mice .1 week after dosing with tamoxifen and \nenzymatically digested at 37˚˚C for 80 minutes in dispase type II \n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington \nBiochemical), as described previously.63 Mechanically dissoci- \nated cells were plated onto laminin/poly-D-lysine (R&D Systems, \nMinneapolis, MN) treated coverslips in complete Neurobasal Plus \nmedium (Neurobasal Plus media supplemented with 2% (vol/vol) \nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic–antimycotic \n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth \nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, \nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor \n(GDNF, PeproTech) were added to the media under some \nconditions. Cytosine b-D-arabinofuranoside (4 mM) was added to \nthe media for 24 hours the day after plating to reduce the \nproliferation of nonneuronal cells. Media was refreshed 3 times \nper week thereafter. Cultures were fixed for 10 minutes at room \ntemperature with 4% paraformaldehyde and subsequently \nprocessed by immunocytochemistry (described earlier). \n\nSNItrans resulted in a mixed population of axotomized and intact \nafferents within the L4 DRG. Therefore, we developed an approach \nto restrict our analysis to axotomized afferents, without relying on \ntransgenic labelling, and used this as a complementary approach to \nconfirm our findings. We injected the neuronal tracer FB into the \nglabrous, tibial innervation territory of both hindpaws 1 week before \ncommon peroneal and tibial transection (SNItrans) or crush (SNIcrush) \nsurgeries (Figs. 2A and B). FastBlue-uptake was complete across \nneurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ \nC84), so this approach allowed us to profile a sample of the \naxotomized afferents. Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) \ninjuries resulted in a rightward shift in population distributions of the \ncross-sectional area of nucleated, FB-labelled DRG neurons when \ncompared with contralateral DRG, consistent with a loss of small \nafferents post–nerve injury.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "from a combination of MrgDCreERT2;Ai14, ThCreERT2;Ai14, and \nCalcaCreERT2;Ai14 lines (mixed sex).3 One month after SNItrans, \nanimals were transcardially perfused with sterile saline followed by \na fixative containing 4% formaldehyde. Ipsilateral and contralateral \nL4 DRG were removed and postfixed for 24 hours on a shaker at \nroom temperature before being washed in PBS and stored \nat 280˚C in CI-VM1 (35% dimethyl sulfoxide, 35% ethylene glycol \nin PBS) until clearing. Tissue clearing was then performed as \npreviously described.67 In brief, \nthe tissue was exposed to \na gradient of 1-propanol containing 0.3% triethylamine (30, 50, \n75, 90, 95, 100, 100%) and washed in this solution at 37˚C for \n24 hours. The tissue was then rehydrated in PBS and labelled with \nprimary antibodies for 1 week at 37˚C (mouse anti-TDP43 and 2x \nanti-RFP, Table 2). The tissue was washed for 24 hours and \nincubated with appropriate secondary antibodies (Table 2) for \nanother week at 37˚C. The tissue was subsequently washed for \n24 hours, dehydrated again in increasing concentrations of 1- \npropanol containing 0.3% triethylamine, and mounted in benzyl \nalcohol with benzyl benzoate (1:2 ratio) containing 0.3% triethyl- \namine on glass slides with silicone spacers. \nImaging was \nperformed on an Olympus spinning disk confocal microscope at \n20x, with 2-mm z-steps. The tissue was stored at 4˚C for \n;16 months before imaging, so only the tissue that remained \ntransparent at this time was used for downstream analyses. \nVolumetric analyses were performed using Imaris using the “spots” \nfeature with region growth (to allow for different-sized spots), \nbackground subtraction, and point spread function elongation \n(standard 2 3 XY). Initial spot diameters were set based on \nMrgDCreERT2;Ai14 nuclear size (as labelled by red fluorescent \nprotein (RFP)). Spot classification was then performed blind by \nadjusting the quality threshold to balance detection in superficial \nand deep tissue. This step was necessary due to differences in \ntissue quality after long-term storage. Any labelled spots in the \nadjacent nerve were then deleted (eg, labelled Schwann cells or \ndebris). Count and volumetric data were then exported for analysis \nin R. Data were filtered for very small (,5 mm3) and very large \n(.2000 mm3) spots to further remove any debris, labelled satellite \nglia or doublets within the ganglia. In both cases, these filters were \napproximate and did not exclude the possibility that some spots \ncorrespond to either class in the final dataset. The upper limit of the \n“small” DRG nuclei size category was defined as the upper bound \nof 32 easily identifiable MrgD1 nuclei (258 mm3). The boundary \nbetween “medium” and “large” bins (400 mm3) was less clearly \ndefined in the samples and was therefore set as the approximate \nmidpoint of the volume distribution. A combined size category for \nall nuclei greater than 258 mm3 was also examined, and the results \nmirrored those of “medium” and “large” bins. \n\nNv ¼ Nsec \nVsec \n\nFinally, \ncalculated: \nthe total number of cells per DRG (NDRG) was \n\nNDRG ¼ Nv 3 VDRG \n\nFor quantification of the proportion of FB-labelled cells co- \nlabelled with afferent subpopulation markers, initially, the total \nnumber of FB-filled neuronal cell profiles with a visible nucleus \nanywhere within the section was counted, with the observer blind \nto other channels. The other channel was then revealed, and \ninstances of co-labelling were quantified. No stereological \ncorrection was applied, given that the similar size of neuronal \nnuclei would prevent over-counts of large neurons and that no \ncomparisons of the total number of labelled cells were made. For \nsoma area analyses, the area of neuronal soma expressing the \nappropriate marker was measured in the optical section within \nthe Z-stack in which that neuron was at its largest, by drawing \naround the perimeter of the neuron in Fiji/ImageJ v2.14.0/1.54f. \n\n2.7. Gene Ontology", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.9. Statistical analysis \nData are expressed as mean 6 SEM unless otherwise specified, \nand P values of less than 0.05 were considered significant. Power \ncalculations were performed using G*Power 3.1.9.7.15 A \nquantitative Venn diagram was created using BioVenn.25 All \nother statistical analyses were performed in Prism 10 (GraphPad \nSoftware, Inc, Boston, MA) or R using paired t tests or 1- or 2-way \nRM ANOVAs (repeated measures analysis of variance), where \nappropriate. Normality was assessed by the Shapiro–Wilk test. If \nˇS´ıd ´ak or \nthe main analysis of variance effect was significant, \nTukey multiple comparisons tests were performed. To compare \npopulation distributions of soma cross-sectional area or volume, \nKolmogorov–Smirnov tests were performed. \n\nAs a third complementary approach, we applied semiauto- \nmated volumetric analyses of nuclei size following tissue clearing. \nIn this study, whole DRGs were cleared 4 weeks after SNItrans for \nnuclei counting in “complete” tissue (Figs. 2E–H). Nuclei were \nlabelled by TDP-43, in line with the study by West et al.,67 and \nwere quantified using Imaris software (Fig. 2F, Video 1). We \nobserved a slight but significant rightward shift in nuclear spot \nvolume population distribution 4 weeks after SNItrans (Fig. 2G). In \naddition, there was a significant reduction in the number of small \nbut not medium or large nuclear spots, in support of a loss of \nsmall-diameter neuron populations (Fig. 2H). \n\n3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent \n\nTo assess the gross loss of neurons from DRG following nerve \ninjury, we generated the AvilFlpO;Atf3CreERT2;RC::FLTG mouse \nline in which na¨ıve and axotomized sensory neurons were \ndifferentially labelled. In this mouse line, all neurons express \nin the na¨ıve state and switch to \ntdTomato (Flp-dependent) \nexpressing green fluorescent protein (GFP) upon axonal damage \nand concurrent tamoxifen treatment (Flp- and Cre-dependent) \n(Figs. 1A and B). Following pilot experiments to optimize \ntamoxifen dosing regimen, this approach was both highly efficient \nand specific (with the caveat that it was necessary to wait for \nseveral days after nerve injury for Cre-induced GFP expression): \n14 days after SNItrans surgery, GFP was expressed by 99.1 6 \n0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we \nobserved GFP in only 4.6 6 0.7% of contralateral DRG neurons \n(Figs. S2A–D, http://links.lww.com/PAIN/C84). We then used \na stereological approach to quantify the total number of neurons \nin L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNItrans, as \nto injury. One week after SNItrans, we \nwell as contralateral", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "Figure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous \ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN \nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3-mm intervals through the entirety of a 30-mm-thick tissue section. Scale bar 5 \n100 mm. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) \nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov–Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , \n0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG \nvolumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot \ndetection feature. Scale bar 5 100 mm. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov–Smirnov tests of \ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, \nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F2,145 8.26, P 5 0.004; n 5 4 to 5 mice; ˇS´ıd ´ak multiple comparisons tests:**P , 0.01. ANOVA, \nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. \n\n3.3. Spared nerve injury induces a loss of Trpm81 and \ncalcitonin gene-related peptide1 but not myelinated dorsal \nroot ganglion neurons \n\nloss of Trpm81 (cold- \ninduced loss. To investigate potential \nsensitive), calcitonin gene-related peptide1 (CGRP) (peptider- \ngic), and myelinated subpopulations of DRG neurons following \nnerve injury, we applied our FB-labelling approach in Trpm8FlpO; \nRC::FLTG (FlpO-dependent tdTom expression), CalcaCreERT2; \nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP \nmice, respectively (Figs. 4A–D). Trpm8-tdTom was expressed Loss restricted to nonpeptidergic nociceptors would not fully \naccount for the degree of total neuron loss that we observed. \nTherefore, we studied a range of other subpopulations, both \nsmall and large in diameter, for their vulnerability to injury-", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed2.pdf" - }, - { - "text": "this diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic \n\nrodent models.24,50,53,56 Some \nnerve injury in experimental \nstudies have suggested that neuron loss occurs in certain patient \ncohorts,48,66 but this is yet to be definitively demonstrated in \nhumans. In rodents, most studies support a preferential loss of \nsmall cells that give rise to unmyelinated fibers53 but some \ncontrasting studies describe the preferential loss of large cells6 or \nloss of cells of all sizes.46 Variation is evident across studies in \nterms of experimental species, age, \ninjury, and \nquantification methods.56 Shi et al.50 used stereological counting \nmethods to identify a 54% loss of DRG neuron number 4 weeks \nafter “mid-thigh” sciatic nerve transection in C57BL/6 mice. \nEstimates for the degree of loss following commonly used nerve \ninjury paradigms (eg, spared nerve injury [SNI] and sciatic nerve \ncrush) are not available and because of the neurochemical \nchanges following injury and the loss of subpopulation marker \ngene expression,5,44,50 the vulnerability of molecularly defined \nsubpopulations has not been characterized. Moreover, more \nrecent studies have cast doubt on the extent or even presence of \nDRG neuron death following nerve injury. One study which \ndeveloped a deep learning approach to assess rat DRG cellular \nplasticity found no loss of neurons up to 2 weeks post-SNI,49 \nwhile another observed no loss of genetically labelled damaged \nDRG neurons 2 months after sciatic nerve crush.44 \n\ntype of \n\n\n \n \n \n \n [html]\n
“ Slohool of Psychology and Neuroscerce, University of Glosgraw, Glasgrow, Unifed Kingdom, a Nuffeeld Department of Clinical Neurosclences, University of Oxford, Oxford, United Kingdom
“ Corresponding author. Address : School of Psychology and Neuroscience, University of Glasgow, Glasgow G12 & GQ, United Kingdom. Tel.: + 44 ( I ) 14.33.7023. E - mal address : gregory weirfiglasgow ac. ak ( G. A. Weir ).
Supplemental digital content is available for this article. Direct LRE, citations appear in the printed text and are provided in the HTML and PDF versions of this article on the journal ’ s Web site ( www. painjournalizeline. com ).
Casynging - 10.2004 This Author ( s ): Pubblished / cyi Risifen / riber / ribality, inc. on betweef of the International Association for the Diudy or Plari. This is an open acess anticle detitured under the Creative Commons Attituden Loorse
http :// dx. dbi. org / 10.1097 / l, pain. 00000000000000000332?
\n\nThe issue of whether neuron loss occurs, and if so, in what \nsubpopulations, is important. It will likely have implications for our \nunderstanding of reinnervation and functional recovery in patients. \nFurthermore, better insight will provide critical context for those \ninvestigating the plasticity that occurs following nerve injury and \nmay inform therapeutic targeting of sensory neuron populations. \n\nAn expanding repertoire of transgenic recombinase driver lines \nnow makes it possible to permanently label DRG neuron \nsubpopulations and study their fate in rodent nerve injury paradigms. \nThe aim of this study was to use this technology to characterize \n\nwww.painjournalonline.com 2863", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - }, - { - "text": "an industrial partnership grant from the BBSRC and AstraZeneca. \nThe remaining authors have no conflicts of interest to declare. \n[7] Boucher TJ, Okuse K, Bennett DLH, Munson JB, Wood JN, McMahon \nSB. Potent analgesic effects of GDNF in neuropathic pain states. Science \n2000;290:124–7. \n\nto lead contact G.- \nA.W.—gregory.weir@glasgow.ac.uk. Further \ninformation and \nrequests for reagents and/or reagents used in this study should \nalso be directed to G.A.W., and we will endeavour to fulfil these. \n\nData are available on request \n\n[8] Bradbury EJ, Burnstock G, McMahon SB. The expression of P2X3 \npurinoreceptors in sensory neurons: effects of axotomy and glial-derived \nneurotrophic factor. Mol Cell Neurosci 1998;12:256–68. \n\n[9] Br ´az JM, Basbaum AI. Triggering genetically-expressed transneuronal \ntracers by peripheral axotomy reveals convergent and segregated \nsensory neuron-spinal cord connectivity. Neuroscience 2009;163: \n1220–32. \n\n[10] Cobos EJ, Nickerson CA, Gao F, Chandran V, Bravo-Caparr ´os I, \nGonz ´alez-Cano R, Riva P, Andrews NA, Latremoliere A, Seehus CR, \nPerazzoli G, Nieto FR, Joller N, Painter MW, Ma CHE, Omura T, Chesler \nEJ, Geschwind DH, Coppola G, Rangachari M, Woolf CJ, Costigan M. \nMechanistic differences in neuropathic pain modalities revealed by \ncorrelating behavior with global expression profiling. Cell Rep 2018;22: \n1301–12. \n[11] Coggeshall RE. A consideration of neural counting methods. Trends \nNeurosci 1992;15:9–13. \n[12] Decosterd I, Woolf CJ. Spared nerve injury: an animal model of persistent \nperipheral neuropathic pain. PAIN 2000;87:149–58. \n\n[13] Denk F, Ramer LM, Erskine ELKS, Nassar MA, Bogdanov Y, Signore M, \nWood JN, McMahon SB, Ramer MS. Tamoxifen induces cellular stress in \nthe nervous system by inhibiting cholesterol synthesis. Acta Neuropathol \nCommun 2015;3:74. \n\nAcknowledgments \n\nThe authors thank Dr Mark Hoon for providing the Trpm8-Flp \ntransgenic mouse line and Prof Andrew Todd and Dr David \nHughes for their critical feedback on the manuscript. Neuron and \nganglion illustrations in Figure 1 and S1 (http://links.lww.com/ \nPAIN/C84) were adapted from images provided by Servier \nMedical Art, licensed under CC BY 4.0. The research was funded \nby an MRC Fellowship grant awarded to GAW. (MR/T01072X/1) \nand a Tenovus Scotland Pilot Grant awarded to AHC and GAW \n(S22-17). This work was also funded by the Wellcome Trust (DPhil \nscholarship to AMB, 215145/Z/18/Z) and a Wellcome Investiga- \ntor Grant to D.L.B. (223149/Z/21/Z), as well as the MRC (MR/ \nT020113/1), and with funding from the MRC and Versus Arthritis \nto the PAINSTORM consortium as part of the Advanced Pain \nDiscovery Platform (MR/W002388/1). AMB further \nreceived \na GTC MSDTC Scholarship. \n\n[14] Dobin A, Davis CA, Schlesinger F, Drenkow J, Zaleski C, Jha S, Batut P, \nChaisson M, Gingeras TR. STAR: ultrafast universal RNA-seq aligner. \nBioinformatics 2013;29:15–21. \n\n[15] Faul F, Erdfelder E, Lang AG, Buchner A. G*Power 3: a flexible statistical \npower analysis program for the social, behavioral, and biomedical \nsciences. Behav Res Methods 2007;39:175–91. \n\n[16] Feng G, Mellor RH, Bernstein M, Keller-Peck C, Nguyen QT, Wallace M, \nNerbonne JM, Lichtman JW, Sanes JR. Imaging neuronal subsets in \ntransgenic mice expressing multiple spectral variants of GFP. Neuron \n2000;28:41–51. \n\nSupplemental digital content \n\nSupplemental digital content associated with this article can be \nfound online at http://links.lww.com/PAIN/C84.", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "basic-english-language-skills.PDF", - "query": "Does the Oxbridge Academy have a guide on how to apply to college?", - "target_page": 21, - "target_passage": "To make the college registration process easier for you, we’ve compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/).", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Applying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a \ndaunting experience. Not only do you need to choose a course, but you \nalso need to make sure that you: \n• meet the entry requirements \n• meet the deadlines \n• \n• \n• fill in the forms correctly \nsend the forms to the right address \ninclude all the necessary attachments \n\nTo make the college registration process easier for you, we’ve compiled a \ncomprehensive guide on how to register at Oxbridge Academy \n(www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general \ntips that will be relevant to the application and registration processes at \nother colleges. \n\n**There are 4 steps you need to follow when you want to**\n**register as a student at Oxbridge Academy:**\n\n**1.**Select Your Course \n\n**2.** Fill in Your Student Details \n\n**3.**Select Your Delivery Option \n\n**4.** Pay Your Registration Fee and Send in Your Form", - "page_start": 20, - "page_end": 20, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Depending on which course you study, you will either be assessed \nby means of written assignments, or through a combination of \nwritten assignments and exams. Assignments not only help to \ndeepen your understanding of the work, but they often also count \ntoward your final mark. \n\nIf you are an Oxbridge Academy student, we’d like you to know \nthat we are here to help you every step of the way, and that we will \ngive you the opportunity to resubmit your assignments if you don’t \nachieve a pass mark the first time around.", - "page_start": 36, - "page_end": 36, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "1. Read (and follow) the instructions carefully. \nIf you are an Oxbridge Academy student, the general assignment \nguidelines will be provided in your “Success” Study Guide. Specific \ninstructions will also be included at the beginning of each of your \nassignments. \n\n2. Read the questions carefully. \nMake sure you understand what is being asked of you, so that you \nfocus on answering the right questions, instead of providing irrelevant \ninformation. \n\n3. Remember that presentation is important. \nNeatness, spelling, and the structure of your assignment will all count \ntoward the mark that you receive for your assignment. \n\n4. \nto the assignment questions. \nBut make sure to use your own words – don’t just copy. You need to show \nthe person marking your assignment that you have developed a sound \nunderstanding of the subject. \n\nUse your course material and other external sources to find answers \n\n5. When you use external resources, remember to reference them \nproperly, and to include them in a bibliography. \nIf you don’t, you may be guilty of plagiarism (www.oxforddictionaries. \ncom/definition/english/plagiarism), which is a serious offence. \n\n6. \nown words when you formulate your answers. \n\nAlways hand in your own work, and make sure that you use your", - "page_start": 37, - "page_end": 37, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "You can find the course name and course code for your chosen course on \nthe relevant detailed course information page on our website. Have a look \nat the example in the screenshot below (the course name and course code \nare circled in red): \n\n\n\nPlease make sure to check the accreditation status of your chosen course. \nSome of our courses are non-credit bearing skills development courses, \nwhich are neither accredited by external bodies nor registered on the NQF. \nPlease go to our website:*oxbridgeacademy.co.za*for more \nabout our skills development courses. \n\ninformation", - "page_start": 21, - "page_end": 21, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "SEND YOUR REGISTRATION FORM \n\nSend your registration form to the \nregistrations office at Oxbridge Academy via \none of the following channels: \n\nFax: \nPost: \nE-mail: registrar@oxbridgeacademy.co.za \n086 262 5550 \nPO Box 12723, Die Boord, 7613", - "page_start": 26, - "page_end": 26, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Different courses have different registration fees. Please check the course \nfees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to \nfind out how much you need to pay to register for your chosen course, and \npay this amount using the banking details provided at the bottom of the \nregistration form. Remember to attach your proof of payment. \n\nIf you are under the age of 18, your parent or guardian will need to sign \nthis section of the form to state that they are aware of your registration \nwith Oxbridge Academy, and that they do not have any objections. If you \nare unemployed, you will need a guarantor to sign this section of the \nform. Your parent or guarantor will be held responsible if you miss any of \nyour payments in relation to your course fees.", - "page_start": 25, - "page_end": 25, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "With our head office in Stellenbosch in the Western Cape, we cater to our \nstudents’ needs by recruiting industry-expert tutors to provide academic \nassistance via telephone and e-mail, as well as by designing our study \nmaterial in such a way that it is clear, simple, and easy for our students \nto understand. \n\nWe are registered with the Department of Higher Education and Training as a Private College in terms of Section \n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070. \n\n*Developed for Oxbridge Academy*", - "page_start": 58, - "page_end": 58, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "1. General Language Tips to Get You Started \n\n2. Parts of Speech \n\n3. Punctuation \n\n4. Commonly Confused Words and Phrases \n\n5. Tips for Filling in Your College Registration Form \n\n6. Learn How to Summarise Your Study Material \n\n7. How to Ask for Help from Your Tutor \n\n8. Tips for Completing Your Written Assignments \n\n9. Tips for Answering Exam Questions \n\n10. Language Skills at Work – How to Write a Cover Letter \n\n11. Language Skills at Work – How to Write a Resignation Letter \n\n12. Language Skills at Work – Sending E-mails to Your Colleagues", - "page_start": 2, - "page_end": 2, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "To be successful in your studies, you need to learn how to create \nmeaningful summaries of your course material. This is especially \nimportant if you are a distance learning student (www.oxbridgeacademy. \nco.za/distance-learning/), as you won’t have a teacher or lecturer to \npoint out key concepts, or to give you tips about the types of questions \nyou can expect in the exams. \n\n• Organise your study material into a structure that makes sense to you. \n\n• Arrange your study material into a format that suits your learning style. \n\n\n \n \n \n \n [html]\n
• Create memory aids for yourself.• Identify key ideas and concepts.
• Focus on what ' s important.• Prepare for exams more easily.
", - "page_start": 27, - "page_end": 27, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "basic-english-language-skills.PDF", - "query": "I have trouble writing effective summaries in English, do you have any tips?", - "target_page": 29, - "target_passage": "To make a good summary, you need to: • Keep it brief. • Make sure to use main headings and keywords. • Focus on the main ideas. • Classify and organise the information in a logical manner. • Use your own words where possible. • Include examples. • Remember that your summaries are there to help you", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "SUMMARIES \n\nGeneral Tips for Making Summaries \n\n• Underline or highlight key points as you work through your study \n\nmaterial, and make notes. \n\n• When you come across a word or concept you don’t understand, \n\nlook it up in a dictionary, or do some research on the concept, and \nadd your own definition to your summary.", - "page_start": 31, - "page_end": 31, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "To make a good summary, you need to: \n\n\n \n \n \n \n [html]\n
Keep it brief.
Make sure to use main headings and keywords.
Focus on the main ideas.
Classify and organise the information in a logical manner.
Use your own words where possible.
Include examples.
Remember that your summaries are there to help you.
", - "page_start": 28, - "page_end": 28, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "25. Create a mind map to summarise Chapter 7 (How to Ask for Help \nfrom Your Tutor). (5) \n\n26. \nwritten assignments. (3) \n\nList 3 things you need to do if you want to earn good marks for your \n\n29. List 3 methods you can use to summarise your study material. (3) \n\n30. Give 2 examples of how good language skills can benefit your ca- \nreer. (2) \n\n31. Complete the following sentence:", - "page_start": 57, - "page_end": 57, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "1. General Language Tips to Get You Started \n\n2. Parts of Speech \n\n3. Punctuation \n\n4. Commonly Confused Words and Phrases \n\n5. Tips for Filling in Your College Registration Form \n\n6. Learn How to Summarise Your Study Material \n\n7. How to Ask for Help from Your Tutor \n\n8. Tips for Completing Your Written Assignments \n\n9. Tips for Answering Exam Questions \n\n10. Language Skills at Work – How to Write a Cover Letter \n\n11. Language Skills at Work – How to Write a Resignation Letter \n\n12. Language Skills at Work – Sending E-mails to Your Colleagues", - "page_start": 2, - "page_end": 2, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "**Excel**\n**Fundamentals**", - "page_start": 0, - "page_end": 0, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Read as much as possible. Reading improves your vocabulary, \nand helps you to become familiar with sentence structure, \nword order, and the correct use of punctuation. \n\n1. \n\nInvest in a good dictionary. When you are unsure of the \nmeaning of a word, or when you come across an unfamiliar \nword, make sure to look it up in your dictionary. \n\n2. \n\nKeep a journal. This will give you an opportunity to practice \nyour writing skills on a regular basis. \n\n3.", - "page_start": 6, - "page_end": 6, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "To be successful in your studies, you need to learn how to create \nmeaningful summaries of your course material. This is especially \nimportant if you are a distance learning student (www.oxbridgeacademy. \nco.za/distance-learning/), as you won’t have a teacher or lecturer to \npoint out key concepts, or to give you tips about the types of questions \nyou can expect in the exams. \n\n• Organise your study material into a structure that makes sense to you. \n\n• Arrange your study material into a format that suits your learning style. \n\n\n \n \n \n \n [html]\n
• Create memory aids for yourself.• Identify key ideas and concepts.
• Focus on what ' s important.• Prepare for exams more easily.
", - "page_start": 27, - "page_end": 27, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "9. Use correct grammar and spelling. \n\nThis will contribute to the clarity of your answers, and will prevent the \nperson marking your paper from having to guess what you mean. \n\n10. For longer questions and essay-style questions: plan your answers be- \n\nfore you start writing. \nThis will help you to formulate logical arguments, as well as to structure \nyour answers clearly. In essay questions, you will get marks for using \nthe correct format, which includes making sure that you have an intro- \nduction, sub-headings and paragraphs, and a conclusion. \n\n11. Where relevant, give examples. \n\nThis will help to demonstrate that you understand the topic. \n\n12. If you are writing an open-book exam, keep in mind that you won’t have \n\nenough time to look up all the answers. \nMake sure that you know your work, and that you know where to look \nfor key information. These types of exams are more focused on testing \nyour understanding than on testing your knowledge, which means that \nyou need to have a thorough grasp of the work. \n\n13. If you have to answer multiple-choice questions, make sure that you read \n\nthe questions very carefully. \nTry to think of the correct answer before you read through the options, \nas you are less likely to become confused. When in doubt, go with your \nfirst instinct. If there is more than one correct answer, go with the an- \nswer that appears to be most correct. \n\n14. If you start running out of time towards the end of the exam, write short \nnotes as answers to each of the remaining questions, instead of trying \nto answer each question perfectly. \nThis way, you should still earn some marks for writing down the most \nimportant points. \n\n15. If you have time left at the end of the exam, go back and read through \n\nyour answers to make sure that you are happy with them.", - "page_start": 43, - "page_end": 43, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "andthe CEO and summarised incomposition of the Remunerationpresentation to theCommittee and details ofRemuneration Committee of the", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "• Always use a relevant and descriptive subject line. \n\nE-mails with blank subject lines may be marked as spam by the \nrecipient’s e-mail client, and e-mails with non-descriptive subject \nlines such as “Hello” or “Meeting” may be ignored. \n\n• Write your e-mail in clear and simple language. \n\nDon’t try to sound too formal, and don’t use complicated words \nwhen simple ones would work just fine. As far as possible, write in \nthe active voice. \n\n• Structure your message clearly, and include only the necessary \n\ninformation. \nTake care not to confuse the message by including too many topics \nin one e-mail. Respect your colleagues’ time, and try to keep your \nmessages as short as possible. \n\nIf you include a link in your e-mail, make sure that you provide some \ncontext. \nYour recipients are unlikely to click on a link if they don’t have any \nidea as to what they are going to see when they open it. \n\n• \n\n• Only mark an e-mail as ‘urgent’ when it really does require immedi- \n\nate attention. \nWhat’s urgent to you may not always be urgent to your recipients.", - "page_start": 52, - "page_end": 52, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", - "query": "Is exposure to risk factors that may affect mental wellbeing at work comparable across European countries?", - "target_page": 25, - "target_passage": "The country data vary significantly. Sweden, Greece and Luxembourg report over two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "k \nc \no \nt \nS \ne \nb \no \nd \nA \n/ \ns \nt \nr \n\nA \nk \nc \no \nt \nS \ny \nt \ni \nl \n\na \nu \nQ \n© \n\n\n\nIn 2007, 2013 and 2020,**Eurostat**asked employed persons in its ad hoc surveys to the Labour Force \nSurvey (LFS) whether they had**‘… exposure to risk factors that can adversely affect mental well-**\n**being’**.10 In 2007 and 2013, the questions covered four items (time pressure and overload of work, \nviolence or threat of violence, harassment and bullying, other factors). In the 2020 survey,11 ‘Mental \nwell-being’ was operationalised by an additional four response options, resulting in a total of eight \noptions:12 \n\n*1. Severe time pressure or overload of work;*\n*2. Violence or threat of violence;*\n*3. Harassment or bullying;*\n*4. Poor communication or cooperation within the organisation;*\n*5. Having to deal with difficult customers, patients, pupils etc.;*\n*6. Job insecurity;*\n*7. Lack of autonomy, or lack of influence over the work pace or work processes; and*\n*8. Another significant risk factor for mental well-being.*\n\nForty-five per cent of the employed persons reported being exposed to risk factors that can adversely \naffect mental wellbeing. The country data vary significantly. Sweden, Greece and Luxembourg report \nover two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.13", - "page_start": 24, - "page_end": 24, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**3.1 Psychosocial risks at work**\nDuring the last 30 years, the scientific, political and practical discussions on**psychosocial risks**and \npreventive measures against psychosocial risks have gained strong importance. After a period of doubts \nand resistance, today they are regarded as risks of the same severity as the classical physical safety \nand health risks.4 (Chapter 1 covers the psychosocial risk aspect; for the prevalence of mental diseases \nand the burden of mental diseases see Chapter 2.2. 5) \n\nLooking at the steady increase of certain psychosocial risk indicators at workplace level, either the**risks**\n**have increased**and/or the**number of people working in occupations**with higher psychosocial risks \nhas increased.6,7 This is valid, for example, for the indicator time pressure, for example, in delivery \nservices, transport, and often also clerical work; the workforce has grown in sectors where emotional \ndemands from dealing with difficult clients, customers, pupils or patients are common; there are also \nmore workers employed (or self-employed) in interactional occupations, for example, in call centres, or \nin occupations with a high level of emotional tensions, for example, education, health and care. \n\n**Figure 2: Risk factors that can adversely affect mental wellbeing – EWCS8 and ESENER9**\n\nA major difference between the ESENER and the EWCS survey is the respondent. In ESENER those \npersons who are most familiar with OSH or responsible for OSH in an enterprise were asked whether a \ncertain risk factor exists in the enterprise; in the EWCS survey workers themselves were asked whether \nthey are exposed to a risk factor. \n\n\n \n \n \n \n [html]\n
TableTableEuropean Agency for Safety and Health at Work – EU - OSHA
Table
", - "page_start": 23, - "page_end": 23, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Some of these groups are**directly addressed by European and national legislation**, for example, \nworkers with disabilities, young workers or pregnant women. For other groups of workers, for example, \nfor women or migrant workers, the legislative protection is formulated as a general ‘equal treatment’ \nprescription, like to provide preventive measures for all groups in an enterprise (Framework Directive, \nArticle 15 ‘Risk groups’), or to provide solutions that fit to the individual (Framework Directive, Art. 6.2.d.). \nThere are some prescriptions that refer to specific preventive activities, for example, to provide written \ninstructions in different languages for safe work with chemicals. \n\n**3.6 Conclusions**\nThe exposure**to psychosocial risks**is increasing, with mental health prevalence still emerging. Major \nwork-related exposures have grown in the past 15 to 25 years that is, time pressure, difficult clients, \nlonger working hours and poor communication. There is also some evidence that countries with over- \naverage employment in sectors like health and care or other human and client-oriented services \n(education, social work, tourism, entertainment) suffer from longer working hours and more mental \nburden. The northern countries are at the top of the countries with highest mental burden. The southern \ncountries have a high share of specific psychosocial risks related to work in tourism and entertainment, \ncharacterised by atypical working times and issues with difficult clients. \n\n\n \n \n \n \n [html]\n
Concerning the sectors, national context appears to be related to differences in psychosocial risk
management in all types of organisations, although in some sectors this relationship is weak. In the apriculture, forestry and fishing sector and the sectors of mining, condruction, electricity, trade,
transport, and accommodation and food, the low level of psychosocial risk management ’ as observed also in a bounzational rational contained. An explanation for this finding might relate to the large proportion of small organisationst
\n\nThere is a stable**block of ‘conventional’ physical health risks**— ergonomics and risk from the work \nenvironment — and ergonomic risks that did not significantly change since 1990. It varies between 15% \nfor exposure to smoke, fumes and dusts to over 60% for repetitive hand/arm movements.**Ergonomic**\n**risks**develop in two directions: 1) traditional risks stagnate in total, that is, lifting and moving heavy \nloads, painful or tiring positions, and shifts between sectors (from industry to transport, health and care); \n2) risks of inactivity and highly repetitive hand/arm movements increase. Beside sectoral and \noccupational differences, it can be noted that in general higher percentages of exposed employed \npersons (workers and self-employed) are working in eastern and southern Member States. \n\nSince 2006 the average**working time**per week went down by 15 minutes for employees, and a slight \nreduction of most atypical — or unsocial — working times can be observed. Work intensification has \nemerged until 2005 but seems to stagnate since then. There are strong indications but no quantitative \nevidence on the extent to which working long hours, work at atypical times and probably also work with \nhigher risks were**transferred to workers in non-standard types of employment**.", - "page_start": 58, - "page_end": 58, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**List of figures**\nFigure 1: Risk factors present (% of establishments) – ESENER 2014 and 2019................................ 23 \n\nFigure 2: Risk factors that can adversely affect mental wellbeing – EWCS and ESENER ................. 24 \n\nFigure 3: ‘Exposure to risk factors adversely affecting mental wellbeing’ – LFS Ad hoc survey 2020 . 26 \n\nFigure 4: Psychosocial risk factors – Differences between skill groups (Job strain)............................. 27 \n\nFigure 5: Psychosocial risk factors – Differences between skill groups (Psychological demand) ........ 28 \n\nFigure 6: Psychosocial risk factors – Differences between skill groups (Decision authority) ............... 28 \n\nFigure 7: Psychosocial risk factors – Differences between skill groups (Skill discretion) ..................... 29 \n\nFigure 8: Hours worked per week of full-time employment, EU27 – Eurostat ...................................... 31 \n\nFigure 9: Average working time and work during unsocial hours – Eurostat LFS ................................ 32 \n\nFigure 10: Development of work intensity indicators between 1991 and 2015 – Eurofound ................ 33 \n\nFigure 11: Establishment size and ‘Pressure due to time constraints’ – ESENER 2014 and 2019 ...... 34 \n\nFigure 12: Establishment size and ‘Long or irregular working hours’ – ESENER 2014 and 2019 ....... 34 \n\nFigure 13: ‘Pressure due to time constraints’, Yes responses – ESENER 2019 .................................. 35 \n\nFigure 14: Employed persons and percentage of working time under pressure – Eurostat LFS Ad hoc \n2019 ....................................................................................................................................................... 35 \n\nFigure 15: Percentage of employed persons with working time under pressure (per country, sum of \nresponses ‘Always’ and ‘Often’) – LFS Ad hoc 2019 ............................................................................ 36 \n\nFigure 16: Exposure to physical risks – ESENER, EWCS and LFS ..................................................... 39 \n\nFigure 17: Physical health risks compared (%) – EWCS 2015 ............................................................. 42 \n\nFigure 18: Employment types in EU27, development 2005 to 2022 – Eurostat .................................. 47 \n\nFigure 19: Employed persons by main place of work – Eurostat .......................................................... 51 \n\nFigure 20: Employees working mostly from home (in % of employed persons) – Eurostat .................. 52 \n\nFigure 21: Development of the total number of non-fatal accidents at work and incidence rates (accidents \nper 100,000 workers), 1998 and 2019 – Eurostat ................................................................................. 65 \n\nFigure 22: Share of people reporting any accident and accidents resulting in time off work by country, \n2020 ....................................................................................................................................................... 70 \n\nFigure 23: Comparison of the average incidence rate of fatal accidents in two periods: 2010-2014 and \n2015-2020 ............................................................................................................................................. 71 \n\nFigure 24: Main causes of mortality 2019, EU27 .................................................................................. 79 \n\nFigure 25: Work-related deaths – estimates by WHO/ILO and ICOH for EU27 ................................... 83 \n\nFigure 26: Work-related DALYs – estimates by WHO/ILO and ICOH for the EU27 ............................. 84 \n\nFigure 27: Prevalence of musculoskeletal diseases – EWCS 2015 ..................................................... 88 \n\nFigure 28: Satisfaction with working conditions in the main paid job – EWCS 2015 ............................ 89", - "page_start": 4, - "page_end": 4, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**References and notes**\n\n1 OSH Barometer data visualisation tool: https://visualisation.osha.europa.eu/osh-barometer \n\n2 Methodological remark: Many workers in the service sectors have similar physically demanding work like workers \nin manufacturing, construction and agriculture. The statistical assignment of enterprises of a certain type to the \nservice sectors and the sectors industry/construction/agriculture is a too rough approach to describe and analyse \nworking conditions, particularly if more detailed data on working conditions are available. For that reason, when \ntalking about health outcomes, in this report often more informative categories are used, for example, managerial \njobs (LFS, Eurostat terminology), or high-, medium- and low-skilled clerical work (EWCS), or high-skilled manual \nand low-skilled manual work (Eurostat), independent on the sector where this work is performed. \n\n3 EU-OSHA – European Agency for Safety and Health at Work: Third European Survey of Enterprises on New \nand Emerging Risks (ESENER 3), ESENER Data visualisation, section ‘Comparisons 2014-2019’; for ‘Prolonged \nsitting’ value from ‘Data visualisation 2019’ not from ‘Comparisons’. \n4 Some of the very first OSH regulations on psychosocial risks at workplaces were issued by Denmark in the early \n1980s, dealing with monotony at work, stress, risk of violence at work and risks of working alone. \n5 Psychosocial risks are regarded as reason, and mental health/disease as consequence or outcome of these \nrisks. \n\n7 EU-OSHA, 2007: Expert forecast on emerging psychosocial risks related to occupational safety and health \n8 Eurofound, 2017: Sixth European Working Conditions Survey – Overview report (2017 Update) (p. 48). Raw \ndata for 2015: Eurofound: European Working Conditions Survey - Data Visualisation; Data for 2005: Eurofound: \nFourth European Working Conditions Survey \n9 EU-OSHA: ESENER Data visualisation, Comparisons 2014-2019. \n10 Due to the change of possible response items, the data for the three surveys cannot be compared; the number \nof mental risk factors increased from three in 2007 and 2013 to eight in 2020. \n11 Eurostat, 2021: EU labour force survey 2020 module on accidents at work and other work-related health \nproblems : assessment report : 2021 edition \n\n*12 Eurostat: Persons reporting exposure to risk factors that can adversely affect mental well-being by sex, age and*\n*factor, data here and explanatory metadata here*\n13 It has to be noted that in 2007 and 2013 the interviews were done face-to-face. In 2020 the interviews were \nconducted either face-to-face or by phone, depending on the public health measures in each country. The \nresponses were influenced by work under conditions of the pandemic. \n\n14 Eurostat: Persons reporting exposure to risk factors that can adversely affect mental well-being by sex, age and \neducational attainment level \n\n*15 Rigó et al., 2021: Work stress on rise? Comparative analysis of trends in work stressors using the European*\n*working conditions survey*\n16 WHO/ILO, 2021: WHO/ILO joint estimates of the work-related burden of disease and injury, 2000–2016: Global \nmonitoring report (p. 35ff). \n\n*17 Eurostat provide data for the periods before and after the NACE revision in 2008.**Data for 2019:**Average number*\n*of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic activity*\n*(from 2008 onwards, NACE Rev. 2), here Filter: Full-time, 15-64 years, all NACE sectors.**Data for 2006:**Average*\n*number of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic*\n*activity (1998-2008, NACE Rev. 1.1), here*\n\n18 Eurostat, 2018: How many hours do Europeans work per week? Average number of usual weekly hours of work \nin main job, by sex, professional status, full-time/part-time and economic activity (from 2008 onwards, NACE Rev. \n2) - hours[lfsa_ewhun2], here", - "page_start": 140, - "page_end": 140, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Figure 3: ‘Exposure to risk factors adversely affecting mental wellbeing’ – LFS Ad hoc survey 202014**\n\n\n\nESENER 2019 reveals that several**psychosocial risk factors**are reported to be present in a significant \nshare of establishments in the EU27, namely having to deal with difficult customers, patients and pupils \n(59%) and time pressure (45%). \n\nThe aspects**‘Difficult clients’, ‘Poor communication’ and ‘Long working hours’**are major psycho- \nsocial risks. The increase of workforce in communicative and client-oriented occupations — social work, \neducation, tourism and entertainment, health and care — during the last 30 years adds to the \nconventional work with clients in service, sales and health occupations. \n\nThe next table shows the top seven EU Member states with the highest share of these risks for all \nsectors and for the sector ‘Human health and social work activities’ (HHSW). \n\n**Table 1: Psychosocial risks, Top countries ‘All Sectors’ and ‘Human health and social work’ – ESENER**\n**2019**\n\n\n\n\n \n \n \n \n [html]\n
Having to deal with difficult customers, patients, papilsPoor communic cation or cooperation within tha organisationLong or irregular working hoursHaving to deal with difficult customers, patients, pupilsPoor communication or cooperation within the organisationLong or irregular working hours
ALL SECTORSALL SECTORSALL SECTORSHHSWHHSWHHSW
PT 75.6 %SE 41.8 %DK 44.9 %5.96.7 %SE 51.8 %SE 56.8 %
MT 75.0 %DK 37.4 %RO 39.7 %PT 94.1 %OK 45.5 %OK 47.8 %
CY 71.4 %8.29.9 %SE 33.1 %EE 91.5 %NL 37.4 %CY 47.0 %
DK 68.3 %NL 28.7 %FI 32.8 %PL 91.4 %8.37.1 %LV 45.7 %
U 67.8 %FI 27.7 %CY 29.6 %8.89.8 %FR 33.6 %CZ 44.3 %
BE 67.5 %LU 25.9 %MT 28.0 %SE 89.4 %ES 31.8 %RO 36.7 %
FR 67.2 %FR 22.9 %DE 25.7 %DK 87.1 %IJ J 31.5 %FR 35.7 %
EU 59.7 %EU 17.9 %EU 21.5 %EU 83.5 %EU 27.7 %EU 31.1 %
\n\n**Difficult customers, patients and pupils (‘clients’)**seem to be the most widespread psychosocial \nburden, with workers in Portugal, Malta and Cyprus are most exposed. In the sector HHSW, eastern \nEuropean countries are much more present, Slovenia at the top, followed by Portugal, Estonia, Poland \nand Bulgaria. \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n26", - "page_start": 25, - "page_end": 25, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "***4.3.2 Health affected – overall opinion***\nThe self-assessment of**health risks at work**is a question in the EWCS. According to the responses to \nthe EWCS 2015, work is regarded by exactly one-quarter (25%) of the workers in the EU as a health \nrisk. (The OSH Barometer provides more details; links in the text box at the end of this chapter.) \n\nThe countries with the**lowest percentage of perceived affection of health at work**are Portugal at \n15%; below or around 20% are also Italy, Ireland and Czechia, Germany, Hungary and Romania. The \ncountries with the highest percentage of perceived health risks at work are Latvia (41%), followed by \nSpain and Slovenia (both 38%), Lithuania (37%), and Estonia, France and Malta (all 35%). \n\nAt EU level the**aggregated sectors**‘Construction and Transport’ show the highest figures (35%) and \n‘Commerce / Hospitality’ (20%) and ‘Financial / Other services’ the lowest (20%). These sectoral \ndifferences repeat in most countries. \n\n**Figure 30: ‘Health at risk’, sectoral responses for EU and three countries – EWCS 2015252**", - "page_start": 90, - "page_end": 90, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**4.3 Wellbeing and health status**\nExisting concepts of**wellbeing**cover**more aspects of work than working conditions or safety and**\n**health**at workplaces. Eurofound mentions as the most relevant components:*income, working time*\n*arrangements, possibilities for skills development and career advancement, and the degree of individual*\n*control over work*. 243 The United Nations Economic Commission for Europe (UNECE) developed a \nscheme of quality of employment that covers these aspects:*safety and ethics of employment, income*\n*benefits and employment, working hours and balancing working and non-working life, security of*\n*employment and social protection, social dialogue, skills development and training, workplace*\n*relationships and work motivation.*244 \n\nThis chapter**focuses on the health and safety aspects**of wellbeing, although the OSH aspect is often \nnot clearly separable from the above-mentioned aspects, that is, when surveys are intending to identify \nthe level of ‘satisfaction at work’. Still, due to its serious impact on all other aspects of working conditions, \nthe consequences of insufficient health are regarded as critical: \n\n*‘While OHS is only one substantive working condition, like earnings and job insecurity it is arguably a*\n*critical one for many workers. In terms of scope and severity, even official data … suggests poor OHS*\n*is something most workers will experience at some point and many far more frequently.’*245 \n\nA common methodology to collect data on**health status**and wellbeing is**self-reporting and self-**\n**assessment**of workplace risks, health risks and health problems, absence, job satisfaction and working \nlife perspective from a health point of view. The data are in general collected by EU-wide surveys, for \nexample, by the EWCS, the Flash Eurobarometer, ESENER or the LFS Ad hoc modules. The \ndescription of working conditions in the OSH Barometer starts with responses regarding the**‘Overall**\n**opinion’**on working conditions. This allows insight into the subjective assessment of health risks at \nwork and wellbeing. \n\n***4.3.1 Satisfaction at work***\n\nIn the EWCS of 2015, at EU level 86% of the workers respond that they are**‘satisfied’**(60%) or**‘very**\n**satisfied’**(26%) with their work. Country differences exist but are not striking. The EU Member States \nwith the highest satisfaction rates are Austria, the Netherlands, Finland, Czechia, Denmark, Belgium \nand Estonia; they range between 93% and 90%. The six countries with the lowest sum of satisfied and \nvery satisfied responses are Greece, Croatia, France, Spain, Italy and Latvia; their values range \nbetween 77% and 82%. \n\n**Figure 28: Satisfaction with working conditions in the main paid job – EWCS 2015246**", - "page_start": 88, - "page_end": 88, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Regarding this question,**age differences are negligible**.**Concerning gender**, male respondents \nreport more often that their work imposes health risks; at EU level the values are 23% for female workers \nand 27% for male workers. \n\n**In 2005, the workers in the 10 new Member States responded much less positive**; 40% of the \nworkers in the 10 new Member States considered their health and safety to be affected because of their \nwork. \n\n**Figure 31: ‘Health at risk’, responses in groups of EU Member States – EWCS253**\n\n\n\nFor the EU-15 (Member States that joined the EU before 2004), the ‘Yes’ responses to this question \ndecreased from 31% in 1991 (first EWCS) to 28% in 2005 and reached 26% in 2015. For the 10 new \nMember States the rate decreased, from previously 40% in 2005 to 29% in 2015.254 The EU membership \nhas definitely created**more convergence**between the countries. \n\n***4.3.3 Reported health problems***\nThe identification of current**work-related health problems**is another approach to create an indicator \nfor health status. Eurostat collected this data in the LFS Ad hoc modules 2007, 2013 and 2020,*Persons*\n*reporting a work-related health problem by sex, age and NACE Rev. 2 activity*.255 \n\n**In 2007, 14.6% of employed persons**reported a work-related health problem;**this figure decreased**\n**in 2013 to 8.8% and went up again to 10.3% in 2020**256 (EU27 level). As expected,**age is one of the**\n**factors**that influence the response to this question. In 2020, 14.1% of the workers in age class 55-64 \nyears reported a work-related health problem, compared to 6.5% in age class 15-34 years and 10.8 in \nage class 35-54 years. These differences between the age classes were quite similar in all three points \nof time. \n\n\n \n \n \n \n [html]\n
TableTableTable
TableTableEuropean A
PatientsTable
", - "page_start": 91, - "page_end": 91, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**result in high values for both responses. That is, high risk but also high satisfaction with health**\n**and safety.**\n\nThe picture of country positions in this ranking changes again when looking at the**response on the off-**\n**work periods**due to a work-related health problem.259 In 2020, around 10% report that they had a \n**work-related health problem that kept them more than six months away from work**. The rate is at \n10.1% for the EU27; the countries with the highest rates above 20% are Hungary (30.3%), Lithuania \n(29.9%), the Netherlands (27.6%), Belgium (20.9%) and Romania (20.7%). The countries with lowest \nrates under 10% are Poland (2.6%), Denmark (6.0%), Sweden (6.2%), Italy (6.5%) and Finland \n(9.0%).260 The country positions do not change much when looking at all absences over one month \n(18.7% for the EU), or three months or over (12.6% for the EU27).261**That means that — at least at**\n**the first glance contradictory — countries reporting highest health risks have the lowest number**\n**of long-term off-work periods.**These figures are probably much influenced by social security and \ncompensation rules. This is another indication that**high exposure and identification of health risks**\n**— fortunately — does not materialise in serious disease episodes, and this could be attributed**\n**to on the effectiveness of prevention measures**. \n\nThere might also be structural reasons for low levels of reported health problems, for example, a**high**\n**percentage of young workers**with low illness rates in highly skilled clerical work; Ireland is probably \nsuch an example. \n\nThe responses to**‘work-related health problem’**vary also between different**occupational groups**. 262 \nThe skilled agricultural and fishery workers (16.9%) report the highest values, followed by plant and \nmachine operators and assemblers (12.5%), craft and related trades workers (12.3%), and the group of \nthose with elementary occupations (11.2%). The lowest shares were found for the professionals (9.3%), \nlegislators, senior officials and managers (9.0%), and clerks (8.0%). \n\n**Figure 34: People reporting a work-related health problem by occupational category 2020 – LFS Ad hoc**\n**module 2020**", - "page_start": 94, - "page_end": 94, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", - "query": "Has the average working week for employees working full-time decreased since 2006?", - "target_page": 31, - "target_passage": ". The statistical data (Eurostat) show a slight decrease of the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Figure 8: Hours worked per week of full-time employment, EU27 – Eurostat**\n\n\n\nThe**commuting time**between home and workplace is quite stable; in 2005 at EU27 level, it stood at \n42.4 minutes, and in 2015 Eurostat reports 40.2 minutes (time for both ways, to the workplace and \nback).19 \n\n**Work at atypical working times**is in general regarded as a working condition with negative health \nimpact, called**work extensity**. The two major indicators of atypical working times are work at**‘atypical**\n**working times’**and**‘long working hours’**. \n\nEurostat reports for**‘Employment at atypical working time’**20 a minor decrease between 2011 and \n2019, from 38.8% to 37.2% (EU27), for all employed workforce and all types of such atypical time. 21 \nSome**groups of self-employed**show a higher rate of atypical working times but also for most of the \ncategories of self-employed the rates decreased during the period 2011 to 2019.**High managerial self-**\n**employed**had a slight increase from 42.1% to 43.2% in this period. For the**low managerial self-**\n**employed**Eurostat finds a decrease from 69.2% to 64.5%. The figures for**small entrepreneurs**\ndropped slightly from 56.6% to 54.1%, the same applies for employed persons in**personal care work**\nwith a minor change (50.6% to 49.8%).**Agricultural self-employed**had the highest level of such \nworking times; they showed a decrease from 68.4% to 63.4%. \n\nThe length of the daily or weekly working time, its allocation over the 24 hours of a day or at night are \nimportant factors for health and wellbeing. The statistical data (Eurostat) show a slight decrease**of the**\n**average weekly working time for full-time employees**(15-64 years) from 40.2 to 39.9 hours between \n2006 and 2019.22 The data also document slight increases and decreases of work at atypical times \n(response option for frequency: ‘usual’).23 In 2006 and 2019, the following percentages of all employed \npersons worked at atypical times: on**Saturdays**the percentage decreased from 28% to 25%,**working**\n**on Sundays**remained stable at around 13.5%,**working in the evenings**decreased from 19% to 15%, \n**work at night**fell from 7% to 5% and**shift work**increased slightly from 17% to 18%.24 \n\n\n \n \n \n \n [html]\n
TableTable
European Agency for Safety and Health at Work – EU - OSHA31
", - "page_start": 30, - "page_end": 30, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Figure 7: Psychosocial risk factors – Differences between skill groups (Skill discretion)**\n\n\n\nFor ‘Decision authority’ and ‘Skill discretion’, the authors found a stable situation since 1995, even a \nsmall rise of skill discretion for manual workers after 2010. Regarding ‘Psychological demands’ and ‘Job \nstrain’, the major increase for all groups took place between 1995 and 2005. This growth decelerated \nafter 2005, this observation is also valid for other working conditions, like work intensity. \n\n***3.1.1 Working time in hours and at atypical times***\n\n**Too many hours of working time and/or working hours at atypical or unsocial times**can put**the**\n**mental**and**the physical health**of humans at risk. It is also regarded as a major**contributing factor**\n**to work accidents**, due to fatigue or exhaustion.16 \n\nThe main indicator to describe working time is the**number of the weekly average working hours**of \nfull-time employees. However, regarding its impact on health and safety,**other aspects of working**\n**time are of the same relevance**: \n\n• How long is the average working day? \n• At which times and days is this work done (typical, atypical times)? \n• How often do long working hours take place? \n• \n• How flexible are start and end? \n• How intense is the work during this time (breaks, deadlines)? \n• Which groups of workers have standard working times and which do not (e.g. depending on the \n\nIs the work split between two jobs? \n\nsector or the type of contract, e.g. sub-contracted workers or self-employed)? \n\nThere is a**slight trend towards fewer working hours**for full-time**employees**(not ‘Employed persons’) \nin the EU27; between 2006 and 2019 the average weekly working time dropped from 40.2 to 39.9 hours, \na decrease of approximately 15 minutes.17 \n\nRegarding the weekly hours, there are**no striking differences**between the EU27 Member States. In \n2019, Cyprus, Austria and Malta with a high share of workers in the sector of tourism (accommodation) \nhad the highest number of working hours per week (above 41 hours), and Denmark, the Netherlands \nand Italy the lowest number (39 or fewer) (full-time, employees, 15-64 years, all NACE codes).18", - "page_start": 28, - "page_end": 28, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Figure 9: Average working time and work during unsocial hours – Eurostat LFS**\n\nTwo country examples might illustrate these developments (all data for 2019): Slovakia, a country with \na high share of process-based industries, reports that 15.0% of its workforce is working at night and 29% \nin shifts; for the EU27 this rate is 5.2% respectively and 18.3%.25 Regarding work on Sundays three \nother countries are at the top of the EU27, the Netherlands, Ireland and Spain; they report between 18% \nand 21% (EU27 average = 13.5%); all three countries have an above-average share of sectors like \ntransport, tourism and agriculture.26 \n\nFor all these types of work it should be take into account that other groups of**workers under non-**\n**standard types of employment contracts**(self-employed, agency workers, students, pensioners, \nundeclared workers) might have taken over work at these atypical working times. \n\nConcluding, it can be stated that there is a**slight trend towards a reduction of weekly working hours**\n**for regularly employed**workers, including a stable commuting time. Working hours at atypical times \nshow a mixed picture. Looking at most types of employees,**atypical working time decreased, except**\n**work on Sundays**. For self-employed with employees, the working time at atypical hours is in general \nat a higher level. The number of employees in night work is decreasing. More employees in service and \nclient-related occupations at night or in shifts but also here the atypical times are slightly decreasing. \n\nProbably these changes**mirror the structural economic changes**, that is, the shift of workforce \nbetween sectors. Night work was common in many industries as part of a three 8-hours shifts, not only \nin industries with permanent production processes (steel, chemicals, etc.). 27 Moreover night work is and \nwas common in essential services like health, transport, technical infrastructure and security. The \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n32", - "page_start": 31, - "page_end": 31, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "***3.1.2 Work intensity***\nThere are numerous references showing that during the period**between 1990 and 2005 work intensity**\n**has considerably increased**.28 \n\nFor example, Eurofound has analysed the responses to the two EWCS questions on high speed at work \nand tight deadlines. The EWCS found a significant increase of work intensity between 1991 and 2005. \nIn 1991,**‘Working at a very high speed’**was for the majority of respondents not an issue. Fifty-two per \ncent of the workers responded to this statement ‘Never’ or ‘Almost never’; in 1991, 24% worked at high \nspeed and responded ‘Around ¾ of the time’, ‘Almost all of the time’ and ‘All of the time’; until 2005 this \nresponse rate went up by 11% to 35%. \n\n**Working to tight deadlines**was not an issue for 34% in 1990, and in 2005 only for 19%, a reduction \nof 15%. The percentage of the sum of responses ‘Around ¾ of the time’, ‘Almost all of the time’ or ‘All \nof the time’ to this question on tight deadlines increased between 1991 and 2005 from 29% to 37%. \nRegarding these two indicators,**work intensity has evidently increased**between 1991 and 2005. 29 \n\n**Figure 10: Development of work intensity indicators between 1991 and 2015 – Eurofound**\n\n\n\nAfter that first period between 1991 and 2005,**this development seems to stagnate between 2005**\n**and 2015**.30 The responses ‘Almost all of the time’ or ‘All of the time’ vary only slightly, between 33% \nand 37% depending on year and question (‘Working at high speed’ or ‘Working to tight deadlines’). \n\nDifferences can be seen regarding sector, company size and occupation.**Regarding work intensity**, \nESENER enterprise data on time pressure for the EU27 indicate a slight increase of 2.3% between 2014 \nand 2019 from 43% to 45%.31 Interestingly, according to ESENER, time pressure drastically**increases**\n**with the size of the enterprise**. In enterprises with 5 - 9 employees, 39% report time pressure, and in \nenterprises with above 250 employees 69%. 32 The same applies for long working hours, where \nenterprises with 5 - 9 employees report 19% ‘long working hours’, and in enterprises with above 250 \nemployees this percentage increases to about 39% (EU27, 2019).33", - "page_start": 32, - "page_end": 32, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "In several occupations,**classical safety risks often add to the above-mentioned exposures**, that is, \nslips, trips and falls, risks related to moving parts of machinery, moving vehicles, exposure to hot, cold, \nor hazardous materials, loud noise, chemical or biological substances, and in general physically \nexhaustive work. \n\nA certain**ergonomic risk**of many administrative and supervisory jobs is**physical inactivity**(61%), in \npractice meaning sitting most of the working time in front of digital equipment, sitting to make phone \ncalls or sitting in meetings. Not only administrative tasks but also many occupations in transport and \nindustry require prolonged sitting (transport, cashiers, parts assembly, etc.). \n\nIn the 10-year period before 2005, EU-wide surveys found a significant increase in work intensity. Major \ndifferences in work intensity and working time patterns can be seen between occupations, forms of work, \nsectors and enterprise size, for example. The length of the daily or weekly working time and its allocation \nwith the 24 hours of a day or at night are important factors for health and wellbeing. The Eurostat data \nshow a slight decrease**in the average weekly working time for full-time employees**(15-64 years) \nfrom 40.2 to 39.9 hours between 2006 and 2019. \n\nEurostat reports for all types of**‘employment at atypical working time’**a minor decrease between \n2011 and 2019, from 38.8% to 37.2% (EU27 average), for all employed workforce and all types of such \natypical time. The data also document slight increases or decreases of the different types of work during \natypical times > on Saturdays the percentage decreased from 28% to 25%, working in the evenings \ndecreased from 19% to 15%, working on Sundays remained stable at around 13.5%, work at night fell \nfrom 7% to 5%, and shift work increased slightly from 17% to 18%. Some**groups of self-employed**\nshow a higher rate of atypical working times: for**high-managerial self-employed**, this rate is 43.2% \nand for**low-managerial self-employed**64.5%. \n\n**Significant differences also exist between eastern/southern and central/northern/western**\n**European countries.**More physical and ergonomic risks (except inactivity) are reported from eastern \nand southern EU Member States but more emotional demands (e.g. difficult clients, poor communication \nand long working hours) in northern and central European countries. One of the major reasons might \nbe the reallocation of industrial production to eastern countries after the EU extension to 24 and later to \n27 Member States. \n\n**Conditions of employment and workforce development**\n\nDuring the past decades and at faster pace after 1990, a**greater variety of non-standard contractual**\n**relations**has emerged. Typical characteristics of non-standard work are part-time work, temporary (or \nfixed-term) work, seasonal work, casual work, home-based work, telework, self-employment or family \nwork. Currently, high public awareness is directed to those types of non-standard work that are \nconnected either to**new forms of contracts**(voucher, platform, zero-hours, portfolio, etc.) or increasing \n**types of work not bound to the premises of the employer**(mobile, at home, at client’s place), mostly \nmade possible by the increased use of modern information and communication technologies (ICT). \nThese forms of work often have as a — additional — major characteristic a**less clear employer–**\n**worker relationship**. \n\nHowever, in 2019 the conventional employment contract still accounted for around 86% of the workforce \n(EU27), 9% are ‘own-account’ workers, that is, self-employed without employees. The remaining 4% \nwere self-employed with employees (employers) and less than 1% were contributing family workers. Of \nall employed workers, 17.2% worked part-time and 13.3% had temporary contracts.", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Figure 15: Percentage of employed persons with working time under pressure (per country, sum of**\n**responses ‘Always’ and ‘Often’) – LFS Ad hoc 2019**\n\n\n\nOne hypothesis to explain the increased time pressure is to draw a direct**connection between short**\n**weekly working time and more intense work**; or in other words, a short weekly working time leads to \nmore**intensification of work or more long hours or atypical working times**(‘trading flexibility for \neffort’). 38 \n\nThe analysis of EU survey data shows**a mixed picture**: Firstly, ESENER data corroborate this \nhypothesis, the three countries with highest percentage of work under time constraints — that is, Finland, \nSweden and Denmark — all have working hours under the EU average. Secondly, LFS data show a \ndifferent picture; a country like Greece has the longest working hours and also reports the highest time \npressure, the same ‘combination’ — but less extreme — applies to Austria, Cyprus and Malta. Trends \nof low or less than average working time and no time constraints are reported for Lithuania, and medium \nworking time and low time constraints for Italy and Ireland. \n\nAn analysis of EWCS data concluded39 that in general intensity increases with long working hours, in \nenterprises with 1-19 the work intensity index (on a scale between 0 and 12) is 4.4, in larger enterprises \nwith above 40 employees it is 6.3. This is in line with ESENER data that corroborate the importance of \nthe**size of the enterprise**for time pressure and long working hours. \n\nLiterature — from very diverse disciplines — on work intensification points to**reasons for**\n**intensification on developments as:40**\n\n• Economic developments, particularly the dominance of neoliberalist policies and enhanced \ncompetition between workers, companies and states; reduction of state influence and \nprivatisation.41 \n\n• Pressure due to substantial organisational changes, for example, introduction of short-term \neconomic objectives in enterprise policies, 42 expansion into new markets or new countries, \nacquiring other enterprises or merging, being acquired, restructuring of management or of basic \nstaff working conditions (contracts, working time, flexibility).43 \n\n• Decrease of trade union influence or worker participation regarding labour relations. \n• Liberalisation of labour legislation, creation of ‘new forms of work’ and new contract types, \nbeyond the permanent full-time employment.44 \n\n• New forms of management, application of management concepts like just-in-time production or \nlean management, higher flexibility of production and higher customer orientation, 45 \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n36", - "page_start": 35, - "page_end": 35, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "22 Eurostat Data for 2019: Average number of usual weekly hours of work in main job, by sex, professional status, \nfull-time/part-time and economic activity (from 2008 onwards, NACE Rev. 2). here Filter: Employees, Full-time, All \nNACE, EU27 2019 Q4. \nEurostat Data for 2006: Average number of usual weekly hours of work in main job, by sex, professional status, \nfull-time/part-time and economic activity (1998-2008, NACE Rev. 1.1), here Filter: Employees, Full-time, All \nNACE, EU27 2019 Q4. \n23 Eurostat definition of atypical work: The atypical work distinguishes between “evening or night work”, “Saturday \nor Sunday working”, and “shift work”. \n24 All data were retried from tables in: Labour market > Employment and unemployment (Labour force survey) M \n> LFS series - detailed annual survey results M > Population in employment working during unsocial hours - LFS \nseries \n25 Eurostat: Employed persons working at nights as a percentage of the total employment, by sex, age and \nprofessional status (%) \n26 Eurostat: Employed persons working on Sundays as a percentage of the total employment, by sex, age and \nprofessional status (%) \n27 Fiz Perez et al., 2019: Shift and night work management in European companies \n28 OSHWiki, 2022: Psychosocial issues – the changing world of work \n29 Eurofound, 2003: Time and work: Work intensity \nEurofound, 2009: Working conditions in the European Union: Working time and work intensity \n30 Eurofound, 2017: Sixth European Working Conditions Survey – Overview report (2017 Update) (p. 48). \n\n31 ESENER addresses the person in an enterprise responsible for or closest to the topic of OSH; the EWCS is a \nworker survey. In addition, the response options were different from the EWCS. Two options in ESENER, ‘Yes’ or \n‘No’, compared to three options in the EWCS: ‘(Almost) all of the time’, ‘Between ¼ and ¾ of the time’, ‘(Almost) \nnever’. \n\n32 EU-OSHA: Third European Survey of Enterprises on New and Emerging Risks (ESENER 3), ESENER Data \nvisualisation, section ‘Comparisons 2014-2019’, section ‘Psychosocial risk factors present in the establishment’, \n‘Pressure due to time constraints’. \n33 Ibid., Section ‘Psychosocial risk factors present in the establishment’, ‘Long or irregular working hours’. \n34 Ibid., Section ‘Psychosocial risk factors present in the establishment’, The exact question was: ‘Please tell me \nfor each of the following risks whether or not it is present in the establishment?‘ ‘Pressure due to time constraints’. \nResponse option: Time pressure. \n35 Ibid., Section ‘Psychosocial risk factors present in the establishment’, The exact question was: ‘Please tell me \nfor each of the following risks whether or not it is present in the establishment?‘ ‘Pressure due to time constraints’. \nResponse option: Time pressure. \n36 EU-OSHA: Third European Survey of Enterprises on New and Emerging Risks (ESENER 3), ESENER Data \nvisualisation, section ‘Comparisons 2014-2019’, section ‘Psychosocial risk factors present in the establishment’, \nThe exact question was: ‘Please tell me for each of the following risks whether or not it is present in the \nestablishment?‘ ‘Pressure due to time constraints’. Response option: Time pressure. \n\n37 Eurostat, 2019: Persons in employment by frequency of working under time pressure, educational attainment \nlevel and professional status, 20-64 years, percentages calculated from numerical data", - "page_start": 141, - "page_end": 141, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "19 Mean duration of commuting time one-way between work and home by sex and age (source: Eurofound), Here \n\n20 Eurostat definition: The atypical work distinguishes between “evening or night work”, “Saturday or Sunday \nworking”, and “shift work”. Data for 2020 are available but indicate a strong reduction of atypical working times, \nthe reason is probably that sectors with a high rate of atypical working times like tourism, transport, entertainment, \nhotels and restaurants could not work as in previous years, and also production lines in industry, often shift work, \nwere stopped.", - "page_start": 140, - "page_end": 140, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Table 30: Development of male and female workforce in the EU27 between 2005 and 2019299**\n\n\n\n\n \n \n \n \n [html]TotalFemaleMaleSelf - amployed ( with and without employees )\n
Eurostat, EU - 27 ( in millions, 15 - 44 years )Q4 2005Q4 2019Development
Employed persons181.2195.8Plus 8.1 %
Employees150.3167.9Plus 11.7 %
Employed persons – female79.990.2Plus 12.9 %
Employees – female69.380.6Plus 16.3 %
Employed persons – male101.3105.6Plus 4.2 %
Employees – male8187.3Plus 7.8 %
Total27.425.2Minus 8.0 %
Self - employed – female8.28.5Plus 3.7 %
Self - employed – male19.117.6Minus 7.9 %
Share of female employed persons44.1 %46.1 %
\n\nAlthough female employment has grown faster than the men’s rate, the employment rate for men is still \n11% higher. Due to the much higher rate of part-time work — women 30%, men 9% 300 — the gender \ngap concerning participation in the labour market is higher when transforming the working time into ‘full- \ntime equivalents’ (FTE). EIGE calculated a difference of 16%:*‘The EU average FTE employment rate*\n*is 41% for women, compared to 57% for men.’301,302*\n\nThe**average age of the workforce has drastically changed**during the last 17 years. In 2005, the age \nclass between 55 and 64 years represented 11.1% of all employed persons, and in 2019 already 18.4% \nof the workforce — a growth of 16 million employed persons. At the same time, the share of the age \nclass between 15 and 39 years decreased from 49.6% to 41.6%, or 8.5 million. Already 5.1 million \nemployed persons are older than 65 years, making up a share of 2.6% of the workforce.303 \n\n**Table 31: Average age of the EU27 workforce304**\n\n\n \n \n \n \n [html]\n
Eurostat, EU - 27 ( in thousands )Q4 2005Q4 2019Share of total 2005 ( 15 - 64 )Share of total 2019 / Q4Development
Employed persons181.225195.791100100.0 %8.0 %
Employed persons 15 - 39 years89.90681.49049.6 %41.6 %- 9.4 %
Employed persons 55 - 64 years20.09635.94211.1 %18.4 %78.9 %
Employed persons 65 years and over2.9715.1351.6 %2.6 %72.8 %
", - "page_start": 109, - "page_end": 109, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "37 Eurostat, 2019: Persons in employment by frequency of working under time pressure, educational attainment \nlevel and professional status, 20-64 years, percentages calculated from numerical data \n\n38 Kelliher & Anderson, 2010: Doing more with less? Flexible working practices and the intensification of work \n39 Piaska, 2018: Scheduled to work hard: The relationship between non-standard working hours and work \nintensity among European workers (2005–2015) \n40 See also the overview in: EU-OSHA, OSHWiki, Guyot, S: Psychosocial issues – the changing world of work, \nhere \n41 Newer literature: James & Walters, 2022: Work and Health: 50 Years of regulatory failure. \n42 Davis & Kim, 2015: Financialization of the Economy \n43 Ethics & Compliance Initiative, 2020: Global Business Ethics Survey Report. Pressure in the Workplace: \nPossible Risk Factors and Those at Risk \n44 Johnstone et al., 2005: Statutory Occupational Health and Safety Workplace Arrangements for the Modern \nLabour Market \n\n45 Lorenz & Valeyre, 2005: Organisational Innovation, Human Resource Management and Labour Market \nStructure: A comparison of the EU-15", - "page_start": 141, - "page_end": 141, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", - "query": "What is the definition of a work accident according to the International Labour Organisation?", - "target_page": 38, - "target_passage": "ILO Definition of accident: ‘An occupational accident is an unexpected and unplanned occurrence, including acts of violence, arising out of or in connection with work, which results in one or more workers incurring a personal injury, disease or death.’", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "*are shifted towards non-permanent workers and subcontractors, who have less protection and/or*\n*knowledge to cope with these risks. This scenario is not easy to verify in quantitative data, although it is*\n*frequently stated in case study research.’*\n\nAlso, Eurofound draws such conclusions on the**impact of subcontracting on working conditions**: \n*‘First, employees in subcontracting perceive higher health and safety risks, notably through more work-*\n*related accidents and increased time pressure. Second, there are a number of psychological risk factors,*\n*such as perceived economic insecurity and worries about losing one’s job, that are more likely among*\n*subcontracting workers.’*49 \n\nThere is even an evident**relation between such forms of employment and higher rates of work**\n**accidents**. In a first systematic review the authors conclude: 50 \n*‘This review supports an association between some of the dimensions of precarious employment and*\n*occupational injuries; most notably for multiple jobholders and employees of temp agencies or*\n*subcontractors at the same worksite. However, results for temporary employment are inconclusive.’*\n\n**OSH Barometer – Mental risks:**\n\nhttps://visualisation.osha.europa.eu/osh-barometer/working-conditions-preventions/working- \nconditions \n\n**ESENER – Data visualisation:**\n\nhttps://visualisation.osha.europa.eu/esener/en/survey/datavisualisation/2019 \n\n**3.2 Physical health risks at work**\nRisks at work that can result in physical harm can be divided into**safety**and**health risks**. \n\nThe main result of insufficient safety is a work accident. A**work accident**has as immediate \nconsequences either a personal injury, a disease, or death of one or more workers. Eurostat \ndistinguishes between non-fatal and fatal work accidents, and for the majority of sectors it provides also \nthe duration of the absence due to the accident — an indicator for the severity of the injury. Non-fatal \naccidents at work can cause medium- or long-term health consequences, and in the worst case a \npermanent disability. \n\nILO Definition of accident: ‘An occupational accident is an unexpected and unplanned occurrence, \nincluding acts of violence, arising out of or in connection with work, which results in one or more workers \nincurring a personal injury, disease or death.’51 \n\n**Physical health risks**can be caused by a**variety of circumstances and exposures**or by**inadequate**\n**ergonomics**. Natural**circumstances**at work can pose such health risks, that is, temperature, storms \nand floods, unsafe terrain, biological agents and so on; or the risks are due to manmade circumstances, \nthat is, work in buildings, on roofs and towers, on traffic routes, under artificial ventilation.**Exposure**is \na general term to describe the interaction between environment / emissions / contaminants and the \nhuman organism. In a workplace context, ‘exposure’ mainly covers emissions from machinery or from \ntools and materials, for example, noise, vibration, dust, electromagnetic fields and chemical substances. \n\nRisks from**inadequate ergonomics**harm in particular the musculoskeletal system. Ergonomic risks of \nmanual work are typically caused by repetitive hand and arm movements, tiring positions, for example, \npermanent kneeling or overhead work, lifting and moving of heavy loads, or of patients and so on. A \ncertain ergonomic risk is**physical inactivity**, in practice sitting most of the working time. Not only \nadministrative tasks but also many occupations in service or industry require permanent sitting, for \nexample, drivers, cashiers, part assembly operators and so on (often called ‘sedentary occupations’).", - "page_start": 37, - "page_end": 37, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "The pure distinction between fatal and non-fatal work accidents does not reveal that a very large part of \nthe human and financial burden is caused**by severe but not fatal accidents**. In 2019, 232,892 work \naccidents resulted in an absence of more than three months or caused a permanent disability, compared \nto 3,008 fatal accidents (NACE Rev. 2 activity A, C-N). That is, in addition to every worker who dies, \nanother 77 suffer injuries resulting in at least three months off work or in permanent disability. \n\n**Work-related deaths and diseases**\n\n**Work-related health outcomes represent a much higher burden**for society than work accidents. \nMore workers are affected, and the overall costs are much higher. When limiting the scope of analysis \nto the officially**recognised occupational diseases**, the trend of health outcomes (deaths, illnesses) \ncaused by ‘exposures’ at work decreases similarly to the accident trend. \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n12", - "page_start": 11, - "page_end": 11, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "***4.1.2 Serious non-fatal and fatal work accidents***\n\nEurostat defines a fatal work accident as follows*: ‘A “fatal accident” means an accident which leads to*\n*the death of a victim within one year of the accident’.*160 \nFatal commuting accidents are excluded, or when counted at national level, excluded from the ESAW \ndata. \n\nIn the last decade, most EU Member States registered a**significant decrease of fatal work**\n**accidents**.161 From 2010 to 2019, for the EU27, the**incidence rate of fatal accidents decreased over**\n**all sectors from 2.31 to 1.74**, or a minus of 25%. In the period between 2010 and 2019 the sectoral \nfigures of five major sectors developed as follows: \n\n**Table 19: Incidence rates of fatal accidents per sector in 2010 and 2019 (EU27)162**\n\n\n \n \n \n \n [html]\n
Sectors, EU - 27Incidence rate 2010Incidence rate 2019Development 2010 to 2019
Agriculture ( A )4.554.44plus 10 %
Manufacturing ( C )2.271.6minus 30 %
Construction ( F )7.546.52minus 14 %
Wholesale ( G )1.431.0minus 30 %
Transport and storage ( H )7.164.84minus 32 %
All sectors2.311.77minus 23 %
\n\n\n\nAlso, large differences between countries can be noted. The following figure — taken from the OSH \nBarometer — calculates the number of fatal accidents in periods and compares the period 2010-2014 \nwith 2015-2020. The reason is that — particularly in smaller Member States — a year with one serious \nand large work accident and several fatalities, or another year without any fatal accident, would distort \nthe annual picture and create significant changes from year to year. Romania, Luxembourg and Bulgaria \nhave the highest incident rates, and the Netherlands, Sweden and Germany the lowest. In 25 countries \nthe rate fell or stagnated in these two periods, with exceptions being Luxembourg and Greece. \n\n**Figure 23: Comparison of the average incidence rate of fatal accidents in two periods: 2010-2014 and 2015-**\n**2020163**", - "page_start": 70, - "page_end": 70, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Still, not only preventive measures but also other non-OSH-related developments worked in the**\n**same direction.**The shrinkage of the workforce in certain sectors, for example, mining, textile, \nagriculture, and specific high-risk subsectors of manufacturing, that is, shipyards or foundries, has led \nto a reduction of the workforce in particularly dangerous working conditions. The production of these \nsectors was — partly or fully — relocated to other regions of the world, and EU enterprises import the \nneeded products as part of global supply chains. \n\n**Major economic changes of sectors with over average work accident rates**\n\n\n \n \n \n \n [html]\n
The decrease of production in the mining and testlike wectors was replaced by the import of mining or bexille products. Nowardays the share of workforce in these onctors is much smaller in the EU / than 30 years ago, in the EUS / 2010, intrilli
The share of emphavein in approachum, also a sextor with high accolert rates, throped mainly due to automation from 0.5 % in 2010 to 4.5 %. 20111114 workwisk eili all 277713 in construction, another sector with accoler rates over average, d
\n\nThe decline of these sectors and the growth of workforce in other sectors like wholesale, transport, \neducation, health and care shifted the safety risks of working conditions. Several EU Member States \nalso observe a growth of road transport-related accidents during work.134 \n\n***4.1.1 Non-fatal work accidents***\n\n\n \n \n \n \n [html]\n
DEFINITIONS
[ Curotaxt has developed the European Statistics on Accidents at Work, or ESAIR, methodology to harmonise the
Imantamized work accidents. This methodology describes how accidents at work have to be reported and defines [ several terms and conditions ].
| What is an accident?
[ Accident at work ’ is defined in the ESAIN methodology [ 39 ] as a ‘ discrete occurrence in the course of work which ‘ leads to physical or mental harm.’
| When is a non - fatal work accident counted?
ESSNAR counts were accolent it the neuropation of work accumed ( 1 days after the early acceler ). Chapter 4. CE if [ Tw ] fund / behindrating [ 101 / seplans : Incolent alerthore these calender days ( alware for early ). Days full calender days a
[ Exempted are : Commuting accidents, self - infilcted injuries ( e. g. suicides ), and strictly natural causes that injure [ secple at their workplaces ( e. g. earthquakes, floods ).
\n\nThe total number of reported non-fatal accidents for the EU27 was 3,140,950 in 2019.136 As mentioned \nin the introduction to this chapter, the incident rates of non-fatal accidents fell in about 25 years from \n4,089 (year 1998137) to 1,713 (2019), that is,**it decreased about 58%**.138 The**greatest part of this**\n**decrease**took place between**1998 and 2010**,139 the incidence rate halved to 2,021,**a drop of 51%**. \nStill, between 2010 and 2019 the incidence rate for the EU27 fell from 2,021 incidents per 100,000 \nworkers to 1,713, a drop of a further 15% (taking 2010 as the reference year).140", - "page_start": 63, - "page_end": 63, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "147 In 2019, there were 3.141 million non-fatal accidents that resulted in at least four calendar days of absence \nfrom work and 3,408 fatal accidents in the EU27, a ratio of approximately 922 non-fatal accidents for every fatal \naccident, here \n148 Kurppa, 2015: Severe Under-reporting of Work Injuries in Many Countries of the Baltic Sea Region: An \nexploratory semi-quantitative study – ‘What goes unreported goes unfixed’ (p. 20 ff). \n\n149 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and sex; Eurostat: Fatal Accidents at work by \nNACE Rev. 2 activity \n\n150 Detailed studies from hospitals in Denmark show that even a large share of serious work accidents (25%) \nresulting in amputations and fractions are not registered, see: LO Denmark, 2012: Underrapportering af \narbejdsulykker Table 14; and the Danish Working Environment Authority published a report concluding a total of \n50% in underreporting, here \n151 Kurppa, 2015: Severe Under-reporting of Work Injuries in Many Countries of the Baltic Sea Region: An \nexploratory semi-quantitative study – ‘What goes unreported goes unfixed’ (p. 20ff). \n152 LFS Ad hoc module: Accidents at work and other work-related health problems (2020, 2013 and 2007) \n153 Eurostat: EU labour force survey 2020 module on accidents at work and other work-related health problems : \nassessment report : 2021 edition. The exact question is (p. 47):*‘Thinking of the year before [last day of reference*\n*week], have you had any accident at work? Accidents outside working hours and accidents during the journey*\n*from home to work or from work to home are excluded. However, accidents during a journey in the course of work*\n*are included.’*\n154 Eurostat, Statistics in focus, Theme 3 – 16/2001: Accidents at work in the EU 1998-1999, here \n155 ISCO-Groups: 1. Managers, 2. Professionals, 3. Technicians and Associate Professionals, 4. Clerical Support \nWorkers, 5. Services and Sales Workers, 6. Skilled Agricultural, Forestry and Fishery Workers, 7. Craft and \nRelated Trades Workers, 8. Plant and Machine Operators and Assemblers, 9. Elementary Occupations, 0. Armed \nForces Occupations. \n\n*156 Eurostat: Persons reporting an accident at work by sex, age and occupation*\n\n157 Eurostat, 2021: Self-reported accidents at work - key statistics \n\n158 Ibid. \n\n159 Agilis, 2015: Final statistical report on the quality assessment and statistical analysis of the 2013 Labour Force \nSurvey ad hoc module (p. 45) \n\n160 Eurostat, 2013: European Statistics on Accidents at Work (ESAW) - Summary methodology - 2013 edition \n(p. 6). \n161 Fatal work accidents are seen as a more reliable data source than non-fatal accidents. \n162 Eurostat: Fatal accidents at work by NACE Rev. 2 activity, Filter: Incidence rate. \n\n163 The OSH Barometer shows the ESAW data from Eurostat’s Fatal accidents in a column diagram showing the \nincidence rate per 100,000 workers for two periods, here \n\n164 Communication from the Commission to the European Parliament, the Council, the European Economic And \nSocial Committee and the Committee of Regions on the practical implementation of the provisions of the Health \nand Safety at Work Directives 89/391 (Framework), 89/654 (Workplaces), 89/655 (Work Equipment), 89/656 \n(Personal Protective Equipment), 90/269 (Manual Handling of Loads) and 90/270 (Display Screen Equipment), \nhere (p. 15). \n165 European Commission, 2009: Causes and circumstances of accidents at work in the EU (p. 101 and Table \nA1.6. p. 130).", - "page_start": 146, - "page_end": 146, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**OSH Barometer – Non-fatal accidents at work:**\nhttps://visualisation.osha.europa.eu/osh-barometer/accidents-diseases-well-being/work- \naccidents/non-fatal-work-accidents \n\n**OSH Barometer – Fatal accidents at work:**\nhttps://visualisation.osha.europa.eu/osh-barometer/accidents-diseases-well-being/work- \naccidents/fatal-work-accidents \n\n**Eurostat – Accidents at work (ESAW and LFS Ad hoc modules):**\nhttps://ec.europa.eu/eurostat/web/health/data/database \n\n\n\n**4.2 Trends in health outcomes**\n\n***‘The misfortune (harm) that these types of***\n***workers get from the work in their***\n***workshops, beyond their uncomfortable***\n***sitting life, is the threat of Myopia. The***\n***well-known affection of the eyes, because***\n***self-evidently for a good visibility it is***\n***necessary to move the eyes closer to the***\n***objects of work.’173,174***\n\n*Ramazzini, 1713:*De Morbis Artificum Diatriba in its \nchapter*on ‘Diseases of those who do fine work’.*\n*Ramazzini’s observation anticipates somehow the 21st*\n*century knowledge on sedentary work and about*\n*accommodative fatigue at a near viewing distance.*\n\nk \nc \no \nt \nS \ne \nb \no \nd \nA \nR \nr \ne \nn \nt \ni \ne \nL \n© \n\n/ \n\n**Work-related health outcomes represent a much higher burden for society than work**\n**accidents.**175 More workers are affected; the overall costs are much higher. At first glance, the trend of \nhealth outcomes (illnesses and wellbeing)**caused by ‘exposures’ at workplaces**is similarly \ndecreasing like the accident trend; that is the case if the scope of the analysis refers to the**officially**\n**recognised occupational diseases**. \n\nThe situation is complex, because only few and mostly the recognised**occupational diseases**have a \nunique cause-effect relationship, that is, a**very strong relation between one specific exposure at**\n**work and one (or more) well-defined disease(s)**as a result of this exposure. \nIn 1987, a joint ILO/WHO expert committee on occupational health offered the suggestion that**the term**\n***work-related diseases***may be appropriate to describe not only recognised occupational diseases but \nother disorders to which the work environment and performance of work contribute significantly as one \nof the several causative factors (Joint ILO/WHO Committee on Occupational Health 1989): \n*‘Nevertheless, it is not always that easy to designate a disease as being work-related. In fact, there is a*\n*wide range of diseases that could be related in one way or another to occupation or working conditions.*\n*On the one hand, there are the classical diseases that are occupational in nature, generally related to*", - "page_start": 72, - "page_end": 72, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "*121 Eurostat: Accidents at work by sex and severity (NACE Rev. 2 activity Total).*\n\n*122 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and sex*\n\n*123 Eurostat: Fatal Accidents at work by NACE Rev. 2 activity; Fatal Accidents at work: Mining and quarrying*\n124 Rees, 2016: Comparing European and American Health & Safety Laws – ‘Pre-1970, there were approximately \n14,000 worker fatalities a year, according to the Occupational Health and Safety Administration (OSHA). By 2010, \nthe workforce had doubled, but fatalities were down to just 4,500 – a workplace fatality rate reduction of 66 \npercent. Worker injuries and illnesses were also down from 10.9 incidents per 100 workers in 1972 to 3.2 per 100 \nin 2014.’ \n125 WHO/ILO, 2021: WHO/ILO joint estimates of the work-related burden of disease and injury, 2000–2016: \nGlobal monitoring report (p. 18). \n126 Source of the picture: here (copyrighted). \n**127**Eurostat: Accidents at work, by specific physical activity and economic activity, EU, 2019 (% share). \n128 Eurostat: Businesses in the mining and quarrying sector \n129 European Commission: Textiles and clothing in the EU \n130 European Parliament, 2014: Briefing – Workers’ conditions in the textile and clothing sector: just an Asian \naffair? \n131 Eurostat: National accounts employment data by industry (up to NACE A*64), Filter for years and sector \n‘Agriculture, forestry and fishing’, here \n132 World Bank: Employment in agriculture (% of total employment) (modelled ILO estimate) \nhttps://data.worldbank.org/indicator/SL.AGR.EMPL.ZS?end=2018&most_recent_year_desc=true&start=1991&typ \ne=shaded&view=chart \n133 United Nations – e-Waste coalition: Global E-waste Monitor 2017 \n134 For example: OSH system at national level - France \n135 Eurostat, 2013: European Statistics on Accidents at Work (ESAW) - Summary methodology - 2013 edition \n(p. 5). \n136 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and sex, A recalculation of the total number of \naccidents for the EU27 to the years 1994 to 1998 is not possible, mainly due to the many enlargements of the EU. \n137 Eurostat, Statistics in focus, Theme 3 – 16/2001: Accidents at work in the EU 1998-1999 (p. 4), here \n138 Data for 1998 for the Sectors A and D to K, NACE Rev. 1.1, EU-15, for 2019 for Sectors A, C-N, NACE Rev. 2, \nEU27. Only incidence rates for these selected sectors can be compared because Eurostat did not provide an \nincidence rate for all sectors in 1998 but for the sectors A and D to K, NACE 1.1. \n139 In total the incidence rate decreased from 4,089 to 1,713; the difference is 2,376. The reduction between 1998 \nand 2010 amounts to 2,068, and between 2010 and 2019 it sums up to 308. That means that 87% of the \nreduction was achieved in the first period and 13% in the second period. \n140 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and sex, Filter Sectors, A, C-N \n141 Eurostat: Accidents at work statistics – Incident rates \n142 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and sex, Filter: Time frequency: Annual; Unit of \nmeasure: Incidence rate; Classification of economic activities - NACE Rev. 2; Sex: Total. \n143 EU-OSHA, 2010: A review of methods used across Europe to estimate work-related accidents and illnesses \namong the self-employed \n144 EU-OSHA, 2010: A review of methods used across Europe to estimate work-related accidents and illnesses \namong the self-employed (p. 7). \n145 Eurostat, 2013: European Statistics on Accidents at Work - Summary methodology - 2013 edition (p. 6): \n*‘Article 2 of the ESAW Regulation covers the provision of data on persons who had an accident at work during the*\n*reference period and states that if the victim is self-employed, a family worker or a student, providing data is*\n*voluntary.’*\n\n*146 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and sex*", - "page_start": 145, - "page_end": 145, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**4 Trends in outcomes – safety, health and wellbeing**\n**Work accidents, work-related diseases and the level of work-related wellbeing**114 are regarded as \nthe three major health and safety outcomes of working conditions. They are used as**lagging indicators**\n(always**work accidents**and often**occupational**or**work-related diseases**, sometimes**wellbeing**) \nand as proof of evidence in political, scientific or practical discussions about the quality of working \nconditions and the effectiveness and performance of the OSH system. \n\nk \nc \no \nt \nS \ne \nb \no \nd \nA \n/ \no \nr \nc \nM \na \nd \ne \nM \nk \na \ne \nr \nb \ne \nv \na \nW \n© \n\ni \n\ni \n\n\n\n**Work accidents**are probably the**most widely used indicator**for assessment of the effectiveness of \nthe OSH systems and the working conditions in general, also in a broader public; thus, this report will \ntackle this topic more extensively than other topics. Work accidents are regarded as a result of \n**insufficient safety prevention**.**Occupational and work-related diseases**are regarded as**short- or**\n**long-term outcomes**of all disease-generating circumstances or exposures at work, caused by any \ntype of material or substance, by unhealthy physical activity or unhealthy inactivity, or by disease- \ncausing aspects of human interaction at work. Occupational and work-related diseases are categorised \nand assessed by experts, particularly by medical professions.**Wellbeing**is the newest concept, \ncovering the individual or group perception of the working conditions. \n\nThe**presence of risk factors**and — if possible — the**level of exposure**makes up the largest block \nof datasets in the OSH Barometer that is used to assess working conditions. \n\n**4.1 Trends in safety outcomes – work accidents**\nThe**development of better safety standards, safety technologies and preventive organisational**\n**approaches**were major factors to achieve a steady reduction of work accidents and fatal work \naccidents during the last 30 years. This is caused by crucial improvements in safety measures and \ntechnologies, by practical implementation of these measures in enterprises, by scientific developments, \nand crucially supported by the legal obligation to apply a comprehensive, proactive and preventive \napproach, as introduced in the EU Framework Directive.", - "page_start": 60, - "page_end": 60, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "476 E European Agency for Safety and Health at Work,2013: European Risk Observatory, Analysis of the \ndeterminants of workplace occupational safety and health practice in a selection of EU Member States, \nhttps://osha.europa.eu/en/publications/reports/analysis-determinants-workplace-OSH-in-EU \n477 European Agency for Safety and Health at Work, 2019: The value of OSH and the societal costs of work- \nrelated injuries and disease, Luxembourg; \nElsler D. et al: A review of case studies evaluating economic incentives to promote occupational safety and \nhealth. Scand J Work Environ Health 2010; 36: 289–298 \n478 E European Agency for Safety and Health at Work, 2021: Improving compliance with occupational safety and \nhealth regulations: an overarching review \n479 Walters D, Johnstone R, Bluff E, Limborg HJ, Gensby U.: Improving compliance with occupational safety and \nhealth regulations: an overarching review EU-OSHA, 2021. Improving compliance with occupational safety and \nhealth regulations \n480 ILO and integration of OSH Into decent work https://www.ilo.org/global/topics/dw4sd/themes/osh/lang-- \nen/index.htm \n481 Dijk, F., Yohama Caraballo-Arias, Y.: Where to Find Evidence-Based Information on Occupational Safety and \nHealth? https://www.annalsofglobalhealth.org/articles/10.5334/aogh.3131/ \nTrade union position, one example: Vogel L (2014), The point of view of the European trade unions: It is urgent to \nrevitalise the EU occupational health and safety policy, http://www.osha.mddsz.gov.si/.../Laurent_VOGEL_EN.pdf \nEmployer position, one example: Safer and healthier work for all - Modernisation of the EU occupational safety \nand health legislation and policy, \n482 Eurofound; Labour market change New forms of employment: 2020 update \n483 Eurofound, 2020: Working conditions in sectors, Publications Office of the European Union, Luxembourg, \ndoi:10.2806/024695, p. 41 \n484 Norway, STAMI: https://noa.stami.no/ National monitoring of work environment (National overvåkning af \narbeidmiljø) \n485 Detailed Action Plan for the 4 Main Strategies to Create Safe Workplaces (update from 2020) \nhttps://kosha.or.kr/english/publications/Resources.do?mode=view&articleNo=277001&article.offset=0&articleLi \nmit=10 \n486 Sakurai, H.: Occupational Safety and Health in Japan: Current Situations and the Future \nhttps://www.jstage.jst.go.jp/article/indhealth/50/4/50_MS1375/_pdf/-char/ja \n487 Occupational Safety and Health Administration Ministry of Labor, Republic of China (Taiwan): National \nOccupational Safety and Health Profile of Taiwan, 2014, Chapter 8 National Occupational Safety and Health \nProfile of Taiwan \n488 See: https://www.mom.gov.sg/workplace-safety-and-health/wsh-reports-and-statistics \n\n489 E.g.: National Academies of Sciences, Engineering, and Medicine. 2018. A Smarter National Surveillance \nSystem for Occupational Safety and Health in the 21st Century. Washington, DC: The National Academies \nPress. https://doi.org/10.17226/24835, 2018 \n\n490 E.g.: Publications from the Association of Workers' Compensation Boards of Canada, https://awcbc.org/en/ \n491 Australian Safety and Compensation Council, Report on indicators for occupational disease*,*Australian \nGovernment, 2006, p1-45 \n492 E.g.: https://data.worksafe.govt.nz/ \n\n493 International Labour Organisation ILO (no publishing date available). Decent work: Measuring decent work. \nhttp://www.ilo.org/integration/themes/mdw/lang--en/index.htm \n\n494 Country profiles on Occupational Safety and Health, https://www.ilo.org/safework/countries/lang-- \nen/index.htm \n495 Work Health Organisation WHO (2011). Global Health Observatory: WHO indicator registry., from: \nhttp://www.who.int/gho/indicator_registry/en/index.html \n496 United Nations: Sustainable Development Goals, https://sustainingdevelopment.com/sdg8-indicators/ \n497 UNECE, 2010: Measuring Quality of Employment, https://unece.org/statistics/publications/measuring-quality- \nemployment", - "page_start": 159, - "page_end": 159, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "ESAW provides more detailed data about the**severity of non-fatal accidents**. 164 According to \nEurostat’s evaluation of ‘Causes and circumstances’ of work accidents (**data from 2005, EU-15 and**\n**Norway**), in 2005, 3.9% of the non-fatal work accidents or 157,494 non-fatal accidents led to**permanent**\n**incapacity**(full or partly), and 138,568 (3,4% of all accidents) to absences from three to six months. 165 \n**In 2019**, the**outcome**‘Permanent incapacity or 183 days*(of time-off)*or over’**made up 4.4% of all**\n**non-fatal work accidents or a little more than 100,000 cases**.**As serious outcomes**we regard at \nleast the cases in the ESAW category: non-fatal accidents involving these consequences are more than \n**34 times more frequent than fatalities**. These detailed time-off and outcome data are only available \nfor the sectors A and C-N, not for the other sectors with lower accident rates. If we include in the \ndefinition of a serious accident also the**ESAW category ‘Time off between 3 and 6 months’, another**\n**5.4% or 129,150 non-fatal accidents**would be added to the category ‘Serious accident’. \n\n**Table 20: Severity of accidents in the EU27 in 2019 (sectors A and C-N)166**\n\n\n\n\n \n \n \n \n [html]Coefficient between nore than 6 months or permanent handicap / fatal34.5All Accidents in A, C - NCoefficient between time off between 3 and 8 months / fotal42.9All Accidents in A, C - NCoefficient between time of between 1 and months nore than 1 months or permanent helice77.4\n
All Accidents in A, C - NMore than 6 months or permanent handicapFatal
(% of all accidents )(% of all accidents )
2.377.146103.7423.008
100 %4.4 %0.13 %
Time off between 3 and 6 monthsFatal
(% of all accidents )(% of all accidents )
2.377.146129.1503.008
100 %5.4 %0.13 %
Time off between 3 and 6 months, more than 6 months or permanent hendicapFatal
(% of all accidents )(% of all accidents )
2.377.146232.8923.008
100 %9.8 %0.13 %
\n\n**National data**showed similar coefficients; a calculation for two EU Member States showed a coefficient \nof 27 for Germany (only permanent handicap) and 66 for France. 167 EU-OSHA used the severity data \nof Eurostat in its study on ‘The value of occupational safety and health and the societal costs of work- \nrelated injuries and diseases’ (2019). 168 \n\nAccording to the publication ‘Causes and circumstances of accidents at work in the EU’ (DG EMPL and \nEurostat), the types of work accidents**causing the longest average days of absence**are: ‘Slipping, \nstumbling and falling’ (46 absence days), followed by three more categories at the same level: ‘Loss of \ncontrol of machines or handheld tools’, by ‘Shock, fright, violence, aggression, threat, presence’,169 and \nby ‘Electrical problems, explosion and fire’ (all three types of accidents with an average of 38 days of \nabsence).170", - "page_start": 71, - "page_end": 71, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic5.pdf", - "query": "Was knowledge domain agnosticism a goal in the development of OLAF?", - "target_page": 1, - "target_passage": "Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations represented largely depend on one or more business use cases. As we designed our framework with industry application in mind, we need to consider it within its real-world usage context.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**OLAF : Ontology Learning Applied Framework**\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) \nJean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK \n\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically**extracting and structuring knowledge**\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a**modular ontology**\n**learning framework**considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning \nsystems as tools to help the domain expert, we developed the proposed framework with**full automation**in mind. An implementation as an**open-**\n**source and collaborative python library**is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning. \n\n\n\n\n\n\n \n \n \n \n [html]\n
Text2Onto, 2005, [ 1 ]It is the reference in the field as it defines a representation - agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a CATE module.Ontologies can be exported in various formats. CATE system adds great visualisations. But it is not maintained since 2011.
OntoCain, 2010, [ 2 ]It focusives on multivord terms to construct a “ lexicalised contology ” by adapting an agglomerative clustering and an PCA method. It impliements & steps text preprocessing, concept extraction ( C / NC - value ). Takonomy construction, aIt considers only multiword terms and relies on WordNet and POS tags. It cloes not distinguish between terms and concepts and implements different adaptable approaches.
OntoLearn ( Reloaded ), 2O13, [ 3 ]It focuses on “ lexicalised ontologies ” and uses seed knowledge. It implements 5 steps : terminology extraction. hypermym graph construction, domain filtering of hypernyms. hypernym graph pruning and edge recovery.It relies on WordNet and PDS tags and does not distinguish between terms and concepts It implements different adaptable approaches.
\n\nMost ontology learning systems do not consider the targeted ontology- \nbased system. Though an ideal ontology should model a domain in an \napplication-independent manner, in practice,**concepts and relations**\n**represented largely depend on one or more business use cases**. As \nwe designed our framework with industry application in mind, we need \nto consider it within its**real-world usage context**. \n\n***C-value-based filtering***\n***Linguistic-based filtering***\n***TF-IDF value-based filtering***\n\nOur implementation is largely based on the**Python NLP**\n**library spaCy**. The text processing on spaCy helps us \nwork with data in**many different languages**while \nstaying flexible on the methods used. The only constraint \nis to end up with a list of**spaCy Doc objects**. \n\nTerm Extraction \n\n***Embedding-based similar term extraction***\n***ConceptNet synonym extraction***\n***WordNet synonym extraction***\n\nTerm Enrichment \n\n***ConceptNet-based extraction***\n***Grouping terms based on synonyms***\n***Term cooccurrences-based extraction***\n***Similarity-based extraction***\n*Formal concept Analysis*\n\n**OLAF**\n\nConcept/Relation \nExtraction \n\n***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "This tutorial is just the entry point to a technology that is entering the*Slope of Enlightenment*in the \nGartner technology hype cycle [Gartner Hype Cycle]. Tim Berners-Lee published his paper on the \nSemantic Web [Berners-Lee 2001] way back in 2001. At least in my experience for most large US \ncorporations the excitement around Machine Learning seemed for a while to eclipse serious interest in \nOWL, SPARQL, and other Semantic Web technologies in the United States. Then influential technology \ncompanies such as Google [Singhal 2012], Facebook [Olanof 2013], and Amazon [Neptune 2017] started \nto embrace the technology using the term Knowledge Graphs [Noy 2019] and the corporate world is \nfinally realizing that machine learning and knowledge graphs are complimentary not competitive \ntechnologies. \n\nThe term knowledge graph itself can be used in different ways. The best definition I’ve heard is that an \nontology provides the vocabulary (i.e., essentially the T-Box) and a knowledge graph is an ontology \ncombined with data (A-Box). Although in the corporate world I often hear people simply talk about \nknowledge graphs without much interest in the distinction between the vocabulary and the data. \n\nThere are a number of vendors emerging who are using the technology in very productive ways and are \nproviding the foundation for federated knowledge graphs that can scale to hundreds of millions of triples \nor more and provide a framework for all corporate data. I’ve listed several in the bibliography but those \nare only the ones I’ve had some experience with. I’m sure there are many others. One of the products I’ve \nhad the best experience with is the AllegroGraph triplestore and the Gruff visualization tool from Franz \nInc. Although Allegro is a commercial tool, the free version supports most of the core capabilities of the \ncommercial version. I’ve found the Allegro triplestore easy to use on a Windows PC with the Docker tool \nto emulate a Linux server. \n\nI first started working with classification-based languages when I worked at the Information Sciences \nInstitute (ISI) and used the Loom language [Macgregor 91] to develop B2B systems for the US \nDepartment of Defense and their contractors. Since then, I’ve followed the progress of the technology, \nespecially the DARPA knowledge sharing initiative [Neches 91] and always thought there was great \npromise in the technology. When I first discovered Protégé it was a great experience. It is one of the best \nsupported and most usable free tools I’ve ever seen, and it always surprised me that there weren’t more \ncorporate users leveraging it in major ways. I think we are finally starting to see this happen and I hope \nthis tutorial helps in a small way to accelerate the adoption of this powerful and robust tool.", - "page_start": 88, - "page_end": 88, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "The original BERT paper [39] showed the effectiveness of the \narchitecture and the pretraining technique by evaluating on the \nGeneral Language Understanding Evaluation (GLUE) benchmark \n[138], the Stanford Question Answering Datasets (SQuAD 1.1 and \n2.0) [108], and the Situations With Adversarial Generations bench- \nmark (SWAG) [155], all datasets designed to test language under- \nstanding and/or commonsense reasoning. BERT posted state of \nthe art results on all of these tasks, and the authors conclude by \nsaying that “unsupervised pre-training is an integral part of many \nlanguage understanding systems.” [39, p.4179]. Even before [39] \nwas published, BERT was picked up by the NLP community and \napplied with great success to a wide variety of tasks [e.g. 2, 149]. \nHowever, no actual language understanding is taking place in \nLM-driven approaches to these tasks, as can be shown by careful \nmanipulation of the test data to remove spurious cues the systems \nare leveraging [21, 93]. Furthermore, as Bender and Koller [14] \nargue from a theoretical perspective, languages are systems of \nsigns [37], i.e. pairings of form and meaning. But the training data \nfor LMs is only form; they do not have access to meaning. Therefore, \nclaims about model abilities must be carefully characterized. \n\n4.4 Curation, Documentation & Accountability \nIn summary, LMs trained on large, uncurated, static datasets from \nthe Web encode hegemonic views that are harmful to marginalized \npopulations. We thus emphasize the need to invest significant re- \nsources into curating and documenting LM training data. In this, \nwe follow Jo et al. [62], who cite archival history data collection \nmethods as an example of the amount of resources that should be \ndedicated to this process, and Birhane and Prabhu [18], who call for \na more justice-oriented data collection methodology. Birhane and \nPrabhu note, echoing Ruha Benjamin [15], “Feeding AI systems on \nthe world’s beauty, ugliness, and cruelty, but expecting it to reflect \nonly the beauty is a fantasy.” [p.1541] \n\n19~26% of papers sampled from ACL, NAACL and EMNLP since 2018 cite [39]. \n20Specifically, that the mutual information between the input and the meaning given \nthe output is zero — what Spärck Jones calls “the model of ignorance”. \n\nAs the late Karen Spärck Jones pointed out: the use of LMs \nties us to certain (usually unstated) epistemological and method- \nological commitments [124]. Either i) we commit ourselves to a \nnoisy-channel interpretation of the task (which rarely makes sense \noutside of ASR), ii) we abandon any goals of theoretical insight into \ntasks and treat LMs as “just some convenient technology” [p.7], or \niii) we implicitly assume a certain statistical relationship — known \nto be invalid — between inputs, outputs and meanings.20 Although \n\n\n \n \n \n \n [html]\n
TableFF insiluteParameterCellstrateTableAge, yearTableTable*SpeciesAge ( years )TableTable
", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "OWL classes are assumed to overlap, i.e., by default they are not disjoint. This is often useful \nbecause in OWL, unlike in most object-oriented models, multiple inheritance is not discouraged \nand can be a powerful tool to model data. If we want classes to be disjoint, we must explicitly \ndeclare them to be so. It is often a good development strategy to start with classes that are not \ndisjoint and then make them disjoint once the model is more fully fleshed out as it is not always \nobvious which classes are disjoint from the beginning.", - "page_start": 17, - "page_end": 17, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Rather than a standard bibliography, this section is divided into various categories based on resources that \nwill be valuable for future exploration of the technologies and methods described in this tutorial. \n\n14.1 W3C Documents \nOWL 2 Primer: https://www.w3.org/TR/owl2-primer/ \n\nOWL 2 Specification: https://www.w3.org/TR/owl2-overview/ \n\nSemantic Web Primer for Object-Oriented Software Developers: https://www.w3.org/TR/sw-oosd- \nprimer/ \n\nSPARQL Specification: https://www.w3.org/TR/sparql11-query/ \n\nSWRL Specification and Built-ins: https://www.w3.org/Submission/SWRL/ \n\n14.2 Web Sites, Tools, And Presentations. \nAgile Alliance: https://www.agilealliance.org/agile101/ \n\nCellfie: https://github.com/protegeproject/cellfie-plugin/wiki/Grocery-Tutorial \n\nGartner Hype Cycle: https://www.gartner.com/en/research/methodologies/gartner-hype-cycle \n\nJena: Open Source Java Framework for Semantic Web and Linked Data Applications: \nhttps://jena.apache.org/ \n\nOpen World Assumption (OWA) presentation by Nick Drummond and Rob Shearer: \nhttp://www.cs.man.ac.uk/~drummond/presentations/OWA.pdf \n\nProtégé: https://protege.stanford.edu/ \n\nProtégé Best Practices. Summary page on my blog for all my articles on Protégé, OWL, SWRL, etc.: \nhttps://www.michaeldebellis.com/post/best-practices-for-new-protege-users \n\nSHACL Playground: https://shacl.org/playground/ \n\nSWRL Presentation by Martin O’Connor: \nhttps://protege.stanford.edu/conference/2009/slides/SWRL2009ProtegeConference.pdf \n\nWebProtégé: https://webprotege.stanford.edu/ \n\nWebVOWL: Web-based Visualization of Ontologies: http://vowl.visualdataweb.org/webvowl.html \n\n14.3 Papers \nBerners-Lee (2001). The Semantic Web: A new form of Web content that is meaningful to computers will \nunleash a revolution of new possibilities. With James Hendler and Ora Lassila. Scientific American, May \n17, 2001. https://tinyurl.com/BernersLeeSemanticWeb \n\nMacGregor, Robert (1991). \"Using a description classifier to enhance knowledge representation\". IEEE \nExpert. 6 (3): 41–46. doi:10.1109/64.87683 https://tinyurl.com/MacGregorLoom", - "page_start": 89, - "page_end": 89, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "**Reasoning and problem-solving**\n\nEarly researchers developed algorithms that imitated step-by-step reasoning that humans use when they \nsolve puzzles or make logical deductions.[13] By the late 1980s and 1990s, methods were developed for \ninformation, employing concepts from probability and \ndealing with uncertain or \neconomics.[14] \n\nincomplete \n\nMany of these algorithms are insufficient for solving large reasoning problems because they experience a \n\"combinatorial explosion\": They become exponentially slower as the problems grow.[15] Even humans \nrarely use the step-by-step deduction that early AI research could model. They solve most of their \nproblems using fast, intuitive judgments.[16] Accurate and efficient reasoning is an unsolved problem. \n\n**Knowledge representation**\nKnowledge representation and knowledge engineering[17] \nallow AI programs to answer questions intelligently and \nmake deductions about real-world facts. Formal knowledge \nrepresentations are used in content-based indexing and \nretrieval,[18] scene \ninterpretation,[19] clinical decision \nsupport,[20] knowledge discovery (mining \"interesting\" and \nactionable inferences from large databases),[21] and other \nareas.[22] \n\nA knowledge base is a body of knowledge represented in a \nform that can be used by a program. An ontology is the set \nof objects, relations, concepts, and properties used by a \nparticular domain of knowledge.[23] Knowledge bases need \nto represent things such as objects, properties, categories, \nand relations between objects;[24] situations, events, states, \nand time;[25] causes and effects;[26] knowledge about \nknowledge (what we know about what other people \nknow);[27] default reasoning (things that humans assume are true until they are told differently and will \nremain true even when other facts are changing);[28] and many other aspects and domains of knowledge. \n\nAn ontology represents knowledge as a set \nof concepts within a domain and the \nrelationships between those concepts. \n\nAmong the most difficult problems in knowledge representation are the breadth of commonsense \nknowledge (the set of atomic facts that the average person knows is enormous);[29] and the sub-symbolic \nform of most commonsense knowledge (much of what people know is not represented as \"facts\" or \n\"statements\" that they could express verbally).[16] There is also the difficulty of knowledge acquisition, \nthe problem of obtaining knowledge for AI applications.[c]", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Note that all these approaches look for the \nevidence of gold-standard linguistic structures, \nand add some amount of extra knowledge to the \nprobe. Most recently, Wu et al. (2020) proposed a", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Neches, Robert (1991). Enabling Technology for Knowledge Sharing. With Richard Fikes, Tim Finin, \nThomas Gruber, Ramesh Patil, Ted Senator, and William T. Swartout. AI Magazine. Volume 12 Number \n3 (1991). https://tinyurl.com/DARPAKnowledgeSharing \n\nNoy, Natasha (2019). Industry-Scale Knowledge Graphs: Lessons and Challenges. With Yuqing Gao, \nAnshu Jain, Anant Narayanan, Alan Patterson, Jamie Taylor. Communications of the ACM. Vol. 62. No. \n8. August 2019. https://tinyurl.com/ACMKnowledgeGraphs \n\nM. J. O'Connor (2012). A Pair of OWL 2 RL Reasoners. With A.K. Das. OWL: Experiences and \nDirections (OWLED), 9th International Workshop, Heraklion, Greece, 2012. http://ceur-ws.org/Vol- \n849/paper_31.pdf \n\nSinghal, Amit. (2012). Introducing the Knowledge Graph: things, not strings. Google SVP, Engineering. \nMay 16, 2012. https://www.blog.google/products/search/introducing-knowledge-graph-things-not/ \n\n14.4 Books \nDuCharme, Bob (2011). Learning SPARQL. O’Reilly Media \n\nLewis, Harry. (1997). Elements of the Theory of Computation. With Christos Papadimitriou. Prentice- \nHall; 2nd edition (August 7, 1997). ISBN-13: 978-0132624787 \n\nSegaran, Toby (2009). Programming the Semantic Web: Build Flexible Applications with Graph Data. \nWith Colin Evans and Jamie Taylor. O'Reilly Media; 1st edition (July 28, 2009). \n\n14.5 Vendors \nAllegroGraph Triplestore (Franz Inc.): https://franz.com/ \n\nAmazon Neptune: https://aws.amazon.com/neptune/ \n\nDocker: https://www.docker.com/ \n\nDynaccurate: https://www.dynaccurate.com/ \n\nOntotext: https://www.ontotext.com/ \n\nPool Party: https://www.poolparty.biz/ \n\nStardog: https://www.stardog.com/ \n\nTop Quadrant: https://www.topquadrant.com/", - "page_start": 90, - "page_end": 90, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation \n\nWe designed the proposed framework focusing on**automation**with very little, if any, human involvement in mind. Unlike most existing approaches, \nparticular attention is brought to the**learned ontology final production use case**. We implement the framework as an open-source and open- \naccess python library. We aim to**gather feedback and grow a community**to develop and test multiple algorithms. Various satellite tools could be \ndeveloped to enhance the framework implementation. However, we should focus on developing**axiom extraction**and**automatic ontology**\n**evaluation**. One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter \nfield is known as \"SemOps\". \n\nCimiano P, Völker J. Text2Onto. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005.p. 227-238. ISBN: 978-3-540-32110-1 \nDrymonas E, Zervanou K, Petrakis EGM. Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System. Natural Language Processing and Information Systems. Berlin, Heidelberg: \nSpringer Berlin Heidelberg; 2010. p. 277-87. ISBN: 978-3-642-13881-2 \nPaola Velardi, Stefano Faralli, Roberto Navigli; OntoLearn Reloaded: A Graph-Based Algorithm for Taxonomy Induction. Computational Linguistics 2013; 39 (3): 665–707. DOI: \n10.1162/COLI_a_00146 \nMuhammad Nabeel Asim, Muhammad Wasim, Muhammad Usman Ghani Khan, Waqar Mahmood, Hafiza Mahnoor Abbasi, A survey of ontology learning techniques and applications, \nDatabase, Volume 2018, 2018, bay101, DOI: 10.1093/database/bay101", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "demonstrates the potential capability of integrating state-of-the-art open source LLMs at \n\norganizations that are less open to integrating third-party LLMs. \n\nWhile the dataset was smaller, we made significant efforts to reduce model variance and \n\nprevent overfitting by allocating more data to the training cohort and using k-fold cross validation. \n\nAnd while our ratio split choice implies the testing results will have slightly greater variance than \n\nexpected, this is mitigated through the extensive manual clinical assessment that was performed. \n\nThe study’s multidimensional clinical evaluation was labor intensive, requiring more than 200 hours", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed8.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic5.pdf", - "query": "Is OLAF a specific strategy for ontological learning or is it a toolbox of different strategies?", - "target_page": 1, - "target_passage": "Our vision is to implement a toolbox of methods we can gather to build pipelines. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**OLAF : Ontology Learning Applied Framework**\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) \nJean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK \n\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically**extracting and structuring knowledge**\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a**modular ontology**\n**learning framework**considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning \nsystems as tools to help the domain expert, we developed the proposed framework with**full automation**in mind. An implementation as an**open-**\n**source and collaborative python library**is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning. \n\n\n\n\n\n\n \n \n \n \n [html]\n
Text2Onto, 2005, [ 1 ]It is the reference in the field as it defines a representation - agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a CATE module.Ontologies can be exported in various formats. CATE system adds great visualisations. But it is not maintained since 2011.
OntoCain, 2010, [ 2 ]It focusives on multivord terms to construct a “ lexicalised contology ” by adapting an agglomerative clustering and an PCA method. It impliements & steps text preprocessing, concept extraction ( C / NC - value ). Takonomy construction, aIt considers only multiword terms and relies on WordNet and POS tags. It cloes not distinguish between terms and concepts and implements different adaptable approaches.
OntoLearn ( Reloaded ), 2O13, [ 3 ]It focuses on “ lexicalised ontologies ” and uses seed knowledge. It implements 5 steps : terminology extraction. hypermym graph construction, domain filtering of hypernyms. hypernym graph pruning and edge recovery.It relies on WordNet and PDS tags and does not distinguish between terms and concepts It implements different adaptable approaches.
\n\nMost ontology learning systems do not consider the targeted ontology- \nbased system. Though an ideal ontology should model a domain in an \napplication-independent manner, in practice,**concepts and relations**\n**represented largely depend on one or more business use cases**. As \nwe designed our framework with industry application in mind, we need \nto consider it within its**real-world usage context**. \n\n***C-value-based filtering***\n***Linguistic-based filtering***\n***TF-IDF value-based filtering***\n\nOur implementation is largely based on the**Python NLP**\n**library spaCy**. The text processing on spaCy helps us \nwork with data in**many different languages**while \nstaying flexible on the methods used. The only constraint \nis to end up with a list of**spaCy Doc objects**. \n\nTerm Extraction \n\n***Embedding-based similar term extraction***\n***ConceptNet synonym extraction***\n***WordNet synonym extraction***\n\nTerm Enrichment \n\n***ConceptNet-based extraction***\n***Grouping terms based on synonyms***\n***Term cooccurrences-based extraction***\n***Similarity-based extraction***\n*Formal concept Analysis*\n\n**OLAF**\n\nConcept/Relation \nExtraction \n\n***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation \n\nWe designed the proposed framework focusing on**automation**with very little, if any, human involvement in mind. Unlike most existing approaches, \nparticular attention is brought to the**learned ontology final production use case**. We implement the framework as an open-source and open- \naccess python library. We aim to**gather feedback and grow a community**to develop and test multiple algorithms. Various satellite tools could be \ndeveloped to enhance the framework implementation. However, we should focus on developing**axiom extraction**and**automatic ontology**\n**evaluation**. One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter \nfield is known as \"SemOps\". \n\nCimiano P, Völker J. Text2Onto. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005.p. 227-238. ISBN: 978-3-540-32110-1 \nDrymonas E, Zervanou K, Petrakis EGM. Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System. Natural Language Processing and Information Systems. Berlin, Heidelberg: \nSpringer Berlin Heidelberg; 2010. p. 277-87. ISBN: 978-3-642-13881-2 \nPaola Velardi, Stefano Faralli, Roberto Navigli; OntoLearn Reloaded: A Graph-Based Algorithm for Taxonomy Induction. Computational Linguistics 2013; 39 (3): 665–707. DOI: \n10.1162/COLI_a_00146 \nMuhammad Nabeel Asim, Muhammad Wasim, Muhammad Usman Ghani Khan, Waqar Mahmood, Hafiza Mahnoor Abbasi, A survey of ontology learning techniques and applications, \nDatabase, Volume 2018, 2018, bay101, DOI: 10.1093/database/bay101", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - }, - { - "text": "Rather than a standard bibliography, this section is divided into various categories based on resources that \nwill be valuable for future exploration of the technologies and methods described in this tutorial. \n\n14.1 W3C Documents \nOWL 2 Primer: https://www.w3.org/TR/owl2-primer/ \n\nOWL 2 Specification: https://www.w3.org/TR/owl2-overview/ \n\nSemantic Web Primer for Object-Oriented Software Developers: https://www.w3.org/TR/sw-oosd- \nprimer/ \n\nSPARQL Specification: https://www.w3.org/TR/sparql11-query/ \n\nSWRL Specification and Built-ins: https://www.w3.org/Submission/SWRL/ \n\n14.2 Web Sites, Tools, And Presentations. \nAgile Alliance: https://www.agilealliance.org/agile101/ \n\nCellfie: https://github.com/protegeproject/cellfie-plugin/wiki/Grocery-Tutorial \n\nGartner Hype Cycle: https://www.gartner.com/en/research/methodologies/gartner-hype-cycle \n\nJena: Open Source Java Framework for Semantic Web and Linked Data Applications: \nhttps://jena.apache.org/ \n\nOpen World Assumption (OWA) presentation by Nick Drummond and Rob Shearer: \nhttp://www.cs.man.ac.uk/~drummond/presentations/OWA.pdf \n\nProtégé: https://protege.stanford.edu/ \n\nProtégé Best Practices. Summary page on my blog for all my articles on Protégé, OWL, SWRL, etc.: \nhttps://www.michaeldebellis.com/post/best-practices-for-new-protege-users \n\nSHACL Playground: https://shacl.org/playground/ \n\nSWRL Presentation by Martin O’Connor: \nhttps://protege.stanford.edu/conference/2009/slides/SWRL2009ProtegeConference.pdf \n\nWebProtégé: https://webprotege.stanford.edu/ \n\nWebVOWL: Web-based Visualization of Ontologies: http://vowl.visualdataweb.org/webvowl.html \n\n14.3 Papers \nBerners-Lee (2001). The Semantic Web: A new form of Web content that is meaningful to computers will \nunleash a revolution of new possibilities. With James Hendler and Ora Lassila. Scientific American, May \n17, 2001. https://tinyurl.com/BernersLeeSemanticWeb \n\nMacGregor, Robert (1991). \"Using a description classifier to enhance knowledge representation\". IEEE \nExpert. 6 (3): 41–46. doi:10.1109/64.87683 https://tinyurl.com/MacGregorLoom", - "page_start": 89, - "page_end": 89, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "This tutorial is just the entry point to a technology that is entering the*Slope of Enlightenment*in the \nGartner technology hype cycle [Gartner Hype Cycle]. Tim Berners-Lee published his paper on the \nSemantic Web [Berners-Lee 2001] way back in 2001. At least in my experience for most large US \ncorporations the excitement around Machine Learning seemed for a while to eclipse serious interest in \nOWL, SPARQL, and other Semantic Web technologies in the United States. Then influential technology \ncompanies such as Google [Singhal 2012], Facebook [Olanof 2013], and Amazon [Neptune 2017] started \nto embrace the technology using the term Knowledge Graphs [Noy 2019] and the corporate world is \nfinally realizing that machine learning and knowledge graphs are complimentary not competitive \ntechnologies. \n\nThe term knowledge graph itself can be used in different ways. The best definition I’ve heard is that an \nontology provides the vocabulary (i.e., essentially the T-Box) and a knowledge graph is an ontology \ncombined with data (A-Box). Although in the corporate world I often hear people simply talk about \nknowledge graphs without much interest in the distinction between the vocabulary and the data. \n\nThere are a number of vendors emerging who are using the technology in very productive ways and are \nproviding the foundation for federated knowledge graphs that can scale to hundreds of millions of triples \nor more and provide a framework for all corporate data. I’ve listed several in the bibliography but those \nare only the ones I’ve had some experience with. I’m sure there are many others. One of the products I’ve \nhad the best experience with is the AllegroGraph triplestore and the Gruff visualization tool from Franz \nInc. Although Allegro is a commercial tool, the free version supports most of the core capabilities of the \ncommercial version. I’ve found the Allegro triplestore easy to use on a Windows PC with the Docker tool \nto emulate a Linux server. \n\nI first started working with classification-based languages when I worked at the Information Sciences \nInstitute (ISI) and used the Loom language [Macgregor 91] to develop B2B systems for the US \nDepartment of Defense and their contractors. Since then, I’ve followed the progress of the technology, \nespecially the DARPA knowledge sharing initiative [Neches 91] and always thought there was great \npromise in the technology. When I first discovered Protégé it was a great experience. It is one of the best \nsupported and most usable free tools I’ve ever seen, and it always surprised me that there weren’t more \ncorporate users leveraging it in major ways. I think we are finally starting to see this happen and I hope \nthis tutorial helps in a small way to accelerate the adoption of this powerful and robust tool.", - "page_start": 88, - "page_end": 88, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you \nhave as well as the standards established by your organization or organizations that you work with. \n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have \nworked with most modern programming languages such as Python or Java, you are already familiar with \nthe concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming \nconflicts between different ontologies. For example, you may have a class called Network in an ontology \nabout telecommunications. You might also have a class called Network in an ontology about graph \ntheory. The two concepts are related but are different. Just as with programming languages you use \nnamespace prefixes to determine what specific namespace a name refers to. E.g., in this example you \nmight have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when \nyou referred to the Network class for the Telecom ontology you would use tc:Network and \ngt:Network for the graph theory class. \n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl \nand is used to refer to classes such as owl:Thing and owl:Nothing. The Resource Description \nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that \nontologies use such as rdfs:label leverage this namespace. \n\nIn the bottom view of the Active ontology tab there is a tab called Ontology Prefixes. This tab shows all \nthe current namespace mappings in your ontology. There are certain concepts from OWL, RDF, RDFS, \nXML and XSD that are required for every ontology, so those namespaces are by default mapped in every \nnew Protégé ontology. There is also a mapping to the empty string for whatever the namespace is for your \nontology. This allows you to display and refer to entities in your ontology without entering a namespace \nprefix. If you look at that tab now you should see a row where the first column is blank, and the second \ncolumn has the base IRI for your ontology. It should be the same IRI as the Ontology IRI at the top of the \nActive ontology tab, except it also has a # sign at the end. E.g., the Pizza tutorial developed for this \ntutorial has an IRI of: http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial and the \nrow that has a blank first column in Ontology Prefixes has the IRI: \nhttp://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#.", - "page_start": 61, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "The original BERT paper [39] showed the effectiveness of the \narchitecture and the pretraining technique by evaluating on the \nGeneral Language Understanding Evaluation (GLUE) benchmark \n[138], the Stanford Question Answering Datasets (SQuAD 1.1 and \n2.0) [108], and the Situations With Adversarial Generations bench- \nmark (SWAG) [155], all datasets designed to test language under- \nstanding and/or commonsense reasoning. BERT posted state of \nthe art results on all of these tasks, and the authors conclude by \nsaying that “unsupervised pre-training is an integral part of many \nlanguage understanding systems.” [39, p.4179]. Even before [39] \nwas published, BERT was picked up by the NLP community and \napplied with great success to a wide variety of tasks [e.g. 2, 149]. \nHowever, no actual language understanding is taking place in \nLM-driven approaches to these tasks, as can be shown by careful \nmanipulation of the test data to remove spurious cues the systems \nare leveraging [21, 93]. Furthermore, as Bender and Koller [14] \nargue from a theoretical perspective, languages are systems of \nsigns [37], i.e. pairings of form and meaning. But the training data \nfor LMs is only form; they do not have access to meaning. Therefore, \nclaims about model abilities must be carefully characterized. \n\n4.4 Curation, Documentation & Accountability \nIn summary, LMs trained on large, uncurated, static datasets from \nthe Web encode hegemonic views that are harmful to marginalized \npopulations. We thus emphasize the need to invest significant re- \nsources into curating and documenting LM training data. In this, \nwe follow Jo et al. [62], who cite archival history data collection \nmethods as an example of the amount of resources that should be \ndedicated to this process, and Birhane and Prabhu [18], who call for \na more justice-oriented data collection methodology. Birhane and \nPrabhu note, echoing Ruha Benjamin [15], “Feeding AI systems on \nthe world’s beauty, ugliness, and cruelty, but expecting it to reflect \nonly the beauty is a fantasy.” [p.1541] \n\n19~26% of papers sampled from ACL, NAACL and EMNLP since 2018 cite [39]. \n20Specifically, that the mutual information between the input and the meaning given \nthe output is zero — what Spärck Jones calls “the model of ignorance”. \n\nAs the late Karen Spärck Jones pointed out: the use of LMs \nties us to certain (usually unstated) epistemological and method- \nological commitments [124]. Either i) we commit ourselves to a \nnoisy-channel interpretation of the task (which rarely makes sense \noutside of ASR), ii) we abandon any goals of theoretical insight into \ntasks and treat LMs as “just some convenient technology” [p.7], or \niii) we implicitly assume a certain statistical relationship — known \nto be invalid — between inputs, outputs and meanings.20 Although \n\n\n \n \n \n \n [html]\n
TableFF insiluteParameterCellstrateTableAge, yearTableTable*SpeciesAge ( years )TableTable
", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "[48] N. Papernot, P. McDaniel, I. Goodfellow, S. Jha, Z. B. Celik, and A. Swami, “Practical black-box attacks against \nmachine learning,” in Proceedings of the 2017 ACM on Asia conference on computer and communications security, \n2017. \n\n[49] N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, “The limitations of deep learning in \nadversarial settings,” in IEEE European symposium on security and privacy (EuroS&P), 2016. \n\n[50] F. Perez and I. Ribeiro, “Ignore previous prompt: Attack techniques for language models,” in NeurIPS ML Safety \nWorkshop, 2022. \n\n[51] A. Radford, J. Wu, R. Child, D. Luan, D. Amodei, and I. Sutskever, “Language models are unsupervised \nmultitask learners,” https://cdn.openai.com/better-language-models/language models are unsupervised multitask \nlearners.pdf, 2019. \n\n[52] C. Riquelme, J. Puigcerver, B. Mustafa, M. Neumann, R. Jenatton, A. Susano Pinto, D. Keysers, and N. Houlsby, \n“Scaling vision with sparse mixture of experts,” Advances in Neural Information Processing Systems (NeurIPS), \n2021. \n\n[53] M. ˇSakota, M. Peyrard, and R. West, “Fly-swat or cannon? cost-effective language model choice via meta-modeling,” \nin Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024. \n\n[54] S. Schulhoff, J. Pinto, A. Khan, L.-F. Bouchard, C. Si, S. Anati, V. Tagliabue, A. Kost, C. Carnahan, and J. Boyd- \nGraber, “Ignore this title and HackAPrompt: Exposing systemic vulnerabilities of LLMs through a global prompt \nhacking competition,” in EMNLP, 2023. \n\n[55] A. Shafran, R. Schuster, and V. Shmatikov, “Machine against the RAG: Jamming retrieval-augmented generation \n\nwith blocker documents,” arXiv preprint arXiv:2406.05870, 2024. \n\n[56] N. Shazeer, A. Mirhoseini, K. Maziarz, A. Davis, Q. Le, G. Hinton, and J. Dean, “Outrageously large neural net- \nworks: The sparsely-gated mixture-of-experts layer,” in International Conference on Learning Representations, \n2016. \n\n[57] T. Shnitzer, A. Ou, M. Silva, K. Soule, Y. Sun, J. Solomon, N. Thompson, and M. Yurochkin, “Large language model \nrouting with benchmark datasets,” arXiv preprint arXiv:2309.15789, 2023. \n\n[58] K. Srivatsa, K. K. Maurya, and E. Kochmar, “Harnessing the power of multiple minds: Lessons learned from LLM \nrouting,” arXiv preprint arXiv:2405.00467, 2024. \n\n[59] D. Stripelis, Z. Hu, J. Zhang, Z. Xu, A. Shah, H. Jin, Y. Yao, S. Avestimehr, and C. He, “Tensoropera router: A \n\nmulti-model router for efficient LLM inference,” arXiv preprint arXiv:2408.12320, 2024. \n\n[60] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, “Intriguing properties of \nneural networks,” arXiv preprint arXiv:1312.6199, 2013. \n\n[61] G. Team, R. Anil, S. Borgeaud, J.-B. Alayrac, J. Yu, R. Soricut, J. Schalkwyk, A. M. Dai, A. Hauth, K. Millican \net al., “Gemini: a family of highly capable multimodal models,” arXiv preprint arXiv:2312.11805, 2023. \n\n[62] Teknium, “Openhermes 2.5: An open dataset of synthetic data for generalist LLM assistants,” 2023. [Online]. \nAvailable: https://huggingface.co./datasets/teknium/OpenHermes-2.5 \n\n[63] H. Touvron, L. Martin, K. Stone, P. Albert, A. Almahairi, Y. Babaei, N. Bashlykov, S. Batra, P. Bhargava, S. Bhosale \net al., “Llama 2: Open foundation and fine-tuned chat models,” arXiv preprint arXiv:2307.09288, 2023. \n\n[64] S. Toyer, O. Watkins, E. A. Mendes, J. Svegliato, L. Bailey, T. Wang, I. Ong, K. Elmaaroufi, P. Abbeel, T. Darrell \net al., “Tensor Trust: Interpretable prompt injection attacks from an online game,” in International Conference on \nLearning Representations (ICLR), 2023. \n\n[65] F. Tram`er, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart, “Stealing machine learning models via prediction \nAPIs,” in USENIX Security Symposium, 2016. \n\n[66] A. Wei, N. Haghtalab, and J. Steinhardt, “Jailbroken: How does LLM safety training fail?” in Advances in Neural \n\nInformation Processing Systems (NeurIPS), 2023.", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv1.pdf" - }, - { - "text": "[1] “Chatbot Arena LLM Leaderboard: Community-driven evaluation for best LLM and AI chatbots,” https:// \nhuggingface.co/spaces/lmarena-ai/chatbot-arena-leaderboard, accessed: 2024-11-14. \n\n[2] “Hello gpt-4o,” https://openai.com/index/hello-gpt-4o/, published: 2024-05-23. \n\n[3] “Introducing Llama 3.1: Our most capable models to date,” https://ai.meta.com/blog/meta-llama-3-1/, published: \n2024-07-23. \n\n[4] “Introducing Meta Llama 3: The most capable openly available LLM to date,” https://ai.meta.com/blog/ \nmeta-llama-3/, published: 2024-04-18. \n\n[5] “Martian LLM router,” https://withmartian.com/. \n\n[6] “New embedding models and API updates,” https://openai.com/index/new-embedding-models-and-api-updates, \npublished: 2024-01-25. \n\n[7] “Notdiamond LLM router,” https://www.notdiamond.ai/. \n\n[8] “OpenAI \nods \nopenai-rivals-seek-new-path-smarter-ai-current-methods-hit-limitations-2024-11-11, published: 2024-11-15. \n\nothers \nseek \nlimitations,” \nnew \n\n[9] “OpenAI, Google and Anthropic are struggling to build more advanced AI,” https://www.bloomberg.com/news/ \narticles/2024-11-13/openai-google-and-anthropic-are-struggling-to-build-more-advanced-ai?sref=CrGXSfHu, \npublished: 2024-11-13. \n\n[10] “OpenAI shifts strategy as rate of ‘GPT’ AI improvements slows,” https://www.theinformation.com/articles/ \nopenai-shifts-strategy-as-rate-of-gpt-ai-improvements-slows, published: 2024-11-9. \n\n[11] “Openrouter LLM router,” https://openrouter.ai/. \n\n[12] “Unify LLM router,” https://unify.ai/. \n\n[13] “What is a control plane?” https://www.ibm.com/think/topics/control-plane, published: 2024-10-31. \n\n[14] J. Achiam, S. Adler, S. Agarwal, L. Ahmad, I. Akkaya, F. L. Aleman, D. Almeida, J. Altenschmidt, S. Altman, \n\nS. Anadkat et al., “GPT-4 technical report,” arXiv preprint arXiv:2303.08774, 2023. \n\n[15] P. Aggarwal, A. Madaan, A. Anand, S. P. Potharaju, S. Mishra, P. Zhou, A. Gupta, D. Rajagopal, K. Kappaganthu, \nY. Yang et al., “Automix: Automatically mixing language models,” arXiv preprint arXiv:2310.12963, 2023. \n[16] G. Alon and M. Kamfonas, “Detecting language model attacks with perplexity,” arXiv preprint arXiv:2308.14132, \n2023. \n\n[17] R. A. Bradley and M. E. Terry, “Rank analysis of incomplete block designs: I. the method of paired comparisons,” \nBiometrika, vol. 39, no. 3/4, 1952. \n\n[18] N. Carlini, D. Paleka, K. D. Dvijotham, T. Steinke, J. Hayase, A. F. Cooper, K. Lee, M. Jagielski, M. Nasr, A. Conmy \n\net al., “Stealing part of a production language model,” arXiv preprint arXiv:2403.06634, 2024. \n\n[19] H. Chaudhari, G. Severi, J. Abascal, M. Jagielski, C. A. Choquette-Choo, M. Nasr, C. Nita-Rotaru, and A. Oprea, \n“Phantom: General trigger attacks on retrieval augmented language generation,” arXiv preprint arXiv:2405.20485, \n2024. \n\n[20] L. Chen, M. Zaharia, and J. Zou, “FrugalGPT: How to use large language models while reducing cost and improving \nperformance,” arXiv preprint arXiv:2305.05176, 2023. \n\n[21] W.-L. Chiang, L. Zheng, Y. Sheng, A. N. Angelopoulos, T. Li, D. Li, B. Zhu, H. Zhang, M. Jordan, J. E. Gon- \nzalez, and I. Stoica, “Chatbot arena: An open platform for evaluating LLMs by human preference,” in Forty-first \nInternational Conference on Machine Learning (ICML), 2024. \n\n[22] S. Cho, S. Jeong, J. Seo, T. Hwang, and J. C. Park, “Typos that broke the RAG’s back: Genetic attack on RAG \npipeline by simulating documents in the wild via low-level perturbations,” arXiv preprint arXiv:2404.13948, 2024. \n\n[23] J. Chu, Y. Liu, Z. Yang, X. Shen, M. Backes, and Y. Zhang, “Comprehensive assessment of jailbreak attacks against \nLLMs,” arXiv preprint arXiv:2402.05668, 2024. \n\n[24] K. Cobbe, V. Kosaraju, M. Bavarian, M. Chen, H. Jun, L. Kaiser, M. Plappert, J. Tworek, J. Hilton, R. Nakano et al., \n“Training verifiers to solve math word problems,” arXiv preprint arXiv:2110.14168, 2021. \n\n[25] N. Dalvi, P. Domingos, Mausam, S. Sanghai, and D. Verma, “Adversarial classification,” in Proceedings of the tenth", - "page_start": 18, - "page_end": 18, - "source_file": "arxiv1.pdf" - }, - { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. \n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in \nwhat is called an undirected or network graph because objects can be subjects and vice versa. Whenever \nyou define a property in OWL you are defining a predicate. An individual can be a subject or an object \n(or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1. In this example \nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object. \n\nHowever, classes and properties themselves are also represented as triples. So for example, when you \ncreate the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to \nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class. Similarly when you add \nNamedPizza as a subclass of Pizza, Protégé adds the triple: NamedPizza rdfs:**s**ubClassOf \nPizza. \n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities \nthat are the subjects of triples where the predicate is rdfs:**s**ubClassOf and the object is any other \nentity. The*?*before a name indicates that the name is a wildcard that can match anything that fits with the \nrest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate \nor even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this \ncase our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the \nname of a class while in others it is a class expression with an orange circle in front of it. This is because \nwhen defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL \naxioms. \n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query \ndetermines what to match in the query. If you want to display everything matched in the WHERE clause \nyou can just use a*for the SELECT clause. The initial default query in this tab is set up with no \nknowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes \nregardless of the ontology. To get information about Pizzas the first thing we need to do is to add \nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a \nmapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab \ndiscussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement: \n\nPREFIX pizza: ", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "OWL classes are assumed to overlap, i.e., by default they are not disjoint. This is often useful \nbecause in OWL, unlike in most object-oriented models, multiple inheritance is not discouraged \nand can be a powerful tool to model data. If we want classes to be disjoint, we must explicitly \ndeclare them to be so. It is often a good development strategy to start with classes that are not \ndisjoint and then make them disjoint once the model is more fully fleshed out as it is not always \nobvious which classes are disjoint from the beginning.", - "page_start": 17, - "page_end": 17, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic5.pdf", - "query": "Is Text2Onto still updated nowadays?", - "target_page": 1, - "target_passage": "But it is not maintained since 2011.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": " ", - "page_start": 87, - "page_end": 87, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": " ", - "page_start": 33, - "page_end": 33, - "source_file": "wikipedia3.pdf" - }, - { - "text": " ", - "page_start": 44, - "page_end": 44, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": " ", - "page_start": 46, - "page_end": 46, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": " ", - "page_start": 12, - "page_end": 12, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": " ", - "page_start": 47, - "page_end": 47, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": " ", - "page_start": 53, - "page_end": 53, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": " ", - "page_start": 47, - "page_end": 47, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": " ", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": " ", - "page_start": 70, - "page_end": 70, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RCI_2013.pdf", - "query": "What was the proportion of revenue generated by wireless telecommunications operations in 2009?", - "target_page": 91, - "target_passage": "6,685", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "“Key Performance Indicators*”*. \n\n**WIRELESS POSTPAID AND PREPAID SUBSCRIBERS**\n(IN THOUSANDS) \n\n**2013**\n\n2012 \n\n2011 \n\nPrepaid Postpaid \n\n\n \n \n \n \n [html]( In millions of dollars, except percentages )Years ended December 31Operating revenueOperating expensesAdjusted operating profit margin αs\n
20132012% Chg
Network revenue$ 6.748$ 6.719
Equipment sales522561( 7 )
Operating revenue – Wireless7.2707.280
Cost of equipment 1( 1.535 )( 1.585 )( 3 )
Other operating expenses( 2.578 )( 2.632 )( 2 )
( 4.113 )( 4.217 )( 2 )
Adjusted operating profit – Wireless$ 3.157$ 3.0633
% of network revenue46.8 %45.6 %
Additions to property, plant and equipment$865$ 1.123
( 23 )Oata revenue included in network revenue$ 3.175$ 2.722
17Data revenue as % of network revenue47 %
\n\n**Operating Revenue**\nOur operating revenue depends on the size of our subscriber base, the \naverage revenue per user and revenue from equipment sales. \n\n*Higher Network Revenue*\nNetwork revenue includes revenue derived from voice and data services \nfrom postpaid monthly fees, airtime, data usage, long distance charges, \noptional service charges, inbound and outbound roaming charges and \ncertain fees, as well as prepaid usage for airtime, data and other \nancillary charges such as long distance.", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Network revenue was higher this year compared to last year. This was \nthe net effect of: \n(cid:129) higher data revenue related to an increase in subscriber levels and \n\n**WIRELESS DATA REVENUE**\n(IN MILLIONS OF DOLLARS) \n\n**2013** **$3,175**\nhigher usage of wireless data services \n\n(cid:129) partially offset by our introduction of new lower priced US and \ninternational roaming plans and rates which offer consumers more \nvalue, and \n\n2012 $2,722 \n\n2011 $2,325 \n\n(cid:129) the continued adoption of customer friendly simplified plans, which \noften bundle in certain features like voicemail, caller ID and long \ndistance that we have charged for separately in the past. \n\nExcluding the decline in US and international roaming revenue this year, \nnetwork revenue would have increased 1%. \n**47%**\n\n2012 41% \n\n2011 35% \n\nData revenue was 17% higher \nthe \ncontinued penetration and growing use of smartphones, tablet devices \nand wireless laptops, which increased the use of e-mail, wireless, \nInternet access, text messaging and other wireless data services. Data \nrevenue represented approximately 47% of total network revenue this \nyear, compared to approximately 41% last year. \n\nthis year mainly because of \n\n*Lower Equipment Sales*\nEquipment sales (net of subsidies) include revenue from sales to: \n(cid:129) independent dealers, agents and retailers \n(cid:129) directly to subscribers through fulfillment by Wireless’ customer \nPostpaid churn was 1.24% this year, compared to 1.29% in 2012. The \nlower churn rate is partly attributable to the new simplified plans and \nthe roaming plans we introduced. \nservice groups, websites, telesales and corporate stores. \n\nRevenue from equipment sales was lower this year, mainly because \nfewer existing subscribers upgraded their devices and there were fewer \ngross activations. \n\nGross postpaid subscriber additions were 1.4 million this year, or 3% \nlower than last year, which reduced net postpaid subscriber additions to \n228,000, despite a lower postpaid churn. We believe the industry \ntransition from three year to two year plans resulting from the recent \nadoption of the Canadian Radio-television and Telecommunications \nCommission (CRTC) Wireless Code may have slowed our overall \nwireless subscriber growth from the second half of the year. See \n“Regulation in Our Industry” for more information on the Wireless \nCode. \n\n**Lower Operating Expenses**\nWe assess operating expenses in two categories: \n(cid:129) the cost of wireless handsets and equipment \n(cid:129) all other expenses involved in day-to-day operations, to service \nexisting subscriber relationships and attract new subscribers. \n\nThe cost of equipment was $50 million lower than last year, or 3%, \nmainly because fewer existing subscribers upgraded hardware and \nfewer new customers were added during the year as discussed above. \nWe activated and upgraded fewer devices compared to 2012. \n\nWe activated and upgraded approximately 2.7 million smartphones this \nyear, compared to approximately 2.9 million in 2012. Approximately \n34% of these were for new subscribers. The decrease was mainly \nbecause there was a 10% reduction in hardware upgrades by existing \nsubscribers during the year, which we also believe is at least partly due \nto the move from three to two year contracts and the associated pricing \nchanges. \n\nTotal customer retention spending (including subsidies on handset \nupgrades) was $939 million, 0.3% lower than last year. The reduction \nwas mainly because fewer existing subscribers upgraded their hardware \nas discussed above, which we partially attribute to the recent shift to \ntwo year contracts.", - "page_start": 43, - "page_end": 43, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "The percentage of subscribers with smartphones increased to 75% of \nour overall postpaid subscriber base, compared to 69% at the end of \n2012. Smartphone subscribers typically generate significantly higher \nARPU and are less likely to churn. \nOther operating expenses (excluding retention spending), were down \nslightly from 2012, due to a continued focus on cost productivity \ninitiatives we are implementing across various functions. \n\n**Higher Adjusted Operating Profit**\nAdjusted operating profit was 3% higher this year compared to last \nyear because of continued growth of wireless data, our improvements \nin cost management and efficiency and lower volumes of hardware \nsales and upgrades. Adjusted operating profit margin as a percentage \nof network revenue increased this year to 46.8% from 45.6% in 2012. \n\n**SMARTPHONES AS A PERCENTAGE OF POSTPAID SUBSCRIBERS**\n(%) \n\n**2013** **75%**\n\n2012 69% \n\n2011 56% \n\n**WIRELESS ADJUSTED OPERATING PROFIT**\n(IN MILLIONS OF DOLLARS) \n\nThe decrease in prepaid subscriber net additions was mainly because of \nincreasing competition at the lower end of the wireless market where \nprepaid products are mainly sold. \n\n**2013** **$3,157**\n\n2012 $3,063 \n\n2011 $3,036", - "page_start": 43, - "page_end": 43, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$12.7 billion \n\nWIRELESS**57%** **5.0**\n\n$12.7 \nCABLE**27%**\n**4.8**\nBILLION \n\nMEDIA**13%**\nBUSINESS \nSOLUTIONS**3%**\n**4.7**\n\n\n\n\n\n**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$7.3 billion \n\n**3. 2**\nPOSTPAID VOICE**46%**\n\n$7.3 \nDATA**44%**\n**3.1**\nBILLION \n\nEQUIPMENT**7%**\nPREPAID VOICE**3%**\n**3.0**", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "QUARTERLY TRENDS \nOur operating results generally vary from quarter to quarter because of \nchanges in general economic conditions and seasonal fluctuations, in \neach of our business segments, which have a material impact. As such, \none quarter’s operating results are not necessarily indicative of our \nresults in a subsequent quarter. Wireless, Cable and Media each have \nunique seasonal aspects to their businesses. \n**Operating Revenue**\nWireless network revenue was lower this quarter compared to the same \nperiod last year, mainly because of the recent introduction of lower \npriced roaming plans and pricing changes made over the past year \nprimarily associated with our new simplified plans. \n\nCable operating revenue was higher this quarter compared to the same \nperiod last year, mainly because of Internet growth and the acquisition \nof Mountain Cable, partially offset by a decline in television revenue \nwith competitive TV subscriber losses. \n\nFluctuations in net \nto quarter can also be \nattributed to losses on the repayment of debt, foreign exchange gains \nor losses, changes in the fair value of derivative instruments, other \nincome and expenses, impairment of assets and changes in income tax \nexpense. \n\nincome from quarter \n\nBusiness Solutions operating revenue was higher this quarter compared \nto the same period last year, mainly because we completed the \nacquisitions of Blackiron Data and Pivot Data Centres earlier this year, \ncombined with the continuing growth in on-net and next-generation \nservices. \n\n**Wireless**\nThe trends in Wireless revenue and adjusted operating profit reflect: \n(cid:129) the growing number of wireless voice and data subscribers \n(cid:129) decreased churn \n(cid:129) higher usage of wireless data \n(cid:129) higher handset subsidies as more consumers shift to smartphones \n(cid:129) a slight decrease in blended ARPU due to changes in wireless price \nMedia operating revenue was higher this quarter compared to the same \nperiod last year, mainly because of revenue growth at Sportsnet and \nhigher sales at The Shopping Channel. \n\n**Adjusted Operating Profit**\nWireless adjusted operating profit was higher this quarter compared to \nthe same period last year, mainly because of cost management and \nproductivity initiatives implemented across various areas, including cost \nof equipment, offset by reduced network revenue described above. \n\nCable adjusted operating profit was higher this quarter compared to \nthe same period last year because of the continued shift in our product \nmix towards higher margin Internet and phone products. \n\nMedia’s adjusted operating profit was lower this quarter compared to \nthe same period last year. The increase in Media’s operating revenue \nthis year was more than offset by the combined impacts of the lower \nnumber of games broadcast in the fourth quarter of 2012 resulting \nfrom the NHL lockout compared with having to broadcast more NHL \nhockey games in the fourth quarter of 2013 because of the compressed \n2013-2014 schedule associated with the upcoming winter Olympics. \nExcluding the impact of these items, Media’s consolidated adjusted \noperating profit would have increased by 22%.", - "page_start": 58, - "page_end": 58, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
The Temporal deathsTable1 =
11111
1 mg( In millions of dollars )Change
see pageOperating revenue changes – higher ( lower ):Network revenue – Wireferess
$. 2939Equipment sales – Wireless
( 39 )39Cable
11742Business Solutions
2345
Media84
48
Corporate items and intercompany eliminations6Higher operating revenue compared to 2012
220Adjusted operating profit changes – higher ( lower ):Wireless
9439Cable
11342Business Solutions
1745
Media
( 29 )48
Corporate items and intercompany eliminations( 36 )Higher adjusted operating profit † compared to 2012
159Higher stock - based compensation expense( 7 )
51Lower restructuring, acquisition and other expenses7
51Higher depreciation and amortization( 79 )
51Impairment recognized in 2012
8051Higher operating income 3 compared to 2012
160Higher finance costs( 71 )
52Gain on sale of interest in TVtropolis47
52Gain on Inukshuk spectrum distribution in 2012( 233 )
52Other17
53
Lower income taxes24
52Decrease in net income from continuing operations compared to 2012( 56 )
Loss from discontinued operations in 201232
\n\n**Operating Revenue**\nWireless network revenue was higher than last year because of higher \nadoption and usage of wireless data services, partially offset by the \nintroduction of lower priced roaming plans and pricing changes made \nover this year. \n\nCable operating revenue was higher than last year mainly because of \ngrowth in Internet and phone revenues and the acquisition of Mountain \nCable, partially offset by a decline in television revenue related \nprincipally from competitive TV subscriber losses. \n\nBusiness Solutions operating revenue was higher than last year mainly \nbecause we completed the acquisitions of Blackiron Data and Pivot \nData Centres earlier this year combined with the continued growth in \non-net and next generation services, partially offset by planned decline \nin legacy voice and data services. \n\nMedia operating revenue was higher than last year mainly because of \nrevenue growth at Sportsnet, higher attendance at Toronto Blue Jays \ngames and higher sales at The Shopping Channel. \n\n**Adjusted Operating Profit**\nWireless adjusted operating profit was higher this year because of \nhigher network revenue, our continued cost management and \nproductivity initiatives implemented across various areas and lower cost \nof equipment. \n\nCable adjusted operating profit was higher than last year because of \nthe continued growth in revenue combined with a shift in our product \nmix towards higher margin Internet and phone products.", - "page_start": 39, - "page_end": 39, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Wireless revenues from the Company’s paging operation were $0.3 million, a decrease of $0.1 million as the local \ncustomer base increasingly chose alternative digital wireless services. Paging service subscribers declined by 7.8% in \n2002 from 3,190 subscribers to 2,940 subscribers. \n\nWithin wireline revenues, the Telephone operation contributed $22.5 million, an increase of $0.9 million, or 4.0%. \nTelephone access revenues were $10.9 million, an increase of $1.4 million or 14.8%. The growth in access revenues \nwas driven by a 38.4% increase in access minutes of use on the Company’s network and an increased percentage of \nminutes in the intrastate jurisdiction, where rates are higher than the interstate jurisdiction. On January 1, 2002 the \nFederal subscriber line charge (SLC) for residential customers increased from $3.50 to $5.00 per month. The SLC \n\n49 ■ 2003 ANNUAL REPORT", - "page_start": 50, - "page_end": 50, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "QUARTERLY RESULTS \n\nThe table below shows our quarterly consolidated financial results and key performance indicators for 2013 and 2012. \n\nQUARTERLY CONSOLIDATED FINANCIAL SUMMARY \n\n**2013** 2012 \n\n**Full**\n**Year** Full \nYear Q3 Q2 Q1 Q4 Q3 Q2 Q4 \n\n**$ 7,270**$ 1,851 $ 1,846 $ 1,813 $ 1,760 \n861 \n93 \n341 \n(28) $ 7,280 $ 1,920 $ 1,889 $ 1,765 $ 1,706 \n825 \n87 \n354 \n(29) **3,475**\n**374**\n**1,704**\n**(117)** 871 \n98 \n453 \n(30) 873 \n93 \n440 \n(28) 870 \n90 \n470 \n(31) 3,358 \n351 \n1,620 \n(123) 852 \n88 \n434 \n(33) 838 \n86 \n392 \n(29) 843 \n90 \n440 \n(32) \n\n**12,706** 3,243 3,224 3,212 3,027 12,486 3,261 3,176 3,106 2,943 \n\n**3,157**\n**1,718**\n**106**\n**161**\n**(149)** 696 \n433 \n29 \n49 \n(40) 875 \n425 \n29 \n55 \n(43) 821 \n431 \n25 \n64 \n(35) 765 \n429 \n23 \n(7) \n(31) 3,063 \n1,605 \n89 \n190 \n(113) 687 \n421 \n27 \n75 \n(34) 843 \n403 \n22 \n50 \n(30) 796 \n403 \n22 \n79 \n(24) 737 \n378 \n18 \n(14) \n(25) \n\n**4,993** 1,167 1,341 1,306 1,179 4,834 1,176 1,288 1,276 1,094 \n\n**(84)**\n**(85)**\n**(1,898)** (18) \n(24) \n(508) (7) \n(38) \n(477) (1) \n(14) \n(463) (58) \n(9) \n(450) (77) \n(92) \n(1,819) (57) \n(10) \n(453) \n\n(26) \n(7) \n(437) 12 \n(33) \n(466) (6) \n(42) \n(463) \n**–** – – (80) – – – \n\n**2,926**\n**(742)** 617 \n(196) 819 \n(180) 828 \n(185) 662 \n(181) 2,766 \n(671) 576 \n(183) 818 \n(169) 789 \n(159) 583 \n(160) \n**81** 14 (3) 60 10 250 241 (6) 7 8 \n\n**2,265** 435 636 703 491 2,345 634 643 637 431 \n**(596)** (115) (172) (171) (138) (620) (112) (177) (224) (107) \n\n**$ 1,669**$ 320 $ 464 $ 532 $ 353 $ 1,725 $ 522 $ 466 $ 413 $ 324 \n**–** – – – – (32) – – (13) (19) \n\n**$ 1,669**$ 320 $ 464 $ 532 $ 353 $ 1,693 $ 522 $ 466 $ 400 $ 305 \n\n**$**\n**3.24**$ 0.62 $ 0.90 $ 1.03 $ 0.69 \n0.68 \n0.90 \n**3.22**\n$ \n3.32 $ 1.01 $ 0.90 $ 0.79 $ 0.62 \n0.61 \n0.90 \n3.30 0.62 0.93 1.01 0.77 \n\n**3.24**\n**3.22**\n**1,669** 0.62 \n0.62 \n320 0.90 \n0.90 \n464 1.03 \n0.93 \n532 0.69 \n0.68 \n353 3.26 \n3.24 \n1,693 1.01 \n1.01 \n522 0.90 \n0.90 \n466 0.77 \n0.75 \n400 0.58 \n0.57 \n305 \n**–** – – – – 32 – – 13 19 \n\n**$ 1,669**$ 320 $ 464 $ 532 $ 353 $ 1,725 $ 522 $ 466 $ 413 $ 324 \n\n77 \n92 \n80 \n– \n(233) \n(14) 57 \n10 \n80 \n– \n(233) \n12 26 \n7 \n– \n– \n– \n(4) (12) \n33 \n– \n– \n– \n(10) 6 \n42 \n– \n– \n– \n(12) \n54 – – 54 – \n\n(In millions of dollars, except per share amounts) \n\nOperating revenue \nWireless \nCable \nBusiness Solutions \nMedia \nCorporate items and intercompany eliminations \n\n**Total operating revenue**\n\nAdjusted operating profit (loss) \n\nWireless \nCable \nBusiness Solutions \nMedia \nCorporate items and intercompany eliminations \n\n**Adjusted operating profit 1**\n\nStock-based compensation (expense) recovery \nRestructuring, acquisition and other expenses \nDepreciation and amortization \nImpairment of assets \n\n**Operating income 2**\nFinance costs \nOther income (expense) \n\nNet income before income taxes \nIncome tax expense \n\nNet income from continuing operations \nLoss from discontinued operations \n\n**Net income**\n\nEarnings per share from continuing operations: \n\nBasic \nDiluted \nEarnings per share: \n\nBasic \nDiluted \nNet income \nLoss from discontinued operations \n\n**Net income from continuing operations**\nAdd (deduct): \n\nStock-based compensation expense (recovery) \nRestructuring, acquisition and other expenses \nImpairment of assets \nGain on sale of TVtropolis \nGain on spectrum distribution \nIncome tax impact of above items \nIncome tax adjustment, legislative tax change \n\n**Adjusted net income 1**\n\nAdjusted earnings per share from continuing operations 1: \n\n**84**\n**85**\n**–**\n**(47)**\n**–**\n**(30)** 18 \n24 \n– \n– \n– \n(5) 7 \n38 \n– \n– \n– \n(8) 1 \n14 \n– \n(47) \n– \n(11) 58 \n9 \n– \n– \n– \n(6) \n**8** – – 8 – \n\n**$ 1,769**$ 357 $ 501 $ 497 $ 414 $ 1,781 $ 448 $ 495 $ 478 $ 360 \n\n$ \n\nBasic \nDiluted \n**$**", - "page_start": 57, - "page_end": 57, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**Media**\nThe trends in Media’s results are generally the result of continual \ninvestment in prime-time and specialty programming, higher sports \nrights costs, higher subscriber fees, and fluctuations in advertising and \nconsumer market conditions. \n\nSeasonal fluctuations relate to periods of increased consumer activity \nand their impact on advertising and related retail cycles, the MLB \nseason, where revenues and expenses are concentrated in the spring, \nsummer and fall months, and the NHL season, where advertising \nrevenues and programming expenses are concentrated in the fall and \nwinter months. \n\n2012 FULL YEAR RESULTS COMPARED TO 2011 \n\n**Operating Revenue**\nConsolidated revenue increased in 2012 by $140 million from 2011, \nWireless contributed $142 million, Cable contributed $49 million and \nMedia contributed $9 million, partially offset by decreases in revenue \nof $54 million in Business Solutions and in corporate items and \nintercompany eliminations of $6 million. The increase was due to \noverall higher subscriber levels, data revenue and equipment sales at \nWireless and higher Internet revenue at Cable, partially offset by lower \noverall revenue at Business Solutions due to the phased exit of the \nlegacy services business. \n\n**Adjusted Operating Profit**\nConsolidated adjusted operating profit increased in 2012 by $95 million \nfrom 2011, Wireless contributed $27 million, Cable contributed \n$56 million, Business Solutions contributed $3 million, and Media \ncontributed $10 million. The increases at Wireless and Cable were due \nto the revenue growth described above combined with cost efficiencies.", - "page_start": 59, - "page_end": 59, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]Corporate items and eliminations\n
Year ended December 31.2012WirelessCableBusiness SolutionsMediaConsolidated totals
Operating revenue$ 7.280$ 3.358$ 351$ 1.620$( 123 )5
2.486Operating costs 14.2171.7532621.430( 10 )7.652
Adjusted operating profit3.0631.60589190( 113 )4.834Restructuring, acquisition and other expenses
92Stock - based compensation expense 1
77Depreciation and amortization
1.819Impairment of α6sets
80Operating income
2.766Finance costs
( 671 )Other income
250Income before income taxes
52.345Additions to property, plant and equipment$ 1.123S832$61
S55$7152.142Goodwill$ 1.146
$ 1.000$ 215S854$53.215
\n\n\n \n \n \n \n [html]\n
Interest on long - term debt$ 734
$ 691Interest on pension liability14
7Foreign exchange loss ( gain )23
( 9 )Change in fair value of derivative instruments( 16 )
1Capitalized interest( 25 )
( 28 )Other12
9$ 742$ 671
\n\nNOTE 5: FINANCE COSTS \n**2013** 2012 \n\n**$ 6,470**\n**278** $ 6,402 \n317 \n\n**6,748**\n**522** 6,719 \n561 \n\n**7,270** 7,280 \n\n**1,809**\n**1,159**\n**498** 2012 \n\n$ 18 \n(30) \n(30) \n**3,466**\n**9**\n\n**3,475**\n\n(42) \n10 \n**213**\n**149**\n$ (32) \n\n**362**\n**12**\n\n**374**\n\nAs of June 2012, Rogers’ stores no longer offered video and game \nrentals or sales at its retail locations. Certain of these stores continue to \nserve customers’ wireless and cable needs. \n\n**Revenue by Product**\n\nWireless: \nPostpaid \nPrepaid \n\nNetwork revenue \nEquipment sales \n\nTotal Wireless \n\nCable: \nTelevision \nInternet \nCable telephony \n\nService revenue \nEquipment sales \n\nTotal Cable \n\nBusiness Solutions: \nNext generation \nLegacy \n\nService revenue \nEquipment sales \n\nTotal Business Solutions \n\nMedia: \nAdvertising \nSubscription \nRetail \nOther **762**\n**316**\n**305**\n**321**\n\nTotal Media **1,704**\n\nCorporate items and intercompany eliminations \n\n1,868 \n998 \n477 \nNOTE 6: DISCONTINUED OPERATIONS \n\nOperating revenue \nOperating costs \nRestructuring, acquisition and other expenses \n3,343 \n15 \n\n3,358", - "page_start": 106, - "page_end": 106, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RCI_2013.pdf", - "query": "What has Rogers Communications done to improve its television platform?", - "target_page": 2, - "target_passage": "Launched NextBox 3.0 delivering a superior TV experience and leveraged the success of Rogers AnyPlace TV, our Internet and mobile on-demand TV service.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Executive Summary \n\nABOUT ROGERS COMMUNICATIONS INC. \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\nWe provide a broad range of services: wireless and wired voice and data \ncommunications, cable television, high-speed Internet, cable telephony, \nwired telecom and data networking services \nto consumers and \nbusinesses. We also compete in television and radio broadcasting, \nmulti-platform shopping, sports media and entertainment, digital media \nand consumer, trade and professional publications. \n\n**2013 CONSOLIDATED REVENUE BY SEGMENT**\n(%) \n\nWIRELESS**57%**\n\nCABLE**27%**\n\n$12.7 \n\nAlmost all of our operations and sales are in Canada. We have a highly \nskilled and diversified workforce of approximately 28,000 employees. \nOur head-office is in Toronto, Ontario and we have numerous offices \nacross Canada. \n\nBILLION \nMEDIA**13%**\n\nBUSINESS SOLUTIONS**3%**\n\n**2013 CONSOLIDATED ADJUSTED OPERATING PROFIT BY SEGMENT**\n(%) \n\nWIRELESS**61%**\n\nCABLE**33%**\n\n$5.0 \nBILLION \n\nMEDIA**4%**\nBUSINESS SOLUTIONS**2%**\n\nFOUR BUSINESS SEGMENTS \nWe report our results of operations in four segments. \n\n\n \n \n \n \n [html]\n
WirelessWireless telecommunications operations for consumers and businesses
CableCable telecommunications operations, including cable television, Intermet and cable telephony for Canadian consumers and businesses.
Business SolutionsNetwork connectivity through our fibre network assets to support a range of voice, data, networking, data centre and cloud - based services for medium and large Canadian businesses, governments, and other telecommunications provider
MediaA diversified portfolio of media properties, including television and radio broadcasting, digital media, multi - platform shopping, publishing and sports media and entertanment
", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "CONNECTED HOME \n\n\n\n\n\n\n\nHOME \nTELEPHONY \n\n\n\nWHOLE HOME \nPVR \n\n\n\nBROADBAND \nINTERNET \n\n\n\nANY SCREEN \nSTREAMING TV \n\n\nCATEGORY- \nLEADING MEDIA \nCONTENT \n\n\n\nE-MAIL \n& MESSAGING \n\n\n\n\n\n\n\nROGERS CONTINUES TO DEFINE HOW FAMILIES COME \nTOGETHER AND CONNECT WITH THEIR WORLD. MILLIONS OF \nCANADIANS DEPEND ON ROGERS TO KEEP THEM INFORMED, \nCONNECTED AND ENTERTAINED WITH A COMBINATION OF \nTHE FASTEST INTERNET SPEEDS AND THE MOST INNOVATIVE \nTELEVISION, TELEPHONY AND HOME MONITORING \nSOLUTIONS AVAILABLE. \n\nThe core of Rogers connected home strategy is to provide customers \nwith the fastest broadband connections, together with the ability to \nseamlessly shift – to shift time, to shift screens and to shift places so they \naccess what they want, when they want, on the screen of their choice. \n\nRogers offers the best in on-demand, sports, movies, specialty, episodic \nand multicultural programming. Customers can schedule, pause, rewind", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "DELIVERING WHAT’S NEXT \n\n\n\n\n\n\nLEADING \nNEXT GENERATION \nNETWORKS MACHINE-TO- \nMACHINE \nCOMMUNICATIONS \n\n\n\nMOBILE \nCOMMERCE \n\n\n\n\nMOBILE \nSTREAMING \nTELEVISION \n\n\n\nHOME \nAUTOMATION \n\n\n\nDIGITAL MEDIA \n\n\n\n\n\n\n\nINNOVATION AND A DRIVE TO BE FIRST TO DELIVER THE \nMOST ADVANCED INFORMATION, COMMUNICATIONS, \nENTERTAINMENT AND TRANSACTION SERVICES, SOLUTIONS \nAND DEVICES ARE AT THE VERY CORE OF ROGERS. \n\nAs one of the first carriers in the world to offer the telecommunications \n“quadruple play” of wireless, television, Internet and telephony services \nover its own networks, few have more capabilities or success in enabling \nsubscribers to enjoy their experiences across multiple screens. \n\nRogers has a long history of firsts, including the first cellular call in Canada, \nthe world’s first high-speed cable modem service, the first digital cellular \nnetwork in North America, Canada’s first video-on-demand and mobile \nTV services, the first HSPA and LTE networks and the first to offer iPhone, \nAndroid, BlackBerry and Windows 8 in Canada. With the combination of \nour advanced next-generation national wireless network, our powerful \nbroadband cable infrastructure and our category-leading media assets, \nwe are in a unique position to help Canadians to live like never before.", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**ROGERS COMMUNICATIONS**\n\n**Rogers Communications (TSX: RCI; NYSE: RCI) is a diversified Canadian**\n**telecommunications and media company. As discussed in the following**\n**pages, Rogers Communications is engaged in the telecom and media**\n**businesses through its primary operating segments Rogers Wireless,**\n**Rogers Cable, Rogers Business Solutions and Rogers Media.**\n\n\n\n**ROGERS COMMUNICATIONS**\n\n**MEDIA**\n\nWIRELESS SEGMENT \n\nRogers Wireless provides wireless voice and data communications services across \nCanada to approximately 9.5 million customers under the Rogers Wireless, Fido \nand chatr brands. Rogers Wireless is Canada’s largest wireless provider and the \nonly national carrier operating on the combined global standard GSM/HSPA+/LTE \ntechnology platforms. Rogers Wireless is Canada’s leader in innovative wireless \nservices, and provides customers with the best and latest wireless devices and \napplications and the fastest network speeds. Rogers Wireless also provides \nseamless wireless roaming across the U.S. and more than 200 other countries, \nand is the Canadian leader in the deployment of mobile commerce and machine- \nto-machine communications. \n\n\n\nCABLE AND BUSINESS SOLUTIONS SEGMENTS \n\nRogers Cable is a leading Canadian cable services provider, whose service \nterritory covers approximately 4.0 million homes in Ontario, New Brunswick and \nNewfoundland representing approximately 30% of the Canadian cable market. \nOur advanced digital hybrid fibre-coax network provides market leading high- \nspeed broadband Internet access speeds, the most innovative selection of digital \ntelevision and online viewing and telephony services to millions of residential \nand small business customers. Together with Rogers Business Solutions, it also \nprovides scalable carrier-grade business telecom, networking, hosting and \nmanaged data services, and IP connectivity and solutions to medium and large \nenterprise, government and carrier customers. \n\n\n\nMEDIA SEGMENT \n\nRogers Media is Canada’s premier destination for category-leading television and \nradio broadcasting, sports entertainment, publishing, and digital media properties. \nTelevision assets include national City network which reaches more than 80% of \nCanadians, five OMNI Television multilingual channels, seven regional and national \nSportsnet channels, as well as specialty channels FX Canada, OLN, The Biography \nChannel and G4. Rogers Media also owns The Shopping Channel, Canada’s only \nnationally televised and online shopping service. It operates more than 50 Canadian \nradio stations, publishes 50+ well known consumer and business magazines, and \nowns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball \nClub and Rogers Centre, Canada’s largest sports and entertainment facility. Rogers \nalso holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL \nToronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "OUR STRATEGY \nTo achieve our vision and drive our future growth, we have six strategic objectives. We made significant progress this year \nagainst each of these, across all business segments. See “Key Highlights” for more detail about individual highlights. \n\n1. DELIVER DIFFERENTIATED END-TO-END \nCUSTOMER EXPERIENCES \nFocus on evolving our cross-device, multi-screen integration to enable \nseamless, \nreliable and easy-to-use product experiences anytime, \nanyplace and anywhere; on delivering a differentiated range of devices \nand device-related services; and on enabling greater integration of our \nmedia assets across screens. We launched new products, including Rogers Smart Home Monitoring, \nto customers in Ontario’s Golden Horseshoe area and Atlantic Canada. \nWe completed several strategic acquisitions this year that strengthened \nour offering of cable television, Internet and telephony services in the \nHamilton, Ontario area, established Business Solutions as a leader in \nCanadian data centre and hosting services and increased the reach of \nour television broadcast network to over 80% of Canadian households. \n\nCable unveiled the next generation of TV experience with NextBox 3.0, \nand Media made significant progress this year, announcing a landmark \nexclusive 12-year \nto broadcast national NHL \ngames, launching a subscription digital magazine service, upgrading \nThe Shopping Channel, and including adding a mobile app and social \nIt also launched Sportsnet 360, and announced a 10-year \nmedia. \npartnership extension with the Vancouver Canucks. \n\nlicensing agreement \n\n4. STRENGTHEN THE CUSTOMER EXPERIENCE \nConstantly improve the experience that customers have using our \nproducts and services by making it easier for them, providing the tools \nand resources customers need to use our products with confidence, \nbeing attuned to our customers’ evolving needs and continuing to \nsimplify our product offerings. OUR PROGRESS IN 2013 \nWe continued to evolve our wireless offering this year, redesigning and \nsimplifying wireless offerings and pricing tiers, and introducing \nCanada’s first wireless Share Everything plan. We also launched a hybrid \nwireless home and small business phone solution that operates on our \nnational wireless network. \n\nOUR PROGRESS IN 2013 \nWe launched several new programs this year to improve the customer \nexperience, \nfor \nindividuals, families and small businesses, our “worry free” $7.99 per \nday US wireless data roaming plan, a new suite of simplified travel value \npacks of voice, text and data roaming, and the Rogers First Rewards \nloyalty program, and we received regulatory approval for the Rogers \ncredit card. Connected for Success, our new broadband Internet pilot \nproject \nis designed to provide affordable broadband Internet, \ncomputers and software to residents of Toronto Community Housing as \npart of the Rogers Youth Fund program. \n\nincluding Canada’s first Share Everything plans \n\n2. MAINTAIN INDUSTRY-LEADING NETWORKS \nReinforce our network’s reliability and speed to capture and monetize \nthe growth in data consumption by expanding our LTE network to a \nwider proportion of the Canadian population, continuing to increase \nbroadband Internet speeds, and further enhancing our TV platforms \nwith next generation features and functionality. \n\n5. IMPROVE PRODUCTIVITY AND COST STRUCTURE \nContinue to focus on cost-optimization initiatives and organizational \nefficiency by improving service delivery, reducing complexity, focusing \non fewer projects with more impact, managing expenses and working \nmore closely with key suppliers. \n\nOUR PROGRESS IN 2013 \nWe continued to expand our high speed wireless LTE 4G broadband \nnetwork this year, and offered the largest selection of LTE devices of \nany carrier in Canada. Our LTE 4G network was the first in Canada, \nwhich covered approximately 73% of the Canadian population at \nDecember 31, 2013.", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**A**\n**T**\n**A**\n**G**\n**L**\n**A**\n**N**\n**C**\n**E**\n\n**RoRogegersrs CCommumuninicacations Inc..**iiis s s aa a didiversified Canadian telecommunicationss anananddd memm dia cocompmpmpanaany.y. \nRoRoRogegegersrsrs Wireelelessss iiis s CaC nadaa’s’ss lllaarargeg st wireless voice and data telecommunications seervrvrvicicicesese provideder r r \nanananddd tht e cocoununntrtrtry’y’ss onlyy nnnatatatioioi nal carrier operating on the combined world standard GSMMM/H/H/HSPSPS A+A /LLTETE \ntetetechc nooloogygygy pplalatformsmsms... RRoRogers Cable is a leading Canadian cable services provider, offeringg hhhigigigh-h-speeedd \nInI ternnetett aaaccccess, ccababablelel television, and telephony products, and together with Rogers Business SSololutions,, \nprovovididdesees bbusinnesesessss tet lecom, networking, hosting, managed services and IP solutions to small, medididiumumum \nananddd lalal rgr e ennteteterrprprise, government and carrier customers. Rogers Media is Canada’s premier group \nofoff cccatategorry-y-y-lelleading broadcast, specialty, print and online media assets, with businesses in radio and \ntetetelelevisionnn bbbroadcasting, televised shopping, sports entertainment, magazine and trade journal publishingngg \nanana d digigigitatatal l media. We are publicly traded on both the TSX and NYSE stock exchanges and are included \nini thee SSS&P&& /TSX 60 Index of the largest publicly traded companies in Canada.", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "LEADING CONTENT \n\n\n\n\n\n\nNATIONAL \nRADIO \nPORTFOLIO \n\n\nCITY NATIONAL \nTELEVISION \nNETWORK \n\n\n\nLEADING \nSPORTSNET TV \nFRANCHISE \n\n\nTELEVISED \nSHOPPING \nNETWORK \n\n\nTORONTO \nBLUE JAYS \nBASEBALL TEAM \n\n\n\nOMNI \nMULTICULTURAL \nNETWORK \n\n\n\n\n\n\n\nROGERS IS COMMITTED TO DELIVERING WORLD-CLASS \nCONTENT AND EXPERIENCES TO CONSUMERS AND \nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY \nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA \nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH \nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE. \n\nToday, businesses across Canada connect with customers through Rogers \ncategory-leading television and radio assets, sports entertainment, \ntelevised and online shopping, publishing, and digital media properties as \nthe one-stop solution for all their local and national advertising needs. \n\nRogers Media is Canada’s premier combination of diversified broadcast, \nspecialty, sports, print and online media assets which together touch \nnearly 90% of Canadians every week. This includes over 50 popular AM \nand FM radio stations across Canada. In television, it includes the seven \nstation City network which broadcasts intensely local, urban-oriented", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Understanding Our Business \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\n**Our vision**is to be known for leading the enablement and delivery of seamless, customer-driven communications, \nentertainment, information and transactional experiences across any device, place or time. \n\nNewfoundland. We also operate a North American transcontinental \nfibre-optic network that extends over 41,000 route kilometres that is \nused to serve enterprise customers, including government and other \ntelecommunications service providers. In Canada, the network extends \ncoast to coast and includes local and regional fibre, transmission \nelectronics and systems, hubs, POPs and IP Routing and switching \ninfrastructure. The network also extends to the US, from Vancouver \nsouth to Seattle, \nthrough \nMinneapolis, Milwaukee and Chicago, and from Toronto, through \nBuffalo, and Montreal, through Albany, to New York City, allowing us \nto connect Canada’s largest markets, while also reaching key US \nmarkets for the exchange of data and voice traffic. \n\ntelevision and high-speed Internet services \n\nfrom the Manitoba-Minnesota border \n\n**Wireless**provides wireless voice and data communication services, \nincluding machine to machine to both consumer and enterprise \nbusinesses, governments \nservice \nproviders.**Cable**provides voice and data communications, home \nmonitoring, \nto both \nconsumers and businesses.**Business Solutions**provides voice and data \ncommunications and advanced services including data centre based \nsolutions and cloud computing services to a wide range of medium to \nlarge businesses, \nincluding other service providers, and government \neither wirelessly or over our terrestrial network. Revenue generated \nfrom these segments is generally based on monthly subscription and \nnetwork usage rates. Costs include attracting, setting-up and retaining \ncustomers, content, and the costs of upgrading and maintaining the \nunderlying network. \n\nand other telecommunications \n\n**Media**provides television and radio broadcasting services to end \ncustomers over both traditional broadcast networks and new digital \nnetworks as well as multi-platform shopping, consumer and trade \npublications and sports media and entertainment experiences, primarily \nthrough its ownership of the Toronto Blue Jays. Revenue is largely \ndriven by advertising and, in the case of TV broadcasting and publishing \nby additional revenues from monthly subscriptions. Revenue is also \ngenerated by the sale of merchandise and event tickets. Costs include \nsports programming, broadcast content (including TV studios, writers \nand on air and on field talent), the cost of merchandise and the \nproduction costs associated with each medium. \n\nOur wireless network is currently one of the most extensive and \nadvanced independent high-speed wireless data networks in Canada, \ncapable of supporting wireless services on smartphones, \ntablets, \ncomputers and a broad variety of machine-to-machine and specialized \ndevices. We built the first Long Term Evolution (LTE) high speed \nnetwork in Canada, reaching nearly 73% of the Canadian population \nat December 31, 2013. We also have roaming agreements with \ninternational carriers in more than 200 other countries, including 5 LTE \nroaming operators and have network sharing arrangements with several \ncarriers in Canada. \n\nWe report our results of operations in four segments, which reflect how \nwe manage our operations and measure our performance. \nOur expansive fibre and hybrid fibre coaxial \ninfrastructure delivers \nservices to consumers and businesses in Ontario, New Brunswick and", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]Corporate items and eliminations\n
Year ended December 31.2012WirelessCableBusiness SolutionsMediaConsolidated totals
Operating revenue$ 7.280$ 3.358$ 351$ 1.620$( 123 )5
2.486Operating costs 14.2171.7532621.430( 10 )7.652
Adjusted operating profit3.0631.60589190( 113 )4.834Restructuring, acquisition and other expenses
92Stock - based compensation expense 1
77Depreciation and amortization
1.819Impairment of α6sets
80Operating income
2.766Finance costs
( 671 )Other income
250Income before income taxes
52.345Additions to property, plant and equipment$ 1.123S832$61
S55$7152.142Goodwill$ 1.146
$ 1.000$ 215S854$53.215
\n\n\n \n \n \n \n [html]\n
Interest on long - term debt$ 734
$ 691Interest on pension liability14
7Foreign exchange loss ( gain )23
( 9 )Change in fair value of derivative instruments( 16 )
1Capitalized interest( 25 )
( 28 )Other12
9$ 742$ 671
\n\nNOTE 5: FINANCE COSTS \n**2013** 2012 \n\n**$ 6,470**\n**278** $ 6,402 \n317 \n\n**6,748**\n**522** 6,719 \n561 \n\n**7,270** 7,280 \n\n**1,809**\n**1,159**\n**498** 2012 \n\n$ 18 \n(30) \n(30) \n**3,466**\n**9**\n\n**3,475**\n\n(42) \n10 \n**213**\n**149**\n$ (32) \n\n**362**\n**12**\n\n**374**\n\nAs of June 2012, Rogers’ stores no longer offered video and game \nrentals or sales at its retail locations. Certain of these stores continue to \nserve customers’ wireless and cable needs. \n\n**Revenue by Product**\n\nWireless: \nPostpaid \nPrepaid \n\nNetwork revenue \nEquipment sales \n\nTotal Wireless \n\nCable: \nTelevision \nInternet \nCable telephony \n\nService revenue \nEquipment sales \n\nTotal Cable \n\nBusiness Solutions: \nNext generation \nLegacy \n\nService revenue \nEquipment sales \n\nTotal Business Solutions \n\nMedia: \nAdvertising \nSubscription \nRetail \nOther **762**\n**316**\n**305**\n**321**\n\nTotal Media **1,704**\n\nCorporate items and intercompany eliminations \n\n1,868 \n998 \n477 \nNOTE 6: DISCONTINUED OPERATIONS \n\nOperating revenue \nOperating costs \nRestructuring, acquisition and other expenses \n3,343 \n15 \n\n3,358", - "page_start": 106, - "page_end": 106, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RCI_2013.pdf", - "query": "Until what NHL season will the Vancouver's ice hockey team be a Rogers Communications partner?", - "target_page": 39, - "target_passage": "Sportsnet announced a 10-year partnership extension with the Vancouver Canucks through the 2022-2023 NHL seasons", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "programs based on what customers are viewing, helping Canadians \nto explore and uncover more programming that appeals to their \nindividual tastes. \n\nWIRELESS \n(cid:129) Canada’s first and fastest wireless LTE 4G broadband network \ncontinued its expansion. Our network covered approximately 73% of \nthe Canadian population at December 31, 2013, while continuing to \noffer the largest selection of LTE devices of any carrier in Canada. We \nwere also the first carrier in North America and one of the first in the \nworld to offer international LTE roaming to wireless customers. \n\nBUSINESS SOLUTIONS \n(cid:129) Following the acquisition of Blackiron and Pivot Data Centres this \nyear, Business Solutions announced it is expanding its hosting and \ncolocation business in Western Canada through a newly expanded \ndata centre in Edmonton and a new Western Canada flagship data \ncentre in Calgary. \n\n(cid:129) Our wireless offerings and pricing tiers were simplified, reducing \ncomplexity and service times for our sales and support teams and \nadding customer value. These innovations include Canada’s first \ncomplete wireless Share Everything plan which allows individuals, \nfamilies and small businesses to share wireless data, unlimited \nnationwide talk and text and calling features across 1 to 10 wireless \ndevices. \n\n(cid:129) SIP Trunking, a new IP-based voice solution, was announced for \nenterprises designed to complement our fibre-based Internet and \nWAN connectivity services. Merging voice services with a business \ndata network, SIP Trunking solutions dynamically allocate bandwidth \nas needed to support voice and/or data needs depending upon \ncapacity requirements during peak hours and also provide a platform \nfor next generation IP-based video, mobile and productivity \napplications and services. \n\n(cid:129) Our “worry free” $7.99 per day US wireless data roaming plan was \nlaunched, with twice the daily data capacity (50 MB) typically used \ndaily by consumers for wireless Internet, as well as enhanced voice, \ntext and data roaming value packages. \n\n(cid:129) A hybrid wireless home and small business phone solution was \nlaunched, that operates on our national wireless network. The service \nis available in regions outside Rogers’ cable territories and offers a \ntraditional home or office phone service and features without the \nneed for a landline or Internet connection. \n\nMEDIA \n(cid:129) Exclusive NHL 12-year licensing agreement to broadcast national NHL \ngames beginning with the 2014-2015 season was signed. The \nagreement grants Rogers the exclusive distribution of all national live \nand in-progress regular season and playoff games within Canada, in \nmultiple languages, across all platforms. We executed separate \nagreements to sublicense certain of these broadcasting rights to TVA \nSports and CBC. \n(cid:129) The M2M World Alliance, an organization comprised of eight leading \ninternational mobile operators including Rogers, demonstrated a \nsingle global SIM card which makes it easier to deploy connected \ndevices in multiple countries and expected to drive further growth for \nour machine-to-machine business. \n\n(cid:129) Sportsnet 360 was launched, which is comprised of the rebranded \ntheScore assets. The acquisition of theScore received final regulatory \napproval in the first half of this year. \nCABLE \n(cid:129) Acquisition of Mountain Cable, Shaw Communications’ (Shaw) cable \n\n(cid:129) Sportsnet announced a 10-year partnership extension with the \nVancouver Canucks through the 2022-2023 NHL seasons, continuing \na 14-year network tradition as the regional television broadcaster of \nCanucks hockey. The new agreement features a comprehensive suite \nof multimedia rights \nincluding television, online and mobile, \ndelivering up to 60 regular season Vancouver Canucks games each \nseason. Sportsnet is also the official regional television broadcast \nrights holder for the Toronto Maple Leafs, Calgary Flames and \nEdmonton Oilers.", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**ROGERS COMMUNICATIONS**\n\n**Rogers Communications (TSX: RCI; NYSE: RCI) is a diversified Canadian**\n**telecommunications and media company. As discussed in the following**\n**pages, Rogers Communications is engaged in the telecom and media**\n**businesses through its primary operating segments Rogers Wireless,**\n**Rogers Cable, Rogers Business Solutions and Rogers Media.**\n\n\n\n**ROGERS COMMUNICATIONS**\n\n**MEDIA**\n\nWIRELESS SEGMENT \n\nRogers Wireless provides wireless voice and data communications services across \nCanada to approximately 9.5 million customers under the Rogers Wireless, Fido \nand chatr brands. Rogers Wireless is Canada’s largest wireless provider and the \nonly national carrier operating on the combined global standard GSM/HSPA+/LTE \ntechnology platforms. Rogers Wireless is Canada’s leader in innovative wireless \nservices, and provides customers with the best and latest wireless devices and \napplications and the fastest network speeds. Rogers Wireless also provides \nseamless wireless roaming across the U.S. and more than 200 other countries, \nand is the Canadian leader in the deployment of mobile commerce and machine- \nto-machine communications. \n\n\n\nCABLE AND BUSINESS SOLUTIONS SEGMENTS \n\nRogers Cable is a leading Canadian cable services provider, whose service \nterritory covers approximately 4.0 million homes in Ontario, New Brunswick and \nNewfoundland representing approximately 30% of the Canadian cable market. \nOur advanced digital hybrid fibre-coax network provides market leading high- \nspeed broadband Internet access speeds, the most innovative selection of digital \ntelevision and online viewing and telephony services to millions of residential \nand small business customers. Together with Rogers Business Solutions, it also \nprovides scalable carrier-grade business telecom, networking, hosting and \nmanaged data services, and IP connectivity and solutions to medium and large \nenterprise, government and carrier customers. \n\n\n\nMEDIA SEGMENT \n\nRogers Media is Canada’s premier destination for category-leading television and \nradio broadcasting, sports entertainment, publishing, and digital media properties. \nTelevision assets include national City network which reaches more than 80% of \nCanadians, five OMNI Television multilingual channels, seven regional and national \nSportsnet channels, as well as specialty channels FX Canada, OLN, The Biography \nChannel and G4. Rogers Media also owns The Shopping Channel, Canada’s only \nnationally televised and online shopping service. It operates more than 50 Canadian \nradio stations, publishes 50+ well known consumer and business magazines, and \nowns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball \nClub and Rogers Centre, Canada’s largest sports and entertainment facility. Rogers \nalso holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL \nToronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Understanding Our Business \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\n**Our vision**is to be known for leading the enablement and delivery of seamless, customer-driven communications, \nentertainment, information and transactional experiences across any device, place or time. \n\nNewfoundland. We also operate a North American transcontinental \nfibre-optic network that extends over 41,000 route kilometres that is \nused to serve enterprise customers, including government and other \ntelecommunications service providers. In Canada, the network extends \ncoast to coast and includes local and regional fibre, transmission \nelectronics and systems, hubs, POPs and IP Routing and switching \ninfrastructure. The network also extends to the US, from Vancouver \nsouth to Seattle, \nthrough \nMinneapolis, Milwaukee and Chicago, and from Toronto, through \nBuffalo, and Montreal, through Albany, to New York City, allowing us \nto connect Canada’s largest markets, while also reaching key US \nmarkets for the exchange of data and voice traffic. \n\ntelevision and high-speed Internet services \n\nfrom the Manitoba-Minnesota border \n\n**Wireless**provides wireless voice and data communication services, \nincluding machine to machine to both consumer and enterprise \nbusinesses, governments \nservice \nproviders.**Cable**provides voice and data communications, home \nmonitoring, \nto both \nconsumers and businesses.**Business Solutions**provides voice and data \ncommunications and advanced services including data centre based \nsolutions and cloud computing services to a wide range of medium to \nlarge businesses, \nincluding other service providers, and government \neither wirelessly or over our terrestrial network. Revenue generated \nfrom these segments is generally based on monthly subscription and \nnetwork usage rates. Costs include attracting, setting-up and retaining \ncustomers, content, and the costs of upgrading and maintaining the \nunderlying network. \n\nand other telecommunications \n\n**Media**provides television and radio broadcasting services to end \ncustomers over both traditional broadcast networks and new digital \nnetworks as well as multi-platform shopping, consumer and trade \npublications and sports media and entertainment experiences, primarily \nthrough its ownership of the Toronto Blue Jays. Revenue is largely \ndriven by advertising and, in the case of TV broadcasting and publishing \nby additional revenues from monthly subscriptions. Revenue is also \ngenerated by the sale of merchandise and event tickets. Costs include \nsports programming, broadcast content (including TV studios, writers \nand on air and on field talent), the cost of merchandise and the \nproduction costs associated with each medium. \n\nOur wireless network is currently one of the most extensive and \nadvanced independent high-speed wireless data networks in Canada, \ncapable of supporting wireless services on smartphones, \ntablets, \ncomputers and a broad variety of machine-to-machine and specialized \ndevices. We built the first Long Term Evolution (LTE) high speed \nnetwork in Canada, reaching nearly 73% of the Canadian population \nat December 31, 2013. We also have roaming agreements with \ninternational carriers in more than 200 other countries, including 5 LTE \nroaming operators and have network sharing arrangements with several \ncarriers in Canada. \n\nWe report our results of operations in four segments, which reflect how \nwe manage our operations and measure our performance. \nOur expansive fibre and hybrid fibre coaxial \ninfrastructure delivers \nservices to consumers and businesses in Ontario, New Brunswick and", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ACQUISITIONS \n(cid:129) Closed our agreement to acquire Metro 14 Montreal for $10 million \non February 4, 2013, and relaunched the station as City Montreal, \nexpanding the City broadcast TV network into the largest market in \nQuebec and increasing the City television network reach to over \n80% of Canadian households. \n\nMEDIA FINANCIAL RESULTS \n\n(cid:129) Finalized our purchase of theScore, Canada’s third largest specialty \nsports channel, for $167 million. We later rebranded theScore as \nSportsnet 360. \n\n\n \n \n \n \n [html]( In millions of dollars, except percentages )Years ended December 31\n
201.12012% ChgOperating revenue – Media
$ 1.704$ 1.6205Operating expenses( 1.543 )
( 1.430 )8Adjusted operating profit – Media$161
S190( 15 )Adjusted operating profit margin9.4 %
11.7 %Additions to property, plant and equipment$79$
\n\nNHL \n(cid:129) Advanced our strategy of delivering highly sought-after sports \ncontent anywhere, anytime, on any platform and strengthening the \nvalue of our sports brand by entering into an exclusive 12-year \nlicensing agreement with the NHL which begins with the 2014-2015 \nseason and grants Rogers the following: \n\n1 Results of operations include theScore’s operating results as of April 30, 2013 (the \ndate of acquisition). \n\n**MEDIA REVENUE**\n(IN MILLIONS OF DOLLARS) \n\n- \n\nnational \nmobile tablets and Internet streaming \nnational rights to all regular season games, all playoff games \nand the Stanley Cup Final, and all special events and non- \ngame events (e.g. NHL All-Star Game, NHL Draft) – in multiple \nlanguages \nout-of-market rights for all regional games \nownership of all \ncondensed games and video archives \nNHL broadcast assets: Rogers to operate NHL Centre Ice and \nNHL Game Centre Live \nsponsorship rights to the NHL Shield logo as an official partner \nof the NHL \nCanadian representation of ad sales for NHL.com \nownership of all commercial \nbroadcasts \nrights to sublicense broadcasting rights to TVA and CBC \nrights to use the Hockey Night In Canada brand through the \nCBC sublicense agreement. \n\nrights across television broadcasts, wireless and \n**2013** **$1,704**\n\nlinear and digital highlights, including \n\n**Higher Operating Revenue**\nMedia generates revenue in five areas: \n(cid:129) advertising sales across its television, radio, publishing and digital \nmedia properties \n\n(cid:129) circulation \n(cid:129) subscriptions \n(cid:129) retail product sales \n(cid:129) ticket sales, receipts of MLB revenue sharing and concession sales inventories for the television \nassociated with Rogers Sports Entertainment. \n\nOperating revenue was 5% higher this year, mainly because of: \n(cid:129) higher \nsubscription and advertising revenue generated by the \ntheScore, and \nincluding the acquisition of \nSportsnet properties, \noverall growth in distribution of our other specialty channels \n\nThrough this agreement, Rogers plans to provide Canadians with a \nunique viewing experience that will feature expanded pre- and post- \ngame coverage of \nregular season and playoff games and other \nenhanced NHL content. We expect this agreement to drive Sportsnet \nsubscriber growth and to provide highly sought after content \nin \nmultiple languages across all of Rogers’ platforms.", - "page_start": 51, - "page_end": 51, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "LEADING CONTENT \n\n\n\n\n\n\nNATIONAL \nRADIO \nPORTFOLIO \n\n\nCITY NATIONAL \nTELEVISION \nNETWORK \n\n\n\nLEADING \nSPORTSNET TV \nFRANCHISE \n\n\nTELEVISED \nSHOPPING \nNETWORK \n\n\nTORONTO \nBLUE JAYS \nBASEBALL TEAM \n\n\n\nOMNI \nMULTICULTURAL \nNETWORK \n\n\n\n\n\n\n\nROGERS IS COMMITTED TO DELIVERING WORLD-CLASS \nCONTENT AND EXPERIENCES TO CONSUMERS AND \nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY \nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA \nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH \nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE. \n\nToday, businesses across Canada connect with customers through Rogers \ncategory-leading television and radio assets, sports entertainment, \ntelevised and online shopping, publishing, and digital media properties as \nthe one-stop solution for all their local and national advertising needs. \n\nRogers Media is Canada’s premier combination of diversified broadcast, \nspecialty, sports, print and online media assets which together touch \nnearly 90% of Canadians every week. This includes over 50 popular AM \nand FM radio stations across Canada. In television, it includes the seven \nstation City network which broadcasts intensely local, urban-oriented", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "WIRELESS \n\nROGERS IS CANADA’S LARGEST WIRELESS \nCOMMUNICATIONS SERVICE PROVIDER \nAs at December 31, 2013, we had: \n(cid:129) approximately 9.5 million subscribers \n(cid:129) approximately 34% share of the Canadian wireless market. \n\nDATA**44%**\n\nPRODUCTS AND SERVICES \nin innovative new wireless network \nRogers is a Canadian leader \ntechnologies and services. We provide wireless voice and advanced \nhigh-speed data communication services to subscribers across Canada \nunder the Rogers, Fido and Chatr brands, and provide our customers \nwith the best and latest wireless devices and applications including: \n(cid:129) mobile high speed Internet access \n(cid:129) wireless voice and enhanced voice features \n(cid:129) wireless home phone \n(cid:129) device protection \n(cid:129) text messaging \n(cid:129) e-mail \n(cid:129) global voice and data roaming \n(cid:129) machine-to-machine solutions \n(cid:129) advanced business solutions \n(cid:129) Suretap mobile wallet \n(cid:129) Rogers AnyPlace TV \n(cid:129) Rogers One Number \n(cid:129) Rogers First Rewards Loyalty Program. \n\nEXTENSIVE WIRELESS NETWORK \nRogers has one of the most extensive and advanced wireless networks \nin Canada: \n(cid:129) supports wireless services on smartphone, tablets, computers and a \nbroad variety of M2M, mobile commerce, retail point of sale and \nother specialized devices \n(cid:129) the first LTE high-speed network in Canada, which reached more \nthan 73% of the Canadian population at December 31, 2013 \n(cid:129) voice and data roaming agreements with international carriers in \nmore than 200 countries \n(cid:129) network sharing arrangements with several regional wireless \n\noperators in Canada. \n\nWe are continuously enhancing our IP service infrastructure for all of \nour wireless services. Advances in technology have transformed how \nour customers interact and how they use the variety of tools that are \navailable to them in their personal and professional lives. Technology \nhas also changed the way businesses operate. \nNATIONAL DISTRIBUTION \nWe distribute our wireless products using various channels including: \n(cid:129) independent dealer networks \n(cid:129) company-owned Rogers, Fido and Chatr retail stores \n(cid:129) customer self-serve rogers.com, fido.ca, chatrwireless.com, ecommerce \nsites \n\nNew technologies allow us to offer new services, such as Rogers One \nNumber, which makes enhanced wireless \nservices available to \nsubscribers on their computer, tablet, or smartphone and can be used \nas an alternative to fixed line telephony. Users enjoy the same services \nand features across the coverage area, \nthanks to the seamless \nintegrated nature of the Rogers network and those of our roaming and \nnetwork sharing partners. \n\n(cid:129) Rogers call centres and outbound telemarketing \n(cid:129) major retail chains and convenience stores.", - "page_start": 40, - "page_end": 40, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**A**\n**T**\n**A**\n**G**\n**L**\n**A**\n**N**\n**C**\n**E**\n\n**RoRogegersrs CCommumuninicacations Inc..**iiis s s aa a didiversified Canadian telecommunicationss anananddd memm dia cocompmpmpanaany.y. \nRoRoRogegegersrsrs Wireelelessss iiis s CaC nadaa’s’ss lllaarargeg st wireless voice and data telecommunications seervrvrvicicicesese provideder r r \nanananddd tht e cocoununntrtrtry’y’ss onlyy nnnatatatioioi nal carrier operating on the combined world standard GSMMM/H/H/HSPSPS A+A /LLTETE \ntetetechc nooloogygygy pplalatformsmsms... RRoRogers Cable is a leading Canadian cable services provider, offeringg hhhigigigh-h-speeedd \nInI ternnetett aaaccccess, ccababablelel television, and telephony products, and together with Rogers Business SSololutions,, \nprovovididdesees bbusinnesesessss tet lecom, networking, hosting, managed services and IP solutions to small, medididiumumum \nananddd lalal rgr e ennteteterrprprise, government and carrier customers. Rogers Media is Canada’s premier group \nofoff cccatategorry-y-y-lelleading broadcast, specialty, print and online media assets, with businesses in radio and \ntetetelelevisionnn bbbroadcasting, televised shopping, sports entertainment, magazine and trade journal publishingngg \nanana d digigigitatatal l media. We are publicly traded on both the TSX and NYSE stock exchanges and are included \nini thee SSS&P&& /TSX 60 Index of the largest publicly traded companies in Canada.", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "OUR STRATEGY \nTo achieve our vision and drive our future growth, we have six strategic objectives. We made significant progress this year \nagainst each of these, across all business segments. See “Key Highlights” for more detail about individual highlights. \n\n1. DELIVER DIFFERENTIATED END-TO-END \nCUSTOMER EXPERIENCES \nFocus on evolving our cross-device, multi-screen integration to enable \nseamless, \nreliable and easy-to-use product experiences anytime, \nanyplace and anywhere; on delivering a differentiated range of devices \nand device-related services; and on enabling greater integration of our \nmedia assets across screens. We launched new products, including Rogers Smart Home Monitoring, \nto customers in Ontario’s Golden Horseshoe area and Atlantic Canada. \nWe completed several strategic acquisitions this year that strengthened \nour offering of cable television, Internet and telephony services in the \nHamilton, Ontario area, established Business Solutions as a leader in \nCanadian data centre and hosting services and increased the reach of \nour television broadcast network to over 80% of Canadian households. \n\nCable unveiled the next generation of TV experience with NextBox 3.0, \nand Media made significant progress this year, announcing a landmark \nexclusive 12-year \nto broadcast national NHL \ngames, launching a subscription digital magazine service, upgrading \nThe Shopping Channel, and including adding a mobile app and social \nIt also launched Sportsnet 360, and announced a 10-year \nmedia. \npartnership extension with the Vancouver Canucks. \n\nlicensing agreement \n\n4. STRENGTHEN THE CUSTOMER EXPERIENCE \nConstantly improve the experience that customers have using our \nproducts and services by making it easier for them, providing the tools \nand resources customers need to use our products with confidence, \nbeing attuned to our customers’ evolving needs and continuing to \nsimplify our product offerings. OUR PROGRESS IN 2013 \nWe continued to evolve our wireless offering this year, redesigning and \nsimplifying wireless offerings and pricing tiers, and introducing \nCanada’s first wireless Share Everything plan. We also launched a hybrid \nwireless home and small business phone solution that operates on our \nnational wireless network. \n\nOUR PROGRESS IN 2013 \nWe launched several new programs this year to improve the customer \nexperience, \nfor \nindividuals, families and small businesses, our “worry free” $7.99 per \nday US wireless data roaming plan, a new suite of simplified travel value \npacks of voice, text and data roaming, and the Rogers First Rewards \nloyalty program, and we received regulatory approval for the Rogers \ncredit card. Connected for Success, our new broadband Internet pilot \nproject \nis designed to provide affordable broadband Internet, \ncomputers and software to residents of Toronto Community Housing as \npart of the Rogers Youth Fund program. \n\nincluding Canada’s first Share Everything plans \n\n2. MAINTAIN INDUSTRY-LEADING NETWORKS \nReinforce our network’s reliability and speed to capture and monetize \nthe growth in data consumption by expanding our LTE network to a \nwider proportion of the Canadian population, continuing to increase \nbroadband Internet speeds, and further enhancing our TV platforms \nwith next generation features and functionality. \n\n5. IMPROVE PRODUCTIVITY AND COST STRUCTURE \nContinue to focus on cost-optimization initiatives and organizational \nefficiency by improving service delivery, reducing complexity, focusing \non fewer projects with more impact, managing expenses and working \nmore closely with key suppliers. \n\nOUR PROGRESS IN 2013 \nWe continued to expand our high speed wireless LTE 4G broadband \nnetwork this year, and offered the largest selection of LTE devices of \nany carrier in Canada. Our LTE 4G network was the first in Canada, \nwhich covered approximately 73% of the Canadian population at \nDecember 31, 2013.", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Executive Summary \n\nABOUT ROGERS COMMUNICATIONS INC. \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\nWe provide a broad range of services: wireless and wired voice and data \ncommunications, cable television, high-speed Internet, cable telephony, \nwired telecom and data networking services \nto consumers and \nbusinesses. We also compete in television and radio broadcasting, \nmulti-platform shopping, sports media and entertainment, digital media \nand consumer, trade and professional publications. \n\n**2013 CONSOLIDATED REVENUE BY SEGMENT**\n(%) \n\nWIRELESS**57%**\n\nCABLE**27%**\n\n$12.7 \n\nAlmost all of our operations and sales are in Canada. We have a highly \nskilled and diversified workforce of approximately 28,000 employees. \nOur head-office is in Toronto, Ontario and we have numerous offices \nacross Canada. \n\nBILLION \nMEDIA**13%**\n\nBUSINESS SOLUTIONS**3%**\n\n**2013 CONSOLIDATED ADJUSTED OPERATING PROFIT BY SEGMENT**\n(%) \n\nWIRELESS**61%**\n\nCABLE**33%**\n\n$5.0 \nBILLION \n\nMEDIA**4%**\nBUSINESS SOLUTIONS**2%**\n\nFOUR BUSINESS SEGMENTS \nWe report our results of operations in four segments. \n\n\n \n \n \n \n [html]\n
WirelessWireless telecommunications operations for consumers and businesses
CableCable telecommunications operations, including cable television, Intermet and cable telephony for Canadian consumers and businesses.
Business SolutionsNetwork connectivity through our fibre network assets to support a range of voice, data, networking, data centre and cloud - based services for medium and large Canadian businesses, governments, and other telecommunications provider
MediaA diversified portfolio of media properties, including television and radio broadcasting, digital media, multi - platform shopping, publishing and sports media and entertanment
", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EMMS_2004.pdf", - "query": "I am a shareholder of Emmis Communication, but I will be available from the 20th of June to the 4th of July, will the Annual Meeting take place during this period?", - "target_page": 6, - "target_passage": "The Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis’ Corporate office.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. \n\nTransfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. \n\nQuarter Ended \nMay 2002 \nAugust 2002 \nNovember 2002 \nFebruary 2003 \nMay 2003 \nAugust 2003 \nNovember 2003 \nFebruary 2004 High \n31.85 \n30.15 \n24.05 \n24.86 \n21.24 \n23.87 \n24.06 \n28.65 \n\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A \nCommon Stock and one record holder of the Class B Common Stock. \n\nEmmis intends to retain future earnings for use in its business and does not anticipate \npaying any dividends on shares of its common stock in the foreseeable future. \n\nExecutive Officers \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nRandall Bongarten \nTelevision Division President \n\nRichard F. Cummings \nRadio Division President \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nPaul W. Fiddick \nInternational Division President \n\nMichael Levitan \nSenior Vice President, \nHuman Resources \n\nGary Thoe \nPublishing Division President \n\nBoard of Directors \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nSusan B. Bayh \nFormer Commissioner of the International Joint \nCommission of the United States and Canada \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nRichard A. Leventhal \nPresident and Majority Owner, \nLMCS, LLC \n\nPeter A. Lund \nMedia consultant and former \nPresident of CBS Inc. \n\nGreg A. Nathanson \nMedia consultant and former \nPresident of Fox Television Stations and \nEmmis Television \n\nFrank V. Sica \nSenior Advisor \nSoros Fund Management LLC", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Outperform \n\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
acknowledgment from the Chairman or his representativeof options traded in the options market. Directors and executives
{ and executives from the Secretary or a person appointedmay not deal in securities on considerations of a short - term
Dy tne Boardj or an intention prior to any dealings innature. 11 CnWTINIIIS nTINI
securities either by themselves or by their associates, and must neonataly, early, family, family, family, family, family, family, family, family, family, family, family, family, family, family, family, family, family, family, fat& SHAREHOLDER COMMUNICATION
parametersThe Company is committed to giving all shareholders timely
The Company ’ s policy is that trading in Santos securities isand equal access to information concerning the Company.
permitted, with approval as set out above, only during theThe Company has developed policies and procedures in accordance with its commitr
following periods :▪ the period commencing two clear days after the
to fulfilling its obligations to shareholders and the broaderannouncement of the
market for continuous disclosCompany ' s annual results
The policies are summarised inand ending 1 July ; and
this Statement, which may be▪ the period commencing
accessed at the Company ' s wakeita, at wave anter.two clear days after the announcement of the
The Company is currently in nrown of company is currently in neverCompany ’ s half yearly
summaries of relevant policies for inclusion on the Corporateresults and end1ng 1 January.
Governance section of theprofinibitions on dealing in
Company ’ s website. The policiessecurities apply not only to
are regularly reviewed andthe acquisition and disposal of
updated for changes to the lawshares, but also to the acquiring,
and the Listing Rules. Thetaking, assigning and releasing
Company notes that the ASX
", - "page_start": 35, - "page_end": 35, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Dear Shareholders, \n\ntion, we gained revenue share at 11 of our 13 measured \nstations and held the line on expenses, giving us a 1.2 \npercent increase in fiscal-year cash flow. \n\nOn our year-end conference call, I said that last year was the \nbest in Emmis Communications’ history. And while that might \nhave sounded like the usual Wall Street hyperbole – like any \nother CEO bragging about his company’s performance – the \ndifference is, I believed it. And I still do. \n\nOur publishing and international divisions also posted strong \nresults. In a tough publishing market, our magazines boosted \ntheir division’s revenues by 4.6 percent over last year and \nincreased cash flow by 3.3 percent. Our international division \nturned in a revenue increase of 27 percent and a cash flow \nincrease of 31 percent. \n\nBut I’ve been in this business long enough to know two \nthings for sure: What I believe is not as important as what I \ncan prove, and what we did last year is only meaningful if it \nreflects on how we will do in the coming year. The good \nnews is, Emmis does have the results to back up my high \npraise, and what we did to perform last year does directly \nrelate to how we’ll perform in the year ahead. \n\nIn addition to boosting performance in our divisions, we \nhoned our corporate operations by continuing to build one \nof the most adept and hardest-working corporate groups in \nAmerican media. With this team in place, we’ve brought \nour leverage and cost of capital down to more manageable \nlevels, found ways to combat the continually increasing \ncosts of health insurance and, in a truly top-notch effort, \nsmoothly integrated our new Austin radio properties – in just \nunder a year as a part of Emmis, the Austin properties are \nenjoying significant ratings and revenue increases. **The best year**\nThe bottom line is this: Emmis Communications turned in a \nremarkable performance last year. Again and again, and by a \nnumber of measures, we outperformed our peers, our mar- \nkets and our own solid track record. \n\nAnd we did this in a year that was challenging in just about \nevery way. The economy was unstable, public companies \ncame under continuing scrutiny, indecency issues hounded \nbroadcasters, competition for tight ad dollars increased and \ntechnology continued to reshape the media world. Of course, for you, the real bottom line on our performance is \nits impact on your investment. I’m proud to say that we saw \na 27 percent increase in our share price over the course of \nthe last fiscal year – we ended fiscal ’03 at 19.79, and closed \nthe book on fiscal ’04 at 25.17. \n\n**How we did it**\nOperationally, we were on top of our game last year. However, \nas I said, I know that the past year’s performance really only \nmatters if it reflects on what we’ll do in the coming year. The \ngood news is, it does. We performed at these high levels not \nby doing something unusual, but by operating the way Emmis \nhas always operated, and the way we always will. \n\nBut our people refused to be slowed by those challenges. \nInstead, they worked through them. They innovated, hustled \nand focused. And they produced. \n\nOur radio division’s revenue growth led our markets and the \nindustry – in our fiscal year, our group was up 4.5 percent \nwhile our markets were up 2.7 percent and the industry only \n1 percent. Based on this kind of performance, we have con- \nsistently ranked among the nation’s leaders in per-station \nrevenue, and we continue to produce top-rated programming \nin markets across the nation.", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "**PART III**\n\n**Item 10. Directors, Executive Officers and Corporate Governance.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nExecutive Officers \nDirector Elections \nBoard Committees and Charters \nDirector Nominating Process \nWebsite Access to Corporate Governance Documents \nSection 16(a) Beneficial Ownership Reporting Compliance \nCorporate Governance \n\nThe certifications of our President and Chief Financial Officer required pursuant to Sections 302 and 906 of the Sarbanes-Oxley Act of 2002 \nare included as exhibits to this Annual Report on Form 10-K and were included as exhibits to each of our quarterly reports on Form 10-Q. \nOur President certified to the New York Stock Exchange (“NYSE”) on May 15, 2014 pursuant to Section 303A.12(a) of the NYSE’s listing \nstandards, that he was not aware of any violation by the Company of the NYSE’s corporate governance listing standards as of that date. \n\n**Item 11. Executive Compensation.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nCompensation of Executive Officers \nCompensation Discussion and Analysis \nDirector Compensation \nCompensation Committee Interlocks and Insider Participation \n\n**Item 12. Security Ownership of Certain Beneficial Owners and Management and Related Shareholder Matters.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nSecurity Ownership of Certain Beneficial Owners and Management \nEquity Compensation Plans \n\n**Item 13. Certain Relationships and Related Transactions, and Director Independence.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nElection of Directors \nCertain Relationships and Related Transactions \n\n**Item 14. Principal Accounting Fees and Services.**\n\nThe information required under this item is included in the following section of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the section of which is incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nRatification of the Appointment of Independent Registered Public Accounting Firm", - "page_start": 79, - "page_end": 79, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Electronic enquiries can also be submitted through the Contact Us \nsection of the Santos website, www.santos.com. \n\n**SHAREHOLDERS’ CALENDAR**\n\n2004 full year results announcement 23 February 2005 \n\n\n \n \n \n \n [html]\n
2004 full year results announcement23 February 2005
Ex - dividend date for 2004 full, year dividend28 February 2005
Record date for 2004 full year dividend4 March 2005
Payment date for 2004 full year dividend31 March 2005
Annual General Meeting20 May 2005
Half year end30 June 2005
2005 interim results announcement16 August 2005
Full, year end31 December 2005
QUARTERLY REPORTING CALENDAR2005 First Quarter Activities Report
27 April 20052005 Second Quarter Activities Report
27 July 20052005 Third Quarter Activities Report
2.0ctober 20052005 Fourth Quarter Activities Report
25 January 2006
", - "page_start": 93, - "page_end": 93, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. \n\nWith its emphasis on solid operations, integrity, community involvement \nand fun, the company’s culture has been repeatedly lauded by both its \nemployees and its peers. Trade publications have regularly cited the \ncompany’s leaders as being among the best in the business. \n\nEmmis became a public company in 1994. It maintains its worldwide \nheadquarters in Indianapolis, where the company was founded. \n\n*This annual report contains certain non-GAAP measures. For a presen-*\n*tation of the directly comparable GAAP measure and a reconciliation of*\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n*the back of our Form 10-K in this Annual Report.*", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
of, non - executive, independentDirectors, except for theEnvironmental and SafetyCommittee, which includesthe CE0 as a member.• the Board Is to comprise a minimum of five and a maximum of ten Directors ( exclusive of the CEO );• the Board ehould communise aperceived to materially interfere with, the Director ' s ability to act in the best interests of the Company, The Board will assess the material / ity of any givenresponsibilities, and term of office of each Director of the Company are set out on page 4.1 of this Annual Report. Details of each Director ' s attendance at Board and Committee Meetings and their shareholdings are also
The Board Guidelines prescribe that the Board is to meet at least eight times a year, including a strategy meeting ofsubstantial majority of independent, non - executive Directors ;relationship that may affectIndependence on a case by case basis and has adopted materiality guidelines to assist inBoard and Committee Meetings and their shareholdings are also set out on page 47 of this Annual Report.
two days duration. The number of meetings of the Board and of each of its Committees and the names of attendees at those• there should be a separation of the roles of Chairman and Chief Executive Officer of the Company ; andthat assessment. Under these guidelines, the following interests are regarded as material. in the absence of any mitligating2.4 Nomination Committee The role, responsibilities and membership requirements of the Nomination Committee are
meetings are set out on page 47 of this Annual Report. Board▪ the Chairman of the Board should be an independent, non - executive Director.• a holding of 5 % or more ofdocumented in the Board Guidelines and in a separate Charter, approved by the Board.
Meetings are structured in two separate sessions, without management present for one of those sessions. The agenda forUnder the Company ’ s Constitution approximately one - third of Directors retire bythe Company ’ s voting shares a direct association with an entity that holds more than 5 % of the Company ’ s voting shares :Under the Board Guidelines, it is the responsibility of the Nomination Committee to devise the criteria for, and review
meetings is prepared by the Company Secretary inrotation each year and Directors appointed during the year are• an affiliation with an entitythe criteria for, and review membership of, and nomin
conjunction with the Chairman and CE0, with periodic inputrequired to submit themselves for election by shareholders at the Company ’ s next Annualwhich accounts for 5 % or more or the revenue or expense of the Company.to, the Board. The primary criteria adopted in selection of suitable Board candidates is their
from the Board. Comprehensive Board papers are distributed toGeneral Meeting. The Board Guidelines encourage Directors to retire at the First Annual General.The Board has determined that there should not be any arbitrary length of tenure that should becapacity to contribute to the ongoing development of the Company having regard to the
", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "[html]acknowledgment from the Chairman or his representativeof options traded in the options market. Directors and executivesBest Practice Recommendations are for full copies of certainto each exchange where its shares are listed : ASX, NASDAQ( and executives from the Secretary or a person appointedmay not deal in securities on considerations of a short - termpolicies and charters to be included on the website. Theand NZX. The Lompany Secretary is responsible for communicationsby the Board ) of an intentionnature.Company has been working onwith the exchanges. All material.prior to any dealings in securities either by themselves11. CONTINU0US & SHAREH0LDERthis during the year, together with the update of the websiteinformation disclosed to the ASX is posted on the Company ’ sor by their associates, and mustCOMMUNICATIONttself. These will shortly bewebsite at www. santos. com. 1h1spromptomytemsThe Company is committed to giving all shareholders timelyavailable unlief colipulateGovernance section of theIIILIGILITIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIThe Company ’ s policy is that trading in Santos securities isand equal. access concerning the Cdwebsite. These policies establishtherefore this Corporate Governance Statement ), notices of, non - statementpermitted, with approval as set out above, only during theThe Company hasprocedures to ensure that Directors and managementuIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIfollowing periods :Putational proteinsaware of and fulfil theirat 1nvestor, media and analyst brinformatic and analysis of the patients• the period commencingaccuraaIICE with to fulfilling its ofobligations in relation toDifferences and compared by the facility is also offered totwo clear days after theshareholders andtimely disclosure of mater.shareholders. Web - casting ofannouncement of themarket for continuesprice sensitive informationmaterial presentations, includingCompany ' s annual resultsThe policies are sInformation must not betweenannual and half - yearly resultsand ending 1 July ; andthis Statement, vSensor ‐ very unsussedpresentations, is provided forDistancementsaccessed at the CLocal and demographicsthe benefit of shareholders,Controlled contributions to two clear days after thewebsite at www. sThP ( omnany is )RASUPQ UI recview Leaving Exchange Ltd ( NZX ). Direcregardless of their location.announcement of theSpecificity ( months )and executive managemenAdditionally, the Company ' sCompany ' s half yearlyprocess of componentnotify the Company Secretexternal auditor attends annualresults and ending 1 Jansummaries of relevancesoon as they become awarenessgeneral meetings to be availableUnder the quidelines,Total difference section", - "page_start": 35, - "page_end": 35, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "at the Company’s annual general meeting in November 2000, it was proposed to invite each \n\nholder of the above options to subscribe for one new 30 November 2001, 0.75 cent option for \n\neach of the above options held on its expiry at a proposed issue price of 1 cent per new option. \n\nThere is no inherent right arising from these options to participate in any new issue of shares in \n\nthe Company which may be offered to shareholders from time to time prior to the exercise of \n\nthe options. The Company will ensure however, that during the exercise period, for the purpose \n\nof determining entitlement to any new issue, the relevant record date will be at least 12 business \n\ndays after the new issue is exercised, so as to give the holder of options an opportunity to exercise \n\ntheir options prior to the relevant record date of any new issue. \n\nIn accordance with the provisions of the E M P L O Y E E S H A R E O P T I O N I N C E N T I V E P L A N \n\nMermaid Marine Australia Limited Employee Share Option Incentive Plan (the “Employee \n\nOption Plan”), as at the date of this report a total of 42 employees have under option an aggregate \n\nof 615,000 ordinary shares in the Company. Of the 615,000 ordinary shares under option pursuant \n\nto the Employee Option Plan, half (307,500) may be purchased within 12 months of 18 June 2000 \n\nat an issue price of 60 cents per share and half (307,500) may be purchased within 12 months of \n\n18 June 2000 at an issue price of 70 cents per share. \n\nI N D E M N I T I E S A N D I N S U R A N C E P R E M I U M S F O R O F F I C E R S A N D A U D I T O R S \n\nDuring the Financial Year, Mermaid paid a premium for a contract insuring all of the directors \n\n\n \n \n \n \n [html]\n
Tableility incurred byAch director, secretary or executiveTableSensitivity, secCary or executive officer to theTableTableTableTableSpecimensSpecificity ( means )TableSpecificity ( months )PreparationsTableProportionalSignificance - basedTableTableTableTableTableTableTablePercentageProblems or otherwise during or since theTable1.10 ( 0.01 )TableTableRed to indemnifAn officer or auditor of the ccTableParametersTable
", - "page_start": 34, - "page_end": 34, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EMMS_2004.pdf", - "query": "Who is the President of the TV Department of Emmis Communications?", - "target_page": 6, - "target_passage": "Randall Bongarten Television Division President", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "First of all, we focus on assembling and maintaining the best \nteams in our markets. We have traditionally had the top \nsalespeople, creative and technical professionals, news \nstaffs, managers and support staff in every city where we \noperate. Their peers turn to them for industry leadership, \nhonor them with awards and copy them at every opportunity. \nWe invest in these people, giving them industry-leading ben- \nefits packages, great opportunities and the tools they need to \nsucceed. This has always been a hallmark of Emmis, and it \nwon’t change. \n\nOur TV performance was even more impressive. The Emmis \ntelevision group’s revenues were up 0.5 percent in calendar \n2003, a year when our markets saw a 2.3 percent decrease \nin revenues, and the industry experienced a 4.7 percent \nrevenue decline. This industry-leading result made us one of \nthe few groups in the nation to post positive growth. In addi-", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. \n\nTransfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. \n\nQuarter Ended \nMay 2002 \nAugust 2002 \nNovember 2002 \nFebruary 2003 \nMay 2003 \nAugust 2003 \nNovember 2003 \nFebruary 2004 High \n31.85 \n30.15 \n24.05 \n24.86 \n21.24 \n23.87 \n24.06 \n28.65 \n\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A \nCommon Stock and one record holder of the Class B Common Stock. \n\nEmmis intends to retain future earnings for use in its business and does not anticipate \npaying any dividends on shares of its common stock in the foreseeable future. \n\nExecutive Officers \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nRandall Bongarten \nTelevision Division President \n\nRichard F. Cummings \nRadio Division President \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nPaul W. Fiddick \nInternational Division President \n\nMichael Levitan \nSenior Vice President, \nHuman Resources \n\nGary Thoe \nPublishing Division President \n\nBoard of Directors \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nSusan B. Bayh \nFormer Commissioner of the International Joint \nCommission of the United States and Canada \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nRichard A. Leventhal \nPresident and Majority Owner, \nLMCS, LLC \n\nPeter A. Lund \nMedia consultant and former \nPresident of CBS Inc. \n\nGreg A. Nathanson \nMedia consultant and former \nPresident of Fox Television Stations and \nEmmis Television \n\nFrank V. Sica \nSenior Advisor \nSoros Fund Management LLC", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Outperform \n\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Douglas J. Jacobson \nExecutive Vice President – \nAcquisitions and Divestitures", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "SENIOR EXECUTIVE OFFICERS \nOF ROGERS COMMUNICATIONS INC. \nAS OF FEBRUARY 11, 2014 \n\n\n\n16 \n\n\n\n19 \n\n\n\n15 \n\n\n\n\n\n17 \n\n\n\n18 \n\n\n\n\n\n14 \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n20 \n\n\n\n21 \n\n\n\n23 \n\n\n\n24 \n\n\n\n25 \n\n\n\n22 \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSENIOR EXECUTIVE OFFICERS \n\n\n\n\n\n14**Guy Laurence**\n\nPresident and Chief \nExecutive Officer \n\n15**Robert F. Berner**\n\nExecutive Vice President, \nNetwork and Chief Technology Officer \n\n16**Robert W. Bruce**\n\nPresident, \nCommunications Division \n\n17**Linda P. Jojo**\n\nExecutive Vice President, \nInformation Technology and \nChief Information Officer \n\n18**Philip B. Lind, CM**\n\nExecutive Vice President, \nRegulatory and Vice Chairman \n\n19**David P. Miller**\n\nSenior Vice President, \nLegal and General Counsel \n\n20**Keith W. Pelley**\nPresident, Rogers Media \n\n21**Jim M. Reid**\n\nSenior Vice President, \nHuman Resources and \nChief Human Resources Officer \n\n22**Edward S. Rogers**\n\nDeputy Chairman and \nExecutive Vice President, \nEmerging Business, \nCorporate Development \n\n23**Melinda M. Rogers**\n\nSenior Vice President, \nStrategy and Development \n\n24**Anthony Staffieri, FCPA, FCA**\nExecutive Vice President \nand Chief Financial Officer \n\n25**Terrie L. Tweddle**\nVice President, \nCorporate Communications", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**Dale noseworthy**\nVice president \ninvestor relations and \ncorporate planning \n**Jeremy Jackson**\nVice president \nmarketing **robert richardson**\nexecutive Vice president \n& chief Financial officer **Michael Mclean**\nVice president \nDevelopment **erin Cleveland**\nVice president \nFinance \n\n\n\nmanagement team", - "page_start": 5, - "page_end": 5, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. \n\nWith its emphasis on solid operations, integrity, community involvement \nand fun, the company’s culture has been repeatedly lauded by both its \nemployees and its peers. Trade publications have regularly cited the \ncompany’s leaders as being among the best in the business. \n\nEmmis became a public company in 1994. It maintains its worldwide \nheadquarters in Indianapolis, where the company was founded. \n\n*This annual report contains certain non-GAAP measures. For a presen-*\n*tation of the directly comparable GAAP measure and a reconciliation of*\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n*the back of our Form 10-K in this Annual Report.*", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
cationsForty years ago, Americans began taking down their TV anternas and severing broadcasters ’ direct link to television
Patientsaudiences. Since then, the cable companies — the middlemen
n 2003,who replaced us — have created more than $ 300 billion of
conivalue for themselves. However, changes in technology have
Jarlygiven broadcasters the ability to provide the American publ
athering ketswith the most popular TV channels, without the middlemen and at a more reasonable price.
Sus2017
We are developing an innovative model that will leverage that technology to get broadcast companies back into that that technology to get broadcast companies back into that ths. We
game. I believe it has the potential to revolutionize thefined
television industry. I also believe it will add substantial valueand
to your investment.Construction
itiousWe unveiled this concept at the National Association of
marterBroadcasters meeting in April. I am proud to say that 11 other television companies joined us at that meeting to
express their support for what we ’ re calling the Broadcasters ’nost
Initiative, and more are signing on each week. Once again,About 3000
Emmis has leveraged innovation to take a leading role in ourindustries.
stationsa
We ’ II continue to use innovation to push us forward.opportu -
Meanwhile, we ’ II also build and maintain the best teams, pro -duce the best media content, outhustle and outsell our com -
petitors, seize the best opportunities and operate this company better than any other.In other words, you can count on Emmis to continue to do
Parameterswhat it has always done : Outperform.
ecauseAged
Thank you for your belief and investment in Emmis.
", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "DIRECTORS \nOF ROGERS COMMUNICATIONS INC. \nAS OF FEBRUARY 11, 2014 \n\n\n\n1 \n\n\n\n2 \n\n\n\n\n\n\n\n8 \n\n\n\n3 \n\n\n\n4 \n\n\n\n5 \n\n\n\n6 \n\n\n\n7 \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n9 \n\n\n\n10 \n\n\n\n11 \n\n\n\n12 \n\n\n\n13 \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nDIRECTORS \n\n\n\n\n\n\n\n10**Loretta A. Rogers**\nCompany Director \n\n11**Martha L. Rogers**\n\nDoctor of \nNaturopathic Medicine \n\n23**Melinda M. Rogers***\nSenior Vice President, \nStrategy and Development, \nRogers Communications \n\n12**Dr. Charles Sirois**\n\nChief Executive Officer, \nTelesystem Ltd. \n\n13**John H. Tory, O. Ont.**\nCompany Director \n\n1**Alan D. Horn, CPA, CA**\n\nChairman, President and \nChief Executive Officer, \nRogers Telecommunications Ltd. \n\n2 \n\n**Peter C. Godsoe, O.C., O. Ont.**\nLead Director, \nCompany Director \n\n14**Guy Laurence***\n\nPresident and Chief Executive Officer, \nRogers Communications \n\n3 \n\n**Charles William David Birchall**\nVice Chairman, \nBarrick Gold Corporation \n\n4 \n\n**Stephen A. Burch**\nChairman, \nUniversity of Maryland Medical Systems \n\n5 \n**John H. Clappison, FCPA, FCA**\nCompany Director \n\n6 \n\n**Thomas I. Hull**\nChairman and Chief Executive Officer, \nThe Hull Group of Companies \n\n18**Philip B. Lind, CM***\n\nExecutive Vice President, \nRegulatory and Vice Chairman, \nRogers Communications \n\n7 \n**John A. MacDonald**\nCompany Director \n\n8 \n\n**Isabelle Marcoux**\nChair, \nTranscontinental Inc. \n\n9 \n\n**The Hon. David R. Peterson, PC, QC**\nSenior Partner and Chairman, \nCassels Brock & Blackwell LLP \n\n22**Edward S. Rogers***\n\nDeputy Chairman and \nExecutive Vice President, \nEmerging Business, \nCorporate Development, \nRogers Communications \n\n***Management Directors are pictured on the following page.**\n\n20 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EMMS_2004.pdf", - "query": "Does the radio station 93.7 in Austin belong to Emmis Communication?", - "target_page": 7, - "target_passage": "KLBJ-FM (93.7), Album Oriented Rock", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. \n\nWith its emphasis on solid operations, integrity, community involvement \nand fun, the company’s culture has been repeatedly lauded by both its \nemployees and its peers. Trade publications have regularly cited the \ncompany’s leaders as being among the best in the business. \n\nEmmis became a public company in 1994. It maintains its worldwide \nheadquarters in Indianapolis, where the company was founded. \n\n*This annual report contains certain non-GAAP measures. For a presen-*\n*tation of the directly comparable GAAP measure and a reconciliation of*\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n*the back of our Form 10-K in this Annual Report.*", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. \n\nTransfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. \n\nQuarter Ended \nMay 2002 \nAugust 2002 \nNovember 2002 \nFebruary 2003 \nMay 2003 \nAugust 2003 \nNovember 2003 \nFebruary 2004 High \n31.85 \n30.15 \n24.05 \n24.86 \n21.24 \n23.87 \n24.06 \n28.65 \n\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A \nCommon Stock and one record holder of the Class B Common Stock. \n\nEmmis intends to retain future earnings for use in its business and does not anticipate \npaying any dividends on shares of its common stock in the foreseeable future. \n\nExecutive Officers \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nRandall Bongarten \nTelevision Division President \n\nRichard F. Cummings \nRadio Division President \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nPaul W. Fiddick \nInternational Division President \n\nMichael Levitan \nSenior Vice President, \nHuman Resources \n\nGary Thoe \nPublishing Division President \n\nBoard of Directors \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nSusan B. Bayh \nFormer Commissioner of the International Joint \nCommission of the United States and Canada \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nRichard A. Leventhal \nPresident and Majority Owner, \nLMCS, LLC \n\nPeter A. Lund \nMedia consultant and former \nPresident of CBS Inc. \n\nGreg A. Nathanson \nMedia consultant and former \nPresident of Fox Television Stations and \nEmmis Television \n\nFrank V. Sica \nSenior Advisor \nSoros Fund Management LLC", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Dear Shareholders, \n\ntion, we gained revenue share at 11 of our 13 measured \nstations and held the line on expenses, giving us a 1.2 \npercent increase in fiscal-year cash flow. \n\nOn our year-end conference call, I said that last year was the \nbest in Emmis Communications’ history. And while that might \nhave sounded like the usual Wall Street hyperbole – like any \nother CEO bragging about his company’s performance – the \ndifference is, I believed it. And I still do. \n\nOur publishing and international divisions also posted strong \nresults. In a tough publishing market, our magazines boosted \ntheir division’s revenues by 4.6 percent over last year and \nincreased cash flow by 3.3 percent. Our international division \nturned in a revenue increase of 27 percent and a cash flow \nincrease of 31 percent. \n\nBut I’ve been in this business long enough to know two \nthings for sure: What I believe is not as important as what I \ncan prove, and what we did last year is only meaningful if it \nreflects on how we will do in the coming year. The good \nnews is, Emmis does have the results to back up my high \npraise, and what we did to perform last year does directly \nrelate to how we’ll perform in the year ahead. \n\nIn addition to boosting performance in our divisions, we \nhoned our corporate operations by continuing to build one \nof the most adept and hardest-working corporate groups in \nAmerican media. With this team in place, we’ve brought \nour leverage and cost of capital down to more manageable \nlevels, found ways to combat the continually increasing \ncosts of health insurance and, in a truly top-notch effort, \nsmoothly integrated our new Austin radio properties – in just \nunder a year as a part of Emmis, the Austin properties are \nenjoying significant ratings and revenue increases. **The best year**\nThe bottom line is this: Emmis Communications turned in a \nremarkable performance last year. Again and again, and by a \nnumber of measures, we outperformed our peers, our mar- \nkets and our own solid track record. \n\nAnd we did this in a year that was challenging in just about \nevery way. The economy was unstable, public companies \ncame under continuing scrutiny, indecency issues hounded \nbroadcasters, competition for tight ad dollars increased and \ntechnology continued to reshape the media world. Of course, for you, the real bottom line on our performance is \nits impact on your investment. I’m proud to say that we saw \na 27 percent increase in our share price over the course of \nthe last fiscal year – we ended fiscal ’03 at 19.79, and closed \nthe book on fiscal ’04 at 25.17. \n\n**How we did it**\nOperationally, we were on top of our game last year. However, \nas I said, I know that the past year’s performance really only \nmatters if it reflects on what we’ll do in the coming year. The \ngood news is, it does. We performed at these high levels not \nby doing something unusual, but by operating the way Emmis \nhas always operated, and the way we always will. \n\nBut our people refused to be slowed by those challenges. \nInstead, they worked through them. They innovated, hustled \nand focused. And they produced. \n\nOur radio division’s revenue growth led our markets and the \nindustry – in our fiscal year, our group was up 4.5 percent \nwhile our markets were up 2.7 percent and the industry only \n1 percent. Based on this kind of performance, we have con- \nsistently ranked among the nation’s leaders in per-station \nrevenue, and we continue to produce top-rated programming \nin markets across the nation.", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Outperform \n\nEmmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
Consumptionemmis entitiesRULC countKFTK - FM ( 97.1 ), TalkKIHT - FM ( 96.3 ), Cassic HillsOriando, Fia., WKCF - TV ( Channel 18 ), WB programmingPortiand, Ore., KOIN - TV ( Channel 6 ).
PrimaryKDHT - FM ( 93.3 ), Rhythmic CHRKEVi - FM ( 10.5 ), OlderKGSR - FM ( 107.1 ), Adult AlternaHSPNT - FIM ( 105.7 ), Alternative RockASHE - FM ( 94.7 ), Album Oriented RockWRDA - FM ( 156.1 ), Neurodiation ( 55.54.1 ), Neurodiation ( 55.54.1 ), Neurotic Loss ( 57 %), Neuronide ( 156.155.154.155.155.166.159.169.199.199.199.199.19CBS programming / local newsTers Hauts, Ind., WTH - TV ( Channel 10, CBS programming / local newsTopeka, Kan, KSNT TV ( Channel 27 ), WBP, sensensitivities
KUBJ - AM ( 590 ), News / TalkKLBJ - FM ( 93.7 ), Album Oriented RockHealthcare, consumption, consumption, consumptionTucson, Ariz, KGUN - TV ( Channel 9 ), ABC programming / local newsCharacteristics ( n = 3 ), pharmacistics ( n = 3 ), abernatium ( n = 3 )
", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "First of all, we focus on assembling and maintaining the best \nteams in our markets. We have traditionally had the top \nsalespeople, creative and technical professionals, news \nstaffs, managers and support staff in every city where we \noperate. Their peers turn to them for industry leadership, \nhonor them with awards and copy them at every opportunity. \nWe invest in these people, giving them industry-leading ben- \nefits packages, great opportunities and the tools they need to \nsucceed. This has always been a hallmark of Emmis, and it \nwon’t change. \n\nOur TV performance was even more impressive. The Emmis \ntelevision group’s revenues were up 0.5 percent in calendar \n2003, a year when our markets saw a 2.3 percent decrease \nin revenues, and the industry experienced a 4.7 percent \nrevenue decline. This industry-leading result made us one of \nthe few groups in the nation to post positive growth. In addi-", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Outperform. \n\nemmis communications 2004 abbreviated financial highlights \n*in thousands except where noted*\n\n’00 \n325,265 \n125,477 \n38.6% \n2.5x ’01 \n473,345 \n174,213 \n36.8% \n6.8x ’02 \n539,822 \n185,665 \n34.4% \n9.3x ’03 \n562,363 \n213,112 \n37.9% \n6.5x ’04 \n591,868 \n220,445 \n37.2% \n6.7x *year ended Feb. 28 (29)*\nnet revenues \nstation operating income*\nstation op income margin \nleverage \n\n**excluding noncash compensation*", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
cationsForty years ago, Americans began taking down their TV anternas and severing broadcasters ’ direct link to television
Patientsaudiences. Since then, the cable companies — the middlemen
n 2003,who replaced us — have created more than $ 300 billion of
conivalue for themselves. However, changes in technology have
Jarlygiven broadcasters the ability to provide the American publ
athering ketswith the most popular TV channels, without the middlemen and at a more reasonable price.
Sus2017
We are developing an innovative model that will leverage that technology to get broadcast companies back into that that technology to get broadcast companies back into that ths. We
game. I believe it has the potential to revolutionize thefined
television industry. I also believe it will add substantial valueand
to your investment.Construction
itiousWe unveiled this concept at the National Association of
marterBroadcasters meeting in April. I am proud to say that 11 other television companies joined us at that meeting to
express their support for what we ’ re calling the Broadcasters ’nost
Initiative, and more are signing on each week. Once again,About 3000
Emmis has leveraged innovation to take a leading role in ourindustries.
stationsa
We ’ II continue to use innovation to push us forward.opportu -
Meanwhile, we ’ II also build and maintain the best teams, pro -duce the best media content, outhustle and outsell our com -
petitors, seize the best opportunities and operate this company better than any other.In other words, you can count on Emmis to continue to do
Parameterswhat it has always done : Outperform.
ecauseAged
Thank you for your belief and investment in Emmis.
", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "MEDIA \n\nDIVERSIFIED CANADIAN MEDIA COMPANY \nWe have a broad portfolio of media properties, which most \nsignificantly includes: \n(cid:129) category-leading television and radio broadcasting properties \n(cid:129) multi-platform shopping \n(cid:129) publishing including Next Issue Canada \n(cid:129) digital media \n(cid:129) sports media and entertainment \n(cid:129) exclusive 12-year licensing agreement with the NHL to \n\n**2013 MEDIA REVENUE MIX**\n(%) \n\nbroadcast all national live hockey games within Canada in \nmultiple languages on all platforms beginning with the 2014- \n2015 season. \n\nA NETWORK OF MEDIA ASSETS THAT REACHES CANADIANS COAST-TO-COAST \n\n\n \n \n \n \n [html]\n
RadioWe operate more than 50 AM and RM radio stations in markets across Canada, including popular radio brands such as 98.1 CHR, 683 News, Sportonet 590, The FAN, KISS IS : IS : IS : IS : IS : IS : IS : IVM and SDNC.
TelevisionWe spectrate and conventral and specialty televisor networks ;• “ Only eveness, which type with affluorian, has detribution to own tifts of Canulan households • “ Mille mobile mutual televior oricals focused, but behavioral, focused, b
Publishing• We joblish many work - linkinser consent - managates such as inhibitions (. Chorlanary, thick Cound Canada - disorder - binks are a leading aspiring, medical, ‘ manical and trade publications ’• We also fear all traumability ’ s medical, ‘
Digital MediaOur online and mobile digital media platforms include digital advertising across websites and mobile platforms, digital content subcriptions, and commera solutions.
Sports EntertainmentWe oven the Toronto Blue ( ay ), Carada ' s only Major Liague Baseball team, and the Rogens Centre event venue, which hots the Toronto Blue Jays ' home games and other professional kague games, concerts, trade shows and special events.
\n\nTelevision and specialty services compete for viewers and advertisers \nwith: \n(cid:129) other Canadian television stations that broadcast \n\nCOMPETITION \nOur radio stations compete mainly with individual stations in local \nmarkets, but they also compete: \n(cid:129) nationally with other large radio operators, including satellite radio \noperator Sirius/XM, the CBC, Bell Media and Corus Entertainment \n(cid:129) with other media, including newspapers, magazines, television and \nlocal \nmarkets, \nincluding those owned and operated by the CBC, Bell \nMedia and Shaw Media, some of which have greater national \ncoverage \n\nin their \n\noutdoor advertising \n\n(cid:129) other specialty channels \n(cid:129) other distant Canadian signals and US border stations given the time- \n\n(cid:129) with new technologies such as online web information services, \nmusic downloading, portable media players and online music \nstreaming services. \nshifting capacity available to digital subscribers \n(cid:129) other media, including newspapers, magazines, radio and outdoor \n\nThe Shopping Channel competes with: \n(cid:129) retail stores, catalogue, Internet and direct mail retailers \n(cid:129) infomercials that sell products on television \n(cid:129) other television channels, for channel placement, viewer attention \n\nadvertising \n(cid:129) content available on the Internet. \n\nCompetition in Sports Entertainment includes: \n(cid:129) other Toronto professional teams, for attendance at Blue Jays games \n(cid:129) other Major League Baseball teams, for Blue Jays players and fans \n(cid:129) other local sporting and special event venues. \n\nand loyalty.", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed1.pdf", - "query": "What are the two components considered in the expected free energy?", - "target_page": 4, - "target_passage": "The former (utilitarian) objective is to realize one’s preferences, such as being satiated or safe, by minimizing the discrepancy between preferred sensa- tions (encoded as “priors over observations” in active inference) and current sensations in different modalities (e.g. interoceptive or exteroceptive). The latter (epistemic) objective is to reduce uncertainty about one’s estimated state", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "ρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne \n\nThis procedure also provides an accurate description of \nthe structure over the whole range of concentrations. A \ndevelopment similar to the one that leads to Eq. (2) de- \nrives the average unpaired RDF from the corresponding \npaired quantities: \n\nβf ex \n\nf ex \nv − \ne \n\nv = β ρ3 ln K0, (4) \n\ne \n\nwhich is due to the change in standard chemical potential \nbetween the two component and three component mod- \nels. It should be noted that the fraction of pairs is now an \nadditional parameter in the minimization scheme, which \nserves to ensure chemical equilibrium. Within this rep- \nresentation, the pair can be modeled as a hard sphere \n(MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since \n\nρiρjgij(k) = \n+ (5) \n\n+ \n\ne e e", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" - }, - { - "text": "In the expression of annihilation cross section, we used the following notations : \n\n∂Φ \n∂h \n∂Φ \n∂H \n∂Ψ \n∂h \n∂Ψ \n∂H \n1 \n√2 \n1 \n√2 \n1 \n√2 \n− \n1 \n√2 \n\n= \n\n= \n\n= \n\n= \n\n2 \n\ns \n4 − 3 \n8 \n1 \n2 (cid:16) \n\n4m2 \nm2 \nf \ncos2 θ (s s \nN ) \n(cid:18) (cid:19) − − \n(cid:17) \n2 \ni \n\n∂Ψ \n∂h ∂Φ \n∂H \n\n∂Ψ \n∂H (cid:19)(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\n+ \nM 2 s \nH + iMH ΓH \n− \n\n2 = \n|M| \n\ng2 \nB \n− \nM 2 \nZ ′ + iMZ ′ΓZ ′ (cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \nM 2 \nh + iMhΓh \n\nLqf qN \n32 \n\n(cid:12) \n(cid:12) \n− \n(cid:12) \n(cid:12) \n+16λ2 \n\ns \n\n∂Φ \n∂h \ns \n4 − \nyf (cid:18) \nN (cid:12) \n(cid:12) \n(cid:12) \n4m2 \nN ) \n(cid:12) \n\ns \n\n− \nm2 \nf \n(s . \n− \n(cid:16) (cid:17) \n\n2 = \n|M| \n\ng2 \nB \n− \nM 2 \nZ ′ + iMZ ′ΓZ ′ (cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\nLqf qN \n32 \n\n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\ns \n−", - "page_start": 9, - "page_end": 9, - "source_file": "1002.2525.pdf" - }, - { - "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "AFTERBURNER COMPONENTS \n\nAFTt$lRNRNER \n\n\n\n\nHOLDERS \n\n\n\nWATER INJECTION \n\nWATER INJECTION \nNOZZLES \n\n\n\n\n\n\n\nCHAMBER \n\n\n\nTURBINE-PROPELLER COMBINATION \n\nREDUCTION \n\nTURBINES \n\n\n\n\nNOZZLE \n\n\nFigure 2.14. Thrust Augmentation and the Gas Turbine-Propeller Combination", - "page_start": 147, - "page_end": 147, - "source_file": "00-80T-80.pdf" - }, - { - "text": "-0.5 \n) \n1 \n- \nPair Fraction \nL \n\n. \nl \no \nm \n-1 \n( \n0.2 \nx \ne \nv \nf \nβ \n0.1 \n\n-1.5 \n0 1 0.5 \n\n3 \n\n2 \n\n1 \n\n0 \n\n(b) \n3 \n\n2 \n\n1 \n\n0 \n\n4 8 6 10 \nr (Å) \n\nFIG. 3: Effective pair potentials derived for MSA3 and \nBIMSA3. (a) Cation anion (dashed line: without taking the \npair into account), (b) pair cation, (c) pair anion, and (d) pair \npair. The internal potential of the pair β eVint(r) is set equal \nto βV eff ij (r) for distances less than 4 ˚A. \n\n0 0.5 \n1/2 \nc \n\n(Color online) Excess free-energy density βf ex \nv \n\nFIG. 4: \nas \na function of the square root of the concentration √c. (dia- \nmond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, \n(solid) BIMSA3, (dot) DHLL, and (cross) experiments. The \ninset gives the fraction of pairs (MSA3, BIMSA3) as a func- \ntion of √c. \n\ntrapolating the original potential at the barrier separat- \ning pairs from free ions (as shown in Fig. 3). We assume \nthat the interaction potential is averaged over the rota- \ntional degrees of freedom of the CIP and thus pairwise \nadditive. Hereafter, the quantities referring to such a \nthree-component model are written with a tilda symbol. \nThe short-range potentials involving the pair can be de- \nrived, in the infinite dilution limit, from an average of \nthe contributing ion interactions. In Fourier space, \n\n3i (k) = \nV SR \n33 (k) = \nV SR \ne \ne \nwhere \n\n(k), \nw(k/2) \n1i + V SR \nV SR \n2i \n(cid:3) \n(cid:2) \nw(k/2)2 \n22 + 2V SR \n11 + V SR \nV SR \ne \n12 \n(cid:2) \ni = 1, 2 \n(k) \n\n(2a) \n\n(2b) \n(cid:3) \ne \nw(r) is the pair probability distribution \n\n\n \n \n \n \n [html]\n
TablePatientsTable1.
Parameters.FigureP
PatientsPatientsTableTable
Table=TableTable
\n\nwe have no additional information, we consider only sym- \nmetric dumbbells. Furthermore, since analytic expres- \nsions for the RDF within BIMSA are not known, we ap- \nproximate the dumbbell as a hard sphere when comput- \ning the perturbation term (this is not necessary for the \nreference term, since an expression for the free energy \nis available). Let \nσc be the diameter of the cation (an- \nion) within the dumbbell, the diameter of the hard sphere \ne \nσc[21]. \nrepresenting this dumbbell is taken to be \nthree- \ne \ncomponent MSA3 and BIMSA3, we obtain results in \nmuch better agreement with the MC simulations, as \nshown in Fig. 4. The diameters obtained for species 1, \n2, and 3 are 3.65, 4.79, and 5.76 ˚A for MSA3 and 3.69, \n4.75 and 6.19 ˚A for BIMSA3. The free ion diameters are \nsimilar for MSA2, MSA3, and BIMSA3. The pair diam- \neter is smaller when modeled as a hard sphere (MSA3) \nthan when modeled as a dumbbell (BIMSA3). At high \n1), the MSA3 overestimates \nconcentration (about 1 mol l− \nthe free energy, because the excluded volume repulsion \nbecomes too important for the pairs to be represented as \nhard spheres. The BIMSA3 model is the closest to the \nMC simulation results. It is worth noting that even at \nthe lowest concentration considered, the fraction of pairs \n(shown in the insert of Fig. 4), although less then 5%, \nhas a non-negligible effect on the thermodynamics of the \nsystem. \n\nσ3 = 4√2 \nπ \nthe Using these two reference \nsystems, \ne \n\nw(k) (1 − δij ) + \nρ3 \nw(k/2) \ng3j \nρj \ng3i + \nρi \nρ3 \ne \ne \ne \ne \n(cid:2) \nw(k/2)]2 \ng33(k) \nρ 2 \n3 [ \ne \ne \ne \ne \ne \ngij(k) \n(k) \ne \n(cid:3) \n\nρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" - }, - { - "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "quantities as its target: the variational free energy (VFE) in the case of perception and the \nexpected free energy (EFE) in the case of action. The VFE is the free energy associated with \na given sensory observation and is resolved perceptually by updating beliefs about the \nenvironment. The EFE is the free energy that is expected in the future, contingent on a \ngiven policy or course of action. Choosing action policies associated with a low EFE lead \nto reducing uncertainty about the environment, as well as making preferred observations \nmore likely. \n\n2.1. POMDPs in Active Inference \n\nIn AIF, the POMDP is one of the most common families of generative models used \nto make inferences about the environment. It is a Markovian discrete state-space model, \nwhere employing it means representing the environment and observations as inhabiting \none among a set of possible (possibly multidimensional) states, and that the changes \nin these states can only depend on the system’s previous state and the agent’s actions. \nEnvironmental states are not directly observable, so they have to be inferred based on \nincoming sensory observations. In AIF for POMDPs and other generative models in general, \nboth perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3), as well \nas the learning of parameters of the generative model (see Section 2.4). Crucially, an agent’s \ngenerative model does not a priori have to be isomorphic to the true environment (i.e., \nthe data-generating process), although this will generally lead to a successful inference, \nand that the generative model will therefore often come to resemble the environment \nthrough learning. \n\nA discrete state-space POMDP in AIF is conventionally defined by five main sets of \nparameters:**A**,**B**,**C**,**D**and**E**[1,33], see Figure 1. Together, these parametrise the agent’s \nprior beliefs about the prior probability of different states in the environment, how states \nof the environment change and how they generate observations. Typically, they will be \nvectors, matrices or tensors; however, henceforth we denote them by their corresponding \nletter in bold. These make up the components needed for the agent to perform AIF.", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "canonical ensemble. The free energy functional is first defined on the original KMC lattice. How- \n\never, after re-writing the interaction terms employing gradient operators [78] one finally obtains \n\nthe free energy functional for a continuous system \n\n(cid:90) \n(cid:104) \ndr \n(cid:105) \n\nεll \n2 εnn \n2 \n(∇ρl)2 + (∇ρn)2 + εnl(∇ρn) · (∇ρl) − µρl F [ρl, ρn] = f (ρl, ρn) + \n, (4) \n\nwhere \n\nf (ρl, ρn) = kT [ρl ln ρl + (1 − ρl) ln(1 − ρl)] \n\n+ kT [ρn ln ρn + (1 − ρn) ln(1 − ρn)] \n\n− 2εllρ2 \nl − 2εnnρ2 n − 4εnlρnρl. \n(5) \n\nSince the liquid may evaporate from the surface into the vapour above the surface, µ is the (true) \n\nchemical potential of this reservoir and determines the rate of evaporation [condensation] from \n\n[to] the surface. Note that normally a free energy of the form in Eq. (4) is obtained by making a \n\ngradient expansion of the free energy functional of a continuous system [84]. However, here we \n\nhave made the mapping from the free energy of the lattice KMC system. \n\nThe chemical potential for the nanoparticles may be determined from the functional derivative \n\nµn = δF [ρn, ρl]/δρn(r). In equilibrium it is constant throughout the system, but it may vary \n\nspatially in a non-equilibrium system, i.e., µn = µn(r, t). We assume that the dynamics of the \n\nnanoparticles is governed by the thermodynamic force ∇µn – i.e. that the nanoparticle current \n\nis j = −Mnρn∇µn, where Mn(ρl) is a mobility coefficient that depends on the local density of \n\nthe liquid. Combining this expression for the current with the continuity equation, we obtain the \n\nfollowing evolution equation for the nanoparticle density profile \n\n(cid:20) \nMnρn∇ \n\n(cid:21) \n\n∂ρn \n∂t \nδF [ρn, ρl] \nδρn \n= ∇ · . (6) \n\nNote that this equation of motion may also be obtained by assuming that the nanoparticles have \n\nover-damped stochastic equations of motion [80–83]. Here, we assume that Mn(ρl) = αΘs(ρl − \n\n0.5), where Θs(x) is a continuous function that switches smoothly from the value 0 to the value \n\n1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that \n\nthe nanoparticles are immobile when the local liquid density is small (dry substrate) and have a \n\n\n \n \n \n \n [html]\n
ComparisonFor the evolution of the liquid density distribution we assume that the liquid is able to evaporatefrom the surface into the vapour ( reservoir ) above the surface ( non - conserved dynamics ) and may
\n\n15", - "page_start": 14, - "page_end": 14, - "source_file": "1001.2669.pdf" - }, - { - "text": "FUNCTION OF THE COMPONENTS. \nEach of the engine components previously de- \nscribed will contribute some function affecting \nthe efficiency and output of the turbojet engine. \nthese components \nFor \nshould be analyzed to determine the requite- \nments for satisfactory operating characteristics. \nThe i&t or &@er must be matched to the \npowerplant to provide the compressor entry \nwith \nthe \nthe required airflow. Generally, \ncompressor inlet must receive the required air- \nflow at subsonic velocity with uniform dis- \ntribution of velocity and direction at \nthe \ncompressor face. The diffuser must capture \nhigh energy air and deliver it at low Mach \nto the compressor. When \nnumber uniformly \nthe inlet is along the sides of the fuselage, the \nedges of the inlet must be located such that \nthe inlet receives only high energy air and \nprovision must be made to dispose of the", - "page_start": 126, - "page_end": 126, - "source_file": "00-80T-80.pdf" - }, - { - "text": "generative models, or even (deep learning-based) amortised inference models. These vari- \nous extensions could provide valuable tools for using AIF models in both theoretical and \napplied research. \n\n**Author Contributions:**Conceptualisation, S.W.N., J.E.L. and P.T.W.; methodology, S.W.N., J.E.L. and \nP.T.W.; software, S.W.N., J.E.L. and P.T.W.; formal analysis, S.W.N. and J.E.L.; writing—original draft \npreparation, S.W.N. and J.E.L.; writing—review and editing, C.H., K.F., C.M. and P.T.W.; visualisation, \nS.W.N. and J.E.L.; supervision, C.M. and P.T.W.; project administration, P.T.W. All authors read and \nagreed to the published version of this manuscript. \n\n**Funding:**C.M. acknowledges funding from Aarhus Universitets Forskningsfonds (grant no. AUFF- \nE-2019-7-10) and from the Carlsberg Foundation (grant no. CF21-0439). \n\n**Institutional Review Board Statement:**Not applicable. \n\n**Informed Consent Statement:**Not applicable. \n\n**Data Availability Statement:**The original data presented in this study are openly available in \nActiveInferenceJuliaPaper at URL: https://osf.io/j3k5q/. \n\n**Conflicts of Interest:**The authors declare no conflicts of interest. The funders had no role in the design \nof this study; in the collection, analyses or interpretation of data; in the writing of this manuscript; or \nin the decision to publish the results. \n\n**Abbreviations**\n\nThe following abbreviations are used in this manuscript: \n\n\n \n \n \n \n [html]\n
AIFActive inference
FEPFree energy principle
VFEVariational free energy
EFEExpected free energy
MCMCMarkov Chain Monte Carlo
POMDPPartially Observed Markov Decision Proces
\n\nParr, T.; Pezzulo, G.; Friston, K.J. Active Inference: The Free Energy Principle in Mind, Brain, and Behavior; The MIT Press: Cambridge, \nMA, USA, 2022. [CrossRef] \nFriston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; O’Doherty, J.; Pezzulo, G. Active inference and learning. Neurosci. \nBiobehav. Rev.**2016**, 68, 862–879. [CrossRef] \nFriston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; Pezzulo, G. Active inference: A process theory. Neural Comput.**2017**, \n29, 1–49. [CrossRef] \nFriston, K.J.; Stephan, K.E. Free-energy and the brain. Synthese**2007**, 159, 417–458. [CrossRef] [PubMed] \nFriston, K. The free-energy principle: A unified brain theory? Nat. Rev. Neurosci.**2010**, 11, 127–138. [CrossRef] [PubMed] \nFriston, K. The free-energy principle: A rough guide to the brain? Trends Cogn. Sci.**2009**, 13, 293–301. [CrossRef] [PubMed] \nFriston, K. A free energy principle for a particular physics. arXiv**2019**, arXiv:1906.10184. [CrossRef] \nFriston, K.; Da Costa, L.; Sajid, N.; Heins, C.; Ueltzhöffer, K.; Pavliotis, G.A.; Parr, T. The free energy principle made simpler but \nnot too simple. Phys. Rep.**2023**, 1024, 1–29. [CrossRef] \nFriston, K.; Kiebel, S. Predictive coding under the free-energy principle. Philos. Trans. R. Soc. B Biol. Sci.**2009**, 364, 1211–1221. \n[CrossRef] [PubMed] \n\n**References**\n\n1. \n\n2. \n\n3. \n\n4. \n5. \n6. \n7. \n8. \n\n9. \n\n10. Karl, F. A Free Energy Principle for Biological Systems. Entropy**2012**, 14, 2100–2121. [CrossRef] \n11. Corcoran, A.W.; Pezzulo, G.; Hohwy, J. From allostatic agents to counterfactual cognisers: Active inference, biological regulation, \n\nand the origins of cognition. Biol. Philos.**2020**, 35, 32. [CrossRef] \n\n12. Heins, C.; Millidge, B.; Da Costa, L.; Mann, R.P.; Friston, K.J.; Couzin, I.D. Collective behavior from surprise minimization. Proc.", - "page_start": 29, - "page_end": 29, - "source_file": "pubmed7_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed1.pdf", - "query": "How could the heart rate be estimated by means of an active inference paradigm?", - "target_page": 6, - "target_passage": "The second panel of Fig. 2 shows the Shannon surprise of an inference model that estimates the current heart rate using the two standard components of a generative model. The for- mer component is the prior, which encodes the person’s a priori probabilistic belief (i.e. probability distribution) about her “nor- mal” heart rate range; here, the prior is a Gaussian centered on 67 and has a precision of 0.11. The latter component is the likeli- hood, which encodes the probabilistic mapping between sensory (heartbeat) observations and the hidden state (heart rate); here, the likelihood is a Gaussian centered on the current heart rate with an additional bias of 15 pulses, and the panel shows the results for 10 values for precision obtained by subdividing the range [0.1,10] into equal intervals.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "inference that tracks the noise rather than the correct state of \nthe estimated variable system (i.e. overfitting), whereas assigning \nexcessively low weight to sensations (or excessively high weight to \nprior knowledge) makes the system poorly responsive to incom- \ning observations that might signal a change in the state of the \nsystem—and both are examples of aberrant inference (Friston \net al. 2014). \n\nFigure 2 provides a formal illustration of the above by plot- \nting some examples of Bayesian inference using generative models \nunder various levels of precision of the model components. For \nsimplicity, we focus on a simplified example of inference of an \ninteroceptive variable: one’s heart rate. Heart rate is a “hidden \nvariable” in Bayesian parlance since it is not directly observable \nbut needs to be inferred through two sources of information: \nprior knowledge about the most likely heart rate and sensory \n(heartbeat) observations. The top panel of Fig. 2 shows a series \nof (noisy) heartbeat observations. In the beginning, they are \nin the normal range for an adult (time steps 1–10), then they \nincrease significantly, simulating tachycardia (time steps 11–20), \nthen they go back to the normal range (time steps 21–30), then \nthey decrease significantly, simulating bradycardia (time steps \n31–40), and finally, they go back to the normal range (time steps \n41–50). \n\nparticipants processed faces expressing fear (but not neutral \nfaces or faces expressing other emotions) when their heart rate \nwas high—hence congruent with the fearful expression (Pez- \nzulo et al. 2018, Yu et al. 2021). The generative model shown \nin Fig. 1 could support this kind of inference by using interocep- \ntive information from the heart (i.e. high heart rate) as evidence \nthat “there might be something fearful out there” (Pezzulo 2013). \nAnother more complex example regards emotional awareness \nand self-awareness—which significantly engage the brain regions \ninvolved in interoception and the representation of physiologi- \ncal processes (Garfinkel et al. 2013). The generative model shown \nin Fig. 1 might support processes of emotional awareness in a \nway that is neither purely bottom-up (i.e. as if interoceptive sig- \nnals cause emotional awareness) nor top-down (i.e. as if emotional \nawareness causes interoceptive signals), but rather through a \ncircular causality between central predictions about bodily state— \nthat engage autonomic reflexes—and interoceptive streams—that \nupdate the predictions (Seth and Friston 2016). In this perspec- \ntive, any representation that induces interoceptive predictions \ncould be associated with emotional or affective content; cru- \ncially, this is also the case with some aspects of self-awareness \n(e.g. recognizing one’s own face) that require integrating intero- \nceptive streams with concurrent exteroceptive (e.g. visual) and \nproprioceptive cues. These examples illustrate that the genera- \ntive model of Fig. 1 natively implements both the multisensory \nintegration required to unite (for example) interoceptive and exte- \nroceptive streams and the active aspects that are supposed to \nsupport emotional and self-processing—and the construction of \nan “embodied self” (i.e. the circular causality between engag- \ning autonomic reflexes and capturing the ensuing interoceptive \nsignals).", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "Figure 2. A simplified example of (Bayesian) inference of one’s heart rate. First panel: simulated time series of heartbeat observations. Second panel: \nShannon surprise of a generative model composed of a fixed prior about heart rate (a Gaussian with a mean of 67 and a precision of 0.11) and a \nlikelihood (a Gaussian centered on the current heart rate with an additional bias of 15 pulses, with various precisions that vary between 0.47 and 10, \nsee the legend). Third panel: Bayesian surprise, which measures the discrepancy between posterior and prior probabilities over time. Bottom panels: \nthe two series of panels are organized in two (left and right) columns, which show the first five time steps of inference for the two cases with high \nprecision (of 10) and low precision (of 0.1) of the likelihood, respectively. See the main text for an explanation and online article for colored version of \nthis figure. \n\nthe current model generate significant surprise, and sometimes, \nthe surprise can remain relatively high for long periods before the \nmodel adapts (or the world changes), especially with some param- \neterizations of the generative model. This is particularly relevant \nin this context since active inference agents strive to minimize \ntheir surprise (and the long-term average of surprise, entropy, \nwhich is a measure of uncertainty) by changing their model, or \nchanging the world, or both. Second, these examples illustrate the importance of precision \ncontrol and the appropriate setting of precision parameters in \nguiding inference. Remarkably, the inference can be more or less \naccurate or fast using the same data, depending on the precision \nparameters. Note that in Fig. 2, we manipulated only the precision \nof the likelihood. However, it would also be possible to manipulate \nthe precision of the prior, together or in alternative to the precision \nof the likelihood. Generally speaking, when the precision of the", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed1.pdf" - }, - { - "text": "Active inference, interoceptive processing, \nand uncertainty reduction \n\nActive inference is based on the idea that in order to engage in \nadaptive allostatic regulation and goal-directed behavior, living \norganisms continuously strive to minimize the surprise of their \nsensations or, more formally, an upper bound to surprise: varia- \ntional free energy (Parr et al. 2022). Notably, the (expected) free \nenergy minimization processes that drive active inference jointly \nconsider two complementary objectives. The former (utilitarian) \nobjective is to realize one’s preferences, such as being satiated \nor safe, by minimizing the discrepancy between preferred sensa- \ntions (encoded as “priors over observations” in active inference) \nand current sensations in different modalities (e.g. interoceptive \nor exteroceptive). The latter (epistemic) objective is to reduce", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "Article \n**Introducing ActiveInference.jl: A Julia Library for Simulation**\n**and Parameter Estimation with Active Inference Models**\n\n**Samuel William Nehrer 1,†**\n**Christoph Mathys 5**\n\n**, Jonathan Ehrenreich Laursen 1,†** **, Conor Heins 2,3,*** **, Karl Friston 3,4** **,**\n\n**and Peter Thestrup Waade 5**\n\n1 \n\nSchool of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; \n202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.) \n\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany \n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk \n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK \n5 \n\nInteracting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); \nptw@cas.au.dk (P.T.W.) \n\n** ***Correspondence: cheins@ab.mpg.de \n† \nThese authors contributed equally to this work. \n\n**Abstract:**We introduce a new software package for the Julia programming language, \nthe library ActiveInference.jl. To make active inference agents with Partially Ob- \nservable Markov Decision Process (POMDP) generative models available to the grow- \ning research community using Julia, we re-implemented the pymdp library for Python. \nActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive \nand behavioural modelling, as it is used in computational psychiatry, cognitive science \nand neuroscience. This means that POMDP active inference models can now be easily \nfit to empirically observed behaviour using sampling, as well as variational methods. In \nthis article, we show how ActiveInference.jl makes building POMDP active inference \nmodels straightforward, and how it enables researchers to use them for simulation, as well \nas fitting them to data or performing a model comparison. \n\n**Keywords:**active inference; free energy principle; predictive processing; Markov decision \nprocess; cognitive modelling; Julia \nAcademic Editor: Astero Provata \n\n**PACS:**87.15.Aa Received: 25 October 2024 \nRevised: 2 January 2025 \nAccepted: 7 January 2025 \n\n**MSC:**91-08 \n\n\n \n \n \n \n [html]\n
Citation : Nehrer, S. W.; EhrenreichTable
Laursen, J,; Heins, C.; Friston, K ;Mathys, C.; Thestrup Waade, P.
Introducing Active Inference. j1 : AJulia Library for Simulation and
Parameter Estimation with ActiveInference Models. Entropy 2025.27.62.
https :// doi. org / 10.3390 / e27010062Copyright : © 2025 by the authors.
Licensee MDPI, Basel, Switzerland.This article is an open access article
distributed under the terms andconditions of the Creative Commons
Attribution ( CC BY ) license( https :// creativecommons. org /
licenses / by / 4.0 /).
", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "The second panel of Fig. 2 shows the Shannon surprise of \nan inference model that estimates the current heart rate using \nthe two standard components of a generative model. The for- \nmer component is the prior, which encodes the person’s a priori \nprobabilistic belief (i.e. probability distribution) about her “nor- \nmal” heart rate range; here, the prior is a Gaussian centered on \n67 and has a precision of 0.11. The latter component is the likeli- \nhood, which encodes the probabilistic mapping between sensory \n(heartbeat) observations and the hidden state (heart rate); here, \nthe likelihood is a Gaussian centered on the current heart rate \nwith an additional bias of 15 pulses, and the panel shows the \nresults for 10 values for precision obtained by subdividing the \nrange [0.1,10] into equal intervals. The results shown in the second \npanel of Fig. 2 show that Shannon surprise increases dramatically \nduring episodes of tachycardia and bradycardia, which are far \nfrom the normal range. The pattern of results is the same across \nall levels of likelihood precision. However, the inference with a \nvery high precision (a precision of 10) tracks more closely the noise \nsensory signals and can therefore lead to more extreme results. \n\nIn general, the accuracy of the inference of hidden bodily \nstates, the “embodied self,” or other aspects of the model depends \non the signal-to-noise ratio of the sensations and on the quality of \nthe model. For example, it is difficult to self-localize in a city if it \nis dark (low signal-to-noise ratio) or if one does not know the city \nwell (poor model). The inference of hidden bodily and emotional \nstates might function in an analogous manner. If the quality of \nthe afferent interoceptive (e.g. cardiac) signals is low, or if one has \na poor model of how one’s body functions, then it would estimate \none’s bodily states such as fatigue incorrectly (which in turn would \nalso impair its adaptive regulation of the same bodily states). Inte- \nroceptive signals could be “too noisy” for various reasons, which \nmight be related to physiology, inflammation, or stress. The body \nmodel can be poor in various ways, too. For example, it could \npoorly characterize the statistical relations between interoceptive \nsensations and hidden bodily states (e.g. systematically mischar- \nacterize high heart rate as caused by hunger but not fatigue \nor joy). \n\nThe third panel shows the Bayesian surprise (or the Kullback- \nLeibler divergence between posterior and prior probability distri- \nbutions) over time. This is a measure of how much dissimilar the \nposterior and the prior are, and it always decreases as a result of \ninference, but note that it decreases much more rapidly when the \nprecision of the likelihood is 10, which is another indication that \nthe posterior is “overfitting,” meaning that the inference result is \nexcessively biased by the likelihood distribution. \n\nFinally, the two bottom series of panels are organized in two \n(left and right) columns, which show the first five time steps of \ninference for the two cases with high precision (of 10) and low pre- \ncision (of 0.1) of the likelihood, respectively. In these plots, the prior \ndistributions are in blue, the posterior distributions are in green, \nand the likelihoods are in red. It is possible to note that in the left \n(high precision) panels, the posterior inference closely follows the \nlikelihood (it “overfits”) after five time steps and the inferred heart \nrate is slightly biased (i.e. it is 79). Differently, in the right (low \nprecision) panels, the inference converges much slower to a high \nprecision posterior, but without overfitting.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "**Core Concepts**\n\n\n \n \n \n \n [html]\n
AIFActive inference is a formal framework for modelling behaviour and cognition. Perception and action are cast as minimising free energy — the V / E and EFE, respectively — given a generative model of the environment.
VFEThe watational free energy. 7 quantities how well a generative model explains incoming sensery observation. It can be revertites as the regative lag model evidence ( culted surprise ) opper - bounded by the divergence from the optimal pom
FW ( s ),+)EFE
The expoted from energy. C quantifies the expected future free menty under an action policy ±. It consists of an information gain term and a prognativ value term that provide a natural balance between explinatory and goal - seeking behavioGS = − Rq ( 0.8 ) n1 [ ln4 ( 5 ) i, τ ) − ln4 ( s ) m ] − Rq ( 0 ( r )] h p ( d ( c )]
Information gainPragmatic value
Generative modelThe generative model is an agent ’ s formal assumptions about the structure and dynamics of its environment, hased on which perceptual and active inferences are carried out. Many types of generative models exist that are suitable for dife
\n\n**2. Active Inference with POMDPs**\n\nIn this section, we briefly describe the core concepts of AIF and POMDPs. This \nshould familiarise the reader with the vernacular used in the later sections regarding \nthe functionalities of the package. While various extensions, such as structure learning, \nwhich enables an agent to learn the structure or shape of its environment through model \ncomparison [44–47], or hierarchical and temporally deep POMDPs [48,49], are relevant for \nfuture work, describing these in detail is beyond the scope of this foundational paper. \n\nAt the core of AIF lies the minimisation of a variational free energy upper bound on \nsurprise for perception, as well as action. This is motivated by the free energy principle [4–8], \nwhich states that self-organising systems can be described as minimising the variational \nfree energy of their sensory states. The minimisation of free energy generally takes two", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "generative models, or even (deep learning-based) amortised inference models. These vari- \nous extensions could provide valuable tools for using AIF models in both theoretical and \napplied research. \n\n**Author Contributions:**Conceptualisation, S.W.N., J.E.L. and P.T.W.; methodology, S.W.N., J.E.L. and \nP.T.W.; software, S.W.N., J.E.L. and P.T.W.; formal analysis, S.W.N. and J.E.L.; writing—original draft \npreparation, S.W.N. and J.E.L.; writing—review and editing, C.H., K.F., C.M. and P.T.W.; visualisation, \nS.W.N. and J.E.L.; supervision, C.M. and P.T.W.; project administration, P.T.W. All authors read and \nagreed to the published version of this manuscript. \n\n**Funding:**C.M. acknowledges funding from Aarhus Universitets Forskningsfonds (grant no. AUFF- \nE-2019-7-10) and from the Carlsberg Foundation (grant no. CF21-0439). \n\n**Institutional Review Board Statement:**Not applicable. \n\n**Informed Consent Statement:**Not applicable. \n\n**Data Availability Statement:**The original data presented in this study are openly available in \nActiveInferenceJuliaPaper at URL: https://osf.io/j3k5q/. \n\n**Conflicts of Interest:**The authors declare no conflicts of interest. The funders had no role in the design \nof this study; in the collection, analyses or interpretation of data; in the writing of this manuscript; or \nin the decision to publish the results. \n\n**Abbreviations**\n\nThe following abbreviations are used in this manuscript: \n\n\n \n \n \n \n [html]\n
AIFActive inference
FEPFree energy principle
VFEVariational free energy
EFEExpected free energy
MCMCMarkov Chain Monte Carlo
POMDPPartially Observed Markov Decision Proces
\n\nParr, T.; Pezzulo, G.; Friston, K.J. Active Inference: The Free Energy Principle in Mind, Brain, and Behavior; The MIT Press: Cambridge, \nMA, USA, 2022. [CrossRef] \nFriston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; O’Doherty, J.; Pezzulo, G. Active inference and learning. Neurosci. \nBiobehav. Rev.**2016**, 68, 862–879. [CrossRef] \nFriston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; Pezzulo, G. Active inference: A process theory. Neural Comput.**2017**, \n29, 1–49. [CrossRef] \nFriston, K.J.; Stephan, K.E. Free-energy and the brain. Synthese**2007**, 159, 417–458. [CrossRef] [PubMed] \nFriston, K. The free-energy principle: A unified brain theory? Nat. Rev. Neurosci.**2010**, 11, 127–138. [CrossRef] [PubMed] \nFriston, K. The free-energy principle: A rough guide to the brain? Trends Cogn. Sci.**2009**, 13, 293–301. [CrossRef] [PubMed] \nFriston, K. A free energy principle for a particular physics. arXiv**2019**, arXiv:1906.10184. [CrossRef] \nFriston, K.; Da Costa, L.; Sajid, N.; Heins, C.; Ueltzhöffer, K.; Pavliotis, G.A.; Parr, T. The free energy principle made simpler but \nnot too simple. Phys. Rep.**2023**, 1024, 1–29. [CrossRef] \nFriston, K.; Kiebel, S. Predictive coding under the free-energy principle. Philos. Trans. R. Soc. B Biol. Sci.**2009**, 364, 1211–1221. \n[CrossRef] [PubMed] \n\n**References**\n\n1. \n\n2. \n\n3. \n\n4. \n5. \n6. \n7. \n8. \n\n9. \n\n10. Karl, F. A Free Energy Principle for Biological Systems. Entropy**2012**, 14, 2100–2121. [CrossRef] \n11. Corcoran, A.W.; Pezzulo, G.; Hohwy, J. From allostatic agents to counterfactual cognisers: Active inference, biological regulation, \n\nand the origins of cognition. Biol. Philos.**2020**, 35, 32. [CrossRef] \n\n12. Heins, C.; Millidge, B.; Da Costa, L.; Mann, R.P.; Friston, K.J.; Couzin, I.D. Collective behavior from surprise minimization. Proc.", - "page_start": 29, - "page_end": 29, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": ": 1 – 29.Smith R, Parr T, Prisron XJ Simularizing emotions : an active inference model of emotional state inference and emotion concept learning. I ' writ hydril 2013 ; t0 : t844.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed1.pdf" - }, - { - "text": "Schwartenbeck, P.; Friston, K. Computational Phenotyping in Psychiatry: A Worked Example. eNeuro**2016**, 3, ENEURO.0049- \n16.2016. [CrossRef] \n\n14. \n\n15. Albarracin, M.; Demekas, D.; Ramstead, M.J.D.; Heins, C. Epistemic Communities under Active Inference. Entropy**2022**, 24, 476. \n\n[CrossRef] [PubMed] \n\n16. Lanillos, P.; Meo, C.; Pezzato, C.; Meera, A.A.; Baioumy, M.; Ohata, W.; Tschantz, A.; Millidge, B.; Wisse, M.; Buckley, C.L.; et al. \n\nActive Inference in Robotics and Artificial Agents: Survey and Challenges. arXiv**2021**, arXiv:2112.01871. [CrossRef] \nFriston, K.; Stephan, K.; Li, B.; Daunizeau, J. Generalised Filtering. Math. Probl. Eng.**2010**, 2010, 621670. [CrossRef] \n\n17. \n18. Waade, P.T.; Mikus, N.; Mathys, C. Inferring in Circles: Active Inference in Continuous State Space Using Hierarchical Gaussian \nFiltering of Sufficient Statistics. In Machine Learning and Principles and Practice of Knowledge Discovery in Databases; Kamp, M., \nKoprinska, I., Bibal, A.; Bouadi, T., Frénay, B., Galárraga, L., Oramas, J., Adilova, L., Krishnamurthy, Y., Kang, B., et al., Eds.; \nCommunications in Computer and Information Science; Springer: Cham, Switzerland, 2021; pp. 810–818. [CrossRef] \n\n19. Weber, L.A.; Waade, P.T.; Legrand, N.; Møller, A.H.; Stephan, K.E.; Mathys, C. The generalized Hierarchical Gaussian Filter. arXiv \n\n**2023**, arXiv:2305.10937. [CrossRef] \nFriston, K.J.; Trujillo-Barreto, N.; Daunizeau, J. DEM: A variational treatment of dynamic systems. NeuroImage**2008**, 41, 849–885. \n[CrossRef] \n\n20. \n\n21. MATLAB, Inc. MATLAB, version: 9.13.0 (R2022b); MATLAB, Inc.: Natick, MA, USA, 2022. \n22. Penny, W.D.; Friston, K.J.; Ashburner, J.T.; Kiebel, S.J.; Nichols, T.E. Statistical Parametric Mapping: The Analysis of Functional Brain \n\nImages; Elsevier: Amsterdam, The Netherlands, 2011; Google-Books-ID: G_qdEsDlkp0C. \n\n23. Heins, C.; Millidge, B.; Demekas, D.; Klein, B.; Friston, K.; Couzin, I.D.; Tschantz, A. pymdp: A Python library for active inference \n\nin discrete state spaces. J. Open Source Softw.**2022**, 7, 4098. [CrossRef] \n\n24. Rossum, G.v.; Drake, F.L. The Python Language Reference, Release 3.0.1 [repr.] ed.; Number Pt. 2 in Python Documentation Manual; \n\nvan Rossum, G., Drake, F.L., Eds.; Python Software Foundation: Hampton, NH, USA, 2010. \n\n25. Gregoretti, F.; Pezzulo, G.; Maisto, D. cpp-AIF: A multi-core C++ implementation of Active Inference for Partially Observable \n\nMarkov Decision Processes. Neurocomputing**2024**, 568, 127065. [CrossRef] \nJosuttis, N.M. The C++ Standard Library: A Tutorial and Reference; Addison-Wesley: Boston, MA, USA, 2012; Google-Books-ID: \n9DEJKhasp7gC. \n\n26. \n\n27. Bagaev, D.; Podusenko, A.; Vries, B.d. RxInfer: A Julia package for reactive real-time Bayesian inference. J. Open Source Softw. \n\n**2023**, 8, 5161. [CrossRef] \n\n28. Bezanson, J.; Karpinski, S.; Shah, V.; Edelman, A. Julia Language Documentation. 2016. Available online: https://readthedocs. \n\norg/projects/julia-wf/downloads/pdf/stable/ (accessed on 26 May 2024). \nvan de Laar, T.W.; de Vries, B. Simulating Active Inference Processes by Message Passing. Front. Robot. AI**2019**, 6, 20. [CrossRef] \n29. \n30. Vanderbroeck, M.; Baioumy, M.; Lans, D.v.d.; Rooij, R.d.; Werf, T.v.d. Active inference for Robot control: A Factor Graph \n\nApproach. Stud. Undergrad. Res. E-J.**2019**, 5, 1–5. [CrossRef] \n\n31. van de Laar, T.; ¸Senöz, ˙I.; Özçelikkale, A.; Wymeersch, H. Chance-Constrained Active Inference. Neural Comput.**2021**, \n\n33, 2710–2735. [CrossRef] \n\n32. Busemeyer, J.R.; Diederich, A. Cognitive Modeling; SAGE: Thousand Oaks, CA, USA, 2010; Google-Books-ID: R7KDF35g5LQC. \nSmith, R.; Friston, K.J.; Whyte, C.J. A step-by-step tutorial on active inference and its application to empirical data. J. Math. \n33. \nPsychol.**2022**, 107, 102632. [CrossRef] [PubMed] \n\n34. Lee, M.D.; Wagenmakers, E.J. Bayesian Cognitive Modeling: A Practical Course, 1st ed.; Cambridge University Press: Cambridge, \n\nUK, 2014. [CrossRef]", - "page_start": 30, - "page_end": 30, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "[html]Pavalus MP, Peinstein JS, Khalsa SS. An active inference approach to interceptive psychopathology Annua Roo. Clin Psychol 2019, IS - 97 - 122Pezzalo G. Why do you fear the Bogerman? An embodied predictive coding model of perceptual inference. Cogn Affect Behwn Newnst 2013 ; 14 : 900 - 11.Pezzulo G, Barca L, Priston IQ. Active inference and cognitive - emotional interactions in the brain. Behav Brain Sci 2015.38 e85Pezzulo G ; lodice P ; Barca L et al. Increased heart rate after exercise facilitates the processing of fearful but not diagusted faces. So Rep 2018 ; 898.Pezzulo G, Maisto D, Barcx L et al. Symptom perception from a predictive processing perspective. Clin Psychol Ear 2013 ; 14.Quigley IGS, Kanosiki. S, Grall WM et al. Punctions of isteroception : from energy regulation : to experience of the self. Thenils Neurosi 2021.44 : 29 – 38.Race RP, Ballard DH. Predictive coding in the visual cortex : a functional interpretation of some extra - classical receptive - faeld effects. Nat Neurosi 1999 ; 2 79 – 87.Reich3 C, Kaess M. Self - barm in the context of horderline personality disorder. Curr Opin Psychol 2021.37 139 – 44.Sagir E, Grion Y : A multi factorial model of self - harm behaviors in anorexia - nervosa and bulinia - nervosa. Compr Psychiatry 2003 ; 96 : 152142.Schmitz M, Back SN, Seitz KI et al. The impact of traumatic childhood experiences on interception. diaregarding one ’ s own hody Borderline Pers Disord Emet Dyonegulation 2023 ; 1.5.Sellby EA, Kranzler A, Lindqvist J et al. The dynamics of pain during nonsuicidal self - injury Clin Psychol Sci 2019 ; P. 302 – 20.Serino S. Scorpina F. Dakanalis A et al. The role of age on multisensory hodily experience : an experimental study with a visttual reality full - body illusion. Cylerpsychol Behav Soc Netur 2018.2194 – 10.Setb AK. Interoceptive inference, emotion, and the embodied self. Thmils Coge Sci 2013 ; 17 : 565 – 73.Setb AK, Priston KJ. Active interoceptive inference and the emotional brain. PhiliosTrans R Soc LowM B Biol Soi 2016.371.2016007.Setb AK, Suzukii K, Critchley HD An isteroceptive predictive coding model of conscious presence. Pront hychol 2012 ; 2395.Sforza A, Bufalari. 1, Haggard P et al. My face in yours. vissuo - tactile facial stimulation influences sense of identity Sw. Newnaci 2013 $ 148 – 62.Shinee RL, Klimstra TA, Denississen [] et al. The development of narrative identity and the emergence of personality disorders in adolescence. Carr Opin Psychol 2021 ; BP 49 – 53.Slargg K. Self - barm. Lancet 2005 ; X66 : 1471 – 83. Smith. B, Peinstein J5, Kuplicki R. et al. Perceptual inserusitivity to the modulation of isteroceptive signals in depression, assiety.and substance use disorders. So. Rep 2021.11 : 1108Smith R, Killgore WD, Lane RD. The structure of emotional experi -ence and its relation to trait emotional awareness : A theoretical review. Dnotion 2018 ; 1B : 670 – 92Smith R, Euglicki R, Peinstein J et al. A Bayesian computational model revenula a failure to adapt interceptive precision estimates across depression, anxiety, exting, and substance use disorders. PLoS Cowput Biol 2000.06 e10094HHSmith R, Lane RD. The neural basis of one ’ s own conscious and unconscious esotional states. Neuroci. Bidehaviorito15.57 : 1 – 29.Smith R, Parr T, Prisron XJ Simularizing emotions : an active inference model of emotional state inference and emotion concept learning. I ' writ hydril 2013 ; t0 :", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed1.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed1.pdf", - "query": "At what stage of childhood does the construction of narrative identity take place?", - "target_page": 3, - "target_passage": "Among the challenges that adolescents have to face are the structuring of a “narrative identity” or self-story, featuring the development of a sense of personal identity that integrates past experiences with current, and future goals and meanings in a coherent whole over time ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "NSSI in adolescence \n\nAdolescence is the period of developmental transition from child- \nhood to adulthood, which might be stretched up to the early \n20s due to current sociocultural changes (e.g. delays in complet- \ning education, occupational attainment, and parenthood) (Patton \net al. 2018). Among the challenges that adolescents have to face \nare the structuring of a “narrative identity” or self-story, featuring \nthe development of a sense of personal identity that integrates \npast experiences with current, and future goals and meanings in \na coherent whole over time (McAdams and McLean 2013, McLean \nand Lilgendahl 2019). The definition of the new boundaries of \nadolescents’ personal identity involves significant changes in the", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed1.pdf" - }, - { - "text": "Emotion-wise, a developmental trend toward an increased \nspecificity of emotion-related maps of bodily sensations (Barca \net al. 2023)—a proxy of \ninteroceptive representations of \nemotions—has been reported from children aged 6 years to adult- \nhood (Hietanen et al. 2016). Pubertal changes encompass dramatic \nbodily and neuroendocrine system changes, comprising—but not \nreduced to—changes in the reproductive, adrenal, and growth \naxes (Cameron 2004). Thus, adolescents might face at least four \nsources of uncertainty: (i) the uncertainty due to physiological \nalterations related to bodily changes and to modification in hor- \nmonal levels leading to sexual maturity; (ii) the uncertainty in self- \nidentity (i.e. the structure of self-awareness) and personal identity \n(i.e, the narrative diachronic self) (Drummond 2021), which might \nbe coupled with changes in body image and the development of \ngender identity; (iii) the uncertainty in affect regulation, with the \nemergence of new forms of affectivity as feelings of love and sex- \nual attraction toward a partner; and (iv) uncertainty in the social \ncontext, with respect to their social status and role expectations \nin the adult society. Such high levels of uncertainty might lead \nto a poorly defined sense of self, with unclear boundaries and a \nsense of emptiness. In this context, pain becomes a possible way \nto recover a bodily sense of self, and self-injurious behavior might \nbe instantiated as an attempt to reduce the rise in the levels of \nuncertainty in these (and potentially other) domains, toward the \ntransition to adulthood (see Miller et al. 2020 for a closely related \napproach on addiction). \n\nExtending this idea even further, one can assume that cer- \ntain emotional states, as well as self-awareness and the (embod- \nied) sense of self—and the feeling of continually being the same \nperson—could be constructed similarly: it would be the result of \nan inferential process that integrates bodily sensations and other \nexperiences over time (Gu et al. 2013, Seth 2013, Stephan et al. \n2016, Barrett 2017). Figure 1 illustrates graphically this perspective \nby showing a (schematic) hierarchical generative model that links \n(exteroceptive, interoceptive, and proprioceptive) sensations at \nlower levels with multimodal models of hidden bodily states, such \nas fatigue and hunger at intermediate layers, and, finally, with \ntemporally extended, integrative models of the emotional and \nembodied self at the higher hierarchical level. The hierarchical \ngenerative model recapitulates a simple predictive coding archi- \ntecture, which includes various putative brain areas or networks \n(gray ovals) arranged hierarchically. In the schematic, networks for \nunimodal (exteroceptive, proprioceptive, and interoceptive) pro- \ncessing are situated at the lowest hierarchical level, multimodal \nnetworks are at an intermediate level, and networks for process- \ning a persistent model of the self are at the highest level. Note \nthat this simple schematic is not supposed to recapitulate brain \nanatomy but to illustrate the basic principles of hierarchical gen- \nerative models and predictive coding; (for a discussion of the \nmapping between predictive coding networks and brain anatomy, \nsee Parr et al. 2022). Each network includes cells encoding predic- \ntions (black nodes) and prediction errors (red nodes). These units \n\nActive inference, interoceptive processing, \nand uncertainty reduction", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "F et al. Inpatient adolescents with borderline personality disorder features : identity diffusion and narrative incoherence. Pers Disord Theory Res Treat 2019.103389 – 93θ3Lind M. Vanswoerden S. Penner F et al. Narrative coberence in adolescence. relations with attachment, mentalization, and psychology J Fen Assess 2010 ; 300 – 9-Linson A, Parr T, Friston KJ. Active inference, stressors, and psychological trauma : a neuroethological model of ( mal ) adaptive-explore - exploit dynamics in ecological context. Behav Brain Resil2020 ; 380 : 1124 : 21.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed1.pdf" - }, - { - "text": "uncertainty about one’s estimated state. This means that active \ninference agents tend to avoid ambiguous states, encompass- \ning the avoidance of ambiguous places where self-localization is \nchallenging, ambiguous social situations where safety is uncer- \ntain, and ambiguous bodily states, such as unsure feelings of \nfatigue. However, one apparent exception to this aversion to ambi- \nguity arises when exploring novel states implies the opportunity \nto learn new things and enhance one’s model; see Friston et al. \n(2017) for a discussion. Furthermore, and importantly, active infer- \nence agents will actively operate in the environment to reduce \ntheir ambiguity; for example, by actively seeking informative sen- \nsations that disambiguate in which location they are (e.g. by \nlooking for traffic signs), whether their social context is safe \nor unsafe (e.g. by trying to understand other’s intentions from \ntheir facial expressions and actions), or whether they are cur- \nrently fatigued (e.g. by putting attention to one’s heart), happy, \nor sad. \n\nreciprocity with caregivers and peers. Thus, in parallel to the \nnegotiation of identity with caregivers (through a relative detach- \nment from them, a renegotiation of intimacy, and the questioning \nof their confirmatory authority), the modifications of friendship \nstructures—from childhood to adolescence—lay the ground for \nthe progressive recognition of social contexts and peer relation- \nships as the elite territories for the modulation and exploration \nof personal identity. The redefinition that the adolescent has to \nface in these territories of exploration (of the self as an individ- \nual separated from the other and of the self with the other) might \npass through a phase of reduced coherence in the narration of \nthe self and hence an increased level of uncertainty. Coherence \nin the self’s narrative is considered a measure of well-being and \nhas been associated with psychopathology in adulthood (Klim- \nstra and Denissen 2017) and adolescence (Lind et al. 2020, Shiner \net al. 2021). For example, narrative incoherence has been found \nto be associated with personality disorders in adolescents (Lind \net al. 2019), where “identity diffusion” (e.g. feelings of emptiness \nand being fragmented and lack of a sense of continuity over time) \nmight be considered an expression of high levels of uncertainty of \nthe self. \n\nThe last examples—disambiguating one’s fatigue and emo- \ntional states—may seem strange if one assumes that we do have \ndirect access to the body- and allostasis-related states (e.g. states \nof satiation, thirst, and fatigue) and to our emotions (e.g. we \nautomatically know whether we are happy or sad). However, one \nassumption of active inference is that one’s bodily and emotional \nstates are not necessarily observable but, instead, “hidden states” \nthat need to be inferred on the basis of sensations (especially, \nbut not exclusively, of interoceptive sensations from the inside \nof the body) and of an implicit, unconscious model of how the \nbody functions (Barrett and Simmons 2015, Pezzulo et al. 2015, \nSeth and Friston 2016). In other words, the same inferential pro- \ncess that allows active inference agents to estimate the hidden \nstate of the external environment (e.g. the presence or absence of \nan object in the environment) is also used to estimate other hid- \nden states, such as fatigue, happiness, or sadness. This implies \nthat one can also be wrong, or be fooled, about these states; for \nexample, we could experience the “interoceptive illusion” of feel- \ning more fatigued than our physiological parameters would afford \n(Iodice et al. 2019).", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "[html]Liotti G. A model of dissociation based on attachment theory and research. JTnuma Dissoos 2006 ; P35 – 73. Maged : W, Nylsot Terpatoleg A. Schnij41, C. Tregle R. PsrsistMagerl : W, Burkart D, Fernandez A, Schmidt LG, Treede R. Persistent antinociception through repeated self - injury in patients with borderline personality disorder. Pain 2012 ; 575 – 94.Maisto D. Barca L. Wan den Bergh O et al. Perception and misperception of bodily symptoms from an active inference perspective. modelling the case of panic disorder. Psyckil Rev 2021.128 – 590 – 710.Malter Cohen M, Jing D, \" fang \" RR et al. Early - life stress has persistent effects on anygiplala function and development in mice and burnius. Pric Narl Acel Sci 0.5 A. 2013.110 : 182 \" 4 – 8McAdams DP, McLean KC. Narrative identity. Curr Dir Psychol. Sci 2013 ; Z2 : 233 – 8.McEvry PM, Mahoney AE. To be sure, to be sure : intolerance of uncertainty mediates symptoms of various araiety disorders and depression. Behav Ther 2012 ; 43 : 533 – 45McLean RC, Lilgendah1 JP. Narrative identity in adolescence and adulthood : pathways of development. In. Handlook of Pressulty Deorlopment. New Yisrk. United States : The Guilford Press, 2015 ; 418 – 32Miller M, Kiverstein J, Kietveld E. Embodying addiction : a predictive processing account. Brain Cogn 2000.13.105485.Moeller FG, Barratt ES, Dougherty DM et al. Psychiatric aspects of impulsivity Am J Psychiatry 2001 ; 158 : 1783 – 93.Murphy J. Viding E. Bird G. Does atypical intersception following physical change contribute to sex differences in mental illness? Psychol Rev 2015 ; 126 : 787 - 3Nock MK. Self - injury. Annu. Rev Clin Psychol 2010 ; 6.339 – 63.Nock MIC, < underline > osiner TTL Gordon XH et al. Non - suicidal self - injury among adolescents : diagnostic correlates and relation to suicide attempts. Psychiatry fies 2006 ; 54 : 65 – 72.Nock MIC, Mendes WB. Physiological arousal, distress tolerance, and social problem - solving deficits arroong, widolescent self - injurers. J Conswith Clin Psychol 2008a, 7628 – 38.Nock MIC, Mendes WB. Physiological arousal, distress tolerance, and social : problees - solving deficits among adolescent self - injurees. J Consist Clin Psychol 2008b, 7.28 – 38Nock MIC, Prinstein MJ A functional approach to the assessment of self - mutilative behavior. J Consult Clin Psychol 2004.72.885 – 90Nock MIC, Prinstein MI, Sterba SK Revealing the form and function of self - injurious thoughts and behaviors : a real - time enological assessment study among adolescents and yesurg adults ; J Almorm Psychol 2009 ; 11.816 – 27.Ogawa [ 8, Stoufe LA, Weinfeld NS et al. Development and the fragmented self : longitudinal study of dissociative symptomatology in a nonclinical sample. Doo hys / hystopothol 19978855 – 79 )Oxmanajpoijha N, Cressrell C, Dodd HF. Intolerance of uncertainty, anxiety, and worry in children and adolescents : a meta - analysis. J Affect Disord 2018.22.80 – 90.Paluska SA, Schwenk TL Physical activity and mental health : current concepts Sports Med 2000.29 : 167 – 80.Pair T, Pezzulo G, Trisston IQ. Active Inference. The Tree Dengy Principle in Mind, Body, and Behaviour. Carebridage, Massrachusetts, United States : The MIT Press, 2022Patton GC, Olsson CA, Skirbekk V et al. Adolescence and the oest generation. Nature 2018.554 : 458 –", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed1.pdf" - }, - { - "text": "We focused on adolescence as a potentially critical period for \nNSSI, given that it is associated with high levels of uncertainty \nabout several central domains in human life. However, there \nare other (gender-related) developmental periods in which bod- \nily changes might be coupled with increased levels of uncertainty \n(e.g. in physiology, in the sense of self, in the social role) and vulner- \nability. Pregnancy and transition to menopause, e.g. are periods of \nendocrine and hormonal upheavals that might impact a woman’s \naffective life and well-being. These physiological changes are cou- \npled with a fundamental developmental transition that requires a \nredefinition of personal identity and narrative integration (McLean \nand Lilgendahl 2019), with increased uncertainty of one’s inter- \nnal states and role in the social context. Taking into account \nthe perimenopausal and menopausal transition, the physiologi- \ncal, psychological, and affective experiences associated with it are \nvery heterogeneous. Some women might experience it as a new \nbeginning, whereas for others, it may be more critical (Deeks 2003). \nIn some cases, e.g. the menopause transition might perturb the \ncontinuity of one’s sense of self, inducing discrepancies in inter- \nnal self-coherence (e.g. the end of childbearing years, the aging \nprocess), which might increase the level of distress (Barca and De \nMarchis 2018). \n\nReferences \nAbraham E, Hendler T, Zagoory-Sharon O*et al.*Interoception sensi- \ntivity in the parental brain during the first months of parenting \nmodulates children’s somatic symptoms six years later: the role \nof oxytocin.*Int J Psychophysiol*2019;**136**:39–48. \nAdams RA, Stephan KE, Brown HR*et al.*The computational anatomy \nof psychosis.*Front Psychiatry*2013;**4**:1–26. \n\nArciero G, Bondolfi G.*Selfhood, Identity and Personality Styles*. 1st edn \nHoboken, New Jersey, United States: John Wiley & Sons Inc, 2009. \nBarca L, Candidi M, Lancia GL*et al.*Mapping the mental space \nof emotional concepts through kinematic measures of decision \nuncertainty.*Philos Trans R Soc Lond B Biol Sci*2023;**378**:20210367. \nBarca L, De Marchis MD. The case of Sofia: an example of the dynamic \nproperties of the therapeutic relationship. 2018. \n\nBarca L, Pezzulo G. Keep your interoceptive streams under control: \nan active inference perspective on anorexia nervosa.*Cogn Affect*\n*Behav Neurosci*2020;**20**:427–40. \n\nThe dramatic changes that a women’s physiology undergoes \nduring life have been suggested to concur with the atypical \ninteroception often reported (e.g. heightened interoceptive atten- \ntion but poor interoceptive accuracy), which might contribute \nto their greater vulnerability to mental illness (Murphy et al. \n2019). Although this is still a speculative hypothesis that needs \nto be tested empirically, the effect of these transition periods on \nwomen’s well-being is currently overlooked and deserves more \nattention. \nBarrett LF.*How Emotions Are Made: The Secret Life of the Brain*. Boston, \nMassachusetts, United States: Houghton Mifflin Harcourt, 2017. \nBarrett LF, Quigley KS, Hamilton P. An active inference theory \nof allostasis and interoception in depression.*Philos Trans R Soc Lond*\n*B Biol Sci*2016;**371**:20160011. \n\nBarrett LF, Simmons WK. Interoceptive predictions in the brain.*Nat*\n*Rev Neurosci*2015;**16**:419–29. \n\nBowlby J.*Attachment and Loss: Attachment*. London, UK: Pimlico, 1997. \nBresin K, Gordon KH. Endogenous opioids and nonsuicidal self- \ninjury: a mechanism of affect regulation.*Neurosci Biobehav Rev*\n2013;**37**:374–83.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed1.pdf" - }, - { - "text": "font-size: 10px;\n }\n \n \n \n [html]", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed1.pdf" - }, - { - "text": "**References**\n1. World Health Organization. Maternal, newborn, child and \nadolescent health and ageing. platform.who.int/data/ \nmaternal-newborn-child-adolescent-ageing (2022). \n\n2. Thornburg, K. L., Bagby, S. P. & Giraud, G. D.*Knobil and Neill’s*\n*Physiology of Reproduction*pp. 1927–1955 (Elsevier, 2015). \n3. Brunton, P. J. & Russell, J. A. The expectant brain: adapting for \nmotherhood.*Nat. Rev. Neurosci.***9**, 11–25 (2008). \n4. Gregg, C. Pregnancy, prolactin and white matter regeneration. \n*J. Neurol. Sci.***285**, 22–27 (2009). \n5. Haim, A. et al. A survey of neuroimmune changes in pregnant \n\nand postpartum female rats.*Brain Behav. Immun.***59**, \n67–78 (2017). \n6. Barrière, D. A. et al. Brain orchestration of pregnancy and \n\nmaternal behavior in mice: a longitudinal morphometric study. \n*NeuroImage***230**, 117776 (2021). \n\nAlthough studied to a lesser degree, ties between maternal \nbehavior and white matter microstructure (particularly connectiv- \nity between temporal and occipital lobes) have been noted31. Here we \nreveal pronounced GMV changes in regions within sensory, attention \nand default mode networks over the gestational window. In paral- \nlel, we observed increased anisotropy in white matter tracts that \nfacilitate communication between emotional and visual processing \nhubs37–39, including the inferior longitudinal fasciculus and inferior \nfronto-occipital fasciculus. Pinpointing the synchrony of gray and \nwhite matter changes that unfold in the maternal brain could be \nkey to understanding the behavioral adaptions that emerge during \nand after pregnancy, such as honing the brain’s visual and auditory \nresponses to infant cues and eliciting maternal behavior. Research \ninto other major transition periods supports this idea. For instance, \nadolescence is a dynamic period characterized by region-specific, \nnonlinear decreases in GMV and increases in WMV, maturational \nbrain changes that are tied to gains in executive function and social \ncognition40. For both adolescence41 and matrescence, the consider- \nable rise in steroid hormone production appears to remodel the brain \n(see ref. 25 for comparative analysis), promoting a suite of behaviors \nadaptive to that life stage. How specific neural changes give rise to \nspecific behavioral adaptations has yet to be fully explored with \nrespect to human pregnancy. \n\n7. Celik, A., Somer, M., Kukreja, B., Wu, T. & Kalish, B. T. The \n\ngenomic architecture of pregnancy-associated plasticity in \nthe maternal mouse hippocampus.*eNeuro***9**, ENEURO.0117-22. \n2022 (2022). \n8. Puri, T. A., Richard, J. E. & Galea, L. A. M. Beyond sex differences: \n\nshort- and long-term effects of pregnancy on the brain.*Trends*\n*Neurosci.***46**, 459–471 (2023). \n9. Chaker, Z. et al. Pregnancy-responsive pools of adult neural \n\nstem cells for transient neurogenesis in mothers.*Science***382**, \n958–963 (2023). \n\n10. Diamond, M. C., Johnson, R. E. & Ingham, C. Brain plasticity \ninduced by environment and pregnancy.*Int. J. Neurosci.***2**, \n171–178 (1971). \n11. Servin-Barthet, C. et al. The transition to motherhood: \n\nlinking hormones, brain and behaviour.*Nat. Rev. Neurosci.***24**, \n605–619 (2023).", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "Barca*et al.*\n2 \n\nsituations—from reduced affective reciprocity during parental \ninteractions (Conradt and Ablow 2010). Development theories \nunderscore the role of parental care in shaping the experience of \nself and others and integrative processes of consciousness (Bowlby \n1997, Liotti 2004, 2006, Fonagy et al. 2023). \n\n**Highlights**\n\n• Predictive processing theories assume that the brain \nforms internal body and self-models at multiple levels \nof detail and strives to reduce their uncertainty. \n\n• High levels of uncertainty in internal models of the body \nand the self are common across several clinical condi- \ntions. \n\n• Excessive levels of uncertainty might also be experienced \nin the typical population during development transitions. \n• This excessive uncertainty might hinder the mainte- \nnance of a coherent model of the embodied self and \nconfidently engage in adaptive courses of actions. \n\n• Maladaptive behaviors, such as non-suicidal self-injury, \nmight emerge as paradoxical but effective strategies to \n“act on the body” to reduce uncertainty \n\nDuring infancy, a child starts making sense of her internal \nexperiences through the information she gets from the external \nworld, most notably from caregivers whose behavior has a fun- \ndamental regulatory function shaping emotional development, \nstress physiology, and refinement of limbic circuitry (Gee 2016). \nIn addition to the quality of caregivers’ response to the infant’s \nneed for proximity, its “predictability” supports the development \nof emotions’ regulatory capacity (Gee and Cohodes 2021; Wu and \nFeng 2020) and a cohesive sense of self (Arciero and Bondolfi \n2009), increases prosociality (Deneault et al. 2023), and influ- \nences the development of social brain structure (see Ilyka et al. \n2021 for a review). Self-report assessment of exposure to unpre- \ndictability during early life appears to predict symptoms of anx- \niety, depression, and anhedonia in adulthood (Glynn et al. 2019). \nEvidence from cross-species studies indicates that the predictabil- \nity of caregivers’ behavior in rodents may specifically influence \nthe offspring’s development of corticolimbic circuitry involved in \nemotion-related functioning (Glynn and Baram 2019). Rodents \nexposed to unpredictable maternal care exhibit atypical amygdala \nfunctioning (Malter Cohen et al. 2013) and weaker connectivity \nwith the medial prefrontal cortex (Guadagno et al. 2018). \n\nsimilar because they explicitly target the body, with self-induced \nhunger or painful sensations, to modify bodily and interocep- \ntive experiences. This perspective helps contextualize harmful \nbehaviors within an “interoceptive inference” framework, which \nassumes that (interoceptive) bodily sensations and their regula- \ntion are key for affectivity, mental health, conscious processes, \nand the self (Craig 2002, Seth et al. 2012, Barrett and Simmons \n2015, Pezzulo et al. 2015, Paulus et al. 2019, Quigley et al. 2021), \nwhich could provide novel insights on why people do things to \nharm themselves intentionally.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed1.pdf" - }, - { - "text": "[html]\n
co - etribdiznent to co - bameostasis in early life. Conscious Cogn 2002.1a, 91 : 1091.17Clautica A, Safron A, Delafa6l6 Rutt J. Back to square one : the bodini. ly roots of conscious experiences in early 10 %. Newnsol Conscious 20021. niab037.
Consradt : E, Ablow J. Infant, physiological : response to the still - face paradigm : contributions of : maternal sessitivity and infants ' early regulatory behavior. Infant Behav Des 2013.251 – 65.Craig AD : How do you feel? Interoception : the sense of the physiological crandition of the body. Nat Research 2002 ; B < 55 – 66. Cruziazedili L, Knabe C, Jeskizoon PM et al. Interceptive ingredients of hody ownership : affective touch and ca
rubber band illusion. Cortex, a Journal Devoted to the Study of the Nemsous Sjostem and Behavior 2018.104 : 180 – 92.Deeks AA. Psychological aspects of menopause management. Best Pract. Res Clin Drdocrinol Metab 2003 ; < underline > D 17 – 31.
Denexult A, Hammond Sl, Madigan S. A meta - analysis of child - parent attachment in early childhood and prosceiality. Deolop - mental Psychology 2023 ; 58 : 236 – 55Diegsest S, Lopez C The bodi. ly self. insights from clinical and experimental research. Arm Phys Rehaliil Mell 201.60 : 598 – 207.
Drustsmond JJ, Self - identity and personal identity. Phenomenol Coge Sci 2021.201235 – 67.Dutra L. Bureeus J - F, Holznes B et al. Quality of early care and child - hood trauma. a prospective study of developmental partbways to dissociation. J. Nerv Ment Dis 2009.507.983 – 90.
Forwagy P, Caregibell C, Luyten. P. Attachment, mentalizing and traucess then ( 3993 ) sed now ( 2002 ). Invision So : 2003 : 33.459Fotopoulosa, Tliakiris M. Mentalizing homeostasis the social origins of istereoceptive inference. NewngTriston IC A theory of cortical responses. Philiss Trans R. Soc Lonil B Biol Sci 2005 ; 36.815 – 36.
Priston K, Lin M, Frith CD et al Active inference, curiosity and insight. Noural Comput 2017.29 2633 – 83.Friston KJ, Stephan KE, Montague R et al. Computational psychiatry : the brain as a phantastic organ. Lanort Psychiatry 2014.1148 – 58.
Garfinkel SN, Nagai Y, Seth AK et al. Neuroimaging studies of interroception and self - awareness. In : Neuroimaging of Concinumonas Springer Berlin, Heidelberg Springer, 2013.207 – 24Gee DG. Sensitive periods of emotion regulation : influences of parental rare on frantoamygdala circuitry and plasticity. Nnu Dir Child Adolesc Dev 2016 ; 2016 ; 2016 ; 87 – 210.
Gee DG and Cohodes EM. Influences of Caregiving on Development : A Sensitive Period for Biological Embedding of Predictability and Safety Cues. Cwr Div Psychol Sci 2021, D0 376 – 83.Glynn LM, Biram TZ. The influence of varpredictable, fragmented parestal signals on the developing brain. Pront Neuroeniborinel 2013 ; 53 : 100756.
Glynn LM, Stem IHS, Howland MA et al. Meanaring tovel antecedents of mental illness : tbe questionnaire of unpredictability in child - hood. Neuropsychopharmacol 2013 ; 44 : 876 – 82.Guadagpo A, Kang MS, Deveryi GA et al. Reduced resting - state functional connectivity of the basolateral amygdala to the medial
prefrontal cortex in prevenarizing rats exposed to chronic early - lafe stress. Brain Struct 2018 ; 22.3711 – 29.
Gu X, Hof PR, Frisston KJ et al. Anterior insular cortex and emotional awareness. J Comp Nirurol 2013 ; S21 : 3371 – 88.
Guidaea VF. Coreglosity of the Self ; A. Deselogreental Aaggroxch to Psychopothology and Therapy. New York, Ursited States. Guiltord Press, 1987
Hietanen JK, Glerean E, Hari R et al. Bodily maps of emotions across chuld development. Dev Sci 2016 ; 10 : 11 : 1 - 8.
Ilyka D, Johnson MH, Lloyd - Fox S. Infant social interactions and brain development : a oystematic review. Neurosci Biobehavi Res 2021.130 - 648 - 69.
Iodice P. Porciello G. Bufalari. I et al. An interoceptive illusion of effort induced by false beart - rate feedback. Proc. Nati Aoal 56 : 0 S A 2015 ; 15 : 13897 - 902.
Keiby A, Maguire 5, Brownlow R et al. Intolerance of uncertainty in eating disorders : an update on the field. Clin Psychol. Bro 2017.56 : 94 – 105.
Kbaasa SS, Adolphs R, Cameron OG et al. Interoception Summit 2016 participants : Interoception and mental health : a roadmap. Biol Psychiatry Cogn Neurosci Neuromaging 2018.8501 – 13.
Khanipour H, Shonshtari Mild, Bidaki R. Succide probability in adolescents with a history of childhood maltreatment : the role of non - suicidal self - injury. emotion regulation difficulties, and forms of self - critizium. Int./ High li
Kirtley OJ, O ' Carroll RE, O ' Conzor RC. Pain and self - harm : a systematic review. J Affect Disord 2016 ; 20.347 – 63.
Klimstra TA, Denissen JJ. A theoretical framework for the associations between identity and psychopathology. Dev Psychol 2015.93.952 – 65.
Klonsky ED, Oltmanns TF, Turkheimer E. Deliberate self - harm in a runclinical population : prevalence and psychological correlates Am J Psychiatry 2003 ; 501 - 3
Ladouceur R, Gosselin P, Dugas MJ. Diperimental manipulation of intolerance of uncertainty a study of a theoretical model of worry Behav fies Ther 200.303 – 41.
Laloural M, Fisir J. Bjurebeg_1 et al. Augmented pain inhibition and higher integration of pain medialistory triain networks in women with self - injury behavior. Mil Psychiatry 2022.37.9452 – 9
Laugesen N, Dugas MJ, Bukovoki WM. Understanding adolescent warry : the application of a cognitive model. ( Abrom Child Psychol 2003 ; JI : 55 - 44
Laurisla M, lannattone 5, Bottesi G. Intolerance of uncertainty and emotional processing in adolescences separating between - person stability and within - person change its Child Adolesc Psy chopathol 2023.51 – 84.
Leone C ; Galosi S ; Mollicoa C et al. Dissecting pain processing in adolescents with non - suicidal self injury could suicide risk lurk among the electrodes?. Ear J Pain 2021.25 1815 – 28.
Lized M, Vanorerden S, Penaser F et al. Inpatient adolescents with boderline personality disorder features : identity diffusion and narrative incoherence. Pers Disord Theory Res Treat 2019 ; M0 S99 – 99.
Lind M, Varswoerden S, Perser F et al. Narrative coherence in adolescence. relations with strachment, mentalization, and psychopathologyJ Pers Assess 2020 ; 102380 - 9.
Linson A, Pars T, Tristran Xp Active inference, stressors, and psychological trainansis is neuroethological model of ( trail ) adaptive explore - exploit : dynamics in ecological context : Brhwor Brain Res 2000 - 38.132421.
", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed1.pdf" - } - ] - }, - { - "references": { - "source_file": "OTC_NSANY_2004.pdf", - "query": "What was the indicator related to increasing Nissan's research and development activities in terms of publication of scientific articles in 2004?", - "target_page": 46, - "target_passage": "And the number of research papers we present at societies such as The Japan Society of Mechanical Engineers rose dramatically in fiscal 2004. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "T E C H N O L O G Y \n\n\n\nWe have succeeded in shortening our production \n\npipeline, too, using a new vehicle development process \n\ncalled V3P that our engineers devised over the past three \n\nyears. V3P, which stands for Value-up innovation of \n\nProduct, Process, and Program, has helped us cut our \n\ndevelopment time almost in half, from 20 months to just \n\n10.5 months. I believe this makes Nissan the world \n\nbenchmark in development. That improvement is having a \n\nmajor effect on the flexibility and execution of R&D at \n\nNissan, and will ultimately boost the company’s profitability. \n\nThe number of new products we have brought to \n\nmarket over the past three years is equally significant— \n\nmore than thirty new vehicles. That’s an impressive \n\nengineering achievement, and the reason you are seeing \n\nso many new Nissan models on the road. \n\nOur R&D infrastructure, however, is still in need of \n\nexpansion. We’ve therefore begun building new facilities at \n\nthe Nissan Technical Center, NTC, and at the Nissan \n\nAdvanced Technical Center, NATC, both of which are in \n\nJapan. These additions represent a major investment, and \n\nshow Nissan’s dedication to maintaining and enhancing its \n\ntechnological skills. \n\nOur technology base is in Japan, where we have some \n\nten thousand people involved in R&D, but we also have two \n\nmajor centers in North America and Europe, and smaller \n\noperations in Taiwan, China, Thailand, South Africa and \n\nBrazil. In the past, these entities were mostly standalone \n\noperations, but today there are many more joint projects \n\n**Pursuing Value Through**\n**Technological Excellence**\n\n“I have two prime objectives. The first is to realize our \n\ncorporate vision, ‘Enriching people’s lives,’ from an \n\nengineering standpoint. The second is to create a \n\nfuture vision for people working in R&D. Research and \n\ndevelopment is all about providing practical value to \n\nthe customer via technological excellence, which in \n\nturn creates value for our shareholders. Nissan has \n\nmade a major commitment to technological excellence \n\nso that we can accomplish these objectives. \n\n**Research and Development**\n\nNissan’s investment in R&D has been rising. In fiscal 2004 \n\nwe devoted approximately ¥400 billion to it, equivalent to \n\n4.6 percent of our turnover. We estimate that our financial \n\ncommitment to R&D will continue to range between 4.5 \n\nand 5 percent. R&D investments take a lot of time to pay \n\noff, of course, so it’s difficult to evaluate our evolution \n\nover the short term. Given our expanded output, however, \n\nI believe that we are headed in the right direction. \n\nFor example, the number of patents we have generated \n\nis growing quickly, exceeding 4,000 in fiscal 2003—more \n\nthan twice the fiscal 1999 figure. And the number of \n\nresearch papers we present at societies such as The Japan \n\nSociety of Mechanical Engineers rose dramatically in fiscal \n\n2004. These are direct results of our commitment to \n\nresearch. We are also generating more new technologies \n\nrelated to safety and the environment, such as the Around \n\nView Monitor and the lane-keeping system.", - "page_start": 45, - "page_end": 45, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "constantlyAge introduction of new Nissan models in the latterreview their performance and, if necessary, take aggressive2004actions, including replacing companies whose performancenere are several risks associated with a diverseis consistently unsatisfactory. That is why our activities willry like ours, including political issues, economicexpand with profit, not at its expense. The General Overseass, and a range of other external factors. At Nissan,Markets are where Nissan will really be growing.\"", - "page_start": 68, - "page_end": 68, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "DESPITE NISSAN’S RECORD OPERATING RESULT IN FISCAL 2004, ITS STOCK PERFORMANCE RETURN WAS \n\nNEGATIVE AND LOWER THAN THE TOPIX INDEX. THE INVESTOR RELATIONS TEAM WAS STRENGTHENED \n\nAT THE START OF FISCAL 2005 TO BETTER ADDRESS THE NEEDS OF INVESTORS AND ENHANCE THEIR \n\nUNDERSTANDING OF NISSAN’S PERFORMANCE. INVESTORS WILL NOW BE ABLE TO GAIN A MORE IN-DEPTH \n\nVIEW OF THE COMPANY’S OPERATIONS AND PERFORMANCE INDICATORS. \n\n**IR Activities**\n\nUnder NISSAN Value-Up, the IR team’s performance will \n\nbe evaluated based on the price-earnings ratio (PER) and \n\nvolatility relative to our major competitors. PER is used to \n\nmeasure how successfully the IR team manages market \n\nexpectations about Nissan in order to maintain the Nissan \n\nshare price close to an intrinsic value. The other measure, \n\nvolatility, is used to measure the risk investors perceive \n\nwhen considering Nissan stock. If Nissan can successfully \n\nreduce volatility, the minimum return required by investors \n\nshould decline. The IR team believes that a strengthening \n\nof disclosure activities is required to improve both \n\nmeasures. The team plans to disclose not only financial \n\nresults but also more forward-looking information about \n\nNissan fundamentals such as technology and product. \n\nSuch forward-looking information helps investors to \n\nforecast future performance more precisely and reduces \n\nuncertainty about the future. As a consequence, Nissan will \n\nincrease the number of investor conferences, events, and \n\nteleconferences during fiscal 2005. \n\n**Share Performance in Fiscal 2004**\n\nNissan’s share price began at ¥1,143 at the beginning \n\nof fiscal 2004 and ended the fiscal year at ¥1,099, \n\ngenerating a negative return of 3.85 percent. Total \n\nshareholder return (TSR) was -1.67 percent, while the \n\ndividend yield came to 2.18 percent (¥24 per share dividend, \n\ndivided by the ¥1,099 closing price). Adverse movements \n\nin foreign exchange rates and commodity price hikes \n\nadversely affected Nissan’s profitability, which was reflected \n\nin the share price. In addition, specific events relating \n\ndirectly to the company also had a negative impact. Later in \n\nthis report, corporate officers will explain what actions \n\nNissan has undertaken to ensure better performance. \n\n**Payout Policy**\n\nNissan announced its NISSAN Value-Up three-year dividend \n\npolicy, covering the period from fiscal 2005 to fiscal 2007, at \n\nthe annual general meeting of shareholders on June 23, \n\n2004. Nissan proposes a long-term dividend policy to \n\nprovide more visibility and improve transparency into the \n\nways in which Nissan rewards its shareholders. Nissan \n\nbelieves that a long-term dividend policy reduces uncertainty \n\nfor investors who already own or are considering acquiring \n\nNissan stock. \n\n**Five-Year Share Performance**\n(Index: April 3, 2000=100) \n400 \nNissan \n300 \n\n200 \nTOPIX Transportation Equipment Index \n100 \nTOPIX \n80 Apr. \nMay June July Aug. Sept Oct. Nov Dec. \nJan. \n**2005**\n**’01** **’02** **’03** **’04** **’05**\n0 \n**2004**", - "page_start": 16, - "page_end": 16, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "\n \n \n \n \n [html]on research and development by 50 percent. Over the next three years we will invest a further S percent of net sales annually, creating new and exciting technologies to benefit our customers.During NISSAN Value - Up we will pursue several key business opportunities :• Our Infiniti luxury brand will extend its reach into new markets such as China and Russia and continue to establish its credibility as a Tier - 1 luxury player.• We will develop our Light Commercial Vehicle biomarkers in and supporting ( E. g., 0 ). nursestic, negativebusiness into a fully competitive global operation through new market and product entries.• We will take a more efficient global sourcing approach to maximize our opportunities and minimize\n
Volume : Nissan will achieve global sales of 4.2 million units in fiscal 2008 — an increase of 812.000 units over fiscal 2004.
ROIC : Nissan will achieve a 20 percent or higher return on invested capital on average over the course of the plan, excluding cash on hand.
To meet this commitment, over the NISSAN Value - Up period we will launch 28 new products, including 10 models that are highly innovative in their concept and benefits.
Our investment in advanced technology continues. From facal 2002 to 2005 we have increased spending
our overall costs as we grow. Our engineering, production and purchasing functions will continue
their acceleration towards being fully integrated global operations.
We will continue to invest in new and emerging markets, including China, India and Russia.
NISSAN Value - Up also delivers increased value for our shareholders through a clear and well - defined dividend
strategy. By the end of the plan period, we will pay an annual dividend of no less than 940 per share, a 66
percent increase over fiscal 2004.
", - "page_start": 4, - "page_end": 4, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "(% of net revenue) \n5.8% \n**478**\n6 \n427 \n**5.6%**\n**398**\n4.8% \n354 \n5 \n**4.6%**\n300 \n4 \n\n3 \n**’04**\n\n**Corporate Rating**\n**Investment in Our Future**\n(Billion Yen) \nAa3 AA– \n5.5% \n500 \nA1 A+ \n5.3% \nA2 A \nR&I 378 \n400 A3 A– \n4.4% \n4.2% 326 \n4.1% Baa1 BBB+ \n4.0% \nS&P 3.8% \nBaa2 BBB \n262 \n300 \n239 244 \n3.4% 232 Baa3 BBB– \nMoody’s 206 \nBa1 BB+ \n200 \n**’99** **’00** **’01** **’02** **’03** **9/01 4/02 9/02 4/03 9/03 4/04 9/04 4/05 5/05**\nCanton plant investment included from fiscal year 2001 \n\n**Automotive Debt:**\n\nDespite higher levels incurred for capital expenditures and \n\nR&D, cash generated from operating activities in the \n\nautomotive division eliminated net automotive debt. Nissan \n\nheld a ¥205.8 billion yen net cash position at the close of \n\nfiscal 2004 in this division. \n\n**Rating**\n\nRegarding Nissan’s long-term credit rating, R&I upgraded \n\nNissan from A- to A on May 11, 2005. S&P upgraded their \n\nrating from BBB to BBB+ on July 20, 2004, and Moody’s \n\nupgraded from Baa3 to Baa1 on January 29, 2004. \n\n**Investment Policy**\n\nCapital expenditures increased by ¥50.2 billion to ¥477.5 \n\nbillion, representing 5.6 percent of net revenue. This \n\nincrease included the Canton plant expansion. R&D \n\nexpenditures increased by ¥43.8 billion to ¥398.1 billion. \n\nThis increase went to fund new technologies and product \n\ndevelopment. Our R&D resources are focused on projects \n\nthat add value to our customers and that will deliver an \n\nexpected return, in both the short and long term. \n\n**Dividend**\n\nAt the annual general meeting of shareholders on June 21, \n\n2005, the company proposed increasing its dividend to \n\n¥24 per share in 2004, up from ¥19 in 2003. In the first \n\nyear of the NISSAN Value-up dividend policy, the \n\nCompany plans to increase the per-share dividend to ¥29 \n\nin 2005. By the end of NISSAN Value-up in March 2008, \n\nNissan plans to pay an annual dividend of no less than \n\n¥40 per share. \n\n**Return on Invested Capital (ROIC)**\n\nNissan’s investments are made within the strict guidelines \n\nof its automotive operating ROIC. Based on these \n\nguidelines, Nissan reached 20.1 percent of ROIC on a \n\nconsistent basis as of fiscal 2003. \n\n**Dividend Policy**\n(Dividend per share, in yen) \n\n40 \n34 40 \n29 \n24 30 \n19 \n14 20 \n8 \n7 \n10 \n0 \n0 \n**’99** **’00** **’01** **’02** **’03** **’04** **’05*** **’06*** **’07***\n*Forecast", - "page_start": 15, - "page_end": 15, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Looking to the New Fiscal Year**\n\nNissan will continue to grow in fiscal 2005. Even assuming a relatively flat total industry volume \n\nof 61 million units globally, Nissan’s sales are forecast to come to 3,618,000 units, a 6.8 percent \n\nincrease over the prior year. \n\nWorldwide, we will launch six all-new models—five in Japan, one in Europe—leading to \n\ntwenty regional product events. \n\n**Our sales objectives**\n\n• Japan: 933,000 units, a 10 percent increase over last year \n\n• U.S.: 1,047,000 units, an increase of 3.3 percent \n\n• Europe: 550,000 units, a 1.1 percent increase over last year \n\n• General Overseas Markets: 1,088,000 units, a 10.7 percent increase \n\n**Our financial outlook**\n\nAny new fiscal year brings risks and opportunities, and 2005 brings very high levels of \n\nuncertainty and risks—volatility in exchange rates, higher interest rates, higher commodity prices, \n\nhigher energy prices, higher incentives and uncertainty about growth in the U.S. and Japan. The \n\nopportunity is in following through on the NISSAN Value-Up plan quickly and effectively. \n\nIn light of these factors, our forecast for fiscal 2005 is as follows. This is based on a foreign \n\nexchange rate assumption for the year of ¥105 per dollar and ¥130 per euro: \n\n• Net revenue is predicted to be ¥9 trillion, up 4.9 percent. \n\n• Operating profit is expected to be ¥870 billion, up 1 percent. \n\n• Ordinary profit is expected to reach ¥860 billion, up 0.5 percent. \n\n• Net income is predicted to be ¥517 billion, up 0.9 percent. \n\n• Capital expenditures are expected to reach ¥540 billion, up 13.1 percent. \n\n• R&D expenses are forecast to reach ¥450 billion, or 5 percent of net sales, up 13.0 percent. \n\n• ROIC is expected to remain at or above 20 percent.", - "page_start": 9, - "page_end": 9, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Due to changes in government regulations, information on risks \ninvolved in business operations has been disclosed in the \nYukashoken-Houkokusho for the year ended March 31,2005 \nas follows: \nand that the outcome may be significantly different from that anticipated. \nAs a result, any such verdict or settlement could adversely affect Nissan’s \nfinancial position and operating results. \n\nGovernment Regulations \nThe automobile industry worldwide is influenced by a broad spectrum of \nregulations governing the emission levels of exhaust fumes, fuel economy \nguidelines, noise level limitations and safety standards, and Nissan expects \nthese regulations to become increasingly stringent. In order to ensure \ncompliance, it may be necessary for Nissan to make significant ongoing \ninvestments in these areas which would have an impact on its financial \nposition and results of operations. \n\nEconomic Factors \nThe demand for products manufactured by Nissan is affected by the \neconomic conditions in each country or market in which they are offered \nfor sale. Nissan conducts its operations all over the world and, in particular, \nin the major markets of North America, Europe, and Asia, to say nothing of \nJapan. While Nissan strives to develop a comprehensive and integrated \nprojection of the global economic outlook, any greater-than-anticipated \ndownturn in one of these markets may have a significant effect on Nissan \nfinancial position and results of operations. \n\nInternational Activities and Overseas Expansion \nNissan’s manufacturing and marketing activities outside Japan are \nconducted in the United States, in Europe, and in the developing and \nemerging markets of Asia. Nissan forecasts and evaluates a wide variety of \nrisks inherent in doing business in such overseas markets including the \nfollowing factors, each of which entails a greater-than-anticipated level of \nrisk: \n\nIntellectual Property Rights \nNissan owns a wide variety of proprietary technologies and has the \nexpertise to differentiate Nissan’s products making them unique from \nthose of its competitors. These assets have proven their value in the \ngrowth of Nissan’s business and will, no doubt, continue to be of value in \nthe future. Nissan strives to protect its intellectual property assets; \nhowever, in certain markets, Nissan may encounter difficulty in fully \nprotecting the proprietary rights to its own technologies. Cases may arise \nwhere Nissan finds itself unable to prohibit others from infringing on its \nintellectual property rights. \n\n• Unfavorable political or economic factors \n• Legal or regulatory changes \n• Potentially adverse tax consequences \n• Labor disputes including strikes \n• Difficulties in recruiting and retaining personnel \n• Social, political or economic turmoil due to terrorism, war, or other \nThe Company has established Intellectual Property Rights Management \nDepartment for the purpose of protecting intellectual property rights in \nspecific areas, strengthening activities to protect Nissan’s intellectual \nproperty rights, and abstracting new intellectual property rights. And the \ndepartment has been performing various activities to protect and create \nNissan Brand. \ndestabilizing factors. \n\nResearch and Development \nNissan’s technology must be “real world”—useful, pragmatic and easy to \nuse. Nissan anticipates the nature and scope of the market demand, and \nthen prioritizes and invests in new technologies. Nonetheless, any sudden \nand greater-than-anticipated changes in its business environment or in \ncustomer preferences may impact negatively on customer satisfaction with \nthese new technologies.", - "page_start": 72, - "page_end": 72, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "outside the company: the U.S. economy, interest rates, oil \n\nprices and competitive actions. Incentives and aggressive \n\ndiscounting are both disturbing the marketplace. We’ve \n\nreached a level where this is actually confusing customers \n\nabout the amount of discount that is available in the \n\nmarket. These are all things that we can’t directly control. \n\nLooking longer term over the period of NISSAN Value- \n\nUp, I think it’s fair to say that we will return to double-digit \n\ngrowth, because we’re going to have some terrific new \n\nproducts that will allow us to enter new segments. The \n\nproduct will drive growth, but it would be a mistake to \n\ndiscount the increasing strength of brand recognition. \n\nWe’ve spent roughly a billion dollars in upgrading Nissan \n\ndealer facilities up to 2004. This will continue to some \n\ndegree in 2005 and 2006, while we’ve begun the same \n\nprocess for Infiniti. People see exciting change happening \n\nat Nissan and Infiniti. \n\nOver the long term, one minor risk for us is that we can \n\nno longer catch people by surprise. That was exciting, but \n\nthat period is gone, which represents a challenge for us. As \n\nwe come off a year with more than 20 percent growth, the \n\n\n \n \n \n \n [html]\n
some of the eye - popping numbers that we have in the past.
The reality is, of course, that we ’ re even stronger, but we
must keep up the momentum.
The U. S. market will continue to be strong, but the
competition will be even tougher. There may be some
separation between those companies that approach the
market the right way, and those that are struggling to find
their place. I consider Nissan very definitely one of the
former. We have a direction and a strategy, and we have
confidence that we can successfully implement the
strategy. If we stay focused, we will succeed.
If ' s important that we do. The North American market,
and the U. S. in particular, is generally a large contributor to
any foreign manufacturer ' s operations. It ' s a big and very
dynamic market, and that spells good news for Nissan. Our
growth, and our strength, is in the very areas where the U. S.
market is growing, We ’ re higher than average in the
Sunbelt states, whose growth in the coming years will
simply magnify ours. We score very well among young
people, a group that is becoming increasingly important.
We also rate highly among the rapidly growing Hispanic
population and the African - American population. Everything
is lining up for us — Nissan has the opportunity to pull away
from other players.*
", - "page_start": 64, - "page_end": 64, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**The recovery story is complete**\n\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up \n\nto all the challenges. We had a record year in revenues, operating profit, net income, sales \n\nvolume and production. \n\n**Sales performance**\n\nGlobal sales came to 3,388,000 units, which exceeded our forecast of 3,380,000 units. This \n\nrecord level represents an increase of 10.8 percent, or 331,000 units, over fiscal 2003, and is \n\n281,000 units more than the previous record level set in 1990. In fiscal 2004, we released nine \n\nall-new models globally. \n\nAlong with record sales, we achieved a global production record. Nissan’s manufacturing \n\nplants turned out 3,378,000 units, or 293,000 units more than the previous record. \n\n**Financial performance**\n\n• Consolidated net revenues came to 8 trillion ¥576.3 billion, up 15.4 percent from last year. \n\n• Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a \n\npercentage of net revenue, our operating profit margin came to 10.0 percent. \n\n• Net income reached ¥512.3 billion, an increase of ¥8.6 billion. \n\n**Nissan 180 commitments**\n\nFiscal 2004 marked the end of our NISSAN 180 business plan. Obviously, NISSAN 180 cannot \n\nbe closed completely until the end of September 2005, but we know that we have already \n\ndelivered two of the plan’s three critical commitments. \n\n• We committed to an 8 percent operating profit margin, and our margin has been at or above \n\n10 percent for every year of NISSAN 180. \n\n• We committed to zero debt, and today we have more than ¥200 billion in net cash under the \n\nnew and more demanding accounting standards. \n\n• Our only remaining commitment is to achieve one million additional sales. Even here we are in \n\nreasonably good shape. At the midpoint of the measurement period we are at 1,809,000 units, \n\nwhich is a slight advance compared to our commitment to reach 3,597,000 units by the end of \n\nSeptember 2005.", - "page_start": 7, - "page_end": 7, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**R&D Investment**\n\n(Billion yen) (% of net revenue) \n4.8% \n4.4% \n4.6% \n500 5 \n4.2% \n3.8% 398 \n354 400 4 \n300 \n262 \n300 3 \n232 \n200 2 \n\n100 1 \n\n0 0 \n**’00** **’01** **’02** **’03** **’04**\n\nand much more collaboration. The core engineering is \n\ncommon to all—that’s why the different organizations can \n\nwork together so closely, and why we’re more efficient \n\ntoday. While each engineering center remains responsible \n\nfor meeting the specific tastes or specifications that its \n\nlocal market demands, we have global oversight to ensure \n\nconsistency, with NTC supervising overall resource \n\nmanagement and facility investment. \n\nWe are building on these strengths through greater \n\ncollaboration with our suppliers—our project partners—and \n\ndoing it much further upstream. For example, we are \n\ncreating a facility at the NATC where we can disclose our \n\nplans to suppliers during the very early planning stages. \n\nThis means we have to be much more open than before, \n\nbut in return we will gain a great deal from the ideas our \n\npartners bring. \n\nThe Alliance with Renault is another major strength for \n\nNissan R&D. We identify areas of mutual interest and \n\ndecide which party will develop specific projects. Our basic \n\noperating principle is to avoid duplicated efforts. We can \n\nwork separately, or together if there is mutual interest in \n\nthe development. For example, we have studied fuel-cell \n\nvehicles—FCVs—as well as, advanced materials, safety, \n\nand other areas together. Our shared goal is to maximize \n\n**Patent**\n\n(xxxxxxx) \n5,000 \n\n4,000 \n\n3,000 \n\n2,000 \n\n1,000 \n\n0 \n**’99** **’00**\n\nO \nU \nR \n\nW \nO \nR \nK \n**Research Paper**\n\n120 \n100 \n80 \n60 \n40 \n20 \n0 \n**’00** **’01** **’02** **’03** **’04**\n\nThe number of research papers presented at JSME (The Japan Society of \nMechanical Engineers), JSAE (The Society of Automotive Engineers of Japan), SAE \n(The Society of Automotive Engineers), FISITA (The International Federation of \nAutomotive Engineering Societies)", - "page_start": 46, - "page_end": 46, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "OTC_NSANY_2004.pdf", - "query": "What was Nissan's vehicle production in Mexico in 2003?", - "target_page": 72, - "target_passage": "308,322", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "NISSAN HAS A GLOBAL PRESENCE. BORN IN JAPAN, WE ARE PERFECTLY \n\nAT HOME IN THE U.S., THE UK, SPAIN, THAILAND, CHINA, EGYPT, BRAZIL \n\nAND WELL OVER 150 OTHER NATIONS WHERE NISSAN CARS AND \n\nTHEIR COMPONENT PARTS ARE PRODUCED, SOLD AND DRIVEN. \n\nWITH NISSAN, DRIVING PLEASURE IS A SENSATION THAT KNOWS NO BORDERS. \n\nTHIS IS THE NISSAN SHIFT_\n\n\n\n\n\n\n\n\n\nO U R W O R L D", - "page_start": 59, - "page_end": 59, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "NISSAN IS A WORLD-CLASS AUTOMOBILE MANUFACTURER. \n\nTO ENVISION, PLAN, BUILD AND DISTRIBUTE MILLIONS OF AUTOMOBILES \n\nTO THE WORLD REQUIRES A CLEAR DEFINITION OF ROLES AND PROCESSES. \n\nAT NISSAN, OUR BUSINESS DIVISIONS COMMUNICATE IDEAS ACROSS COUNTRIES, \n\nCULTURES AND FUNCTIONS TO DEVISE THE TRANSPARENT, \n\nEFFICIENT SOLUTIONS THAT CREATE SUCCESS. THIS IS THE NISSAN SHIFT_\n\n\n\n\n\n\n\n\n\nO U R W O R K", - "page_start": 33, - "page_end": 33, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Exceeding expectations**\n**—the Nissan automobile**\n\n\nAt the center of everything we do stands the Nissan automobile. Our vehicles are the most \n\ntangible expression of our brand and the values of our company. We make cars that both inspire \n\npassion and exceed the expectations of our customers. Through bold and thoughtful designs, \n\ninnovative technologies, and a richer and more rewarding driving experience, we are defining \n\nour unique place in the auto industry. \n\nOur product development philosophy differs from that which many of our competitors follow. \n\nRather than focus on what the competition is providing, we concentrate on what they do not. \n\nWe listen to drivers to discover their unmet needs and desires, and follow the most promising \n\nthreads of emerging trends. Our designs are bold, geared to electrify and inspire. We see little \n\npoint in building vehicles that please everyone but excite no one. \n\nThe appeal of a Nissan goes much deeper than the fine lines of its body and the gleam of \n\nits paint. We make some of the world’s most advanced high-performance engines and \n\ntransmissions. From our renowned VQ engine series to the latest in high technology, \n\ncontinuously variable transmissions (CVT), we blend driving pleasure with safety, fuel efficiency, \n\nand real-world environmental solutions. \n\nNissan has a long history of leadership and innovation in the automotive industry. We began \n\nour quest to create the best cars in the world in 1933, when the company was founded in \n\nYokohama. The first Datsun passenger car rolled off the assembly line two years later. In the \n\nyears since, we have fashioned a reputation for bold and innovative products. We were the first \n\ncompany to design, manufacture and export a small pickup truck from Japan to the United \n\nStates, and to build and export a sports sedan, the Datsun 510. And we were the first to \n\nproduce a true sports car that was also affordable, the Z. Today, we build equally exceptional \n\nvehicles in factories throughout the world that consistently rank in the top tier for efficiency, \n\nproductivity and quality. \n\nIn the future, we will take the Nissan brand into new segments and markets. We will \n\naccelerate the pace of automotive evolution. And our products will continue to define our brand \n\nwith clarity and consistency that brings lasting value to all our stakeholders.", - "page_start": 23, - "page_end": 23, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "*Millions of*\n*U.S. dollars (Note 1)*\n*(except per*\n*share amounts)*\n2004 \n*Mar. 31, 2005*\n\n*Millions of yen*\n*(except per share amounts and number of employees)*\n\n2004 \n*Mar. 31, 2005* 2003 \n*Mar. 31, 2004* 2002 \n*Mar. 31, 2003* 2001 \n*Mar. 31, 2002* 2000 \n*Mar. 31, 2001* *For the years ended*\n\n¥8,576,277 ¥7,429,219 ¥6,828,588 ¥6,196,241 ¥6,089,620 \n$80,152 \nNet sales \n\n861,160 8,048 \nOperating income 824,855 737,230 489,215 290,314 \n\n512,281 4,788 \nNet income 503,667 495,165 372,262 331,075 \n\n125.16 1.17 \nNet income per share (Note 2) 122.02 117.75 92.61 83.53 \n\n94,236 881 \nCash dividends paid (Note 3) 74,594 50,800 27,841 0 \n\n¥2,465,750 ¥2,023,994 ¥1,808,304 ¥1,620,822 ¥ 957,939 \n9,848,523 \n\n$23,044 \nShareholder’s equity \n\n92,042 \nTotal assets 7,859,856 7,349,183 7,215,005 6,451,243 \n\n1,963,173 18,347 \nLong-term debt 1,694,793 1,603,246 1,604,955 1,402,547 \n\n525,926 4,915 \nDepreciation and amortization 461,037 371,125 374,827 360,191 \n\n183,607 \nNumber of employees 123,748 127,625 125,099 133,833 \n\nNotes: 1. Unless indicated otherwise, all dollar figures herein refer to U.S. currency. Yen amounts have been translated into U.S. dollars, for convenience \nonly, at ¥107 = $1, the approximate exchange rate on March 31, 2005. \n2. Net income per share amounts are based on the weighted average number of shares of common stock outstanding during each year. \n\nFigures for net income per share are in exact yen and U.S. dollars. \nNumber of shares outstanding as of March 31, 2005: 4,520,715,112. \n3. Cash dividends during the full year by subsidiary companies to non-Nissan minority shareholders are not included. \n\n\n \n \n \n \n [html]\n
Sales and Production ( units ) Potential2004Mw. 21.20052003Mex 31.20042002Mex 31.20032001Mus 31.20022000Mw. 31.2001
Global vehicle production3.293.3392.883.4092.586.6022.428.2792.475.730
Japan1.481.5631.475.0631.444.3141.272.8511.313.527
United States803.556619.665392.458353.366352.927
Mexico325.086308.322340.658328.946312.691
Spain142.889116.58984.919137.502136.807
United Kingdom319.652331.924297.719296.788327.792
Others51.57231.84626.53428.82631.986
Global unit sales ( wholesale )3.470.4222.946.7822.635.6862.460.4842.564.160
Japan819.152799.206792.767702.657725.842
North America ( Notes 1 and 2 )1.394.0991.204.8821.040.684958.030985.168
Europe ( Note2 )554.901548.693458.222453.697513.048
Others ( Note 1 )702.270394.001344.013336.100340.102
\n\nNotes: 1. Unit sales in Mexico are included in “North America.” \n2. Sales and Production for Europe and Mexico for each year are on a January to December basis. (In the annual reports for the fiscal years before \n2003, production for Europe and Mexico was on April to March basis.)", - "page_start": 71, - "page_end": 71, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "M A N U F A C T U R I N G \n\n\n\n**Building on World-Class**\n**Productivity and Efficiency**\nT A D A O T A K A H A S H I \nExecutive Vice President \n\nunfortunate, since it affected our ratings in the J. D. Power \n\nand Associates Initial Quality Study. We’ve since taken \n\neffective measures to resolve these problems. More \n\nimportantly, we learned from them. We created new \n\nsystems and new approaches to quality, which we then \n\napplied in Japan and to the new factories in China. \n\n“By following the Nissan Production Way and the \n\nprinciple of*doukiseisan*—meaning synchronization \n\nwith the customer—manufacturing at Nissan remains \n\nflexible and integrated, and keeps lead times short. \n\nThe Nissan Production Way incorporates integration at \n\nthe supplier, global and logistic levels. That is why we \n\nremain the most productive manufacturer in the world. \nIncidentally, the factories in China opened with no \n\nWe’ve also become much more efficient, as our \nsignificant quality issues. This highlights one of our ‘never- \n\nutilization rates show. In Japan, we were operating at \nending’ quests at Nissan, which is to identify problems and \n\n54 percent of capacity in 1999. In fiscal 2004 that \nrapidly get solutions for them in place. \n\nfigure increased to 86 percent, which is just about the \nWe do not rely solely on external quality evaluations. \n\nmaximum possible. During NISSAN Value-Up, we will \nIn cooperation with Renault, we created AVES, the Alliance \n\nincrease our global utilization rate from approximately \nVehicle Evaluation System. AVES is a sophisticated \n\n74 percent to over 80 percent. We will not achieve that \nprocess involving two people taking four to five hours to \n\nevaluate a vehicle. Because it is time-intensive, we also \n\ndevised a short version of AVES that only takes an hour \n\nand can be done at the factory. \n\nThe second major area of focus is logistics, which is \n\nbecoming more complicated. We send engine parts to the \n\nU.S., and soon we will be shipping more parts from leading \n\ncompetitive countries, or LCCs. During 2004, we \n\nencountered cargo-handling problems on the U.S. West \n\nCoast, which highlighted the need for a more sophisticated \n\ntracking system. If we had had such a system in place, we \n\ncould have anticipated those problems and made the \n\nnecessary adjustments. \n\nWhile Nissan’s productivity leads the world, we have \n\nnot stopped working to improve the process. One system \n\nwe have implemented is the Design Standard Time Ratio, \n\nwhich allows us to calculate the ideal standard time for \n\nevery operation. By applying this globally, we have brought \n\nall our branches around the world to nearly the same level. \n\nThis in turn illustrated that we can produce vehicles more \n\ncheaply and with good productivity in the LCCs. Another \n\nopportunity discovered for the LCCs was in low-cost jig \n\nand die making. As a result, we have doubled the capacity \n\nManufacturing achieved a series of milestones during \n\nNISSAN 180. One of the biggest was opening the Canton \n\nplant in the U.S., which got up to speed quickly, launching \n\nfive new vehicles in a period of just eight months. We built \n\ntwo plants in China, and restarted operations in Egypt. We \n\ndramatically expanded the Decherd, Tennessee engine \n\nplant in the U.S., and all engines for North America are now \n\nbuilt at Decherd or at our plant in Mexico. \n\nWe also commenced cross-production with Renault: \n\nNissan began building Renault’s Platina in Mexico and its \n\nTraffic in Spain, while Renault began building our Pickup \n\nand Xterra at its factory in Brazil. We also started \n\nproduction of common engines with Renault, with our \n\nsubsidiary Aichi Kikai and the Yokohama plant producing \n\nthe four-cylinder engines used in our new Tiida, Note and \n\nLafesta models. In Japan, we launched six new models in \n\njust six months—the Murano, Fuga, Lafesta, Tiida, Tiida \n\nLatio and Note. We also launched three vehicles—the Tiida, \n\nTeana and Tiida Latio—in China.", - "page_start": 51, - "page_end": 51, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "[html]\" Europe is one of the most fragmented automotiveNissan is still a small player in the region, selling 550.000 cars across a very large and diverse territory that stretchesmarket in the world and intervention a highly competitive one besidence besides. Despite or up / designed interventions and size. Signally relatively smarkers, and size, however, energy to have beeput to participants the participantifrom the Afaetic Ocean to Riussia, and from Finland to brael, In the past we covered the area through multiple distribution channels, which we are currently in the process of simplifying. A few aspects of the European market have made profoEurope. In fact, although Prescribers the levels of profilability here the levels of profilability here t. S. or other markets generate, we surpassedtransmissions. The cars must also be engineered to suit the high driving speeds typical in the region and ensure superior handling, which results in higher cods. As in many other mature markets, an incentive war is ransions in Funnee. Nins--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------use incentives selectively and to always protect profitability. Providing products which customers recognize and appreciate for their style and attributes rather than being theThe brand is strongly associated with 4a4ay, off - road vehicles and pickup trucks.now have a wide range of products, five of which were newly launched in 2005, including the Pathfinder and the Navarathere is also a solid heritage built around a model designed for urban driving. Bothnd second generations of this car were veryJ, and the third generation is performingpickup. We will release the Micra C + C at the Frankfurt Michor Show in September, giving customers the option of a unique standard glass roof in a fully retracting hard convertible top. Nissan ’ s manufacturing still defines the leading edgNursing and cases our 464 heritage and SUV strength assenger car segment, Nissan is developingEurope. According to The Harbour Report, our plant in Sunderland is the most productive plant in Europe. Surgeriand will scheft production on a new R - severely rarcrossover vehicles that blend car - ike nce with 4x4 versatility. The Qashgai concept troduced at the 2004 Geneva Motor Show is f these — smaller, more affordable, andSunderland will start production on a new 8 - segment car based on the Tone concept car in early 2006, followed by the Qashqai crossover vehicle in early 2007. Our Barcelona plant, which manufactures SUVs, 44 - and lightControls to European roads. The Qashqai will oduction in our plant in Sunderland in thecommercial vehicles, will reach full capacity in mid - 2005. Finally, our truck plant in Avila, Spain, which specializes in3007. The Murano, launched this year, is or to the Qashqai in the larger executive Europeans have already taken to thelight - duty trucks, will start producing a replacement for the popular Cabstar in late 2006. This efficient production base is a critical part of our profilable growth scenario.Interviewers without survival forecasts in ts. This car is helping make Nissan a brand le aspire to own.NSSSAN Value - Up has given us a plan for building both profit and volume. We will not, however, sacrifice profit to gain volume. How far we can go depends on how fact we deliver results. I believe that we have much more room to grow, and to", - "page_start": 62, - "page_end": 62, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "T E C H N O L O G Y \n\n\n\nWe have succeeded in shortening our production \n\npipeline, too, using a new vehicle development process \n\ncalled V3P that our engineers devised over the past three \n\nyears. V3P, which stands for Value-up innovation of \n\nProduct, Process, and Program, has helped us cut our \n\ndevelopment time almost in half, from 20 months to just \n\n10.5 months. I believe this makes Nissan the world \n\nbenchmark in development. That improvement is having a \n\nmajor effect on the flexibility and execution of R&D at \n\nNissan, and will ultimately boost the company’s profitability. \n\nThe number of new products we have brought to \n\nmarket over the past three years is equally significant— \n\nmore than thirty new vehicles. That’s an impressive \n\nengineering achievement, and the reason you are seeing \n\nso many new Nissan models on the road. \n\nOur R&D infrastructure, however, is still in need of \n\nexpansion. We’ve therefore begun building new facilities at \n\nthe Nissan Technical Center, NTC, and at the Nissan \n\nAdvanced Technical Center, NATC, both of which are in \n\nJapan. These additions represent a major investment, and \n\nshow Nissan’s dedication to maintaining and enhancing its \n\ntechnological skills. \n\nOur technology base is in Japan, where we have some \n\nten thousand people involved in R&D, but we also have two \n\nmajor centers in North America and Europe, and smaller \n\noperations in Taiwan, China, Thailand, South Africa and \n\nBrazil. In the past, these entities were mostly standalone \n\noperations, but today there are many more joint projects \n\n**Pursuing Value Through**\n**Technological Excellence**\n\n“I have two prime objectives. The first is to realize our \n\ncorporate vision, ‘Enriching people’s lives,’ from an \n\nengineering standpoint. The second is to create a \n\nfuture vision for people working in R&D. Research and \n\ndevelopment is all about providing practical value to \n\nthe customer via technological excellence, which in \n\nturn creates value for our shareholders. Nissan has \n\nmade a major commitment to technological excellence \n\nso that we can accomplish these objectives. \n\n**Research and Development**\n\nNissan’s investment in R&D has been rising. In fiscal 2004 \n\nwe devoted approximately ¥400 billion to it, equivalent to \n\n4.6 percent of our turnover. We estimate that our financial \n\ncommitment to R&D will continue to range between 4.5 \n\nand 5 percent. R&D investments take a lot of time to pay \n\noff, of course, so it’s difficult to evaluate our evolution \n\nover the short term. Given our expanded output, however, \n\nI believe that we are headed in the right direction. \n\nFor example, the number of patents we have generated \n\nis growing quickly, exceeding 4,000 in fiscal 2003—more \n\nthan twice the fiscal 1999 figure. And the number of \n\nresearch papers we present at societies such as The Japan \n\nSociety of Mechanical Engineers rose dramatically in fiscal \n\n2004. These are direct results of our commitment to \n\nresearch. We are also generating more new technologies \n\nrelated to safety and the environment, such as the Around \n\nView Monitor and the lane-keeping system.", - "page_start": 45, - "page_end": 45, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Nissan Canada, Inc. Mississauga, Ontario \n\n\n \n \n \n \n [html]\n
MexicoNissan Mexicana, S. A. de C. V.Mexico D. F.Manufacture and sales of automobiles and partsP17.056
100.00
\n\nE \nT \nA \nR \nO \nP \nR \nO \nC", - "page_start": 107, - "page_end": 107, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "the launches are separate activities. In the future, we will \n\n‘bundle’ all launches by developing the launch process and \n\ncreating the dies in Japan. This bundle will then be \n\nreproduced and forwarded to the various factories \n\nproducing the car. \n\nWe have established four key factors for success \n\nduring NISSAN Value-Up: quality, timely delivery, cost, and \n\nthe environment. Regarding the environment, we have \n\nidentified three environmental issues, which are CO2, \n\nrecycling, and emissions such as chemical emissions and \n\nvolatile organic compounds. This is our newest challenge, \n\nsince we do not yet have concrete targets on a global scale \n\nas we do for Japan. \n\nOur goal is to maintain Nissan’s status as the world \n\nleader in manufacturing by aggressively implementing new \n\ntechnologies and expertise. Our processes are designed \n\nto require low investment costs and generate fast product \n\nlaunches, which would result in a faster return on \n\ninvestment in addition to a top-quality product.” \n\nThe above are all part of the Nissan Integrated \n\nManufacturing System, known as NIMS, which provides \n\nmore flexibility in manufacturing. Using NIMS, for example, \n\nwe can produce eight models on a single line. During \n\nNISSAN 180, we introduced 16 NIMS lines worldwide into \n\nour 18 total major lines. For NISSAN Value-Up, we will \n\nincrease this to 22 NIMS lines. \n\nWe will need that flexibility during NISSAN Value-Up, \n\nbecause twice a month we will be launching new cars \n\nsomewhere—a total of 70 production starts. We cannot do \n\nthis with our old system. The launch stage can be a difficult \n\nperiod, and too often problems arise that can cause panic \n\non the line. To cope with these problems, we’ve devised \n\nwhat we call the Global Launching Expert system. The \n\nlaunch expert can stand back and analyze the situation and \n\ncome up with solutions. We are now identifying, educating \n\nand dispatching launch experts from around the world. In \n\n2006, we will further refine our launch procedures by \n\nopening the Global Production Engineering Center. \n\nCurrently, if we produce the same car in several markets, \n\n\n\nEEuurrooppee \n\nM A N U F A C T U R I N G I N E U R O P E \n\n“In the last four years the Nissan Production \nWay has become the international standard for \nmanufacturing in the world. This system makes \nsense everywhere, including Japan, the UK, \nSpain, and the U.S. It’s a system that everyone \nembraces and feels is theirs, not one that was \nimposed on them. The Sunderland plant is the \nmost productive automotive plant in the Western \nworld, and while we have great people working \nfor us, the Nissan Production Way is what made \nthis success possible. \nWe decided not to compete directly in \nfundamental segments. Instead, we chose to \nbuild unique, profitable vehicles, like the new \ncrossover vehicle, based on the Qashqai \nconcept car, which will be released in early \n2007. This is one of the three launches for the \nupcoming year from the Sunderland plant, along \nwith the Tone and the Micra C+C coupe and \ncabriolet. NISSAN 180 was a great success for \nus. Today, our Spanish factory is in full \nproduction and our Sunderland plant is \npreparing to turn out the three new models.” \n\nC O L I N D O D G E \nSenior Vice President \nNissan Europe \n\nEurope is an incredibly competitive market, \nwith 15 companies trying to gain market share.", - "page_start": 53, - "page_end": 53, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**The recovery story is complete**\n\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up \n\nto all the challenges. We had a record year in revenues, operating profit, net income, sales \n\nvolume and production. \n\n**Sales performance**\n\nGlobal sales came to 3,388,000 units, which exceeded our forecast of 3,380,000 units. This \n\nrecord level represents an increase of 10.8 percent, or 331,000 units, over fiscal 2003, and is \n\n281,000 units more than the previous record level set in 1990. In fiscal 2004, we released nine \n\nall-new models globally. \n\nAlong with record sales, we achieved a global production record. Nissan’s manufacturing \n\nplants turned out 3,378,000 units, or 293,000 units more than the previous record. \n\n**Financial performance**\n\n• Consolidated net revenues came to 8 trillion ¥576.3 billion, up 15.4 percent from last year. \n\n• Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a \n\npercentage of net revenue, our operating profit margin came to 10.0 percent. \n\n• Net income reached ¥512.3 billion, an increase of ¥8.6 billion. \n\n**Nissan 180 commitments**\n\nFiscal 2004 marked the end of our NISSAN 180 business plan. Obviously, NISSAN 180 cannot \n\nbe closed completely until the end of September 2005, but we know that we have already \n\ndelivered two of the plan’s three critical commitments. \n\n• We committed to an 8 percent operating profit margin, and our margin has been at or above \n\n10 percent for every year of NISSAN 180. \n\n• We committed to zero debt, and today we have more than ¥200 billion in net cash under the \n\nnew and more demanding accounting standards. \n\n• Our only remaining commitment is to achieve one million additional sales. Even here we are in \n\nreasonably good shape. At the midpoint of the measurement period we are at 1,809,000 units, \n\nwhich is a slight advance compared to our commitment to reach 3,597,000 units by the end of \n\nSeptember 2005.", - "page_start": 7, - "page_end": 7, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_SEA_2014.pdf", - "query": "Why did Sundance Energy's oil sales improve in 2014?", - "target_page": 18, - "target_passage": "The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a decrease in product pricing ($15.7 million). ", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]ANNUAL PERCENTAGE CHANGEYEAR\n
IN 2P PV10 ( NET ASSET VALUE ) PER DEBT ADJUSTED SHAREIN SUNDANCE PRICE PER SHAREIN ASX2002014
21.6 %- 48.0 %1.1 %2013
63.3 %29.9 %15.1 %2012
- 15.6 %87.8 %14.6 %2011
59.7 %- 44.6 %- 14.5 %
\n\n*Dear Fellow Shareholders,*\n\n*2014 Review — 2014 was a year of stark economic contrasts*\n*in our industry. During the first half as in the past several years,*\n*historically volatile West Texas Intermediate oil prices seemed*\n*range bound between $80 and $110 with geopolitical events*\n*driving prices towards the ceiling and demand risks pushing*\n*prices towards the floor of the range.*\n\nCEO’S REPORT \n\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap \nand plentiful debt, on horizontal drilling and completions to drive production growth \nwhile making material strategic acquisitions in order to increase their long-term \nexposure to oil prices. \n\nThe easy credit environment caused asset prices to increase significantly to the point \nwhere, in our view, risk adjusted returns on new acquisitions were threatening cyclical \nlows. In line with our strategy, Sundance had monetized several mature assets realizing \n\n~$50 million in current period gains while freeing up \n~$165 million in invested capital. \nSundance’s Performance versus the ASX 200 \n\nWe primarily reinvested this capital in production growth \nand cash flow with only about $75 million reinvested in \nacquiring oil and gas leases and producing properties. This \nresulted in our production increasing from 5,028 BOEPD \nto 9,434 BOEPD by December 2014 and full year EBITDAX \nincreasing $73.8 million to $126.4 million in 2014. Had \nprices stayed steady, we likely would have generated \nearnings before income taxes of over $85 million and a \nreturn on capital in excess of 20%. \n\nOur second capital priority for the year was to conclude the appraisal of the Woodford \nformation in our Logan County, Oklahoma assets. We viewed this relatively modest, but \nhigher risk, investment as having a 25% chance of success with a 15x upside. Unfortunately, \nwe met with mixed success in our appraisal activities proving that in today’s onshore \nUS oil and gas industry that the best absolute returns are generated by drilling in proved \nregions. There are plenty of solid opportunities to efficiently grow the business without \nexposure to undue geologic risk. \n\nLike many prior bubbles driven by new technologies, the second half of the year saw the \npricing environment come crashing down around us. The market became fundamentally \nunbalanced, driving prices down almost 50% and rendering material portions of global \noil and gas development uneconomic. \n\nOur peers went from talking about their growth prospects to fretting about cash costs \nand liquidity, a stark contrast from the go-go growth times which existed in the first half \nof the year. This shift in industry strategy has now come in line with our general business \nphilosophy — in the resource space, low-cost, low debt businesses will survive and thrive \nacross cycles; and, relative to our US onshore peer group, Sundance boasts a top 15% \ncost structure and balance sheet.", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "A year of growing production, cash flow and reserves \nIn line with our strategy we continued to increase the level of company operated assets, \nand successfully maintained a very strong focus on optimising our operations and reducing \ncosts. This resulted in an impressive improvement in well performance combined with a \ntop tier cost structure. \n\nThrough our operated development program, we ended 2014 with record production \nof 9,434 barrels of oil equivalent per day (BOEPD) compared with an exit rate of 5,028 \nBOEPD in December 2013 and an average annual production of 6,635 BOEPD compared \nto 3,015 BOEPD in 2013. During 2014 we drilled and completed 42.7 net wells, primarily \nin the Eagle Ford, bringing our total well count to 81.3 by 31 December 2014. High \nvalue oil comprised approximately 69 percent of our total 2014 annual production \nand production from Sundance-operated projects accounted for 89 percent of total \nproduction for the year. \n\n*Dear Fellow Shareholders,*\n\n*I am pleased to present Sundance Energy Australia Limited’s*\n*Annual Report for the 12 months ended 31 December 2014. It*\n*has been another year of significant progress for Sundance*\n*across our portfolio of liquids rich oil and gas assets in the US.*\nCHAIRMAN’S LETTER \n\nThe Company’s strategic focus on growing production, cash flows and reserves from \nlarge, repeatable resource plays in North America continues to deliver positive results \nwith growth in production, cash flows, and reserves. \n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston \nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent; \nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado \nfor $114 million which realised an internal rate of return of 104 percent. These divestitures \nof smaller, less scalable positions enabled us to focus on developing and growing our \nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma. \n\nDespite the reduction in crude oil and liquids prices towards the end of the year \nand continuing into 2015, the operational performance and focused, value-adding \ntransactions during the past year have positioned the Company very favourably for \nfuture growth in net asset value and shareholder returns. \n\n*Despite the reduction in*\n*crude oil and liquids*\n*prices towards the end of*\n*the year and continuing*\n*into 2015, the opertional*\n*performance and focused,*\n*value-adding transactions*\n*during the past year have*\n*positioned the Company*\n*very favourably for future*\n*growth in net asset value*\n*and shareholder returns.*\nCorresponding with the growth in annual production, the Company’s full year revenues \nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million. \n\nThe Company’s development program also generated significant growth in Constant Case \nreserves during the year. More details are contained elsewhere in this Annual Report, \nbut in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1 \nMBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6 \nMBOE, and 92.8 MBOE, respectively, at the end of 2013. \n\nIn the current price environment, we have elected to scale back our drilling program to \nmainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will \nenable us to maintain our low leverage profile, which was approximately 1.03x debt to \nAdjusted EBITDAX at year end, and focus on growing our drilling inventory in an environ- \nment with less competition for leases and small acquisitions. Liquidity was $84 million at \nyear end, with a borrowing base redetermination in 2015 expected to materially increase \ndebt availability if the use of such funds is justified in line with our strategy.", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "The Eagle Ford – driving value and production growth \nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the \nbasin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014 \nwhich includes the acquisition of approximately 18,000 net acreage in 2014. By the end of \nthe first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence \nin this prolific oil and gas region has been driving significant value for the Company and \nour shareholders, and continues to form our priority focus for development and acreage \ngrowth in the coming years. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "At year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford \nacreage where we continue to pursue operational and drilling efficiencies, opportunities \nto further improve well economics by improving recoveries and reducing costs. In 2014 \nthis included a switch to pad drilling with zipper fracs and new completion techniques \nthat have provided significant upside in production. \n\n*The Company has a*\n*strong balance sheet to*\n*withstand the current low*\n*oil price environment,*\n*and our sound financial*\n*management strategy*\n*has seen the Company*\n*well supported by*\n*both new and existing*\n*investors in Australia*\n*and internationally.*\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance \nat 7,850 – 8,500 BOEPD, an increase from the previous year of some 13 – 17 percent, \nbut a target that we believe is achievable while maintaining acceptable levels of liquidity \ngiven our demonstrated abilities and growing footprint in the Eagle Ford. \n\nSafety and Environment \nSundance has a strong culture throughout the organisation of ensuring that high standards \nof safety are maintained and that our operations are conducted in an environmentally \nresponsible way. During 2014 our comprehensive safety program was enhanced and \nfurther improvements will be a strong focus throughout 2015. \n\nA strong financial position \nSundance is well placed for future growth in the Eagle Ford. The Company has a strong \nbalance sheet to withstand the current low oil price environment, and our sound financial \nmanagement strategy has seen the Company well supported by both new and existing \ninvestors in Australia and internationally. \n\nWe expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. \n\nOn behalf of the Board and Company, I would like to thank our shareholders for your \nstrong support of the Company throughout the year. We are committed to delivering \nlong-term value for our shareholders and I look forward to reporting over the rest of the \ncoming year on the continued value creation and growth of Sundance. \n\nYours sincerely,", - "page_start": 4, - "page_end": 4, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**(In US$‘000s)**\n\n**IFRS Profit Loss Reconciliation to Adjusted EBITDAX:**\n\nProfit attributable to owners of Sundance .................................................. \n\nIncome tax (benefit)/expense ...................................................................... \n\nFinance costs, net of amounts capitalised and interest received ................ \n\n(Gain) Loss on derivative financial instruments ........................................... \n\nSettlement of derivative financial instruments............................................ \n\nDepreciation and amortisation expense ...................................................... \n\nImpairment of non-current assets ............................................................... \n\nExploration expense..................................................................................... \n\nStock compensation, value of services ........................................................ \n\nGain on sale of non-current assets .............................................................. \n\n**Adjusted EBITDAX .......................................................................................**\n\n**EBITDAX Margin ..........................................................................................**\n\n\n \n \n \n \n [html]\n
Year ended 31 December2014
201315.321
15.942( 841 )
5.567494
( 232 )( 10.792 )
5541.150
28285.584
36.22571.212
-10.934
-1.915
1.590( 48.604 )
( 7.335 )126.373
52.59479 %
62 %
\n\n***Exploration and Development***\n\nFor the month of December 2014, the Company achieved record production of 9,434 Boe/d, which included 869 Boe/d of \nflared gas from wells waiting to hook-up to pipelines. The December 2014 exit rate increased 88% over prior year’s exit rate \nof 5,028 Boe/d. During the year ended 31 December 2014, the Company produced 2.4 MMBoe, which included 0.2 MMBoe \nof flared gas. This result was more than double the production in prior year, primarily as a result of increased drilling activity \nand production in the Eagle Ford Basin. \n\nThe Company’s exploration and development activities are focused in the Eagle Ford and the Mississippian/Woodford \nFormations. Costs incurred for development and production expenditures for the Eagle Ford and Mississippian/Woodford \nFormations during the year ended 31 December 2014 totalled $324.0 million, which included $295.9 million of drilling and \ndevelopment expenditure related to our 2014 plan, $3.8 million on infrastructure, and $24.3 million of drilling and \ndevelopment expenditure related to our 2015 plan. This investment resulted in the addition of 75 gross (42.7 net) wells into \nproduction, including 50 gross (39.5 net) Sundance-operated horizontal wells. An additional 24 gross (13.7 net) wells were \ndrilling, being prepared for fracture stimulation or testing as at 31 December 2014, an increase of 7 gross (3.0 net) compared \nto the beginning of the year.", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "*Through our emphasis on operating and G&A cost control*\n*initiatives, the Company’s record oil and natural gas sales*\n*translated to best-in-class Adjusted EBITDAX Margin (79*\n*percent) among peers our size and a full 10 absolute percentage*\n*points higher than the average of our entire peer group.*\n\nAs a result of its significant production increase, the Company’s 2014 oil, NGL and natural \ngas sales revenue increased by $74.4 million to $159.8 million; an 87 percent increase \ncompared to $85.3 million in 2013. \n\nREVENUE (US$000s) AND PRODUCTION (Boe/d) \n\n10,000 $50,000 \n\n8,000 $40,000 \n\n6,000 $30,000 \n\n4,000 $20,000 \n\n2,000 $10,000 \n\n Q1-13 Q2-13 Q3-13 \n\nQ1-14 \nn REVENUE —— Boe/d \n\nQ4-13 Q2-14 Q3-14 Q4-14 \n\nThis topline growth resulted in Adjusted EBIDTAX increase of $73.8 million to $126.4 \nmillion (79 percent of revenue); a 140 percent increase compared to $52.6 million \n(62 percent of revenue) in 2013. In other words, for every $1.00 of revenue growth \ncompared to 2013, the Company added $0.99 of 2014 Adjusted EBITDAX growth. \n\nThis Adjusted EBITDAX (generally a good proxy for our \noperating cash flow) increase was primarily the result of \nincreased revenue and the following cost controlled \noperating expenses: \n\nADJUSTED EBITDAX AND MARGIN \n\n$40,000 100% \n\n$35,000 \n80% \n$30,000 \n\n•*Lease operating expenses*increased only slightly (12 percent), \ndespite significant production increases (108 percent). \nAs a result of several changes in its field operations and \neconomies of scale, the Company has realized improvement \nin its lease operating costs per barrel. \n\n$25,000 \n60% \n$20,000 \n40% \n$15,000 \n\n$10,000 \n\n20% \n$5,000 \n\n•*Production taxes*also only increased slightly (11 percent), \ndespite significant revenue increase (87 percent). Through a \nseries of strategic dispositions, the Company has shifted its \nstate production mix from primarily high severance tax rate \njurisdictions (states of Colorado and North Dakota) to lower severance tax rate jurisdictions \n(states of Texas and Oklahoma). \n\n Q1-13 Q2-13 Q3-13 Q4-13 Q1-14 Q2-14 Q3-14 Q4-14 \n\nn ADJUSTED EBITDAX (US$000s) \n—— ADJUSTED EBITDAX MARGIN (%) \n\n•*General and administrative expenses*remained relatively flat compared to prior year. \nThis is primarily due to the fact that the Company began ramping up staffing in 2013 as \nit expected development growth in late 2013 and 2014. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "\n \n \n \n \n [html]December\n
Change inChange as
20142013$%
144.99479.36565.62982.7
6.1612.7743.387122.1
8.6383.2065.432169.5
159.79385.34574.44887.2
\n\n**Net sales volumes:**\n\nOil (Bbls) ............................................................................... \n\nNatural gas (Mcf) ................................................................. \n\nNGL (Bbls) ............................................................................ \n\nOil equivalent (Boe) ............................................................. \n\nAverage daily production (Boe/d) \n\n\n \n \n \n \n [html]20142013Volume\n
%L, 675.078
827.432847.646102.41.803.000
934.200868.80093.0267.952
95.821172.131179.62.243.529
1.078.9531.164.576107.96.147
2.9563.191107.9
\n\n**Barrel of oil equivalent (Boe) and average net daily production (Boe/d**). Sales volume increased by 1,164,576 Boe (107.9%) \nto 2,243,529 Boe (6,147 Boe/d) for the year ended 31 December 2014 compared to 1,078,953 Boe (2,956 Boe/d) for the prior \nyear due to successfully bringing online 88 gross (50.1 net) producing wells primarily \nin the Eagle Ford and \nMississippian/Woodford Formations. \n\nThe Eagle Ford contributed 4,187 Boe/d (68.1%) of total sales volume during the year ended 31 December 2014 compared to \n1,371 Boe/d (46.4%) during the prior year. Mississippian/Woodford contributed 1,433 Boe/d (23.2%) of total sales volume \nduring the year ended 31 December 2014 compared to 503 Boe/d (17.0%) during the prior year. Our sales volume is \noil-weighted, with oil representing 75% and 77% of total sales volume for the year ended 31 December 2014 and 2013, \nrespectively. \n\n**Oil sales.**Oil sales increased by $65.6 million (82.7%) to $145.0 million for the year ended 31 December 2014 from $79.4 million \nfor the prior year. The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a \ndecrease in product pricing ($15.7 million). Oil production volumes increased 102.4% to 1,675,078 Bbls for the year ended 31 \nDecember 2014 compared to 827,432 Bbls for the prior year. The average price we realised on (NGL) the sale of our oil \ndecreased by 9.8% to $86.56 per Bbl for the year ended 31 December 2014 from $95.92 per Bbl for the prior year.", - "page_start": 17, - "page_end": 17, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**Natural gas sales.**Natural gas sales increased by $3.4 million (122.1%) to $6.2 million for the year ended 31 December 2014 \nfrom $2.8 million for the prior year. The increase in natural gas revenues was primarily the result of increased production \nvolumes ($2.6 million) and improved product pricing ($0.8 million). Natural gas production volumes increased 868,800 Mcf \n(93.0%) to 1,803,000 Mcf for the year ended 31 December 2014 compared to 934,200 Mcf for the prior year. The average price \nwe realised on the sale of our natural gas increased by 15.1% to $3.42 per Mcf for the year ended 31 December 2014 from \n$2.97 per Mcf for the prior year.", - "page_start": 17, - "page_end": 17, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n**NOTE 20 – OTHER NON-CURRENT ASSETS**\n\n**2013**\n**US$’000** **Year ended 31 December**\n\n\n \n \n \n \n [html]\n
Escrow accounts9982.000
Other-19
Total other non - current assets9982.019
NSDTE 21 − TRADE AND OTHER PAYANUS AND ACCRUED EXPENSES20142013
Year ended 31 DecemberUS $ 7000US $’ 000
Oil and natural gas property and operating related117.117123.938
Administrative expenses, including salaries and wages__2.0775.146
Total trade, other payables and accrued expenses__119.194. 129.084
\n\nAt 31 December 2013, the Group had payable balances of $16.7 million which was outside normal payment terms, \noffset by a receivable balance of $11.7 million to the same creditor company (see Note 12 for additional \ninformation). The Company’s remaining Bakken assets were sold to this company in July 2014, for approximately \n$14.0 million, including the settlement of the net liability. \n\n**NOTE 22 – CREDIT FACILITIES**\n\n\n \n \n \n \n [html]\n
Year ended 31 December2014 US $ 0002013 US $ 0000
Senior Credit Facility95.00015.000
Junior Credit Facility35.00015.000
Total credit facilities130.00030.000
Deferred financing fees( 1.195 )( 859 )
Total credit facilities, net of deferred financing fees. 128.8059.141
\n\n**Junior Credit Facility**\n\nIn August 2013, Sundance Energy, Inc. (“Sundance Energy”), a wholly owned subsidiary of the Company, entered \ninto a second lien credit agreement with Wells Fargo Energy Capital, Inc., as the administrative agent (the “Junior \nCredit Facility”), which provides for term loans to be made in a series of draws up to $100 million. The Junior Credit \nFacility matures in June 2018 and is secured by a second priority lien on substantially all of the Company’s assets. \nUpon entering into the Junior Credit Facility, the Company immediately borrowed $15 million pursuant to the terms \nof the Junior Credit Facility and paid down the outstanding principal of the Senior Credit Facility. In May 2014, the \nCompany’s borrowing capacity increased to $35 million. As at 31 December 2014, the borrowing capacity under the \nJunior Credit Facility remains at $35 million.", - "page_start": 87, - "page_end": 87, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "[html]I − 11 N PAI VI VL + 1 PA L − ($ in millions, except per share data )PAL V IL V77Years Ended December 31Financial and Operating Data2010200920082007200620052004-RevenuesNatural gas and oil sales5.647$5.049$7.858$ 5.62$5.619$3.273$StatementMarketing, gathering, compression and service operations sales3.7192.6533.7712, I761.7071.392773Total revenues9.3667.70211.6297.8007.3264.6652.709Percentage (%)Production expenses89387688964049030205Production taxes157107284216176208104General and administrative espenses4533493772431396437Marketing, gathering, compression and service operations expenses3.5602.4983.6482.0635901.358755Depreciation, depletion and amortization1.6141.6I5χ1441.9884629456llImpairments and other__ ( II6II, 202830___SS−S____ Total operating costs. 5616.647_10.0725.600.9122.892________________________________________________________________________________________________________________________________________________________________________________________________________Income ( loss ) from operations1.805( 8.945 )1.4572.650All1.775991Interest expense...( II3 )( 271 )( 40 %)( 316( 221 )( 167 )Other income ( expense )243( 28 )( II )1526105Miscellaneous gains ( losses )_ ( 145202 )( 184 )8310_ ( 70 )( 25 )____ Total other income ( expense )_________________________________________________________________________________________________________________________________________________________________________________________________________ ( 343 )( 466 )_ ( 303( 103Q8( 187 )Income ( loss ) before income taxes and cumulative effect of accounting change2.884( 9.288 )9912.3473.2411.492805Income tax expense ( benefit ):Current−4423295−−Deferred________________________________________________________________________________________________________________________________________________________________________________________________________3.487( 36 )8631.242S45__290Net income ( loss ) before cumulative effect of accounting change, net of tax1.774( 5.805 )6041.4551.9949475I5Net ( income ) loss attributable to noncontrolling interest( 25 )––−–−Cumulative effect of accounting change, net of", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_SEA_2014.pdf", - "query": "I heard that Sundance Energy has acquired land in South Texas in July 2014, where is it?", - "target_page": 21, - "target_passage": "In July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South Texas", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "The Eagle Ford – driving value and production growth \nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the \nbasin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014 \nwhich includes the acquisition of approximately 18,000 net acreage in 2014. By the end of \nthe first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence \nin this prolific oil and gas region has been driving significant value for the Company and \nour shareholders, and continues to form our priority focus for development and acreage \ngrowth in the coming years. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "*Acquisitions*\nIn April 2014, the Company acquired approximately 4,800 net acres in the Eagle Ford for an initial purchase price of \napproximately $10.5 million and two separate earn out payments due upon commencement of drilling in each of three blocks \nof acreage (total for all three blocks of $7.7 million) and payout of the first two wells drilled on each block of the acreage \n($7.7 million). The term of the agreement is two years and provides a one year extension for $500 per acre extended. This \nacquired acreage is adjacent to our existing acreage in McMullen County, Texas. \n\nIn July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South \nTexas, for approximately $36 million and a commitment to drill four Eagle Ford wells. The Company also has the option, at its \nsole discretion, to acquire the Seller’s remaining working interest for an additional $45 million for the earlier of one year from \nclosing the acquisition or six months from first production of hydrocarbons.", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "\n \n \n \n \n [html]ANNUAL PERCENTAGE CHANGEYEAR\n
IN 2P PV10 ( NET ASSET VALUE ) PER DEBT ADJUSTED SHAREIN SUNDANCE PRICE PER SHAREIN ASX2002014
21.6 %- 48.0 %1.1 %2013
63.3 %29.9 %15.1 %2012
- 15.6 %87.8 %14.6 %2011
59.7 %- 44.6 %- 14.5 %
\n\n*Dear Fellow Shareholders,*\n\n*2014 Review — 2014 was a year of stark economic contrasts*\n*in our industry. During the first half as in the past several years,*\n*historically volatile West Texas Intermediate oil prices seemed*\n*range bound between $80 and $110 with geopolitical events*\n*driving prices towards the ceiling and demand risks pushing*\n*prices towards the floor of the range.*\n\nCEO’S REPORT \n\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap \nand plentiful debt, on horizontal drilling and completions to drive production growth \nwhile making material strategic acquisitions in order to increase their long-term \nexposure to oil prices. \n\nThe easy credit environment caused asset prices to increase significantly to the point \nwhere, in our view, risk adjusted returns on new acquisitions were threatening cyclical \nlows. In line with our strategy, Sundance had monetized several mature assets realizing \n\n~$50 million in current period gains while freeing up \n~$165 million in invested capital. \nSundance’s Performance versus the ASX 200 \n\nWe primarily reinvested this capital in production growth \nand cash flow with only about $75 million reinvested in \nacquiring oil and gas leases and producing properties. This \nresulted in our production increasing from 5,028 BOEPD \nto 9,434 BOEPD by December 2014 and full year EBITDAX \nincreasing $73.8 million to $126.4 million in 2014. Had \nprices stayed steady, we likely would have generated \nearnings before income taxes of over $85 million and a \nreturn on capital in excess of 20%. \n\nOur second capital priority for the year was to conclude the appraisal of the Woodford \nformation in our Logan County, Oklahoma assets. We viewed this relatively modest, but \nhigher risk, investment as having a 25% chance of success with a 15x upside. Unfortunately, \nwe met with mixed success in our appraisal activities proving that in today’s onshore \nUS oil and gas industry that the best absolute returns are generated by drilling in proved \nregions. There are plenty of solid opportunities to efficiently grow the business without \nexposure to undue geologic risk. \n\nLike many prior bubbles driven by new technologies, the second half of the year saw the \npricing environment come crashing down around us. The market became fundamentally \nunbalanced, driving prices down almost 50% and rendering material portions of global \noil and gas development uneconomic. \n\nOur peers went from talking about their growth prospects to fretting about cash costs \nand liquidity, a stark contrast from the go-go growth times which existed in the first half \nof the year. This shift in industry strategy has now come in line with our general business \nphilosophy — in the resource space, low-cost, low debt businesses will survive and thrive \nacross cycles; and, relative to our US onshore peer group, Sundance boasts a top 15% \ncost structure and balance sheet.", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "A year of growing production, cash flow and reserves \nIn line with our strategy we continued to increase the level of company operated assets, \nand successfully maintained a very strong focus on optimising our operations and reducing \ncosts. This resulted in an impressive improvement in well performance combined with a \ntop tier cost structure. \n\nThrough our operated development program, we ended 2014 with record production \nof 9,434 barrels of oil equivalent per day (BOEPD) compared with an exit rate of 5,028 \nBOEPD in December 2013 and an average annual production of 6,635 BOEPD compared \nto 3,015 BOEPD in 2013. During 2014 we drilled and completed 42.7 net wells, primarily \nin the Eagle Ford, bringing our total well count to 81.3 by 31 December 2014. High \nvalue oil comprised approximately 69 percent of our total 2014 annual production \nand production from Sundance-operated projects accounted for 89 percent of total \nproduction for the year. \n\n*Dear Fellow Shareholders,*\n\n*I am pleased to present Sundance Energy Australia Limited’s*\n*Annual Report for the 12 months ended 31 December 2014. It*\n*has been another year of significant progress for Sundance*\n*across our portfolio of liquids rich oil and gas assets in the US.*\nCHAIRMAN’S LETTER \n\nThe Company’s strategic focus on growing production, cash flows and reserves from \nlarge, repeatable resource plays in North America continues to deliver positive results \nwith growth in production, cash flows, and reserves. \n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston \nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent; \nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado \nfor $114 million which realised an internal rate of return of 104 percent. These divestitures \nof smaller, less scalable positions enabled us to focus on developing and growing our \nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma. \n\nDespite the reduction in crude oil and liquids prices towards the end of the year \nand continuing into 2015, the operational performance and focused, value-adding \ntransactions during the past year have positioned the Company very favourably for \nfuture growth in net asset value and shareholder returns. \n\n*Despite the reduction in*\n*crude oil and liquids*\n*prices towards the end of*\n*the year and continuing*\n*into 2015, the opertional*\n*performance and focused,*\n*value-adding transactions*\n*during the past year have*\n*positioned the Company*\n*very favourably for future*\n*growth in net asset value*\n*and shareholder returns.*\nCorresponding with the growth in annual production, the Company’s full year revenues \nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million. \n\nThe Company’s development program also generated significant growth in Constant Case \nreserves during the year. More details are contained elsewhere in this Annual Report, \nbut in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1 \nMBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6 \nMBOE, and 92.8 MBOE, respectively, at the end of 2013. \n\nIn the current price environment, we have elected to scale back our drilling program to \nmainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will \nenable us to maintain our low leverage profile, which was approximately 1.03x debt to \nAdjusted EBITDAX at year end, and focus on growing our drilling inventory in an environ- \nment with less competition for leases and small acquisitions. Liquidity was $84 million at \nyear end, with a borrowing base redetermination in 2015 expected to materially increase \ndebt availability if the use of such funds is justified in line with our strategy.", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**Auditor’s Independence Declaration to the Directors of Sundance**\n**Energy Australia Limited**\n\nIn relation to our audit of the financial report of Sundance Energy Australia Limited for the financial \nyear ended 31 December 2014, to the best of my knowledge and belief, there have been no \ncontraventions of the auditor independence requirements of the*Corporations Act 2001*or any \napplicable code of professional conduct.", - "page_start": 46, - "page_end": 46, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n**NOTE 20 – OTHER NON-CURRENT ASSETS**\n\n**2013**\n**US$’000** **Year ended 31 December**\n\n\n \n \n \n \n [html]\n
Escrow accounts9982.000
Other-19
Total other non - current assets9982.019
NSDTE 21 − TRADE AND OTHER PAYANUS AND ACCRUED EXPENSES20142013
Year ended 31 DecemberUS $ 7000US $’ 000
Oil and natural gas property and operating related117.117123.938
Administrative expenses, including salaries and wages__2.0775.146
Total trade, other payables and accrued expenses__119.194. 129.084
\n\nAt 31 December 2013, the Group had payable balances of $16.7 million which was outside normal payment terms, \noffset by a receivable balance of $11.7 million to the same creditor company (see Note 12 for additional \ninformation). The Company’s remaining Bakken assets were sold to this company in July 2014, for approximately \n$14.0 million, including the settlement of the net liability. \n\n**NOTE 22 – CREDIT FACILITIES**\n\n\n \n \n \n \n [html]\n
Year ended 31 December2014 US $ 0002013 US $ 0000
Senior Credit Facility95.00015.000
Junior Credit Facility35.00015.000
Total credit facilities130.00030.000
Deferred financing fees( 1.195 )( 859 )
Total credit facilities, net of deferred financing fees. 128.8059.141
\n\n**Junior Credit Facility**\n\nIn August 2013, Sundance Energy, Inc. (“Sundance Energy”), a wholly owned subsidiary of the Company, entered \ninto a second lien credit agreement with Wells Fargo Energy Capital, Inc., as the administrative agent (the “Junior \nCredit Facility”), which provides for term loans to be made in a series of draws up to $100 million. The Junior Credit \nFacility matures in June 2018 and is secured by a second priority lien on substantially all of the Company’s assets. \nUpon entering into the Junior Credit Facility, the Company immediately borrowed $15 million pursuant to the terms \nof the Junior Credit Facility and paid down the outstanding principal of the Senior Credit Facility. In May 2014, the \nCompany’s borrowing capacity increased to $35 million. As at 31 December 2014, the borrowing capacity under the \nJunior Credit Facility remains at $35 million.", - "page_start": 87, - "page_end": 87, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**(In US$‘000s)**\n\n**IFRS Profit Loss Reconciliation to Adjusted EBITDAX:**\n\nProfit attributable to owners of Sundance .................................................. \n\nIncome tax (benefit)/expense ...................................................................... \n\nFinance costs, net of amounts capitalised and interest received ................ \n\n(Gain) Loss on derivative financial instruments ........................................... \n\nSettlement of derivative financial instruments............................................ \n\nDepreciation and amortisation expense ...................................................... \n\nImpairment of non-current assets ............................................................... \n\nExploration expense..................................................................................... \n\nStock compensation, value of services ........................................................ \n\nGain on sale of non-current assets .............................................................. \n\n**Adjusted EBITDAX .......................................................................................**\n\n**EBITDAX Margin ..........................................................................................**\n\n\n \n \n \n \n [html]\n
Year ended 31 December2014
201315.321
15.942( 841 )
5.567494
( 232 )( 10.792 )
5541.150
28285.584
36.22571.212
-10.934
-1.915
1.590( 48.604 )
( 7.335 )126.373
52.59479 %
62 %
\n\n***Exploration and Development***\n\nFor the month of December 2014, the Company achieved record production of 9,434 Boe/d, which included 869 Boe/d of \nflared gas from wells waiting to hook-up to pipelines. The December 2014 exit rate increased 88% over prior year’s exit rate \nof 5,028 Boe/d. During the year ended 31 December 2014, the Company produced 2.4 MMBoe, which included 0.2 MMBoe \nof flared gas. This result was more than double the production in prior year, primarily as a result of increased drilling activity \nand production in the Eagle Ford Basin. \n\nThe Company’s exploration and development activities are focused in the Eagle Ford and the Mississippian/Woodford \nFormations. Costs incurred for development and production expenditures for the Eagle Ford and Mississippian/Woodford \nFormations during the year ended 31 December 2014 totalled $324.0 million, which included $295.9 million of drilling and \ndevelopment expenditure related to our 2014 plan, $3.8 million on infrastructure, and $24.3 million of drilling and \ndevelopment expenditure related to our 2015 plan. This investment resulted in the addition of 75 gross (42.7 net) wells into \nproduction, including 50 gross (39.5 net) Sundance-operated horizontal wells. An additional 24 gross (13.7 net) wells were \ndrilling, being prepared for fracture stimulation or testing as at 31 December 2014, an increase of 7 gross (3.0 net) compared \nto the beginning of the year.", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Forward-Looking Statements \nThis Annual Report includes forward-looking statements. \nThese statements relate to Sundance’s expectations, beliefs, \nintentions or strategies regarding the future. These statements \ncan be identified by the use of words like “anticipate”, \n“believe”, “intend”, “estimate”, “expect”, “may”, “plan”, \n“project”, “will”, “should”, “seek” and similar words or \nexpressions containing same. The forward-looking state- \nments reflect the Company’s views and assumptions with \nrespect to future events as of the date of this presentation \nand are subject to a variety of unpredictable risks, uncertain- \nties, and other unknowns. Actual and future results and \ntrends could differ materially from those set forth in such \nstatements due to various factors, many of which are \nbeyond our ability to control or predict. Given these \nuncertainties, no one should place undue reliance on any \nforward-looking statements attributable to Sundance, \nor any of its affiliates or persons acting on its behalf. \nAlthough every effort has been made to ensure this report \nsets forth a fair and accurate view, we do not undertake \nany obligation to update or revise any forward-looking \nstatements, whether as a result of new information, future \nevents or otherwise. \n\nCompetent Persons Statement \nThis report contains information on Sundance Energy’s \nreserves and resources which has been reviewed by David \nRamsden-Wood, Professional Engineer, who is licensed in \nAlberta, Canada and is qualified in accordance with ASX \nListing Rule 5.11 and has consented to the inclusion of this \ninformation in the form and context in which it appears. \n\n\n \n \n \n \n [html]\n
Directors
Michael D. Hannell – Chairman
Eric McCrady – Managing Director and CEO
Damien A. Hannes – Non - Executive Director
Neville W. Martin – Non - Executive Director
Weldon Holcombe – Non - Executive Director
Company Secretary
Damien Connor
Registered Office
32 Beulah Road
Norwood SA 5067
Phone : ( 6.8 ) 836.0388
Fax : ( 6.8 ) 813.0766
Website : www. sundanceenergy. com. au
Corporate Headquarters
Sundance Energy, Inc.
63.17th Street, Suite 1950
Denver, CO 80202 USA
Phone : ( 303 ) 543 - 5700
Fax : ( 303 ) 543 - 5701
Website : www. sundanceenergy. net
Auditors
Ernst & Young
Ernst & Young Centre
680 George Street
Sydney NSW 2000
Australian Legal Advisors
Baker & McKenzie
Level 27, AMP Centre
50 Bridge Street
Sydney, NSW 2000
Australia
Bankers
National Australia Bank Limited – Australia
Wells Fargo – United States
Share Registry
Computershare Investor Services Pty Ltd
Level 5.115 Grenfell Street
Adelaide SA 5000
Securities Exchange Listing
Australian Securities Exchange ( ASX )
ASX Code : SEA
", - "page_start": 112, - "page_end": 112, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "*Experience*\nMike has been a Director of Sundance since March 2006 and chairman of our board of directors since December 2008. \nMr. Hannell has over 45 years of experience in the oil and gas industry, initially in the downstream sector and subsequently in \nthe upstream sector. His extensive experience has been in a wide range of design and construction, engineering, operations, \nexploration and development, marketing and commercial, financial and corporate areas in the United States, United Kingdom, \ncontinental Europe and Australia at the senior executive level with Mobil Oil (now Exxon) and Santos Ltd. Mr. Hannell recently \nfinished his term as the chairman of Rees Operations Pty Ltd (doing business as Milford Industries Pty Ltd), an Australian \nautomotive components and transportation container manufacturer and supplier. He has also held a number of other board \nappointments including the chairman of Sydac Pty Ltd, a designer and producer of simulation training products for industry. \nMr. Hannell has also served on a number of not-for-profit boards, with appointments as president of the Adelaide-based \nChamber of Mines and Energy, president of Business SA (formerly the South Australian Chamber of Commerce and Industry), \nchairman of the Investigator Science and Technology Centre, chairman of the Adelaide Graduate School of Business, and a \nmember of the South Australian Legal Practitioners Conduct Board. Mr. Hannell holds a Bachelor of Science degree in \nEngineering (with Honors) from the University of London and is a Fellow of the Institution of Engineers Australia. \n\n*Interest in Shares*: \n1,059,000 ordinary shares in Sundance Energy Australia Limited \n\n*Special Responsibilities*: \n-Chairman of the Board of Directors \n-Chairman of the Remuneration and Nominations Committee \n-Member of the Audit and Risk Management Committee \n-Member of the Reserves Committee \n\n*Other Directorships*: \nNil \n\n**Eric P. McCrady**\n*Director, BS in Business*Administration \n\n*Experience*\nEric has been our Chief Executive Officer since April 2011 and Managing Director of our board of directors since November \n2011. He also served as our Chief Financial Officer from June 2010 until becoming Chief Executive Officer in 2011. Mr. McCrady \nhas served in numerous positions in the energy, private investment and retail industries. From 2004 to 2010, Mr. McCrady was \nemployed by The Broe Group, a private investment firm, in various financial and executive management positions across a \nvariety of industry investment platforms, including energy, transportation and real estate. From 1997 to 2003, Mr. McCrady \nwas employed by American Coin Merchandising, Inc. in various corporate finance roles. Mr. McCrady holds a degree in Business \nAdministration from the University of Colorado, Boulder. \n\n*Interest in Shares, Restricted Share Units and Options:*\n1,908,581 Ordinary Shares in Sundance Energy Australia Limited and 791,561 Restricted Share Units \n\n*Special Responsibilities*: \nManaging Director and Chief Executive Officer of the Company \n\n*Other Directorships*: \nNil \n\n- 23 -", - "page_start": 24, - "page_end": 24, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "At year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford \nacreage where we continue to pursue operational and drilling efficiencies, opportunities \nto further improve well economics by improving recoveries and reducing costs. In 2014 \nthis included a switch to pad drilling with zipper fracs and new completion techniques \nthat have provided significant upside in production. \n\n*The Company has a*\n*strong balance sheet to*\n*withstand the current low*\n*oil price environment,*\n*and our sound financial*\n*management strategy*\n*has seen the Company*\n*well supported by*\n*both new and existing*\n*investors in Australia*\n*and internationally.*\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance \nat 7,850 – 8,500 BOEPD, an increase from the previous year of some 13 – 17 percent, \nbut a target that we believe is achievable while maintaining acceptable levels of liquidity \ngiven our demonstrated abilities and growing footprint in the Eagle Ford. \n\nSafety and Environment \nSundance has a strong culture throughout the organisation of ensuring that high standards \nof safety are maintained and that our operations are conducted in an environmentally \nresponsible way. During 2014 our comprehensive safety program was enhanced and \nfurther improvements will be a strong focus throughout 2015. \n\nA strong financial position \nSundance is well placed for future growth in the Eagle Ford. The Company has a strong \nbalance sheet to withstand the current low oil price environment, and our sound financial \nmanagement strategy has seen the Company well supported by both new and existing \ninvestors in Australia and internationally. \n\nWe expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. \n\nOn behalf of the Board and Company, I would like to thank our shareholders for your \nstrong support of the Company throughout the year. We are committed to delivering \nlong-term value for our shareholders and I look forward to reporting over the rest of the \ncoming year on the continued value creation and growth of Sundance. \n\nYours sincerely,", - "page_start": 4, - "page_end": 4, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_SEA_2014.pdf", - "query": "I am the CFO of Sundance Energy, will my base increase in 2015 as it did in 2014?", - "target_page": 31, - "target_passage": "No increases to Managing Director’s or KMP’s base salary", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]ANNUAL PERCENTAGE CHANGEYEAR\n
IN 2P PV10 ( NET ASSET VALUE ) PER DEBT ADJUSTED SHAREIN SUNDANCE PRICE PER SHAREIN ASX2002014
21.6 %- 48.0 %1.1 %2013
63.3 %29.9 %15.1 %2012
- 15.6 %87.8 %14.6 %2011
59.7 %- 44.6 %- 14.5 %
\n\n*Dear Fellow Shareholders,*\n\n*2014 Review — 2014 was a year of stark economic contrasts*\n*in our industry. During the first half as in the past several years,*\n*historically volatile West Texas Intermediate oil prices seemed*\n*range bound between $80 and $110 with geopolitical events*\n*driving prices towards the ceiling and demand risks pushing*\n*prices towards the floor of the range.*\n\nCEO’S REPORT \n\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap \nand plentiful debt, on horizontal drilling and completions to drive production growth \nwhile making material strategic acquisitions in order to increase their long-term \nexposure to oil prices. \n\nThe easy credit environment caused asset prices to increase significantly to the point \nwhere, in our view, risk adjusted returns on new acquisitions were threatening cyclical \nlows. In line with our strategy, Sundance had monetized several mature assets realizing \n\n~$50 million in current period gains while freeing up \n~$165 million in invested capital. \nSundance’s Performance versus the ASX 200 \n\nWe primarily reinvested this capital in production growth \nand cash flow with only about $75 million reinvested in \nacquiring oil and gas leases and producing properties. This \nresulted in our production increasing from 5,028 BOEPD \nto 9,434 BOEPD by December 2014 and full year EBITDAX \nincreasing $73.8 million to $126.4 million in 2014. Had \nprices stayed steady, we likely would have generated \nearnings before income taxes of over $85 million and a \nreturn on capital in excess of 20%. \n\nOur second capital priority for the year was to conclude the appraisal of the Woodford \nformation in our Logan County, Oklahoma assets. We viewed this relatively modest, but \nhigher risk, investment as having a 25% chance of success with a 15x upside. Unfortunately, \nwe met with mixed success in our appraisal activities proving that in today’s onshore \nUS oil and gas industry that the best absolute returns are generated by drilling in proved \nregions. There are plenty of solid opportunities to efficiently grow the business without \nexposure to undue geologic risk. \n\nLike many prior bubbles driven by new technologies, the second half of the year saw the \npricing environment come crashing down around us. The market became fundamentally \nunbalanced, driving prices down almost 50% and rendering material portions of global \noil and gas development uneconomic. \n\nOur peers went from talking about their growth prospects to fretting about cash costs \nand liquidity, a stark contrast from the go-go growth times which existed in the first half \nof the year. This shift in industry strategy has now come in line with our general business \nphilosophy — in the resource space, low-cost, low debt businesses will survive and thrive \nacross cycles; and, relative to our US onshore peer group, Sundance boasts a top 15% \ncost structure and balance sheet.", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "A year of growing production, cash flow and reserves \nIn line with our strategy we continued to increase the level of company operated assets, \nand successfully maintained a very strong focus on optimising our operations and reducing \ncosts. This resulted in an impressive improvement in well performance combined with a \ntop tier cost structure. \n\nThrough our operated development program, we ended 2014 with record production \nof 9,434 barrels of oil equivalent per day (BOEPD) compared with an exit rate of 5,028 \nBOEPD in December 2013 and an average annual production of 6,635 BOEPD compared \nto 3,015 BOEPD in 2013. During 2014 we drilled and completed 42.7 net wells, primarily \nin the Eagle Ford, bringing our total well count to 81.3 by 31 December 2014. High \nvalue oil comprised approximately 69 percent of our total 2014 annual production \nand production from Sundance-operated projects accounted for 89 percent of total \nproduction for the year. \n\n*Dear Fellow Shareholders,*\n\n*I am pleased to present Sundance Energy Australia Limited’s*\n*Annual Report for the 12 months ended 31 December 2014. It*\n*has been another year of significant progress for Sundance*\n*across our portfolio of liquids rich oil and gas assets in the US.*\nCHAIRMAN’S LETTER \n\nThe Company’s strategic focus on growing production, cash flows and reserves from \nlarge, repeatable resource plays in North America continues to deliver positive results \nwith growth in production, cash flows, and reserves. \n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston \nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent; \nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado \nfor $114 million which realised an internal rate of return of 104 percent. These divestitures \nof smaller, less scalable positions enabled us to focus on developing and growing our \nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma. \n\nDespite the reduction in crude oil and liquids prices towards the end of the year \nand continuing into 2015, the operational performance and focused, value-adding \ntransactions during the past year have positioned the Company very favourably for \nfuture growth in net asset value and shareholder returns. \n\n*Despite the reduction in*\n*crude oil and liquids*\n*prices towards the end of*\n*the year and continuing*\n*into 2015, the opertional*\n*performance and focused,*\n*value-adding transactions*\n*during the past year have*\n*positioned the Company*\n*very favourably for future*\n*growth in net asset value*\n*and shareholder returns.*\nCorresponding with the growth in annual production, the Company’s full year revenues \nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million. \n\nThe Company’s development program also generated significant growth in Constant Case \nreserves during the year. More details are contained elsewhere in this Annual Report, \nbut in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1 \nMBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6 \nMBOE, and 92.8 MBOE, respectively, at the end of 2013. \n\nIn the current price environment, we have elected to scale back our drilling program to \nmainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will \nenable us to maintain our low leverage profile, which was approximately 1.03x debt to \nAdjusted EBITDAX at year end, and focus on growing our drilling inventory in an environ- \nment with less competition for leases and small acquisitions. Liquidity was $84 million at \nyear end, with a borrowing base redetermination in 2015 expected to materially increase \ndebt availability if the use of such funds is justified in line with our strategy.", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "At year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford \nacreage where we continue to pursue operational and drilling efficiencies, opportunities \nto further improve well economics by improving recoveries and reducing costs. In 2014 \nthis included a switch to pad drilling with zipper fracs and new completion techniques \nthat have provided significant upside in production. \n\n*The Company has a*\n*strong balance sheet to*\n*withstand the current low*\n*oil price environment,*\n*and our sound financial*\n*management strategy*\n*has seen the Company*\n*well supported by*\n*both new and existing*\n*investors in Australia*\n*and internationally.*\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance \nat 7,850 – 8,500 BOEPD, an increase from the previous year of some 13 – 17 percent, \nbut a target that we believe is achievable while maintaining acceptable levels of liquidity \ngiven our demonstrated abilities and growing footprint in the Eagle Ford. \n\nSafety and Environment \nSundance has a strong culture throughout the organisation of ensuring that high standards \nof safety are maintained and that our operations are conducted in an environmentally \nresponsible way. During 2014 our comprehensive safety program was enhanced and \nfurther improvements will be a strong focus throughout 2015. \n\nA strong financial position \nSundance is well placed for future growth in the Eagle Ford. The Company has a strong \nbalance sheet to withstand the current low oil price environment, and our sound financial \nmanagement strategy has seen the Company well supported by both new and existing \ninvestors in Australia and internationally. \n\nWe expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. \n\nOn behalf of the Board and Company, I would like to thank our shareholders for your \nstrong support of the Company throughout the year. We are committed to delivering \nlong-term value for our shareholders and I look forward to reporting over the rest of the \ncoming year on the continued value creation and growth of Sundance. \n\nYours sincerely,", - "page_start": 4, - "page_end": 4, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Forward-Looking Statements \nThis Annual Report includes forward-looking statements. \nThese statements relate to Sundance’s expectations, beliefs, \nintentions or strategies regarding the future. These statements \ncan be identified by the use of words like “anticipate”, \n“believe”, “intend”, “estimate”, “expect”, “may”, “plan”, \n“project”, “will”, “should”, “seek” and similar words or \nexpressions containing same. The forward-looking state- \nments reflect the Company’s views and assumptions with \nrespect to future events as of the date of this presentation \nand are subject to a variety of unpredictable risks, uncertain- \nties, and other unknowns. Actual and future results and \ntrends could differ materially from those set forth in such \nstatements due to various factors, many of which are \nbeyond our ability to control or predict. Given these \nuncertainties, no one should place undue reliance on any \nforward-looking statements attributable to Sundance, \nor any of its affiliates or persons acting on its behalf. \nAlthough every effort has been made to ensure this report \nsets forth a fair and accurate view, we do not undertake \nany obligation to update or revise any forward-looking \nstatements, whether as a result of new information, future \nevents or otherwise. \n\nCompetent Persons Statement \nThis report contains information on Sundance Energy’s \nreserves and resources which has been reviewed by David \nRamsden-Wood, Professional Engineer, who is licensed in \nAlberta, Canada and is qualified in accordance with ASX \nListing Rule 5.11 and has consented to the inclusion of this \ninformation in the form and context in which it appears. \n\n\n \n \n \n \n [html]\n
Directors
Michael D. Hannell – Chairman
Eric McCrady – Managing Director and CEO
Damien A. Hannes – Non - Executive Director
Neville W. Martin – Non - Executive Director
Weldon Holcombe – Non - Executive Director
Company Secretary
Damien Connor
Registered Office
32 Beulah Road
Norwood SA 5067
Phone : ( 6.8 ) 836.0388
Fax : ( 6.8 ) 813.0766
Website : www. sundanceenergy. com. au
Corporate Headquarters
Sundance Energy, Inc.
63.17th Street, Suite 1950
Denver, CO 80202 USA
Phone : ( 303 ) 543 - 5700
Fax : ( 303 ) 543 - 5701
Website : www. sundanceenergy. net
Auditors
Ernst & Young
Ernst & Young Centre
680 George Street
Sydney NSW 2000
Australian Legal Advisors
Baker & McKenzie
Level 27, AMP Centre
50 Bridge Street
Sydney, NSW 2000
Australia
Bankers
National Australia Bank Limited – Australia
Wells Fargo – United States
Share Registry
Computershare Investor Services Pty Ltd
Level 5.115 Grenfell Street
Adelaide SA 5000
Securities Exchange Listing
Australian Securities Exchange ( ASX )
ASX Code : SEA
", - "page_start": 112, - "page_end": 112, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**(In US$‘000s)**\n\n**IFRS Profit Loss Reconciliation to Adjusted EBITDAX:**\n\nProfit attributable to owners of Sundance .................................................. \n\nIncome tax (benefit)/expense ...................................................................... \n\nFinance costs, net of amounts capitalised and interest received ................ \n\n(Gain) Loss on derivative financial instruments ........................................... \n\nSettlement of derivative financial instruments............................................ \n\nDepreciation and amortisation expense ...................................................... \n\nImpairment of non-current assets ............................................................... \n\nExploration expense..................................................................................... \n\nStock compensation, value of services ........................................................ \n\nGain on sale of non-current assets .............................................................. \n\n**Adjusted EBITDAX .......................................................................................**\n\n**EBITDAX Margin ..........................................................................................**\n\n\n \n \n \n \n [html]\n
Year ended 31 December2014
201315.321
15.942( 841 )
5.567494
( 232 )( 10.792 )
5541.150
28285.584
36.22571.212
-10.934
-1.915
1.590( 48.604 )
( 7.335 )126.373
52.59479 %
62 %
\n\n***Exploration and Development***\n\nFor the month of December 2014, the Company achieved record production of 9,434 Boe/d, which included 869 Boe/d of \nflared gas from wells waiting to hook-up to pipelines. The December 2014 exit rate increased 88% over prior year’s exit rate \nof 5,028 Boe/d. During the year ended 31 December 2014, the Company produced 2.4 MMBoe, which included 0.2 MMBoe \nof flared gas. This result was more than double the production in prior year, primarily as a result of increased drilling activity \nand production in the Eagle Ford Basin. \n\nThe Company’s exploration and development activities are focused in the Eagle Ford and the Mississippian/Woodford \nFormations. Costs incurred for development and production expenditures for the Eagle Ford and Mississippian/Woodford \nFormations during the year ended 31 December 2014 totalled $324.0 million, which included $295.9 million of drilling and \ndevelopment expenditure related to our 2014 plan, $3.8 million on infrastructure, and $24.3 million of drilling and \ndevelopment expenditure related to our 2015 plan. This investment resulted in the addition of 75 gross (42.7 net) wells into \nproduction, including 50 gross (39.5 net) Sundance-operated horizontal wells. An additional 24 gross (13.7 net) wells were \ndrilling, being prepared for fracture stimulation or testing as at 31 December 2014, an increase of 7 gross (3.0 net) compared \nto the beginning of the year.", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n**NOTE 22 – CREDIT FACILITIES continued**\n\nThe principal amount of the loans borrowed under our Junior Credit Facility is due in full on the maturity date. \nInterest on the Junior Credit Facility accrues at a rate equal to the greater of (i) 8.50% or (ii) a base rate (being, at \nour option, either (a) LIBOR for the applicable interest period (adjusted for Eurodollar Reserve Requirements) or (b) \nthe greatest of (x) the prime rate announced by Wells Fargo Bank, N.A., (y) the federal funds rate plus 0.50% and (z) \none-month adjusted LIBOR plus 1.00%), plus a margin of either 6.5% or 7.5%, based on the base rate selected. \n\nThe Company is also required under our Junior Credit Facility to maintain the following financial ratios: \n\n• \n\na current ratio, consisting of consolidated current assets including undrawn borrowing capacity to \nconsolidated current liabilities, of not less than 1.0 to 1.0 as of the last day of any fiscal quarter; \na maximum leverage ratio, consisting of consolidated debt to adjusted consolidated EBITDAX (as defined \nin the Junior Credit Facility), of not greater than 4.5 to 1.0 as of the last day of any fiscal quarter \n(beginning 30 September 2013); and \nan asset coverage ratio, consisting of PV10 to consolidated debt, of not less than 1.5 to 1.0, as of certain \ntest dates. \n\n• \n\n• \n\nFor the years ended 31 December 2014 and 2013, the Company capitalised $0.7 million and $0.3 million, \nrespectively, of financing costs related to the Junior Credit Facility, which offset the principal balance. As at 31 \nDecember 2014 there was $35.0 million outstanding under the Company’s Junior Credit Facility. As at 31 December \n2014, the Company was in compliance with all restrictive financial and other covenants under the Junior Credit \nFacility. \n\n**Senior Credit Facility**\n\nOn 31 December 2012, Sundance Energy entered into a credit agreement with Wells Fargo Bank, N.A. (the “Senior \nCredit Facility”), pursuant to which up to $300 million is available on a revolving basis. The borrowing base under \nthe Senior Credit Facility is determined by reference to the value of the Company’s proved reserves. The agreement \nspecifies a semi-annual borrowing base redetermination and the Company can request two additional \nredeterminations each year. The borrowing capacity was increased from prior year to $110 million as at 31 \nDecember 2014 based on Company reserves as at 31 December 2014. As at 31 December 2014, the Company had \n$15 million undrawn on the Senior Credit Facility. In conjunction with the increase in the borrowing base, the \nCompany has expanded the syndicate of banks under the Senior Credit Facility. With Wells Fargo as administrative \nagent, Bank of America Merrill Lynch and the Bank of Nova Scotia have now joined the banking group. \n\nInterest on borrowed funds accrue, at the Company’s option, of i) LIBOR plus a margin that ranges from 175 to 275 \nbasis points or ii) the Base Rate, defined as a rate equal to the highest of (a) the Federal Funds Rate plus ½ of 1%, (b) \nthe Prime Rate, or (c) LIBOR plus a margin that ranges from 75 to 175 basis points. The applicable margin varies \ndepending on the amount drawn. The Company also pays a commitment that ranges from 37.5 to 50 basis points \non the undrawn balance of the borrowing base. The agreement has a five-year term and contains both negative and \naffirmative covenants, including minimum current ratio and maximum leverage ratio requirements consistent with \nthe Junior Credit Facility’s. Certain development and production assets are pledged as collateral and the facility is \nguaranteed by the Parent Company.", - "page_start": 88, - "page_end": 88, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Opinion \nIn our opinion: \n\na. \nthe financial report of Sundance Energy Australia is in accordance with the*Corporations Act 2001*, \nincluding: \n\ni \ngiving a true and fair view of the consolidated entity's financial position as at 31 December 2014 and \nof its performance for the year ended on that date; and \n\nii complying with Australian Accounting Standards and the*Corporations Regulations 2001*; and \n\nb. \n\nthe financial report also complies with*International Financial Reporting Standards*issued by the IASB \nas disclosed in Note 1. \n\n*Report on the remuneration report*\n\nWe have audited the Remuneration Report included in pages 28 to 43 of the directors' report for the year ended 31 \nDecember 2014. The directors of the company are responsible for the preparation and presentation of the \nRemuneration Report in accordance with section 300A of the*Corporations Act 2001*. Our responsibility is to express \nan opinion on the Remuneration Report, based on our audit conducted in accordance with Australian Auditing \nStandards. \n\nOpinion \nIn our opinion, the Remuneration Report of Sundance Energy Australia Limited for the year ended 31 December \n2014, complies with section 300A of the*Corporations Act 2001*.", - "page_start": 109, - "page_end": 109, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**Auditor’s Independence Declaration to the Directors of Sundance**\n**Energy Australia Limited**\n\nIn relation to our audit of the financial report of Sundance Energy Australia Limited for the financial \nyear ended 31 December 2014, to the best of my knowledge and belief, there have been no \ncontraventions of the auditor independence requirements of the*Corporations Act 2001*or any \napplicable code of professional conduct.", - "page_start": 46, - "page_end": 46, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "The Eagle Ford – driving value and production growth \nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the \nbasin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014 \nwhich includes the acquisition of approximately 18,000 net acreage in 2014. By the end of \nthe first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence \nin this prolific oil and gas region has been driving significant value for the Company and \nour shareholders, and continues to form our priority focus for development and acreage \ngrowth in the coming years. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n**NOTE 20 – OTHER NON-CURRENT ASSETS**\n\n**2013**\n**US$’000** **Year ended 31 December**\n\n\n \n \n \n \n [html]\n
Escrow accounts9982.000
Other-19
Total other non - current assets9982.019
NSDTE 21 − TRADE AND OTHER PAYANUS AND ACCRUED EXPENSES20142013
Year ended 31 DecemberUS $ 7000US $’ 000
Oil and natural gas property and operating related117.117123.938
Administrative expenses, including salaries and wages__2.0775.146
Total trade, other payables and accrued expenses__119.194. 129.084
\n\nAt 31 December 2013, the Group had payable balances of $16.7 million which was outside normal payment terms, \noffset by a receivable balance of $11.7 million to the same creditor company (see Note 12 for additional \ninformation). The Company’s remaining Bakken assets were sold to this company in July 2014, for approximately \n$14.0 million, including the settlement of the net liability. \n\n**NOTE 22 – CREDIT FACILITIES**\n\n\n \n \n \n \n [html]\n
Year ended 31 December2014 US $ 0002013 US $ 0000
Senior Credit Facility95.00015.000
Junior Credit Facility35.00015.000
Total credit facilities130.00030.000
Deferred financing fees( 1.195 )( 859 )
Total credit facilities, net of deferred financing fees. 128.8059.141
\n\n**Junior Credit Facility**\n\nIn August 2013, Sundance Energy, Inc. (“Sundance Energy”), a wholly owned subsidiary of the Company, entered \ninto a second lien credit agreement with Wells Fargo Energy Capital, Inc., as the administrative agent (the “Junior \nCredit Facility”), which provides for term loans to be made in a series of draws up to $100 million. The Junior Credit \nFacility matures in June 2018 and is secured by a second priority lien on substantially all of the Company’s assets. \nUpon entering into the Junior Credit Facility, the Company immediately borrowed $15 million pursuant to the terms \nof the Junior Credit Facility and paid down the outstanding principal of the Senior Credit Facility. In May 2014, the \nCompany’s borrowing capacity increased to $35 million. As at 31 December 2014, the borrowing capacity under the \nJunior Credit Facility remains at $35 million.", - "page_start": 87, - "page_end": 87, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "sg247938.pdf", - "query": "What are the physical requirements for installing the Storwize V7000?", - "target_page": 70, - "target_passage": "You must consider several key factors when you are planning the physical site of a Storwize V7000 installation. The physical site must have the following characteristics: \u0002 Meets power, cooling, and location requirements of the Storwize V7000 nodes. \u0002 Has two separate power sources. \u0002 Sufficient rack space exists for the installation of controller and disk expansion enclosures. \u0002 Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not exceed maximum power rating of the rack. For more information about the power and environmental requirements, see this website", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "– Prerequisites: \n\n(cid:129) Storwize V7000 and the external storage system are connected to the same SAN \nfabric. \n\nIf there are VMware ESX host s involved in the data migration, the VMware ESX \nhosts are set to allow volume copies to be recognized. \n\nFor more information about the Storage Migration prerequisites, see 9.1.2, “Prerequisites” \non page 387. \n\nIf all restrictions are satisfied and prerequisites are met, select all of the options and click \n**Next**, as shown in Figure 9-4.", - "page_start": 411, - "page_end": 411, - "source_file": "sg247938.pdf" - }, - { - "text": "When you plan deployment of Storwize V7000, identify networking technologies that you will \nuse. \n\n**Note:**With Spectrum Virtualize V8.1.1.1 and later, RDMA (iSER) is supported by 25 Gb \nEthernet iSCSI adapter cards with V7000 Gen2+ only. For more information, see 3.7.4, \n“iSCSI Extensions for RDMA (iSER)” on page 62. \n\n**3.4 Physical planning**\n\nYou must consider several key factors when you are planning the physical site of a Storwize \nV7000 installation. The physical site must have the following characteristics: \n\n(cid:2) Meets power, cooling, and location requirements of the Storwize V7000 nodes. \n\n(cid:2) Has two separate power sources. \n\n(cid:2) Sufficient rack space exists for the installation of controller and disk expansion enclosures. \n\n(cid:2) Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not \nexceed maximum power rating of the rack. For more information about the power and \nenvironmental requirements, see this website. \n\nYour Storwize V7000 2076-524 and Storwize V7000 2076-624 order includes a printed copy \nof the IBM Storwize V7000 Gen2 and Gen2+ Quick Installation Guide, which also provides \ninformation about environmental and power requirements. \n\n**3.4.1 Cabling**\n\nCreate a cable connection table that follows your environment’s documentation procedure to \ntrack all of the following connections that are required for the setup: \n\n(cid:2) Power \n(cid:2) Ethernet \n(cid:2) SAS \n(cid:2) iSCSI or Fibre Channel over Ethernet (FCoE) connections \n(cid:2) Switch ports (FC, Ethernet, and FCoE) \n\nDistribute your disk expansion enclosures evenly between control enclosures, nodes within \ncontrol enclosures, and SAS channels within nodes. For more information, search for “SAS \ncabling guidelines” at this IBM Knowledge Center page. \n\nWhen planning SAN cabling make sure that your physical topology allows you to observe \nzoning rules and recommendations. \n\nIf the data center provides more than one power source, make sure that you use that capacity \nwhen planning power cabling for your system.", - "page_start": 69, - "page_end": 69, - "source_file": "sg247938.pdf" - }, - { - "text": "**13.4.4 Updating IBM Storwize V7000 drive code**\n\nAfter completing the Storwize V7000 software update as described in 13.4, “Software update” \non page 687, the firmware of the Storwize V7000 drives also must be updated. The upgrade \ntest utility identified that downlevel drives are in the system, as shown in Figure 13-25. \nHowever, this fact does not stop the system software from being performed. \n\nFigure 13-25 Upgrade test utility drive firmware warning \n\nTo update the IBM Storwize V7000 drive code, complete the following steps: \n\n1. Download the latest Drive firmware package for IBM Storwize V7000 from Fix Central. \n2. On the Storwize V7000 GUI, navigate to**Pools**→**Internal Storage**and select**All**\n**Internal.**", - "page_start": 717, - "page_end": 717, - "source_file": "sg247938.pdf" - }, - { - "text": "**3.1 General planning rules**\n\n**Important:**At the time of this writing, the statements that are provided in this book are \naccurate but can change. Always verify any statements that are made in this book with the \nIBM Storwize V7000 supported hardware list, device driver, firmware, and recommended \nsoftware levels information that are available at the following websites: \n\n(cid:2) Support Information for Storwize V7000 \n(cid:2) IBM System Storage Interoperation Center (SSIC) \n\nTo maximize the benefit that is realized from the Storwize V7000, pre-installation planning \nmust include several important steps. These steps ensure that the Storwize V7000 provides \nthe best possible performance, reliability, and ease of management for your application \nneeds. The correct configuration also helps minimize downtime by avoiding changes to the \nStorwize V7000 and the storage area network (SAN) environment to meet future growth \nneeds. \n\nThis book is*not*intended to provide in-depth information about the described topics. For an \nenhanced analysis of advanced topics, see IBM System Storage SAN Volume Controller and \nStorwize V7000 Best Practices and Performance Guidelines, SG24-7521. \n\n**3.1.1 Basic planning flow**\n\nThe general rule of planning is to define your goals, and then, plan a solution that can be \nshown to meet these goals. Always remember to verify that each element of your \nconfiguration is supported. \n\nConsider the following points when planning for the Storwize V7000: \n\n(cid:2) Collect and document the number of hosts (application servers) to attach to the Storwize \nV7000. Identify the traffic profile activity (read or write, sequential, or random), and the \nperformance requirements (bandwidth and input/output [I/O] operations per second \n[IOPS]) for each host. \n\n(cid:2) Decide whether you are going to use Storwize V7000 to virtualize external storage. If you \ndo, collect and document the following items: \n\n– Information on the back-end storage that exists in the environment and is intended to \n\nbe virtualized by the Storwize V7000. \n\n– Whether you must configure image mode volumes. If you want to use image mode \nvolumes, decide whether and how you plan to migrate them into managed mode \nvolumes. \n\n– Information about the planned new back-end storage to be virtualized by the Storwize \nV7000. \n\n– The required virtual storage capacity for fully provisioned and space-efficient (SE) \nvolumes. \n\n– The required storage capacity for: \n\n(cid:129) Local mirror copy (volume mirroring) \n(cid:129) Point-in-time copy (IBM FlashCopy) \n(cid:129) Remote copy (Metro Mirror and Global Mirror) \n(cid:129) Compressed volumes \n(cid:129) Encrypted volumes", - "page_start": 65, - "page_end": 65, - "source_file": "sg247938.pdf" - }, - { - "text": "**2.8 Useful IBM Storwize V7000 websites**\n\nSee the following IBM Storwize V7000 web pages for more information: \n\n(cid:2) IBM Support page: \n\nhttps://www.ibm.com/support/home/product/5402112/IBM_Storwize_V7000_(2076) \n\n(cid:2) IBM Storwize V7000 Unified and IBM Storwize V7000 Systems: \n\nhttps://www.ibm.com/support/home/product/5421300/IBM_Storwize_V7000_Unified \n\n(cid:2) IBM Storwize V7000 page support \n\nhttp://www-01.ibm.com/support/docview.wss?uid=ssg1S1003741 \n\n(cid:2) Direct attachment of IBM Storwize V7000 \n\nhttps://www-01.ibm.com/support/docview.wss?uid=ssg1S1005776 \n\n(cid:2) IBM Knowledge Center: \n\nhttps://www.ibm.com/support/knowledgecenter/en/ST3FR7_8.2.1/com.ibm.storwize.v7 \n000.821.doc/v7000_ichome.html", - "page_start": 63, - "page_end": 63, - "source_file": "sg247938.pdf" - }, - { - "text": "**Uploading the SSH public key to the IBM Storwize V7000**\nAfter you create your SSH key pair, upload your SSH public key onto the IBM Storwize \nV7000. Complete the following steps: \n\n1. Open the user section in the GUI, as shown in Figure B-5.", - "page_start": 781, - "page_end": 781, - "source_file": "sg247938.pdf" - }, - { - "text": "table, th, td {\n border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]The installation of physical components is planned to fulfill all requirements and correctly executed, including :- Control enclosures are physically installed with the correct cabling.• Cluster IP - 4 address, which is the address that is used for the management of the system.• Service IPv4 addresses, which are used to access node service interfaces. You need one address for each node.• IPv4 subnet mask for each subnet used.\n
- The Ethemet and Fibre Channel connectivity are correctly configured.- Expansion enclosures, if available, are physically installed and attached to the Storwize V7000 nodes in the VO group that is meant to use them.
-- The Storwize V7000 control enclosures and optional expansion enclosures are powered on.Your web browser is supported and has the appropriate settings enabled. For more information about supported browsers and settings, see IBM Knowledge Center.
You have the required information available, including :− For IPv4 addressing ( if used ):
• IPv4 gateway for each subnet used.− For IPv6 addressing ( if used ):
• Cluster IPvB address, which is used for the management of the system.• Service ( P - v6 addresses, which are used to access node service interfaces. You need one address for each node.
• IPv6 prefix for each subnet used.• IPv6 gateway. for each subnet used.
- The licenses that enable you to use licensed functions, which include the licenses that indicate your entitlement to use licensed functions :• External Virtualization
• Transparent Cloud Tiering– Physical location of the system.
- The name, email address, and phone number of the storage administrator who IBM can contact if necessary.- The Network Time Protocol ( NTP ) server IP address ( optional, but recommended ), which is necessary only if you want to use an NTP service instead of manually entering date and time.
- The Simple Mail Transfer Protocol ( SMTP ) email server IP address ( optional ), which is necessary only if you want to emable cull home.- The IP addresses for Remote Support Proxy Servers ( optional ), which are necessary only if you want to enable Support Assistance.
", - "page_start": 109, - "page_end": 109, - "source_file": "sg247938.pdf" - }, - { - "text": "**Initial configuration**\n\nThis chapter describes the initial configuration of the IBM Storwize V7000 system. It provides \nstep-by-step instructions about how to create the cluster, define its basic settings, and add \nnodes and optional expansion enclosures. \n\nOther features, such as user authentication, secure communications, and local port masking, \nare also covered. These features are optional and do not need to be configured during the \ninitial configuration. \n\nThis chapter includes the following topics: \n\n(cid:2) 4.1, “Prerequisites” on page 88 \n(cid:2) 4.2, “System initialization” on page 89 \n(cid:2) 4.3, “System setup” on page 92 \n(cid:2) 4.4, “Configuring user authentication” on page 108 \n(cid:2) 4.5, “Configuring secure communications” on page 117 \n(cid:2) 4.6, “Configuring local Fibre Channel port masking” on page 121 \n(cid:2) 4.7, “Other administrative procedures” on page 124", - "page_start": 108, - "page_end": 108, - "source_file": "sg247938.pdf" - }, - { - "text": "An IBM Storwize V7000 solution provides a choice of up to 760 disk drives per system or \n1024 disk drives per clustered system (by using dense drawers). The solution uses SAS \ncables and connectors to attach to the optional expansion enclosures. \n\nThe IBM Storwize V7000 system supports a range of external disk systems similar to what \nIBM SAN Volume Controller supports today. A view of an IBM Storwize V7000 control \nenclosure is shown in Figure 2-4. \n\nFigure 2-4 Top-front view of a Storwize V7000 control enclosure \n\nThe IBM Storwize V7000 solution consists of 1 - 4 control enclosures and optionally, up to 36 \nexpansion enclosures. It supports the intermixing of the different expansion enclosures. Each \nenclosure contains two canisters. Control enclosures contain two node canisters, and \nexpansion enclosures contain two expansion canisters. \n\n**2.3.1 IBM Storwize V7000 models**\n\nThe IBM Storwize V7000 consists of enclosures and drives. An enclosure contains two \ncanisters that are seen as part of the enclosure, although they can be replaced \nindependently. \n\n**More information:**For the most up-to-date information about features, benefits, and \nspecifications of IBM Storwize V7000 models, see this web page. \n\nThe information in this IBM Redbooks publication is valid at the time of this writing and \ncovers IBM Spectrum Virtualize V8.2. As IBM Storwize V7000 matures, expect to see new \nfeatures and enhanced specifications. \n\nThe IBM Storwize V7000 models are listed in Table 2-1. \n\nTable 2-1 IBM Storwize V7000 models \n\n\n \n \n \n \n [html]\n
ModelCacheFibre Channel ( FC ) / iSCSI / SAS portsDrive slotsPower supply
2076 - AF1 ( with two node canisters Gen2 +)64.128, or 256 gigabytes ( GB )16 × 16 Gb / 6 × 1 Gb + 8.10 Gb / 4 x 12 Gb24 x 2.5 - inch ( All Flash )Integrated dual power supplies with battery
", - "page_start": 34, - "page_end": 34, - "source_file": "sg247938.pdf" - }, - { - "text": "Any additional licenses must be procured per every enclosure where they are planned to be \nused. For example, if you plan to build a disk array with compression enabled in one \nenclosure only (no matter if this enclosure is the control or expansion enclosure), you must \npurchase only one compression license. \n\n**2.4 IBM Storwize V7000 hardware**\n\nAlong with the previous release of the IBM Spectrum Virtualize V7.3, IBM introduced a \nhardware refresh for the IBM Storwize V7000 platform (code name Gen2) with another \nupdate in V7.8 (Gen2+). These improvements are further enhanced with the most recent \nversion of IBM Spectrum Virtualize software V8.2. \n\nThis section introduces and partially repeats these hardware changes and software \nimprovements that are associated with these updates. They include the following changes \nand improvements: \n\n(cid:2) New internal component layout, such as canister and ports \n(cid:2) Integrated battery pack within node canisters \n(cid:2) Enhanced scalability and flexibility with 16 Gbps I/O adapters \n(cid:2) Improved Real-time Compression engine with hardware assistance \n(cid:2) Extended disk drive support \n(cid:2) Cache upgrade option to 128 GB per canister \n\nTo meet these objectives, the base hardware configuration of the IBM Storwize V7000 Gen2 \nand Gen2+ were substantially improved to support more advanced processors, more \nmemory, and faster data interfaces. \n\n**2.5 IBM Storwize V7000 components**\n\nThe IBM Storwize V7000 is a modular, midrange virtualization RAID storage subsystem that \nuses the IBM Spectrum Virtualize software engine. It has the following benefits: \n\n(cid:2) Brings enterprise technology to midrange storage \n(cid:2) Specialty administrators are not required \n(cid:2) Client setup and service are simplified \n(cid:2) The system can grow incrementally as storage capacity and performance needs change \n(cid:2) Multiple storage tiers are in a single system with nondisruptive migration between them \n(cid:2) Simple integration can be done into the server environment \n\nThe IBM Storwize V7000 consists of a set of drive enclosures. Control enclosures contain \ndisk drives and two nodes (an I/O group), which are attached to the SAN fabric or 10-gigabit \nEthernet (GbE) fast Ethernet. Expansion enclosures contain drives and are attached to \ncontrol enclosures. \n\nThe simplest use of the IBM Storwize V7000 is as a traditional RAID subsystem. The internal \ndrives are configured into RAID arrays, and virtual disks are created from those arrays. With \nIBM Spectrum Virtualize software, this usage is extended by the deployment of distributed \nRAID arrays, which shrink the reconstruction time of failed drives. \n\nIBM Storwize V7000 supports spinning disks and flash drives. When different tiers are used, \nthe IBM Storwize V7000 uses IBM Easy Tier to automatically place volume hot spots on \nbetter-performing storage. Even without the Easy Tier enabled, the Storage Pool balancing is \navailable and enabled by default to equally distribute workload equally across all MDisks in \nthat tier. \n\n**19** Chapter 2. System overview", - "page_start": 40, - "page_end": 40, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "sg247938.pdf", - "query": "Is '1oijizer--10108453535318919918883384---jhjjzhiuhzrh--14584joiz///KK ' valid for a pool?", - "target_page": 218, - "target_passage": "Naming rules: When you choose a name for a pool, the following rules apply: \u0002 Names must begin with a letter. \u0002 The first character cannot be numeric. \u0002 The name can be a maximum of 63 characters. \u0002 Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), underscore (_), period (.), hyphen (-), and space. \u0002 Names must not begin or end with a space. \u0002 Object names must be unique within the object type. For example, you can have a volume that is named ABC and a storage pool that is calledvolumes that are calledvolumes called ABC. \u0002 The default object name is valid (object prefix with an integer). \u0002 Objects can be renamed to their current names", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "56.570.7772583.4. OO591950000.01690.12990.0134− 48.340.7931589.3. 007721000000.01320.11490.0107− 40.110.8089595.2. O1OO4", - "page_start": 22, - "page_end": 22, - "source_file": "00-80T-80.pdf" - }, - { - "text": ",. n \n\n\n,:,j \n,-g # I", - "page_start": 20, - "page_end": 20, - "source_file": "00-80T-80.pdf" - }, - { - "text": "‘: \n\n\n\n\n\n\n\n-.- \n\n\n\n\n\n\n\n*\n,-. \n. :,,.", - "page_start": 373, - "page_end": 373, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**32**| EMPLOYEES", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "_~. \n,, \n.", - "page_start": 325, - "page_end": 325, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**Contents**", - "page_start": 4, - "page_end": 4, - "source_file": "sg246915.pdf" - }, - { - "text": "[html]yVu00600000000590223he00355 yama1LsjK934_flY1wa0e4GPEc521iv = 453A2BDeE * bA53LVdpF3 55YV0rLX1r ( 701 )F1FZqQ = Bogdan Savu ; 18MR0045771 ; 18MR0ZZ014E826 ; Jq *dns1− * 192.168.PDNSserver 1dns_doma1n** domain. exampPDNSDomain Name# Network conf igurationJournal - Denovementnet1_name- \" net_ocp_c ' uster1 \"# NetwoΔ - k Namenet1_v1an_1d− * 1 *# VLANnet1_subnet− * 192.168.11.0 / 21 *# Netwonet1_gateway** 192.168.11.1 *# Gatewnet1_start- * 192.168.11.223 ## FirstIP from Poolnet1_end- * 192.168.11.223 ## LastIP from Poo1FIM1 conf1gurat1on ( 0CP - Master Nodes )Jensense ------------------------------vml_number------# NumberGeneticsvml_memory--- 32 *# Memor,vm1_cpu-------# VirtuCPUvml_vcpu_rat10-----# vCPUATI0 1 : 4 1 vCPU = 0.25 eCPU ( cores )vm1_nameα * bsocp *# HostnAge greathervm1_f1 rst_1p** 192.168.11.223 *# FistIP from a consecutive pool of IPsvml_tmage_name• \" x1v_p9_1mage_rhe176 \"# The 1mage namevml_remote_restart• \" true \"# Enab1Restartvml_storage_name• \" x1v_StoragePoo1 \"# StoraTemp1atevm1_dockerd1sk1α * 0 **# Docke- d1sk s1ze 1n GB for ephemera1 storage# WR conf1guration ( OCP - Infra Nodes )Jensense ------------------------------vm2_numberα - 90 *# NumberGeneticsvrr2_memory--- 16 *# Memor,vmZ_cpu-----# VirtuCPUvm2_vcpu_rat10-------# vCPURATI0 1 : 4 1 vCPU = 0.25 eCPU ( cores )vm2_name• \" 1nf ' node \"# HostnAge greathervm2_f1 rst_1p** 192.168.11.205 *# FistIP from a consecutive pool of IPsvm2_1mage_name• \" x1v_p9_image_# The 1nage namevm2_remote_restart• \" true \"# Enab1Restartvm2_storage_name• \" x1v_StoragePoo1 \"# StoraTemp1atevm2_dockerd1sk1--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# Docke- d1sk s1ze 1n GB for ephemera1 storage# WB conf1gurat1on ( OCP - korkers ( App ) Nodes )Jensense ------------------------------vm3_numberα - 90 *# NumberGeneticsvrn3_memory--- 32 *# Memor,vm3_cpu-----# VirtuCPUvm3_vcpu_rat10-------# vCPURATI0 1 : 4 1 vCPU = 0.25 eCPU ( cores )vm3_name• \" appnode \"# HostnAge greathervm3_f1 rst_1p\n ", - "page_start": 130, - "page_end": 130, - "source_file": "sg248459.pdf" - }, - { - "text": "3,THIN_PROVISION_VOL_1,0,io_grp0,online,0,Pool0,100.00GB,striped,,,,,6005076400F58004980000 \n0000000005,0,1,empty,1,no,0,0,Pool0,no,yes,3,THIN_PROVISION_VOL_1, \n6,MIRRORED_SYNC_RATE_16,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F58004980000 \n0000000008,0,1,empty,0,no,0,0,Pool0,no,yes,6,MIRRORED_SYNC_RATE_16, \n7,THIN_PROVISION_MIRRORED_VOL,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F58004 \n9800000000000009,0,1,empty,1,no,0,0,Pool0,no,yes,7,THIN_PROVISION_MIRRORED_VOL, \n8,Tiger,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F580049800000000000010,0,1,e \nmpty,0,no,0,0,Pool0,no,yes,8,Tiger, \n9,UNCOMPRESSED_VOL,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F5800498000000000 \n00011,0,1,empty,0,no,1,0,Pool0,no,yes,9,UNCOMPRESSED_VOL, \n12,vdisk0_restore,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F58004980000000000 \n000E,0,1,empty,0,no,0,0,Pool0,no,yes,12,vdisk0_restore, \n13,vdisk0_restore1,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F5800498000000000 \n0000F,0,1,empty,0,no,0,0,Pool0,no,yes,13,vdisk0_restore1, \n\n\n \n \n \n \n [html]\n
Example 7 - 36
The Isvdisk command : Storage pool ID and name
IBM_Storwize : ITS0 : superuser > 1svd1sk 0
1.0
name A_MIRR0RED_VOL_1
I0_group_id 0
I0_group_name 10_grp0
status on ' ine
md1sk_grp_id 0
md1sk_grp_name_Poo10
10.00GB
type striped
formatted yes
formatting no
md1 sk_1d
md1sk_name
FC_1d
FC_name
RC_1d
RC_name
vd1sk_UID 6005076400F58004980000000000000
preferred_node_1.2
fast_wri te_state empty
cache readwrite
ud1.4660
fc_map_count_0
sync_rate 50
copy_count 1
se_copy_count_0
F11e system
m1rror_wri te_pr1or1ty 1atency
RC_change no
compressed_copy_count_0
access_I0_group_count 1
1ast_access_time
parent_md1sk_grp_id 0
parent_md1sk_grp_name Poo10
owner_type_none
", - "page_start": 333, - "page_end": 333, - "source_file": "sg247938.pdf" - }, - { - "text": "**$**\n\n**724**\n(734) \n(746) **$ 255**\n441 \n364 **$ 386**\n401 \n511 **$ (14)**\n(26) \n- \n\n**$**\n\n**331**\n(5,416) \n(5,490) \n\n**$**\n\n**9,761**\n(2,893) \n9,694 \n\n**$**\n\n**$22,389**\n**$ 22 ,389**\n7,468 \n6,734 \n\n$ \n\n- \n- \n- \n\n$ \n\n**-**\n- \n- **-**\n- \n- **-**\n- \n- \n\n**$**\n\n**-**\n- \n- \n\n**$**", - "page_start": 38, - "page_end": 38, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": ")YE STREAMERS OhI F!ilJ MOnFl", - "page_start": 100, - "page_end": 100, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "news4.pdf", - "query": "I want to start a company that automates kitchen tasks, does that sound like a good idea for 2025?", - "target_page": 1, - "target_passage": "Smart home automation Smart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**The top AI-powered tech trends in 2025**\n\n\n\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. \n\nFinancial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "McCarthy, John; Minsky, Marvin; Rochester, Nathan; Shannon, Claude (1955). \"A Proposal for \n\nthe Dartmouth Summer Research Project on Artificial Intelligence\" (https://web.archive.org/w \neb/20070826230310/http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html). \nArchived from the original (http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth. \nhtml) on 26 August 2007. Retrieved 30 August 2007. \n\nMcCarthy, John (2007), \"From Here to Human-Level AI\",*Artificial Intelligence*, p. 171 \nMcCarthy, John (1999),*What is AI?*(http://jmc.stanford.edu/artificial-intelligence/what-is-ai/inde \nx.html), archived (https://web.archive.org/web/20221204051737/http://jmc.stanford.edu/artifi \ncial-intelligence/what-is-ai/index.html) from the original on 4 December 2022, retrieved \n4 December 2022 \n\nMcCauley, Lee (2007). \"AI armageddon and the three laws of robotics\".*Ethics and Information*\n*Technology*.**9**(2): 153–164. CiteSeerX 10.1.1.85.8904 (https://citeseerx.ist.psu.edu/viewdo \nc/summary?doi=10.1.1.85.8904). doi:10.1007/s10676-007-9138-2 (https://doi.org/10.1007% \n2Fs10676-007-9138-2). S2CID 37272949 (https://api.semanticscholar.org/CorpusID:372729 \n49). \n\nMcGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge \n\ndiscovery\".*The Knowledge Engineering Review*.**20**(1): 39–61. \ndoi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). \nS2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656). \n\nMcGaughey, E (2022),*Will Robots Automate Your Job Away? Full Employment, Basic Income,*\n*and Economic Democracy*(https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \np. 51(3) Industrial Law Journal 511–559, doi:10.2139/ssrn.3044448 (https://doi.org/10.213 \n9%2Fssrn.3044448), S2CID 219336439 (https://api.semanticscholar.org/CorpusID:2193364 \n39), SSRN 3044448 (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \narchived (https://web.archive.org/web/20210131074722/https://papers.ssrn.com/sol3/paper \ns.cfm?abstract_id=3044448) from the original on 31 January 2021, retrieved 27 May 2023 \nMerkle, Daniel; Middendorf, Martin (2013). \"Swarm Intelligence\". In Burke, Edmund K.; Kendall, \nGraham (eds.).*Search Methodologies: Introductory Tutorials in Optimization and Decision*\n*Support Techniques*. Springer Science & Business Media. ISBN 978-1-4614-6940-7. \nMinsky, Marvin (1967),*Computation: Finite and Infinite Machines*, Englewood Cliffs, N.J.: \n\nPrentice-Hall \n\nMoravec, Hans (1988).*Mind Children*(https://archive.org/details/mindchildrenfutu00mora). \n\nHarvard University Press. ISBN 978-0-6745-7616-2. Archived (https://web.archive.org/web/2 \n0200726131644/https://archive.org/details/mindchildrenfutu00mora) from the original on 26 \nJuly 2020. Retrieved 18 November 2019. \n\nMorgenstern, Michael (9 May 2015). \"Automation and anxiety\" (https://www.economist.com/new \ns/special-report/21700758-will-smarter-machines-cause-mass-unemployment-automation-a \nnd-anxiety).*The Economist*. Archived (https://web.archive.org/web/20180112214621/https:// \nwww.economist.com/news/special-report/21700758-will-smarter-machines-cause-mass-une \nmployment-automation-and-anxiety) from the original on 12 January 2018. Retrieved \n13 January 2018. \n\nMüller, Vincent C.; Bostrom, Nick (2014). \"Future Progress in Artificial Intelligence: A Poll Among \nExperts\" (http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF).*AI Matters*.**1**(1): 9–11. \ndoi:10.1145/2639475.2639478 (https://doi.org/10.1145%2F2639475.2639478). \nS2CID 8510016 (https://api.semanticscholar.org/CorpusID:8510016). Archived (https://web. \narchive.org/web/20160115114604/http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF) \nfrom the original on 15 January 2016.", - "page_start": 60, - "page_end": 60, - "source_file": "wikipedia3.pdf" - }, - { - "text": "“We will continue to pursue \nopportunities to grow and \nenhance shareholder value. \nWe plan to actively seek strategic \nacquisitions; look for additional \nbranch locations in higher- \ngrowth areas to expand our \nexisting banks; and increase \nour mortgage and \n.brokerage operations.”", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "**There’s only**\n\n\n\n**to run a business...**\n\nFORM 100025[2001]", - "page_start": 39, - "page_end": 39, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "Finally, our Company remains well positioned because of the hard and creative work put \nforth by our employees, board of directors, partners, contractors, and consultants. With \nprices low we have a new set of circumstances we can capitalize on to strengthen our \nbusiness. Thanks to each and every one of you for your continued focus and passion to \ntake the calculated risks needed for generating superior shareholder returns and building \na stable, flourishing enterprise. \n\nSincerely,", - "page_start": 6, - "page_end": 6, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Alternatively, dedicated models for mathematical problem solving with higher precision for the outcome \nincluding proof of theorems have been developed such as*Alpha Tensor*,*Alpha Geometry*and*Alpha*\n*Proof*all from Google DeepMind,[157]*Llemma*from eleuther[158] or*Julius*.[159] \n\nWhen natural language is used to describe mathematical problems, converters transform such prompts \ninto a formal language such as Lean to define mathematical tasks. \n\nSome models have been developed to solve challenging problems and reach good results in benchmark \ntests, others to serve as educational tools in mathematics.[160] \n\n**Finance**\n\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail \nonline banking to investment advice and insurance, where automated \"robot advisers\" have been in use \nfor some years.[161] \n\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly \ninnovative AI-informed financial products and services: \"the deployment of AI tools will simply further \nautomatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice \nin the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension \ninnovation.\"[162] \n\n**Military**\nVarious countries are deploying AI military applications.[163] The main applications enhance command \nand control, communications, sensors, integration and interoperability.[164] Research is targeting \nintelligence collection and analysis, \ninformation operations, and \nsemiautonomous and autonomous vehicles.[163] AI technologies enable coordination of sensors and \neffectors, threat detection and identification, marking of enemy positions, target acquisition, coordination \nand deconfliction of distributed Joint Fires between networked combat vehicles involving manned and \nunmanned teams.[164] \n\nlogistics, cyber operations, \n\nAI has been used in military operations in Iraq, Syria, Israel and Ukraine.[163][165][166][167] \n\n**Generative AI**\n\nIn the early 2020s, generative AI gained widespread prominence. GenAI is AI capable of generating text, \nimages, videos, or other data using generative models,[168][169] often in response to prompts.[170][171] \n\nIn March 2023, 58% of U.S. adults had heard about ChatGPT and 14% had tried it.[172] The increasing \nrealism and ease-of-use of AI-based text-to-image generators such as Midjourney, DALL-E, and Stable \nDiffusion sparked a trend of viral AI-generated photos. Widespread attention was gained by a fake photo \nof Pope Francis wearing a white puffer coat, the fictional arrest of Donald Trump, and a hoax of an attack \non the Pentagon, as well as the usage in professional creative arts.[173][174] \n\n\n \n \n \n \n [html]\n
Agents
", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia3.pdf" - }, - { - "text": "building both profit and volume. We will not, however, sacrifice profit to gain volume. How far we can go depends on how fact we deliver results. I believe that we have much more room to grow, and to demons", - "page_start": 62, - "page_end": 62, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**2 0 0 0**\n\n*“In 2000 we took great pride in Euronet’s Fast 500*\n*ranking by Deloitte & Touche as the second fastest*\n*growing technology company in North America.”*\n\nDuring 2000, we failed to meet our revenue target Touche as the second fastest growing technology \n\nfor our software division. In the Fourth Quarter, we company in North America based on our five-year \n\ninitiated the steps necessary to rightsize our revenue growth of 66,790%. \n\nsoftware business and to bring costs in line with \n\nWe’re continuing to build on our recurring revenue \nongoing revenue expectations. However, owning \n\nstream through transaction channels that reinforce \nthis software division gives us control of software \n\nour strengths as an electronic payments processor. \ndevelopment. It also provides the expertise and \n\nToday, we’re expanding the \nflexibility to adapt to emerging \n\n**Annual Consolidated Revenues**\n27% increase for full year \n2000 over 1999 \nreach of our ATM networks, \n**52.7**\ntransaction needs and to bring \n\ndelivering innovative new \n**41.5**\nnew payment solutions quickly \n**n**\n**o**\n**i**\n**l**\n**l**\n**i**\nmobile operator services and \n\n**M**\n**D**\n**S**\n**U**\nto market, which enhances our \n\ntapping the promise of mobile \noutsourcing opportunities. The \n**11.9**\n\ncommerce with an expanding \nsoftware business is very valuable \n\n**5.3**\n\n**1.3**\nsuite of wireless solutions. \n**0.1**\nto Euronet and completes our \n**1995 1996 1997 1998 1999 2000**\nBased on this strong foundation, \nservice offering. We expect it to be a \n\nour future has more potential than ever before. \npositive contributor to our bottom line going forward. \n\nWe’re excited about the possibilities ahead as we \nSince founding Euronet in 1994, we’ve worked \n\ncontinue to form the digital bridges that will \nhard to establish the company as a leader in the \n\nposition Euronet Worldwide as a global leader in \nfield of secure electronic financial transactions and \n\nsecure electronic financial transactions. \nto grow our presence worldwide. So in 2000 we took \n\ngreat pride in Euronet being ranked by Deloitte &", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "Prominent Authors Sue OpenAI\" (https://www.nytimes.com/2023/09/20/books/authors-open \nai-lawsuit-chatgpt-copyright.html?campaign_id=2&emc=edit_th_20230921&instance_id=103 \n259&nl=todaysheadlines®i_id=62816440&segment_id=145288&user_id=ad24f3545dae \n0ec44284a38bb4a88f1d),*The New York Times*, archived (https://web.archive.org/web/2024 \n0914155020/https://www.nytimes.com/2023/09/20/books/authors-openai-lawsuit-chatgpt-co \npyright.html?campaign_id=2&emc=edit_th_20230921&instance_id=103259&nl=todaysheadl \nines®i_id=62816440&segment_id=145288&user_id=ad24f3545dae0ec44284a38bb4a88 \nf1d) from the original on 14 September 2024, retrieved 5 October 2024 \nAltman, Sam; Brockman, Greg; Sutskever, Ilya (22 May 2023). \"Governance of \n\nSuperintelligence\" (https://openai.com/blog/governance-of-superintelligence).*openai.com*. \nArchived (https://web.archive.org/web/20230527061619/https://openai.com/blog/governanc \ne-of-superintelligence) from the original on 27 May 2023. Retrieved 27 May 2023. \n\nAnderson, Susan Leigh (2008). \"Asimov's \"three laws of robotics\" and machine metaethics\".*AI*\n*& Society*.**22**(4): 477–493. doi:10.1007/s00146-007-0094-5 (https://doi.org/10.1007%2Fs0 \n0146-007-0094-5). S2CID 1809459 (https://api.semanticscholar.org/CorpusID:1809459). \n\nAnderson, Michael; Anderson, Susan Leigh (2011).*Machine Ethics*. Cambridge University \n\nPress. \n\nArntz, Melanie; Gregory, Terry; Zierahn, Ulrich (2016), \"The risk of automation for jobs in OECD \ncountries: A comparative analysis\",*OECD Social, Employment, and Migration Working*\n*Papers 189*\n\nAsada, M.; Hosoda, K.; Kuniyoshi, Y.; Ishiguro, H.; Inui, T.; Yoshikawa, Y.; Ogino, M.; Yoshida, \n\nC. (2009). \"Cognitive developmental robotics: a survey\".*IEEE Transactions on Autonomous*\n*Mental Development*.**1**(1): 12–34. doi:10.1109/tamd.2009.2021702 (https://doi.org/10.110 \n9%2Ftamd.2009.2021702). S2CID 10168773 (https://api.semanticscholar.org/CorpusID:101 \n68773). \n\n\"Ask the AI experts: What's driving today's progress in AI?\" (https://www.mckinsey.com/business \n-functions/mckinsey-analytics/our-insights/ask-the-ai-experts-whats-driving-todays-progress- \nin-ai).*McKinsey & Company*. Archived (https://web.archive.org/web/20180413190018/http \ns://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ask-the-ai-expert \ns-whats-driving-todays-progress-in-ai) from the original on 13 April 2018. Retrieved 13 April \n2018. \n\nBarfield, Woodrow; Pagallo, Ugo (2018).*Research handbook on the law of artificial intelligence*. \nCheltenham, UK: Edward Elgar Publishing. ISBN 978-1-7864-3904-8. OCLC 1039480085 \n(https://search.worldcat.org/oclc/1039480085). \n\nBeal, J.; Winston, Patrick (2009), \"The New Frontier of Human-Level Artificial Intelligence\", \n\n*IEEE Intelligent Systems*, vol. 24, pp. 21–24, doi:10.1109/MIS.2009.75 (https://doi.org/10.11 \n09%2FMIS.2009.75), hdl:1721.1/52357 (https://hdl.handle.net/1721.1%2F52357), \nS2CID 32437713 (https://api.semanticscholar.org/CorpusID:32437713) \n\nBerdahl, Carl Thomas; Baker, Lawrence; Mann, Sean; Osoba, Osonde; Girosi, Federico (7 \n\nFebruary 2023). \"Strategies to Improve the Impact of Artificial Intelligence on Health Equity: \nScoping Review\" (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11041459).*JMIR AI*.**2**: \ne42936. doi:10.2196/42936 (https://doi.org/10.2196%2F42936). ISSN 2817-1705 (https://se \narch.worldcat.org/issn/2817-1705). PMC 11041459 (https://www.ncbi.nlm.nih.gov/pmc/articl \nes/PMC11041459). PMID 38875587 (https://pubmed.ncbi.nlm.nih.gov/38875587). \nS2CID 256681439 (https://api.semanticscholar.org/CorpusID:256681439).", - "page_start": 52, - "page_end": 52, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "news4.pdf", - "query": "I want to help my parents who are in residential care, are there any trendy AI-related devices I could help them with? ", - "target_page": 1, - "target_passage": "Wearable devices equipped with this technology can offer real-time health insights, helping individuals make informed decisions about their well-being", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**The top AI-powered tech trends in 2025**\n\n\n\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. \n\nFinancial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "models are prone to generating falsehoods called \"hallucinations\", although this can be reduced with \nRLHF and quality data. They are used in chatbots, which allow people to ask a question or request a task \nin simple text.[122][123] \n\nCurrent models and services include Gemini (formerly Bard), ChatGPT, Grok, Claude, Copilot, and \nLLaMA.[124] Multimodal GPT models can process different types of data (modalities) such as images, \nvideos, sound, and text.[125] \n\n**Hardware and software**\n\nIn the late 2010s, graphics processing units (GPUs) that were increasingly designed with AI-specific \nenhancements and used with specialized TensorFlow software had replaced previously used central \nprocessing unit (CPUs) as the dominant means for large-scale (commercial and academic) machine \nlearning models' training.[126] Specialized programming languages such as Prolog were used in early AI \nresearch,[127] but general-purpose programming languages like Python have become predominant.[128] \n\nThe transistor density in integrated circuits has been observed to roughly double every 18 months—a \ntrend known as Moore's law, named after the Intel co-founder Gordon Moore, who first identified it. \nImprovements in GPUs have been even faster.[129] \n\n**Applications**\n\nAI and machine learning technology is used in most of the essential applications of the 2020s, including: \nsearch engines (such as Google Search), targeting online advertisements, recommendation systems \n(offered by Netflix, YouTube or Amazon), driving internet traffic, targeted advertising (AdSense, \nFacebook), virtual assistants (such as Siri or Alexa), autonomous vehicles (including drones, ADAS and \nself-driving cars), automatic language translation (Microsoft Translator, Google Translate), facial \nrecognition (Apple's Face ID or Microsoft's DeepFace and Google's FaceNet) and image labeling (used \nby Facebook, Apple's iPhoto and TikTok). The deployment of AI may be overseen by a Chief automation \nofficer (CAO). \n\n**Health and medicine**\n\nThe application of AI in medicine and medical research has the potential to increase patient care and \nquality of life.[130] Through the lens of the Hippocratic Oath, medical professionals are ethically \ncompelled to use AI, if applications can more accurately diagnose and treat patients.[131][132] \n\nFor medical research, AI is an important tool for processing and integrating big data. This is particularly \nimportant for organoid and tissue engineering development which use microscopy imaging as a key \ntechnique in fabrication.[133] It has been suggested that AI can overcome discrepancies in funding \nallocated to different fields of research.[133] New AI tools can deepen the understanding of biomedically \nrelevant pathways. For example, AlphaFold 2 (2021) demonstrated the ability to approximate, in hours \nrather than months, the 3D structure of a protein.[134] In 2023, it was reported that AI-guided drug \ndiscovery helped find a class of antibiotics capable of killing two different types of drug-resistant \nbacteria.[135] In 2024, researchers used machine learning to accelerate the search for Parkinson's disease", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Alternatively, dedicated models for mathematical problem solving with higher precision for the outcome \nincluding proof of theorems have been developed such as*Alpha Tensor*,*Alpha Geometry*and*Alpha*\n*Proof*all from Google DeepMind,[157]*Llemma*from eleuther[158] or*Julius*.[159] \n\nWhen natural language is used to describe mathematical problems, converters transform such prompts \ninto a formal language such as Lean to define mathematical tasks. \n\nSome models have been developed to solve challenging problems and reach good results in benchmark \ntests, others to serve as educational tools in mathematics.[160] \n\n**Finance**\n\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail \nonline banking to investment advice and insurance, where automated \"robot advisers\" have been in use \nfor some years.[161] \n\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly \ninnovative AI-informed financial products and services: \"the deployment of AI tools will simply further \nautomatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice \nin the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension \ninnovation.\"[162] \n\n**Military**\nVarious countries are deploying AI military applications.[163] The main applications enhance command \nand control, communications, sensors, integration and interoperability.[164] Research is targeting \nintelligence collection and analysis, \ninformation operations, and \nsemiautonomous and autonomous vehicles.[163] AI technologies enable coordination of sensors and \neffectors, threat detection and identification, marking of enemy positions, target acquisition, coordination \nand deconfliction of distributed Joint Fires between networked combat vehicles involving manned and \nunmanned teams.[164] \n\nlogistics, cyber operations, \n\nAI has been used in military operations in Iraq, Syria, Israel and Ukraine.[163][165][166][167] \n\n**Generative AI**\n\nIn the early 2020s, generative AI gained widespread prominence. GenAI is AI capable of generating text, \nimages, videos, or other data using generative models,[168][169] often in response to prompts.[170][171] \n\nIn March 2023, 58% of U.S. adults had heard about ChatGPT and 14% had tried it.[172] The increasing \nrealism and ease-of-use of AI-based text-to-image generators such as Midjourney, DALL-E, and Stable \nDiffusion sparked a trend of viral AI-generated photos. Widespread attention was gained by a fake photo \nof Pope Francis wearing a white puffer coat, the fictional arrest of Donald Trump, and a hoax of an attack \non the Pentagon, as well as the usage in professional creative arts.[173][174] \n\n\n \n \n \n \n [html]\n
Agents
", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Artificial intelligent (AI) agents are software entities designed to \nperceive their environment, make decisions, and take actions \nautonomously to achieve specific goals. These agents can interact \nwith users, their environment, or other agents. AI agents are used \nin various applications, including virtual assistants, chatbots, \nindustrial \nautonomous vehicles, game-playing systems, and \nrobotics. AI agents operate within the constraints of their \nprogramming, available computational resources, and hardware \nlimitations. This means they are restricted to performing tasks \nwithin their defined scope and have finite memory and processing \ncapabilities. In real-world applications, AI agents often face time \nconstraints for decision-making and action execution. Many AI \nagents incorporate learning algorithms, enabling them to improve \ntheir performance over time through experience or training. Using \nmachine learning, AI agents can adapt to new situations and \noptimise their behaviour for their designated tasks.[175][176][177] \n\n**Other industry-specific tasks**\n\nThere are also thousands of successful AI applications used to solve specific problems for specific \nindustries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in \nsome offerings or processes.[178] A few examples are energy storage, medical diagnosis, military \nlogistics, applications that predict the result of judicial decisions, foreign policy, or supply chain \nmanagement. \n\nAI applications for evacuation and disaster management are growing. AI has been used to investigate if \nand how people evacuated in large scale and small scale evacuations using historical data from GPS, \nvideos or social media. Further, AI can provide real time information on the real time evacuation \nconditions.[179][180][181] \n\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments \nor increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict \nthe ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct \npredictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests, \nand save water. \n\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and \napplications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the \ndevelopment of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting \nsolar activity, and distinguishing between signals and instrumental effects in gravitational wave \nastronomy. Additionally, it could be used for activities in space, such as space exploration, including the \nanalysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance, \nand more autonomous operation.", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] \n\nArtificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**AI welfare and rights**\n\nIt is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel), \nand if so, to what degree.[388] But if there is a significant chance that a given machine can feel and suffer, \nthen it may be entitled to certain rights or welfare protection measures, similarly to animals.[389][390] \nSapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may \nprovide another moral basis for AI rights.[389] Robot rights are also sometimes proposed as a practical \nway to integrate autonomous agents into society.[391] \n\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI \nsystems. Similarly to the legal status of companies, it would have conferred rights but also \nresponsibilities.[392] Critics argued in 2018 that granting rights to AI systems would downplay the \nimportance of human rights, and that legislation should focus on user needs rather than speculative \nfuturistic scenarios. They also noted that robots lacked the autonomy to take part to society on their \nown.[393][394] \n\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI \nsentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot \nanalogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created \nand carelessly exploited.[390][389] \n\n**Superintelligence and the singularity**\n\nA superintelligence is a hypothetical agent that would possess intelligence far surpassing that of the \nbrightest and most gifted human mind.[379] If research into artificial general intelligence produced \nsufficiently intelligent software, it might be able to reprogram and improve itself. The improved software \nwould be even better at improving itself, leading to what I. J. Good called an \"intelligence explosion\" and \nVernor Vinge called a \"singularity\".[395] \n\nHowever, technologies cannot improve exponentially indefinitely, and typically follow an S-shaped \ncurve, slowing when they reach the physical limits of what the technology can do.[396] \n\n**Transhumanism**\n\nRobot designer Hans Moravec, cyberneticist Kevin Warwick and inventor Ray Kurzweil have predicted \nthat humans and machines may merge in the future into cyborgs that are more capable and powerful than \neither. This idea, called transhumanism, has roots in the writings of Aldous Huxley and Robert \nEttinger.[397]", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" - }, - { - "text": "drug treatments. Their aim was to identify compounds that block the clumping, or aggregation, of alpha- \nsynuclein (the protein that characterises Parkinson's disease). They were able to speed up the initial \nscreening process ten-fold and reduce the cost by a thousand-fold.[136][137] \n\n**Sexuality**\n\nApplications of AI in this domain include AI-enabled menstruation and fertility trackers that analyze user \ndata to offer prediction,[138] AI-integrated sex toys (e.g., teledildonics),[139] AI-generated sexual \neducation content,[140] and AI agents that simulate sexual and romantic partners (e.g., Replika).[141] AI is \nalso used for the production of non-consensual deepfake pornography, raising significant ethical and legal \nconcerns.[142] \n\nAI technologies have also been used to attempt to identify online gender-based violence and online \nsexual grooming of minors.[143][144] \n\n**Games**\n\nGame playing programs have been used since the 1950s to demonstrate and test AI's most advanced \ntechniques.[145] Deep Blue became the first computer chess-playing system to beat a reigning world chess \nchampion, Garry Kasparov, on 11 May 1997.[146] In 2011, in a*Jeopardy!*quiz show exhibition match, \nIBM's question answering system, Watson, defeated the two greatest*Jeopardy!*champions, Brad Rutter \nand Ken Jennings, by a significant margin.[147] In March 2016, AlphaGo won 4 out of 5 games of Go in a \nmatch with Go champion Lee Sedol, becoming the first computer Go-playing system to beat a \nprofessional Go player without handicaps. Then, in 2017, it defeated Ke Jie, who was the best Go player \nin the world.[148] Other programs handle imperfect-information games, such as the poker-playing \nprogram Pluribus.[149] DeepMind developed increasingly generalistic reinforcement learning models, \nsuch as with MuZero, which could be trained to play chess, Go, or Atari games.[150] In 2019, DeepMind's \nAlphaStar achieved grandmaster level in StarCraft II, a particularly challenging real-time strategy game \nthat involves incomplete knowledge of what happens on the map.[151] In 2021, an AI agent competed in a \nPlayStation Gran Turismo competition, winning against four of the world's best Gran Turismo drivers \nusing deep reinforcement learning.[152] In 2024, Google DeepMind introduced SIMA, a type of AI \ncapable of autonomously playing nine previously unseen open-world video games by observing screen \noutput, as well as executing short, specific tasks in response to natural language instructions.[153] \n\n**Mathematics**\nIn mathematics, special forms of formal step-by-step reasoning are used.[154] In contrast, LLMs such as \n*GPT-4 Turbo*,*Gemini Ultra*,*Claude Opus*,*LLaMa-2*or*Mistral Large*are working with probabilistic \nmodels, which can produce wrong answers in the form of hallucinations. Therefore, they need not only a \nlarge database of mathematical problems to learn from but also methods such as supervised fine-tuning or \ntrained classifiers with human-annotated data to improve answers for new problems and learn from \ncorrections.[155] A 2024 study showed that the performance of some language models for reasoning \ncapabilities in solving math problems not included in their training data was low, even for problems with \nonly minor deviations from trained data.[156]", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia3.pdf" - }, - { - "text": "the future to warrant research or that humans will be valuable from the perspective of a superintelligent \nmachine.[282] However, after 2016, the study of current and future risks and possible solutions became a \nserious area of research.[283] \n\n**Ethical machines and alignment**\n\nFriendly AI are machines that have been designed from the beginning to minimize risks and to make \nchoices that benefit humans. Eliezer Yudkowsky, who coined the term, argues that developing friendly AI \nshould be a higher research priority: it may require a large investment and it must be completed before AI \nbecomes an existential risk.[284] \n\nMachines with intelligence have the potential to use their intelligence to make ethical decisions. The field \nof machine ethics provides machines with ethical principles and procedures for resolving ethical \ndilemmas.[285] The field of machine ethics is also called computational morality,[285] and was founded at \nan AAAI symposium in 2005.[286] \n\nOther approaches include Wendell Wallach's \"artificial moral agents\"[287] and Stuart J. Russell's three \nprinciples for developing provably beneficial machines.[288] \n\n**Open source**\nActive organizations in the AI open-source community include Hugging Face,[289] Google,[290] \nEleutherAI and Meta.[291] Various AI models, such as Llama 2, Mistral or Stable Diffusion, have been \nmade open-weight,[292][293] meaning that their architecture and trained parameters (the \"weights\") are \npublicly available. Open-weight models can be freely fine-tuned, which allows companies to specialize \nthem with their own data and for their own use-case.[294] Open-weight models are useful for research and \ninnovation but can also be misused. Since they can be fine-tuned, any built-in security measure, such as \nobjecting to harmful requests, can be trained away until it becomes ineffective. Some researchers warn \nthat future AI models may develop dangerous capabilities (such as the potential to drastically facilitate \nbioterrorism) and that once released on the Internet, they cannot be deleted everywhere if needed. They \nrecommend pre-release audits and cost-benefit analyses.[295] \n\n**Frameworks**\n\nArtificial Intelligence projects can have their ethical permissibility tested while designing, developing, \nand implementing an AI system. An AI framework such as the Care and Act Framework containing the \nSUM values—developed by the Alan Turing Institute tests projects in four main areas:[296][297] \n\n**Respect**the dignity of individual people \n**Connect**with other people sincerely, openly, and inclusively \n**Care**for the wellbeing of everyone \n**Protect**social values, justice, and the public interest \n\n\n \n \n \n \n [html]\n
Allelested[ 298 ] howe
τ, these principles do not go with
Lit their criticisns, especially regards to the
", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia3.pdf" - }, - { - "text": "181. Zhao, Xilei; Lovreglio, Ruggiero; Nilsson, Daniel (1 May 2020). \"Modelling and interpreting \n\npre-evacuation decision-making using machine learning\" (https://www.sciencedirect.com/sci \nence/article/pii/S0926580519313184).*Automation in Construction*.**113**: 103140. \ndoi:10.1016/j.autcon.2020.103140 (https://doi.org/10.1016%2Fj.autcon.2020.103140). \nhdl:10179/17315 (https://hdl.handle.net/10179%2F17315). ISSN 0926-5805 (https://search. \nworldcat.org/issn/0926-5805). Archived (https://web.archive.org/web/20240519121548/http \ns://www.sciencedirect.com/science/article/abs/pii/S0926580519313184) from the original on \n19 May 2024. Retrieved 5 October 2024. \n\n182. \"India's latest election embraced AI technology. Here are some ways it was used \n\nconstructively\" (https://www.pbs.org/newshour/world/indias-latest-election-embraced-ai-tech \nnology-here-are-some-ways-it-was-used-constructively).*PBS News*. 12 June 2024. \nRetrieved 28 October 2024. \n\n183. Müller, Vincent C. (30 April 2020). \"Ethics of Artificial Intelligence and Robotics\" (https://plat \n\no.stanford.edu/archives/fall2023/entries/ethics-ai/).*Stanford Encyclopedia of Philosophy*\n*Archive*. Archived (https://web.archive.org/web/20241005165650/https://plato.stanford.edu/a \nrchives/fall2023/entries/ethics-ai/) from the original on 5 October 2024. Retrieved 5 October \n2024. \n\n184. Simonite (2016). \n185. Russell & Norvig (2021), p. 987. \n186. Laskowski (2023). \n187. GAO (2022). \n188. Valinsky (2019). \n189. Russell & Norvig (2021), p. 991. \n190. Russell & Norvig (2021), pp. 991–992. \n191. Christian (2020), p. 63. \n192. Vincent (2022). \n193. Kopel, Matthew. \"Copyright Services: Fair Use\" (https://guides.library.cornell.edu/copyright/f \nair-use).*Cornell University Library*. Archived (https://web.archive.org/web/20240926194057/ \nhttps://guides.library.cornell.edu/copyright/fair-use) from the original on 26 September 2024. \nRetrieved 26 April 2024. \n\n194. Burgess, Matt. \"How to Stop Your Data From Being Used to Train AI\" (https://www.wired.co \nm/story/how-to-stop-your-data-from-being-used-to-train-ai).*Wired*. ISSN 1059-1028 (https:// \nsearch.worldcat.org/issn/1059-1028). Archived (https://web.archive.org/web/202410031801 \n00/https://www.wired.com/story/how-to-stop-your-data-from-being-used-to-train-ai/) from the \noriginal on 3 October 2024. Retrieved 26 April 2024. \n\n195. Reisner (2023). \n196. Alter & Harris (2023). \n197. \"Getting the Innovation Ecosystem Ready for AI. An IP policy toolkit\" (https://www.wipo.int/e \ndocs/pubdocs/en/wipo-pub-2003-en-getting-the-innovation-ecosystem-ready-for-ai.pdf) \n(PDF).*WIPO*. \n\n198. Hammond, George (27 December 2023). \"Big Tech is spending more than VC firms on AI \n\nstartups\" (https://arstechnica.com/ai/2023/12/big-tech-is-spending-more-than-vc-firms-on-ai- \nstartups).*Ars Technica*. Archived (https://web.archive.org/web/20240110195706/https://arst \nechnica.com/ai/2023/12/big-tech-is-spending-more-than-vc-firms-on-ai-startups) from the \noriginal on 10 January 2024. \n\n199. Wong, Matteo (24 October 2023). \"The Future of AI Is GOMA\" (https://www.theatlantic.com/t \n\nechnology/archive/2023/10/big-ai-silicon-valley-dominance/675752).*The Atlantic*. Archived \n(https://web.archive.org/web/20240105020744/https://www.theatlantic.com/technology/archi \nve/2023/10/big-ai-silicon-valley-dominance/675752) from the original on 5 January 2024.", - "page_start": 40, - "page_end": 40, - "source_file": "wikipedia3.pdf" - }, - { - "text": "During the 2024 Indian elections, US$50 millions was spent on authorized AI-generated content, notably \nby creating deepfakes of allied (including sometimes deceased) politicians to better engage with voters, \nand by translating speeches to various local languages.[182] \n\n**Ethics**\n\nAI has potential benefits and potential risks.[183] AI may be able to advance science and find solutions for \nserious problems: Demis Hassabis of DeepMind hopes to \"solve intelligence, and then use that to solve \neverything else\".[184] However, as the use of AI has become widespread, several unintended \nconsequences and risks have been identified.[185] In-production systems can sometimes not factor ethics \nand bias into their AI training processes, especially when the AI algorithms are inherently unexplainable \nin deep learning.[186] \n\n**Risks and harm**\n\n**Privacy and copyright**\n\nMachine learning algorithms require large amounts of data. The techniques used to acquire this data have \nraised concerns about privacy, surveillance and copyright. \n\nAI-powered devices and services, such as virtual assistants and IoT products, continuously collect \npersonal information, raising concerns about intrusive data gathering and unauthorized access by third \nparties. The loss of privacy is further exacerbated by AI's ability to process and combine vast amounts of \ndata, potentially leading to a surveillance society where individual activities are constantly monitored and \nanalyzed without adequate safeguards or transparency. \n\nSensitive user data collected may include online activity records, geolocation data, video or audio.[187] \nFor example, in order to build speech recognition algorithms, Amazon has recorded millions of private \nconversations and allowed temporary workers to listen to and transcribe some of them.[188] Opinions \nabout this widespread surveillance range from those who see it as a necessary evil to those for whom it is \nclearly unethical and a violation of the right to privacy.[189] \n\nAI developers argue that this is the only way to deliver valuable applications. and have developed several \ntechniques that attempt to preserve privacy while still obtaining the data, such as data aggregation, de- \nidentification and differential privacy.[190] Since 2016, some privacy experts, such as Cynthia Dwork, \nhave begun to view privacy in terms of fairness. Brian Christian wrote that experts have pivoted \"from \nthe question of 'what they know' to the question of 'what they're doing with it'.\"[191] \n\nGenerative AI is often trained on unlicensed copyrighted works, including in domains such as images or \ncomputer code; the output is then used under the rationale of \"fair use\". Experts disagree about how well \nand under what circumstances this rationale will hold up in courts of law; relevant factors may include \n\"the purpose and character of the use of the copyrighted work\" and \"the effect upon the potential market \nfor the copyrighted work\".[192][193] Website owners who do not wish to have their content scraped can \nindicate it in a \"robots.txt\" file.[194] In 2023, leading authors (including John Grisham and Jonathan", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "news4.pdf", - "query": "Is the topic of finance trending among AI topics for 2015 in Canada?", - "target_page": 1, - "target_passage": "Financial services", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Alternatively, dedicated models for mathematical problem solving with higher precision for the outcome \nincluding proof of theorems have been developed such as*Alpha Tensor*,*Alpha Geometry*and*Alpha*\n*Proof*all from Google DeepMind,[157]*Llemma*from eleuther[158] or*Julius*.[159] \n\nWhen natural language is used to describe mathematical problems, converters transform such prompts \ninto a formal language such as Lean to define mathematical tasks. \n\nSome models have been developed to solve challenging problems and reach good results in benchmark \ntests, others to serve as educational tools in mathematics.[160] \n\n**Finance**\n\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail \nonline banking to investment advice and insurance, where automated \"robot advisers\" have been in use \nfor some years.[161] \n\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly \ninnovative AI-informed financial products and services: \"the deployment of AI tools will simply further \nautomatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice \nin the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension \ninnovation.\"[162] \n\n**Military**\nVarious countries are deploying AI military applications.[163] The main applications enhance command \nand control, communications, sensors, integration and interoperability.[164] Research is targeting \nintelligence collection and analysis, \ninformation operations, and \nsemiautonomous and autonomous vehicles.[163] AI technologies enable coordination of sensors and \neffectors, threat detection and identification, marking of enemy positions, target acquisition, coordination \nand deconfliction of distributed Joint Fires between networked combat vehicles involving manned and \nunmanned teams.[164] \n\nlogistics, cyber operations, \n\nAI has been used in military operations in Iraq, Syria, Israel and Ukraine.[163][165][166][167] \n\n**Generative AI**\n\nIn the early 2020s, generative AI gained widespread prominence. GenAI is AI capable of generating text, \nimages, videos, or other data using generative models,[168][169] often in response to prompts.[170][171] \n\nIn March 2023, 58% of U.S. adults had heard about ChatGPT and 14% had tried it.[172] The increasing \nrealism and ease-of-use of AI-based text-to-image generators such as Midjourney, DALL-E, and Stable \nDiffusion sparked a trend of viral AI-generated photos. Widespread attention was gained by a fake photo \nof Pope Francis wearing a white puffer coat, the fictional arrest of Donald Trump, and a hoax of an attack \non the Pentagon, as well as the usage in professional creative arts.[173][174] \n\n\n \n \n \n \n [html]\n
Agents
", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**The top AI-powered tech trends in 2025**\n\n\n\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. \n\nFinancial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346", - "page_start": 0, - "page_end": 0, - "source_file": "news4.pdf" - }, - { - "text": "Up to this point, most of AI's funding had gone to projects that used high-level symbols to represent \nmental objects like plans, goals, beliefs, and known facts. In the 1980s, some researchers began to doubt \nthat this approach would be able to imitate all the processes of human cognition, especially perception, \nrobotics, learning and pattern recognition,[335] and began to look into \"sub-symbolic\" approaches.[336] \nRodney Brooks rejected \"representation\" in general and focussed directly on engineering machines that \nmove and survive.[x] Judea Pearl, Lofti Zadeh, and others developed methods that handled incomplete \nand uncertain information by making reasonable guesses rather than precise logic.[86][341] But the most \nimportant development was the revival of \"connectionism\", including neural network research, by \nGeoffrey Hinton and others.[342] In 1990, Yann LeCun successfully showed that convolutional neural \nnetworks can recognize handwritten digits, the first of many successful applications of neural \nnetworks.[343] \n\nAI gradually restored its reputation in the late 1990s and early 21st century by exploiting formal \nmathematical methods and by finding specific solutions to specific problems. This \"narrow\" and \"formal\" \nfocus allowed researchers to produce verifiable results and collaborate with other fields (such as statistics, \neconomics and mathematics).[344] By 2000, solutions developed by AI researchers were being widely \nused, although in the 1990s they were rarely described as \"artificial intelligence\" (a tendency known as \nthe AI effect).[345] However, several academic researchers became concerned that AI was no longer \npursuing its original goal of creating versatile, fully intelligent machines. Beginning around 2002, they \nfounded the subfield of artificial general intelligence (or \"AGI\"), which had several well-funded \ninstitutions by the 2010s.[4] \n\nDeep learning began to dominate industry benchmarks in 2012 and was adopted throughout the field.[11] \nFor many specific tasks, other methods were abandoned.[y] Deep learning's success was based on both \nhardware improvements (faster computers,[347] graphics processing units, cloud computing[348]) and \naccess to large amounts of data[349] (including curated datasets,[348] such as ImageNet). Deep learning's \nsuccess led to an enormous increase in interest and funding in AI.[z] The amount of machine learning \nresearch (measured by total publications) increased by 50% in the years 2015–2019.[306] \n\nIn 2016, issues of fairness and the misuse of technology were catapulted into center stage at machine \nlearning conferences, publications vastly increased, funding became available, and many researchers re- \nfocussed their careers on these issues. The alignment problem became a serious field of academic \nstudy.[283] \n\nIn the late teens and early 2020s, AGI companies began to deliver programs that created enormous \ninterest. In 2015, AlphaGo, developed by DeepMind, beat the world champion Go player. The program \ntaught only the game's rules and developed a strategy by itself. GPT-3 is a large language model that was \nreleased in 2020 by OpenAI and is capable of generating high-quality human-like text.[350] ChatGPT, \nlaunched on November 30, 2022, became the fastest-growing consumer software application in history, \ngaining over 100 million users in two months.[351] It marked what is widely regarded as AI's breakout \nyear, bringing it into the public consciousness.[352] These programs, and others, inspired an aggressive AI \nboom, where large companies began investing billions of dollars in AI research. According to AI Impacts, \nabout $50 billion annually was invested in \"AI\" around 2022 in the U.S. alone and about 20% of the new", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] \n\nArtificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology.", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Promotion of the wellbeing of the people and communities that these technologies affect requires \nconsideration of the social and ethical implications at all stages of AI system design, development and \nimplementation, and collaboration between job roles such as data scientists, product managers, data \nengineers, domain experts, and delivery managers.[300] \n\nThe UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations \navailable under a MIT open-source licence which is freely available on GitHub and can be improved with \nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge, \nability to reason, and autonomous capabilities.[301] \n\n\n\n**Regulation**\n\nThe regulation of artificial intelligence is the development \nof public sector policies and laws for promoting and \nregulating AI; it is therefore related to the broader regulation \nof algorithms.[302] The regulatory and policy landscape for \nAI is an emerging issue in jurisdictions globally.[303] \nAccording to AI Index at Stanford, the annual number of \nAI-related laws passed in the 127 survey countries jumped \nfrom one passed \nin 2022 \nalone.[304][305] Between 2016 and 2020, more than 30 \ncountries adopted dedicated strategies for AI.[306] Most EU \nmember states had released national AI strategies, as had \nCanada, China, India, Japan, Mauritius, \nthe Russian \nFederation, Saudi Arabia, United Arab Emirates, U.S., and \nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia \nand Tunisia.[306] The Global Partnership on Artificial Intelligence was launched in June 2020, stating a \nneed for AI to be developed in accordance with human rights and democratic values, to ensure public \nconfidence and trust in the technology.[306] Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher \npublished a joint statement in November 2021 calling for a government commission to regulate AI.[307] \nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they \nbelieve may happen in less than 10 years.[308] In 2023, the United Nations also launched an advisory \nbody to provide recommendations on AI governance; the body comprises technology company \nexecutives, governments officials and academics.[309] In 2024, the Council of Europe created the first \ninternational legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence \nand Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United \nStates, the United Kingdom, and other signatories.[310] \n\nin 2016 to 37 passed \n\nIn a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only \n35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\".[304] \nA 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to \nhumanity.[311] In a 2023 Fox News poll, 35% of Americans thought it \"very important\", and an additional \n41% thought it \"somewhat important\", for the federal government to regulate AI, versus 13% responding \n\"not very important\" and 8% responding \"not at all important\".[312][313]", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Harari, Yuval Noah (2023). \"AI and the future of humanity\" (https://www.youtube.com/watch?v= \nLWiM-LuRe6w).*YouTube*. Archived (https://web.archive.org/web/20240930110823/https://w \nww.youtube.com/watch?v=LWiM-LuRe6w) from the original on 30 September 2024. \nRetrieved 5 October 2024. \n\nHaugeland, John (1985).*Artificial Intelligence: The Very Idea*. Cambridge, Mass.: MIT Press. \n\nISBN 978-0-2620-8153-5.", - "page_start": 56, - "page_end": 56, - "source_file": "wikipedia3.pdf" - }, - { - "text": "FINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "181. Zhao, Xilei; Lovreglio, Ruggiero; Nilsson, Daniel (1 May 2020). \"Modelling and interpreting \n\npre-evacuation decision-making using machine learning\" (https://www.sciencedirect.com/sci \nence/article/pii/S0926580519313184).*Automation in Construction*.**113**: 103140. \ndoi:10.1016/j.autcon.2020.103140 (https://doi.org/10.1016%2Fj.autcon.2020.103140). \nhdl:10179/17315 (https://hdl.handle.net/10179%2F17315). ISSN 0926-5805 (https://search. \nworldcat.org/issn/0926-5805). Archived (https://web.archive.org/web/20240519121548/http \ns://www.sciencedirect.com/science/article/abs/pii/S0926580519313184) from the original on \n19 May 2024. Retrieved 5 October 2024. \n\n182. \"India's latest election embraced AI technology. Here are some ways it was used \n\nconstructively\" (https://www.pbs.org/newshour/world/indias-latest-election-embraced-ai-tech \nnology-here-are-some-ways-it-was-used-constructively).*PBS News*. 12 June 2024. \nRetrieved 28 October 2024. \n\n183. Müller, Vincent C. (30 April 2020). \"Ethics of Artificial Intelligence and Robotics\" (https://plat \n\no.stanford.edu/archives/fall2023/entries/ethics-ai/).*Stanford Encyclopedia of Philosophy*\n*Archive*. Archived (https://web.archive.org/web/20241005165650/https://plato.stanford.edu/a \nrchives/fall2023/entries/ethics-ai/) from the original on 5 October 2024. Retrieved 5 October \n2024. \n\n184. Simonite (2016). \n185. Russell & Norvig (2021), p. 987. \n186. Laskowski (2023). \n187. GAO (2022). \n188. Valinsky (2019). \n189. Russell & Norvig (2021), p. 991. \n190. Russell & Norvig (2021), pp. 991–992. \n191. Christian (2020), p. 63. \n192. Vincent (2022). \n193. Kopel, Matthew. \"Copyright Services: Fair Use\" (https://guides.library.cornell.edu/copyright/f \nair-use).*Cornell University Library*. Archived (https://web.archive.org/web/20240926194057/ \nhttps://guides.library.cornell.edu/copyright/fair-use) from the original on 26 September 2024. \nRetrieved 26 April 2024. \n\n194. Burgess, Matt. \"How to Stop Your Data From Being Used to Train AI\" (https://www.wired.co \nm/story/how-to-stop-your-data-from-being-used-to-train-ai).*Wired*. ISSN 1059-1028 (https:// \nsearch.worldcat.org/issn/1059-1028). Archived (https://web.archive.org/web/202410031801 \n00/https://www.wired.com/story/how-to-stop-your-data-from-being-used-to-train-ai/) from the \noriginal on 3 October 2024. Retrieved 26 April 2024. \n\n195. Reisner (2023). \n196. Alter & Harris (2023). \n197. \"Getting the Innovation Ecosystem Ready for AI. An IP policy toolkit\" (https://www.wipo.int/e \ndocs/pubdocs/en/wipo-pub-2003-en-getting-the-innovation-ecosystem-ready-for-ai.pdf) \n(PDF).*WIPO*. \n\n198. Hammond, George (27 December 2023). \"Big Tech is spending more than VC firms on AI \n\nstartups\" (https://arstechnica.com/ai/2023/12/big-tech-is-spending-more-than-vc-firms-on-ai- \nstartups).*Ars Technica*. Archived (https://web.archive.org/web/20240110195706/https://arst \nechnica.com/ai/2023/12/big-tech-is-spending-more-than-vc-firms-on-ai-startups) from the \noriginal on 10 January 2024. \n\n199. Wong, Matteo (24 October 2023). \"The Future of AI Is GOMA\" (https://www.theatlantic.com/t \n\nechnology/archive/2023/10/big-ai-silicon-valley-dominance/675752).*The Atlantic*. Archived \n(https://web.archive.org/web/20240105020744/https://www.theatlantic.com/technology/archi \nve/2023/10/big-ai-silicon-valley-dominance/675752) from the original on 5 January 2024.", - "page_start": 40, - "page_end": 40, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**References**\n\n1. Russell & Norvig (2021), pp. 1–4. \n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr \nom/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC \nH/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006) \n\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the \n\nland? On the interpretations, illustrations, and implications of artificial intelligence\".*Business*\n*Horizons*.**62**: 15–25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. \n2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). \nS2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736). \n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32–33, 1020–1021) \n\nProposal for the modern version: Pennachin & Goertzel (2007) \nWarnings of overspecialization in AI from leading researchers: Nilsson (1995), McCarthy \n(2007), Beal & Winston (2009) \n5. Russell & Norvig (2021, §1.2). \n6. Dartmouth workshop: Russell & Norvig (2021, p. 18), McCorduck (2004, pp. 111–136), NRC \n\n(1999, pp. 200–201) \nThe proposal: McCarthy et al. (1955) \n\n7. Successful programs of the 1960s: McCorduck (2004, pp. 243–252), Crevier (1993, pp. 52– \n\n107), Moravec (1988, p. 9), Russell & Norvig (2021, pp. 19–21) \n\n8. Funding initiatives in the early 1980s: Fifth Generation Project (Japan), Alvey (UK), \n\nMicroelectronics and Computer Technology Corporation (US), Strategic Computing Initiative \n(US): McCorduck (2004, pp. 426–441), Crevier (1993, pp. 161–162, 197–203, 211, 240), \nRussell & Norvig (2021, p. 23), NRC (1999, pp. 210–211), Newquist (1994, pp. 235–248) \n9. First AI Winter, Lighthill report, Mansfield Amendment: Crevier (1993, pp. 115–117), Russell \n\n& Norvig (2021, pp. 21–22), NRC (1999, pp. 212–213), Howe (1994), Newquist (1994, \npp. 189–201) \n\n10. Second AI Winter: Russell & Norvig (2021, p. 24), McCorduck (2004, pp. 430–435), Crevier \n\n(1993, pp. 209–210), NRC (1999, pp. 214–216), Newquist (1994, pp. 301–318) \n11. Deep learning revolution, AlexNet: Goldman (2022), Russell & Norvig (2021, p. 26), \n\nMcKinsey (2018) \n\n12. Toews (2023). \n13. Problem-solving, puzzle solving, game playing, and deduction: Russell & Norvig (2021, \n\nchpt. 3–5), Russell & Norvig (2021, chpt. 6) (constraint satisfaction), Poole, Mackworth & \nGoebel (1998, chpt. 2, 3, 7, 9), Luger & Stubblefield (2004, chpt. 3, 4, 6, 8), Nilsson (1998, \nchpt. 7–12) \n\n14. Uncertain reasoning: Russell & Norvig (2021, chpt. 12–18), Poole, Mackworth & Goebel \n\n(1998, pp. 345–395), Luger & Stubblefield (2004, pp. 333–381), Nilsson (1998, chpt. 7–12) \n15. Intractability and efficiency and the combinatorial explosion: Russell & Norvig (2021, p. 21) \n16. Psychological evidence of the prevalence of sub-symbolic reasoning and knowledge: \n\nKahneman (2011), Dreyfus & Dreyfus (1986), Wason & Shapiro (1966), Kahneman, Slovic \n& Tversky (1982) \n\n17. Knowledge representation and knowledge engineering: Russell & Norvig (2021, chpt. 10), \nPoole, Mackworth & Goebel (1998, pp. 23–46, 69–81, 169–233, 235–277, 281–298, 319– \n345), Luger & Stubblefield (2004, pp. 227–243), Nilsson (1998, chpt. 17.1–17.4, 18) \n\n18. Smoliar & Zhang (1994). \n19. Neumann & Möller (2008). \n20. Kuperman, Reichley & Bailey (2006).", - "page_start": 30, - "page_end": 30, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_CHK_2010.pdf", - "query": "Is there any chance that my cousin has been granted financial aid from Chesapeak Energy? He's studying at a college in Oklahoma.", - "target_page": 26, - "target_passage": "hat’s why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]in - kind39473939tools as nononlo − rTableGroup maximumorganizationprogram.\n
PatientsTumorComponentsSpecificity ( n = 25 )Teduction of controlControl
\n\nto selected students pursuing careers in finance, economics, accounting, \nmarketing, business administration, computer science and information \ntechnology. In addition, scholars will take part in a Chesapeake Presiden- \ntial Leadership Course facilitated by faculty members in coordination with \ndesignated Chesapeake leadership coaches, including a Chesapeake senior \nvice president and OCU alumni. \n\nvolunteer program in which employees roll up their sleeves in the com- \nmunities they call home. \n\nIn 2007 Chesapeake launched a scholarship program in Texas with an \ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal- \nlas to match its gift within a year. The cities responded and matched the gift, \nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the \ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the \ncost of higher education for 48 minority students. The fund provides each \nstudent $20,000 a year for up to four years at the school of their choice. To \ndate more than $1.0 million has been distributed to deserving local students. \nTo help ensure the training of qualified geologists, engineers, land- \nmen and energy lawyers in the next generation, we award scholarships \nto students pursuing energy-related degrees. We also help mentor them \nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship \nrecipients are paired with Chesapeake employee mentors who help devel- \nop students’ knowledge and provide career advice. There are currently 25 \nmentors and 40 scholarship recipients participating in the Peak Program. \n\nChesapeake partners with other companies and organizations to meet \nbasic, practical needs in hundreds of communities. An example is our \n\n\n\nOur recruiting team also initiated a strategic military recruitment \neffort during the past two years to hire former military personnel to \nwork in a variety of leadership and crew positions. This effort earned \nChesapeake an honor from G.I. JOBS magazine when we were named a \n2011 Top 100 Military-Friendly Employer. Chesapeake currently employs \n37 men and women who formerly served as junior military officers and \nmore than 100 former servicemen and servicewomen who joined the \ncompany through a program called Troops 2 Roughnecks. \n\nIn addition to our specific scholarship programs, one-time educational \ndonations and recruitment efforts, in 2010 we gave more than $1.8 million \nto fund higher education for nearly 400 other students in 12 states through \nour Chesapeake Scholars program. Chesapeake’s scholarships help recruit \nthe best and brightest students and provide educational opportunities in \ncommunities where we operate. In Oklahoma City, more than 400 em- \nployees volunteer for up to an hour a week on company time at four local \npublic schools. Chesapeake’s program has grown to become the largest \ncorporate mentoring program in Oklahoma.", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**Educational Impact**\nWe are also proud to help prepare tomorrow’s leaders today. In 2010 \nChesapeake supported universities, schools, academic chairs, scholarships \nand other educational programs with contributions totaling $5.4 million. \n\nChesapeake also makes contributions that help improve lives and \neconomies in cities where we operate: $25 million in 2010 alone. For ex- \nample, this past year we donated $200,000 to establish the Chesapeake \nEnvironmental and Recycling Center at Goodwill Industries of Central \nOklahoma. The center will provide an additional 80 jobs to disabled Okla- \nhomans, as well as help Goodwill recycle 10 million pounds a year, which \n\nInvesting in programs that promote technology and innovation is a \nkey to our country’s success. That’s why we gave $1.0 million to establish \nthe Chesapeake Energy dormitory for students at the Oklahoma School for \nScience and Mathematics (OSSM), a public, tuition-free, residential high \nschool located in Oklahoma City for juniors and seniors with exceptional \nabilities. The extremely competitive school is helping train the next gen- \neration of scientists and mathematicians. \n\n**Chesapeake’s $25 million**\n**of charitable giving in 2010**\n\n**15%**\n\n**7%**\n**54%**\n\nWe also established the Chesapeake Energy Presidential Scholars Pro- \ngram at the Oklahoma City University Meinders School of Business, making \na $5.0 million commitment to be distributed over the next five years. The \nChesapeake Scholars Program will provide up to $25,000 per year in tuition \n**24%**", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Chesapeake’s sense of civic commitment provides a bountiful harvest of \nbenefits to cities large and small. We partner with groups and organizations \nacross all of our operating areas to improve the communities our employ- \nees, contractors, vendors, land and mineral owners call home. We believe \nthe success of our business depends on the strength, goodwill and vitality \nof those communities. Most importantly, we believe it is the responsibility \nof every successful business to share success with its neighbors. \n\nIn 2010 we gave more than $25 million to charitable organizations \nand projects across our operating areas, primarily focusing on community \ndevelopment, education, health and medical and social services. \n\nequates to one-third of \nthe goods that other- \nwise would have been \ndestined for Oklahoma \nIn \nCity-area \nWest Virginia, we helped \nfund \nconstruction of \nthe Morgantown Market \nPlace, a permanent site for the city’s farmers’ market, creating more busi- \nness opportunities for local farmers. \n\n*Equipping the next generation — West Virginia*\n*students hold their new laptops from*\n*Chesapeake as part of the company’s*\n*Discovering Tomorrow’s Leaders program.*\n\nlandfills. \n\nChesapeake also supports local chambers of commerce and city \ncouncils in all of its operating areas. In the Haynesville Shale last year, we \nawarded grants to the Shelby County, Sabine Parish and Coushatta-Red \nRiver chambers of commerce to help fund tourism, business communi- \ncations and chamber events. In Texas, we assisted more than 250 civic, \nprofessional and community service organizations throughout Johnson, \nTarrant and western Dallas counties, and sponsored memberships in \n35 local Texas chambers of commerce. By helping local chambers and \nbusinesses grow and thrive, we are creating stronger economies. \n\n**Economic Impact**\nWhile much of the U.S. is still struggling to recover from the economic re- \ncession, the positive impact of natural gas and oil operations has provided \na valuable economic recovery stimulus for states that are home to explora- \ntion and development activities. As the nation’s second-largest producer \nof natural gas, a Top 15 producer of liquids and most active driller of new \nwells, Chesapeake’s arrival in a new play stimulates economic activity, \naugments personal income through jobs and royalty payments, gen- \nerates substantial tax revenue and sustains communities throughout its \noperating areas. \n\nWe also hire locally whenever possible to help stimulate the local \neconomy, and we provide training when the local work force isn’t yet \nqualified for the jobs we have open. For example, when Chesapeake \nbegan operating in the Marcellus Shale of West Virginia and Pennsyl- \nvania, finding experienced rig workers was a challenge. To meet that \nneed, Chesapeake’s wholly owned subsidiary, Nomac Drilling, built \nthe 40,000-square-foot Eastern Training Center and Housing Facility in \nBradford County, near Sayre, Pennsylvania. The campus opened in 2010 \nand serves as a housing facility and training ground for 266 workers at \na time. Nomac and Chesapeake host regular job fairs in the region and \nthe lines of interested candidates often extend out the door. \n\nIn addition to the general economic impact of our activities on local \neconomies, the company’s tax contributions are substantial. In 2010 \nChesapeake paid approximately $675 million in taxes, including ad valorem, \nseverance, sales, employer, and corporate income and franchise taxes. These \ntaxes pay for ongoing government services and also build and maintain \nschools, recreational facilities, and parks and roads — at a time when state \nand local governments are still feeling the pinch of recession. We are proud \nto support America’s economy with our growth while also helping to protect \nthe environment through the greater use of clean-burning natural gas and \nreducing the country’s dependence on expensive foreign oil.", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**12**| LETTER TO SHAREHOLDERS \n\nwet natural gas and dry natural gas), similar to the components of the \nEagle Ford Shale. We have made a large commitment to this play and \nhave acquired approximately 1.2 million net leasehold acres and expect \nto increase this total to as much as 1.5 million net leasehold acres in the \ncoming months. We are currently using three rigs to evaluate the play \nand believe our leasehold could support the drilling of up to 12,000 net \nwells. This is an area where we anticipate bringing in a joint venture \npartner late in 2011 or early in 2012. \n\n\n \n \n \n \n [html]\n
0.0000TableTableTableP ‐ CTable1.100Tabled1.TableTablePatientsTable
\n\n**Our People**\nGreat assets cannot exist without great people, so we take great pride \nin hiring, training, motivating, rewarding and retaining what we regard \n\nIn addition, we were honored in December 2010 at the 12th Annual \nPlatts Global Energy Awards as finalists for CEO of the Year, Community \n\nFrom our beginning 22 years ago with 10 \n\nemployees in Oklahoma City to employing \n\nmore than 10,000 people across 15 states \n\ntoday, Chesapeake has always focused on \n\nbuilding first-class human resources within \n\na distinctive corporate culture. \n\n\n\nDevelopment Program of the Year, Deal of the Year, Energy Producer \nof the Year and the Industry Leadership Award. Chesapeake was one \nof only two companies selected as a finalist in five or more categories. \nThe company was also honored in 2010 with a Certificate of Recognition \nfor our military reserve recruiting efforts, named a 2010 Best Diversity \nCompany by Engineering & Information Technology Magazine and rec- \nognized for Best Investor Relations in Energy Sector and Best Investor \nRelations Website at the 2010 IR Magazine U.S. Awards. \n\nas the best employees in the industry. From our beginning 22 years ago \nwith 10 employees in Oklahoma City to employing more than 10,000 \npeople across 15 states today, Chesapeake has always focused on build- \ning first-class human resources within a distinctive corporate culture. Talk \nto Chesapeake employees and you will note genuine pride and great \nenthusiasm about the company and the critical role that we play in deliv- \nering increasing quantities of clean and affordable American natural gas \nand valuable and reliable liquids to energy consumers across the country. \nChesapeake employees are distinctive in other ways as well. They \nare much younger than the industry average, with half of our almost \n4,000 Oklahoma City-based headquarters employees 33 years old \nor younger. Their enthusiasm and willingness to learn create an \n\n**Recent Events and a Better Way Forward**\nYou may be aware that I have been outspoken in attempting to persuade \nour country’s political leadership to recognize that the discovery of vast \nresources of unconventional natural gas and oil in the U.S. is a complete \ngame changer for our country from an economic, national security and \nenvironmental perspective. After two years of my best efforts and the \nefforts of many others in the industry, most notably T. Boone Pickens,", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**CORPORATE PROFILE**\n\nChesapeake Energy Corporation is the second-largest producer of \nnatural gas, a Top 15 producer of oil and natural gas liquids and \nthe most active driller of new wells in the U.S. \nHeadquartered in Oklahoma City, the company’s operations are focused on discovering and developing \n\nunconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in \n\nthe Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite \n\nWash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, \n\nNiobrara and Utica unconventional liquids-rich plays. \n\nThe company has also vertically integrated its oper- \n\nations and owns substantial midstream, compression, \n\ndrilling and oilfield service assets. Chesapeake’s stock \n\nis listed on the New York Stock Exchange under \n\nthe symbol CHK. Further information is available at \n\n**www.chk.com**where Chesapeake routinely posts \n\nannouncements, updates, events, investor informa- \n\ntion, presentations and press releases. \n\n\n\n**ON THE COVER**\n*Moving west, a Chesapeake rig*\n*drills toward the Niobrara Shale*\n*in the Powder River Basin of*\n*southeastern Wyoming, one of*\n*several new liquids-rich plays*\n*that are enabling the company*\n*to increase its profitability and*\n*return on capital.*", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "*Developing great assets begins with*\n*great people, such as the hardworking*\n*crews of Nomac, Chesapeake’s wholly*\n*owned drilling subsidiary. Employees*\n*take pride in the critical roles they play*\n*in finding and delivering natural gas*\n*to their fellow Americans.*", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**2011** **High** **Low** **Last**\n\nFirst Quarter $ 35.95 $ 25.93 $ 33.52 \n\n**2010** **High** **Low** **Last**\n\nFourth Quarter \nThird Quarter \nSecond Quarter \nFirst Quarter $ 26.43 \n23.00 \n25.55 \n29.22 $ 20.97 \n19.68 \n19.62 \n22.10 $ 25.91 \n 22.65 \n20.95 \n23.64 \n\n**2009** **High** **Low** **Last**\n\nFourth Quarter $ 30.00 \n29.49 \nThird Quarter \n24.66 \nSecond Quarter \n20.13 \nFirst Quarter $ 22.06 \n16.92 \n16.43 \n13.27 $ 25.88 \n 28.40 \n19.83 \n17.06 \n\n**2008** **High** **Low** **Last**\n\nFourth Quarter \nThird Quarter \nSecond Quarter \nFirst Quarter $ 35.46 \n74.00 \n68.10 \n49.87 $ 9.84 \n31.15 \n45.25 \n34.42 $ 16.17 \n 35.86 \n65.96 \n46.15 \n\n**Corporate Headquarters**\n6100 North Western Avenue \nOklahoma City, OK 73118 \n(405) 935-8000 \n\nof future events. They include estimates of nat- \nural gas and oil reserves, expected production, \nassumptions regarding future natural gas and \noil prices, planned drilling activity and capital \nexpenditures, and future asset sales, as well as \nstatements concerning anticipated cash flow and \nliquidity, business strategy and other plans and \nobjectives for future operations. Although we \nbelieve the expectations and forecasts reflected \nin these and other forward-looking statements \nare reasonable, we can give no assurance they \nwill prove to have been correct. They can be af- \nfected by inaccurate assumptions or by known \nor unknown risks and uncertainties. \n\n**Internet Address**\nCompany financial information, public disclo- \nsures and other information are available through \nChesapeake’s website at www.chk.com. \n\n**Common Stock**\nChesapeake Energy Corporation’s common stock \nis listed on the New York Stock Exchange (NYSE) \nunder the symbol CHK. As of March 31, 2011, there \nwere approximately 415,000 beneficial owners \nof our common stock. \n\nFactors that could cause actual results to differ \nmaterially from expected results are described \nunder “Risk Factors” in Item 1A of our 2010 Annual \nReport on Form 10-K included in this report. We \ncaution you not to place undue reliance on for- \nward-looking statements, and we undertake no \nobligation to update this information. We urge \nyou to carefully review and consider the disclo- \nsures made in this report and our other filings \nwith the Securities and Exchange Commission \n(SEC) regarding the risks and factors that may \naffect our business. \n\n**Common Stock Dividends**\nDuring 2010 the company declared a cash div- \nidend of $0.075 per share on March 8, June 21, \nSeptember 1 and December 20 for a total div- \nidend declared of $0.30 per share. \n\n**Independent Public Accountants**\nPricewaterhouseCoopers LLP \n6120 South Yale, Suite 1850 \nTulsa, OK 74136 \n(918) 524-1200 \n\n\n\nThe SEC requires natural gas and oil companies, in \nfilings made with the SEC, to disclose proved re- \nserves and permits the optional disclosure of \nprobable and possible reserves. While Chesapeake \nhas elected not to report probable and possible \nreserves in its filings with the SEC, we have pro- \nvided estimates in this report of what we consider \nto be our “total resource base.” This term includes \nour estimated proved reserves as well as “risked \nand unrisked unproved resources,” which repre- \nsent Chesapeake’s internal estimates of volumes of \nnatural gas and oil that are not classified as proved \nreserves but are potentially recoverable through \nexploratory drilling or additional drilling or recovery \ntechniques. Our estimates of unproved resources \nare not intended to correspond to probable and \npossible reserves, as defined by SEC regulations, \nand are by their nature more speculative than \nestimates of proved reserves and accordingly are \nsubject to substantially greater risk of being ac- \ntually realized by the company.", - "page_start": 46, - "page_end": 46, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "*Unconcerned by a Chesapeake drill-*\n*ing rig, antelope continue their daily*\n*routines in southeastern Wyoming’s*\n*Powder River Basin where the com-*\n*pany is developing the promising*\n*Niobrara Play.*", - "page_start": 18, - "page_end": 18, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "\n \n \n \n \n [html]\n
domestic oil production as two of its primary attributes, it is encouraging
to see our political leadership finally grasp that natural gas stands alone
as the only affordable, scalable and immediately available alternative to
foreign oil and that U. S. oil production can be increased significantly in
the years ahead.
The events of the past few months have unmistakably driven home
the fact that it is insanity to rely on the Middle East to provide our econ -
omy ' s lifeline of oil. This should be especially obvious when one realizes
that during the next 10 years, America will likely export at least another
\n\nThe combination of these vast new discoveries of unconventional \nnatural gas and liquids provides America with a unique future path- \nway toward greater energy independence, an industrial renaissance, \neconomic rejuvenation and greater national security. I remain fully con- \nfident that the marketplace understands this and that over time the U.S. \nwill more fully embrace and utilize clean, affordable, abundant American \nnatural gas and increased domestic oil production as the best alterna- \ntives to burning environmentally challenged coal and expensive and \ndangerous foreign oil. \n\nThere is now a clear road ahead toward a more sustainable, afford- \nable, dynamic and independent future if America embraces the remark- \nable gift of energy abundance that Chesapeake has helped discover in \nthe U.S. You have my commitment, and the commitment of more than \n\n\n\n\n\n10,000 other Chesapeake employees, that every day we are working \nhard to create shareholder value and a better future for our communi- \nties, our states and our country through the continued discovery and \ndevelopment of unconventional natural gas and liquids. \n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n*telemetry systems that provide pumpers with real-time information on oil and water*\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\nThe good news, however, is that America can now secure a new \nenergy future thanks to Chesapeake and a handful of other leading U.S. \nE&P companies that have reinvented the process of finding natural gas \nand oil during the past five years. In doing so, we have discovered twice \nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil. \nFurthermore, these same few companies that led the unconventional \nnatural gas revolution have in just the past two years also reinvented \nthe way in which we can find large new oil resources onshore in the U.S. \nIn fact, I believe the U.S. can possibly increase its production of oil from \nthe current 5.8 million barrels per day by 30–50% during the next 5–10 \nyears, thereby potentially reaching the President’s 2025 goal of reducing \nforeign oil imports by 33%, 5–10 years earlier than hoped. \n\nBest regards,", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "horizontal wells drilled just to the Bossier may not always hold Haynes- \nville rights. Therefore, Chesapeake and other producers have been drilling \naggressively to hold all rights through the Haynesville before the initial \nthree-year term of a typical lease expires. As a result, there has not been \nmuch drilling to the Bossier to date. However, once our leases are held by \nproduction (HBP) by Haynesville drilling (we expect to be largely complete \nwith HBP drilling by year-end 2011 and completely finished by year-end \n2012), we will begin developing the Bossier Shale more aggressively in \n2013. In the Bossier play, we own 205,000 net leasehold acres and esti- \nmate we could drill up to 2,600 net wells in the years ahead. \n\nlargest and most respected European energy companies. In this trans- \naction, we sold Statoil 32.5% of our Marcellus assets for $3.375 billion \nin cash and drilling carries. Today, having sold 32.5% of our original 1.8 \nmillion net leasehold acres, we have returned to owning 1.7 million net \nleasehold acres in the play and are the industry’s leading leasehold \nowner, largest producer and most active developer. We are producing \nfrom more than 100 net wells in the Marcellus on our 1.7 million net acres, \nare currently drilling with 32 rigs and estimate we could drill up to 21,000 \nadditional net wells in the years ahead. \n\nThe very significant upward \n\ntrajectory of value creation that \n\nChesapeake is on today is primarily \n\ndriven by the quality of our assets, \n\nwhich feature dominant positions \n\nin 16 of the 20 most important \n\nmajor unconventional natural gas \n\nand liquids plays in the U.S. \n\n\n\nfor the company to find other liquids-rich plays in 2010. \nThe Granite Wash, and other plays with liquids-rich gas \nproduction streams, provide the strongest economics in \nthe industry today because they possess the best of both \nworlds: high-volume natural gas production along with \nsignificant volumes of highly valued liquids that dramatically increase \ninvestment returns. \n\n*Generating the highest returns in the company, plays like the Oklahoma Colony Granite*\n*Wash inspire Chesapeake to find other liquids-rich opportunities.*\n\nMarcellus Shale — We first became aware of the Marcellus in 2005 \nwhen we were negotiating our $2.2 billion acquisition of Appalachia’s \nsecond-largest natural gas producer, Columbia Natural Resources, LLC. \nIn 2007 we aggressively accelerated our Marcellus leasehold acquisition \nefforts and began to prepare for our first drilling activities. By early 2008, \nwe had determined the Marcellus could be prospective over an area of \napproximately 15 million net acres (approximately five times larger \nthan the prospective Haynesville core area and 10 times larger than the \nBarnett core area). \n\nAfter acquiring 1.8 million net leasehold acres, we entered into a \njoint venture agreement in late 2008 with Oslo-based Statoil, one of the \n\nWe are producing from approximately 150 net Granite Wash \nwells, are currently drilling with 16 rigs and estimate we could drill \nup to 1,700 additional net wells on our 215,000 net leasehold acres in \nthe years ahead. Based on current NYMEX futures prices for natu- \nral gas and oil, each Granite Wash well should generate approxi- \nmately $11.5 million of present value (or up to an undiscounted \ntotal of $19.5 billion for all 1,700 wells), making it obvious why finding, \nleasing and developing more unconventional liquids-rich plays was \nChesapeake’s number one priority for 2010. We were very successful", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_SMFG_2011.pdf", - "query": "Has the Sumitomo Mitsui Financial Group offered help to the elderly?", - "target_page": 6, - "target_passage": "Currently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create frameworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycleframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle planning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a soundplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound balance between work and care needs, given that many group employees will later need to nurse ailing relatives.balance between work and care needs, given that many group employees will later need to nurse ailing relatives", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "**Corporate Outline (as of September 30, 2011)** **Editorial Policy**\n\nCompany Name Sumitomo Mitsui Financial Group, Inc. This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group :: \n\nBusiness Description Management of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of \n: is fulfilling as we work to create a sustainable society. \n\nnon-bank subsidiaries, as well as the performance of ancillary functions \nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is \n\nEstablished December 2, 2002 \n: \nthe essence of business itself, and our initiatives act upon this. \n\nHead Office 1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan \n: \nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s \nChairman of the Board Masayuki Oku \n: \nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report \nPresident Koichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) \n: \n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR \nCapital ¥2,337.8 billion \n: \nactivities and statistical data omitted in the CSR Report 2011 (digest version). \nStock Exchange Listings Tokyo Stock Exchange (First Section) \n: \nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in \nOsaka Securities Exchange (First Section) \nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand \nNagoya Stock Exchange (First Section) \nour CSR and other activities in greater detail. \nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange. \n\nFrom the current fiscal year, we are including third-party opinions in the website version. \n\n**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service \n\n**Scope of this Report**\n\n(cid:129) Sumitomo Mitsui Financial Group, Inc. \n\n(cid:129) Sumitomo Mitsui Banking Corporation \n\n(cid:129) SMFG Card & Credit, Inc. \n\n(cid:129) Sumitomo Mitsui Card Company, Limited \n\n(cid:129) Cedyna Financial Corporation \n\n(cid:129) Sumitomo Mitsui Finance and Leasing Co., Ltd. \n\n(cid:129) The Japan Research Institute, Limited \n\n(cid:129) SMBC Friend Securities Co., Ltd. \n\n(cid:129) SMBC Nikko Securities Inc. \n\n(cid:129) THE MINATO BANK, LTD. \n\n(cid:129) Kansai Urban Banking Corporation \n\n(cid:129) Other Group companies \n\nCompany name abbreviations and other special terminology \n\nThroughout this report,**“Sumitomo Mitsui Financial Group”**or**“SMFG”**refers to the holding company alone.**“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates. \n\n\n\n**Reference guidelines**\nGlobal Reporting Initiative (GRI) Sustainability Reporting Guidelines 2006 (G3) \n\n*Global Reporting Initiative (GRI): Established as an international standard for sustainability reporting, compilers set up an international \norganization (GRI) in 1997 to encourage its adoption worldwide. \n\n**CSR disclosure**\n**through**\n**specific examples**\n\n**CSR report 2011 (digest version)**\n\nCovers CSR baselines and CSR activities at SMFG and its Group companies, \nCovers CSR baselines and CSR activities at SMFG and its Group companies, \ncentered on specific examples \ncentered on specific examples \n\n**CSR report 2011**\n**(digest version with examples of activities and**\n**statistical performance, online PDF file)**", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "i \nt \no \nm \no \nM \n\nL \nt \nd \n. \n\nL \nm \ni \n\ni \nt \ne \nd i \nt \ns \nu \ni \n\nL \nt \nd \n. \n\nF \nn \na \nn \nc \ne \n\ni \nI \nn \nc \n. \n\n**SMFG CSR promotion structure**\n\n**Group CSR Committee**\n\n**Chairman**: Director in charge of SMFG \nCorporate Planning Department \n**Committee members**: General Managers of SMFG, \nSumitomo Mitsui Banking Corporation, \nSMFG Card & Credit, Sumitomo Mitsui Card, \nCedyna, Sumitomo Mitsui Finance and Leasing, \nThe Japan Research Institute, \nSMBC Friend Securities, SMBC Nikko Securities, \nTHE MINATO BANK and \nKansai Urban Banking Corporation \n**Administered by**: Group CSR Department of SMFG \n**Strategic advisor**: \nJRI Center for the Strategy of Emergence \nB \na \nn \nk \nn \ng \nC \no \nr \np \no \nr \na \nt \ni \no \nn \n\nS \nu \nm \n\ni \nt \no \nm \no \nM \n\ni \n\nWe intend to be a financial services group that contributes to the healthy development \nWe intend to be a financial services group that contributes to the healthy development \nof society. For this purpose, we recognize the importance of our mission to serve as a \nof society. For this purpose, we recognize the importance of our mission to serve as a \ncrucial part of the public infrastructure and also our social responsibilities. With such \ncrucial part of the public infrastructure and also our social responsibilities. With such \nrecognition, we under take business operations that contribute to the steady \nrecognition, we under take business operations that contribute to the steady \ndevelopment of Japan and the rest of the world, and endeavor, as a good corporate \ndevelopment of Japan and the rest of the world, and endeavor, as a good corporate \ncitizen, to make a positive contribution to society. \ncitizen, to make a positive contribution to society. \n\ni \nt \ns \nu \n\n3.**Contributing to**\n\ni \n\n**CSR Liaison Committee**\n**Social Development**\n\n4.**Free and Active**\n\nWe intend to be a financial services group for which all officers and employees work \nWe intend to be a financial services group for which all officers and employees work \nwith pride and commitment. For this purpose, we respect people and develop \nwith pride and commitment. For this purpose, we respect people and develop \nemployees with extensive professional knowledge and capabilities, thereby creating a \nemployees with extensive professional knowledge and capabilities, thereby creating a \nfree and active business environment. \nfree and active business environment. \n\n**Business Environment**\n\n5.**Compliance**\n\nWe intend to be a financial services group that always keeps in mind the importance of \nWe intend to be a financial services group that always keeps in mind the importance of \ncompliance. For this purpose, we reflect our awareness of Business Ethics in our business \ncompliance. For this purpose, we reflect our awareness of Business Ethics in our business \nactivities at all times. In addition, we respond promptly to directives from auditors and \nactivities at all times. In addition, we respond promptly to directives from auditors and \ninspectors. Through these actions, we observe all laws and regulations, and uphold moral \ninspectors. Through these actions, we observe all laws and regulations, and uphold moral \nstandards in our business practices. \nstandards in our business practices. \n\n**Participation in global initiatives**\n\nRecent years have seen a growing range of international initiatives to deal with threats to the sustainability of the global environment. \nRecent years have seen a growing range of international initiatives to deal with threats to the sustainability of the global environment. \nAs a global citizen, the SMFG Group, mindful of its societal influence as a financial institution, follows the guidelines and principles of \nAs a global citizen, the SMFG Group, mindful of its societal influence as a financial institution, follows the guidelines and principles of \nthe following initiatives and organizations: \nthe following initiatives and organizations:", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "financial institutions in the disaster-affected areas \nfinancial institutions in the disaster-affected areas \n\n\n\n\n\n\n\n\n\n\nAnd today \nAnd today Besshi copper mine in the Meiji era \nBesshi copper mine in the Meiji era \n\nMitsui Charity Hospital at its establishment \nMitsui Charity Hospital at its establishment \n\n\n\n**Creating systems for sustainability**\n\n**Environmental measures**\n\nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \n\nleverage its role as a leading financial services group. This is a priority field for the future. \nleverage its role as a leading financial services group. This is a priority field for the future. \n\nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \n\nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \n\ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \n\ntechnological breakthroughs, with a particular focus on the Asian region. \ntechnological breakthroughs, with a particular focus on the Asian region. \n\n\n\n**Further measures needed**\n\n\n\n\n\n**Symbiosis and diversity**\n\n**Global challenges**\n\nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \n\noperations both in Japan and overseas. Initiatives include aggressive development of advisory \noperations both in Japan and overseas. Initiatives include aggressive development of advisory \n\nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \n\nas well as contributions to the international community and the environmental business, chiefly \nas well as contributions to the international community and the environmental business, chiefly \n\nthrough branches and representative offices overseas. \nthrough branches and representative offices overseas. \n\nWe will continue to discuss and review various approaches to issues facing the international \nWe will continue to discuss and review various approaches to issues facing the international \n\ncommunity so as to build up trust internationally as a global player. \ncommunity so as to build up trust internationally as a global player. \n\n**Further measures needed**\n\nShare expertise in corporate social responsibility \nShare expertise in corporate social responsibility ● \n\nwith the international community \nwith the international community \n\nImprove financial services in preparation for the \nImprove financial services in preparation for the ● \n\nglobalization of operations in Japan (multilingual \nglobalization of operations in Japan (multilingual \n\nsupport) \nsupport) \n\nPromote diversity \nPromote diversity ● \n\nIn the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "As one of Japa \ns leading financial services groups, \nAs one of Japan’s leading financial services groups, \nthe SMFG Group is taking the lead in aggressively addressing the four priority issues \nthe SMFG Group is taking the lead in aggressively addressing the four priority issues \nwe have identified as significantly impacting the nation. \nwe have identified as significantly impacting the nation. \n**Priority Issues for Us**\n\n\n\n**Ensuring peace of mind for the future**\n\n**Shrinking and aging population**\n\n\n\n**Measures for Japan’s regeneration**\n\n**Reconstruction**\n**after the earthquake**\n**and tsunami**\nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create \nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create \n\nframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle \nframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle \n\nplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound \nplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound The March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power \nThe March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power \n\nbalance between work and care needs, given that many group employees will later need to nurse ailing relatives. \nbalance between work and care needs, given that many group employees will later need to nurse ailing relatives. generation capacity and severed manufacturing supply chains across the nation. This was in addition \ngeneration capacity and severed manufacturing supply chains across the nation. This was in addition \n\nto the severe damage sustained by agriculture and fisheries in the Northeast. \nto the severe damage sustained by agriculture and fisheries in the Northeast. *Estimates by the Statistics Bureau, Ministry of Internal Affairs and Communications (October 1, 2011) \n\nThe disaster also threw into relief many social issues facing the nation. By leveraging our role as \nThe disaster also threw into relief many social issues facing the nation. By leveraging our role as \n\n**Further measures needed**\na leading financial services group, we are committing our full range of resources to dealing with the \na leading financial services group, we are committing our full range of resources to dealing with the \n\nenormous task of regional reconstruction after the earthquake, in partnership with stakeholders \nenormous task of regional reconstruction after the earthquake, in partnership with stakeholders \n\nincluding enterprises, local governments and non-profit organizations. \nincluding enterprises, local governments and non-profit organizations. \n\n\n**Further measures needed**\n\n\n\nSupport businesses involved in health, medical and \nSupport businesses involved in health, medical and ● \n\nnursing care \nnursing care \n\nExpand range of financial products and services for the \nExpand range of financial products and services for the ● \n\nelderly (planning for asset management for old age) \nelderly (planning for asset management for old age) \n\nFoster a better work-life balance \nFoster a better work-life balance ● \n\n\n\nWide-ranging financial support for the reconstruction of infrastructure \nWide-ranging financial support for the reconstruction of infrastructure ● \n\nOngoing disaster recovery activities by employee volunteers \nOngoing disaster recovery activities by employee volunteers ● \n\nComprehensive support for industrial recovery in partnership with local governments and \nComprehensive support for industrial recovery in partnership with local governments and ● \n\nfinancial institutions in the disaster-affected areas \nfinancial institutions in the disaster-affected areas", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n**Keeping**\n**our shareholders**\n**informed**\n\nSpecific Examples of CSR Activities \n\n**Together with Our Shareholders**\n**and Markets**\n\nWebsite \n\nAnnual report \n\n**Contributing to the development of sounder financial markets**\n\nSRI Indexes on which SMFG is listed Examples of Group disclosure activities \n\nQuarterly and interim financial reports, \nQuarterly and interim financial reports, \n\nresults announcements, securities \nresults announcements, securities \n\nreports, legal disclosure statements, \nreports, legal disclosure statements, \n\nregular publications, etc. \nregular publications, etc. \n\nWe believe that the SMFG Group can contribute \nWe believe that the SMFG Group can contribute \nAnnual and interim reports (in Japanese \nAnnual and interim reports (in Japanese \nfurther to the creation of a sustainable society \nfurther to the creation of a sustainable society \nand English) \nand English) \n\n\n\nBased on this approach, SMFG goes \nBased on this approach, SMFG goes \n\n**We aim to further**\n**strengthen communication**\n**with our shareholders**\n**and investors**\n\nbeyond legal requirements in enriching its \nbeyond legal requirements in enriching its \n\ndisclosure of information on management \ndisclosure of information on management \n\npolicy and operational strategy. These \npolicy and operational strategy. These \n\ninitiatives have won the support of many \ninitiatives have won the support of many \n\nmarket participants. We were selected as \nmarket participants. We were selected as \n\nSMFG is committed to ensuring financial \nSMFG is committed to ensuring financial a winner of the Awards for Excellence in \na winner of the Awards for Excellence in \n\nsoundness through appropriate policy-making \nsoundness through appropriate policy-making Corporate Disclosure for fiscal 2011 by The \nCorporate Disclosure for fiscal 2011 by The \n\nand business operations. At the same time, \nand business operations. At the same time, Securities Analysts Association of Japan. \nSecurities Analysts Association of Japan. \n\nwe disclose corporate information in a \nwe disclose corporate information in a \n\ntimely and precise way to shareholders and \ntimely and precise way to shareholders and \n\ncompanies’ corporate social responsibility \ncompanies’ corporate social responsibility \n\n**Together with our investors:**\n**Creating a platform for**\n**social contribution through**\n**the financial markets**\n\nactivities, and uses the information it gathers \nactivities, and uses the information it gathers \n\nto create a basic file on companies managing \nto create a basic file on companies managing \n\nsocially responsible investment funds*3*3. \nsocially responsible investment fund \n\n**SMFG has listed**\n**its shares on SRI indexes**\n\nthrough its activities in financial markets. \nthrough its activities in financial markets. \n\nFor example, SMBC Friend Securities markets \nFor example, SMBC Friend Securities markets SRI indexes are for socially responsible \nSRI indexes are for socially responsible \n\n while \n“Environmental Sustainability Bond”*1*1 while \n“Environmental Sustainability Bond” investments in which major investment \ninvestments in which major investment \n\nSMBC Nikko Securities markets “WB Green \nSMBC Nikko Securities markets “WB Green decisions are based on environmental and \ndecisions are based on environmental and \n\n. These are bonds \nBonds (Green Bonds)”*2*2. These are bonds \nBonds (Green Bonds)” social factors as well as the target company’s s \nsocial factors as well as the target company \n\n\n\n\n\nmarkets. We believe full disclosure not only \nmarkets. We believe full disclosure not only \n\nhelps foster a more correct understanding \nhelps foster a more correct understanding \n\nand evaluation of the Group, but also \nand evaluation of the Group, but also \n\ncontributes to the development of sounder \ncontributes to the development of sounder", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "housing for the elderly, expected to be a \nhousing for the elderly, expected to be a \n\nfuture growth area. \nfuture growth area. \n\nW hile c o n t inuing t o t a ilo r bu sine s s \nW hile c o n t inuin g t o t a ilo r b u s in e s s \n\nactivities to the needs of the community at \nactivities to the needs of the community at \n\nlarge and ensuring a friendly banking \nlarge and ensuring a friendly banking \n\nenvironment for our customers, the SMFG \nenvironment for our customers, the SMFG \n\nGroup also plans to support the creation of \nGroup also plans to support the creation of \n\n\n\n\n\n**Roundtable session: SMBC Food and Agricultural Assessment Loan**\n\nA roundtable session with experts held in August 2011 \nconsidered the role of the new SMBC Food and Agricultural \nAssessment Loan in improving the food supply chain that \nlinks food and fishery producers with food processors and \nconsumers. Opinions were also exchanged on what other \nfuture role the bank might assume in this regard, given \nthe current situation and issues facing the food industry \nand agriculture \nin Japan. \n\n**Key comments of participants**\n\nKatsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd. \n“We want to deliver value by creating demand and quality combined with safety, peace \nof mind and trust.” \n\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences, \nThe University of Tokyo \n“Eating should be something that generates emotion. New potential exists in the world of cuisine.” \nDaisuke Yamamoto, Vice Senior Consultant, Research Department, \nThe Japan Research Institute, Limited \n“As consumer tastes go through a time of great change, I think it is important to \nprioritize ingredients and the attitude of customers toward eating.” \nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of \nthe Corporate Banking Unit & Middle Market Banking Unit, SMBC \n“An important concept is multilateral dialogue as the number of parties involved in food \nproduction increases throughout the supply chain.” \nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC \n\nThe Minato Bank has created a position \nThe Minato Bank has created a position \n\ntitled “Service Care Manager” at each of \ntitled “Service Care Manager” at each of \n\nits branches, filled by at least one branch \nits branches, filled by at least one branch \n\nmanagerial staffer, as part of measures to \nmanagerial staffer, as part of measures to \n\nmake branch visits more pleasant for \nmake branch visits more pleasant for \n\ncustomers, following earlier nuts-and-bolts \ncustomers, following earlier nuts-and-bolts \n\nimprovements. \nimprovements. \n\nService Care Managers are dedicated to \nService Care Managers are dedicated to \n\nimproving support and services for the \nimproving support and services for the \n\ncustomer at each branch. Their training \ncustomer at each branch. Their training \n\nincludes simulations of the problems faced \nincludes simulations of the problems faced \n\nby persons with disabilities, awareness \nby persons with disabilities, awareness \n\nraising and support methods for the elderly \nraising and support methods for the elderly \n\nand persons with disabilities. \nand persons with disabilities.", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**Social Contribution Activities**\n\n**1**\n★★ \n\n**Helping build prosperity**\n**in Asia and the world**\n\n**7** **8**\n★★ \n\n**2**\n★★ \n\n★★ \n\n★★ \n**3**\n**4**\n★★ \n★★ \n**10**\n★★ \n★★ \n**5**\n★★ \n★★ \n★★ \n\nThe SMFG Group is engaged in a range of activities \nThe SMFG Group is engaged in a range of activities \n\nthat contribute to development at both the regional \nthat contribute to development at both the regional \n\nand international level. In addition to overseas units’ \nand international level. In addition to overseas units’ \n\nindependent initiatives, which are geared to host \nindependent initiatives, which are geared to host \n\ncountry issues and characteristics, the Group supports \ncountry issues and characteristics, the Group supports \n\nprojects that have contributed to achievement of the \nprojects that have contributed to achievement of the \n\nUnited Nations’ global Millennium Development Goals, \nUnited Nations’ global Millennium Development Goals, \n\nsuch as poverty eradication, health improvement and \nsuch as poverty eradication, health improvement and \n\nstatus improvement for education and women in \nstatus improvement for education and women in \n\ndeveloping countries. Our support takes the form of \ndeveloping countries. Our support takes the form of \n\ndonations to non-profit and non-governmental \ndonations to non-profit and non-governmental \n\norganizations, through the employee volunteer fund. \norganizations, through the employee volunteer fund. \n\n(The map shows areas where fund money is used, \n(The map shows areas where fund money is used, \n\n**Europe**\n**7**\n\n**Donations to charity groups**\n\nEmployees of Sumitomo Mitsui Banking Corporation Europe \nEmployees of Sumitomo Mitsui Banking Corporation Europe \n(SMBCE) conducted volunteer activities in their time off. \n(SMBCE) conducted volunteer activities in their time off. \nSMBCE contributes to charitable organizations through an \nSMBCE contributes to charitable organizations through an \nin-house fund and also uses a matching gifts program under \nin-house fund and also uses a matching gifts program under \nwhich it donates a \nwhich it donates a \ncertain amount for \ncertain amount for \nevery donation made \nevery donation made \nby its employees. \nby its employees. \n\n**The United States**\n**10**\n\n**SMBC GLOBAL FOUNDATION**\n\nBased in the United States, SMBC Global Foundation has \nBased in the United States, SMBC Global Foundation has \nprovided scholarships to more than 5,000 university students \nprovided scholarships to more than 5,000 university students \nin Asian countries since its establishment in 1994. In the \nin Asian countries since its establishment in 1994. In the \nUnited States, it supports educational trips to Japan \nUnited States, it supports educational trips to Japan \norganized by a high school located in Harlem, New York City, \norganized by a high school located in Harlem, New York City, \nand volunteer employees of SMBC and JRI to participate in \nand volunteer employees of SMBC and JRI to participate in \nschool beautification programs. The foundation also provides \nschool beautification programs. The foundation also provides \nmatching gifts for SMBC employees. \nmatching gifts for SMBC employees. \n\n\n\n\n\n\n\n**6**\n\nMiddle East & Asia \n★★ \n\n symbol). Please see our website for \nmarked with a ★ symbol). Please see our website for \nmarked with a \nmore details. \nmore details. \n**South Korea** **Vietnam**\n**1** **4**\n\n**Support for a South Korean students’**\n**Japanese-language theater competition**\nAs a way of increasing understanding of Japanese culture, \nAs a way of increasing understanding of Japanese culture, \nSMBC \ns Seoul Branch donates funds to make possible the \nSMBC’s Seoul Branch donates funds to make possible the \nholding of a competition \nholding of a competition \ninvolving theatrical perfor- \ninvolving theatrical perfor \nmances in the Japanese \nmances in the Japanese \nlanguage by South Korean \nlanguage by South Korean \nstudents of Japanese. \nstudents of Japanese.", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\n**New queue-number display system**\n**installed at bank counters**\n\n**Together with Our Customers**\n\nColors and special designs are used to make \n\nqueue-number displays more visible to all customers \n\n(The Minato Bank) \n\n\n\n**We work as a team to improve customer satisfaction and product quality, and, while supporting the customer,**\n**contribute to the sustainable development of society as a whole.**\n\n\n\n\n\n\n\n\n\nA further measure is installation of handheld \nA further measure is installation of handheld \n\n**Making banking**\n**a more pleasant experience**\n**for all customers**\n\nhearing support devices at all branches \nhearing support devices at all branches \n\n(except housing loan promotion offices), to \n(except housing loan promotion offices), to \n\nallay the concerns of hearing-impaired \nallay the concerns of hearing-impaired \n\ncustomers who find it difficult to converse \ncustomers who find it difficult to converse \n\nWith the old-age dependency ratio soaring, \nWith the old-age dependency ratio soaring, and follow spoken instructions. By using the \nand follow spoken instructions. By using the \n\nthe SMFG Group aims to provide friendly, \nthe SMFG Group aims to provide friendly, devices as communication tools, bank \ndevices as communication tools, bank \n\neasy-to-use banking services for all its \neasy-to-use banking services for all its employees can respect customer privacy \nemployees can respect customer privacy \n\nand do not have to talk loudly. \nand do not have to talk loudly. \n\ncustomers. \ncustomers. \nSome Group companies are likewise making \nSome Group companies are likewise making Further measures include posting of “green \nFurther measures include posting of “green \n\ntheir facilities barrier-free at bank branches \ntheir facilities barrier-free at bank branches \n\n\n\nThe SMBC Food and Agricultural Assessment \nThe SMBC Food and Agricultural Assessment \n\nLoan comes with conditions, depending on \nLoan comes with conditions, depending on \n\nthe results of an evaluation of food-producers’ \nthe results of an evaluation of food-producers’ \n\nprogress in areas such as food safety and \nprogress in areas such as food safety and \n\nenvironment-friendliness, healthiness and \nenvironment-friendliness, healthiness and \n\nnutritional value, and efficiency of distribution. \nnutritional value, and efficiency of distribution. \n\nThe Japan Research Institute researches \nThe Japan Research Institute researches \n\nm e a s u r e s i n t h e \nm e a s u r e s i n t h e \n\nTelephone handset-type ATM \n (The Minato Bank) of food and \na r e a s of food and \na r e a s \n\nfarming being taken \nfarming being taken \n\nby the loan applicant, \nby the loan applicant, \n\n**Preparing our businesses**\n**for a higher old-age**\n**dependency ratio**\n\nand drafts a simple \nand drafts a simple \n\n“diagnosis” stating \n“diagnosis” stating \n\nwhether there is room \nwhether there is room \n\nfor future improvement. Ernst & Young \nfor future improvement. Ernst & Young \n\nShinNihon LLC provides expert opinions on \nShinNihon LLC provides expert opinions on \n\near” logos at branches to reassure customers \near” logos at branches to reassure customers \n\nBut in recent years, consumers have come to \nBut in recent years, consumers have come to that the bank has facilities for conversing \nthat the bank has facilities for conversing \n\n**The financial sector’s role in**\n**improving the nation’s diet and**\n**in strengthening the agricultural**\n**and fisheries sectors**\n\nplace more priority on factors other than \nplace more priority on factors other than writing. All branches are being equipped \nin in writing. All branches are being equipped \n\nvolume and price, such as food safety and \nvolume and price, such as food safety and with white boards and special message \nwith white boards and special message", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "give the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this \n\ncorporate social responsibility \ncorporate social responsibility DNA embedded in the business \nDNA embedded in the business \n\nphilosophies of both the Sumitomo \nphilosophies of both the Sumitomo and Mitsui groups over the 400 \nand Mitsui groups over the 400 \n\nyears of their existence, we will \nyears of their existence, we will continue to play our part in solving \ncontinue to play our part in solving \n\nproblems facing the international \nproblems facing the international community through our financial \ncommunity through our financial \n\noperations. \nservice operations. \nservice \n\nGive further support for businesses involved in greenhouse gas \nGive further support for businesses involved in greenhouse gas ● \n\nreduction, water supply, new energy and resource initiatives \nreduction, water supply, new energy and resource initiatives \n\nDo more to safeguard biodiversity, in our capacity as a \nDo more to safeguard biodiversity, in our capacity as a ● \n\nfinancial institution \nfinancial institution \n\nShare our information assets and know-how globally in the \nShare our information assets and know-how globally in the ● \n\nenvironmental business \nenvironmental business \n\n\n\n**CSR REPORT 2011**10", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**Social Contribution**\n**Activities**\n\nGarbage was analyzed in the Kugenuma Beach cleanup event, in which SMFG and its Group companies participated \n**SMFG as a corporate citizen: Working to create a prosperous society for all**\n\nbranches at their own initiative. A wide variety \nbranches at their own initiative. A wide variety \n\n**SMFG and**\n**its Group companies**\n**participate in neighborhood**\n**cleanup programs** **Supporting education in**\n**developing countries,**\n**together with our customers**\n**and employees**\n\n**Donations through**\n**“The World Bank**\n**Green Fund”**\n\nof social contribution activities, such as the \nof social contribution activities, such as the \nMitsui Sumitomo VISA Card \ncollection of used stamps and PET bottle \ncollection of used stamps and PET bottle \n\ncaps, were carried out for global causes. \ncaps, were carried out for global causes. \n\nSumitomo Mitsui \nCard staff \nPOINT UP Mall \nSMBC Nikko Securities will continue activi- \nSMBC Nikko Securities will continue activi \n\nties that contribute to society and prioritize \nties that contribute to society and prioritize \n\ncommunication between employees. \ncommunication between employees. \n\nPromoting usage through \nthe point-allocation system \nDonation of used books \n\n\n\n\nSumitomo Mitsui \nCardholders \n\nBOOKOFF CORP Group \n\nBuying used books \n\nPurchase price \n\nBuilding libraries in developing countries \nthrough the NGO Room to Read \n\nIn the fall of 2010, SMBC Nikko Securities \nIn the fall of 2010, SMBC Nikko Securities \n\nestablished its “Green Week” for strength- \nestablished its “Green Week” for strength \n\nening environmental protection and social \nening environmental protection and social \n\ncontribution activities, with the aim of \ncontribution activities, with the aim of \n\npromoting communication within regional \npromoting communication within regional \n\nsociety and among participating employees \nsociety and among participating employees \n\nand their families, while deepening under- \nand their families, while deepening under \n\nstanding of environmental protection through \nstanding of environmental protection through \n\nEmployees and their families pitch in to clean up \n the bed of the Ara River in Tokyo \nparticipation in social contribution activities. \nparticipation in social contribution activities. \n\nBetween November 13 and December 5, \nBetween November 13 and December 5, \nEnvironmental protection activities \n2010, environmental protection programs \n2010, environmental protection programs \nForestry management volunteering experience in Osaka \n(Izumi no Mori) \nwere rolled out by cross-organizational \nwere rolled out by cross-organizational \n117 participants \n“Green Committees” in four locations in \n“Green Committees” in four locations in \n\nIn fiscal 2010, 150 volunteers from the \nIn fiscal 2010, 150 volunteers from the \n\nSMFG Group participated in beach cleanup \nSMFG Group participated in beach cleanup \n\nactivities in Kanagawa and Hyogo prefectures \nactivities in Kanagawa and Hyogo prefectures \n\non “SMFG Clean-up Day.” This initiative is \non “SMFG Clean-up Day.” This initiative is \n\nnot simply a matter of picking up garbage. It \nnot simply a matter of picking up garbage. It \n\nalso involves inspections and analysis of \nalso involves inspections and analysis of \n\ngarbage to identify pointers for providing \ngarbage to identify pointers for providing \n\nsolutions for environmental issues in the \nsolutions for environmental issues in the \n\nfuture. \nfuture. \n\nIn addition to beach cleanup activities in \nIn addition to beach cleanup activities in \n\nChiba and Hyogo prefectures by SMBC \nChiba and Hyogo prefectures by SMBC \n\nFriend Securities, Group companies of \nFriend Securities, Group companies of \n\nCedyna, Sumitomo Mitsui Finance & Leasing, \nCedyna, Sumitomo Mitsui Finance & Leasing, \n\nthe Japan Research Institute and SMBC \nthe Japan Research Institute and SMBC \n\nCardholders and employees of Sumitomo \nCardholders and employees of Sumitomo", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_CHK_2010.pdf", - "query": "Does Chesapeake Energy have a project to reduce excessive water use?", - "target_page": 28, - "target_passage": "Created to meet the challenge of reducing our water usage, Chesapeake’s Aqua Renew® program uses state-of-the-art technology to recycle pro- duced water.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "As we explore for and produce clean, affordable, abundant, American \nnatural gas, we provide an important solution to our nation’s energy \nchallenges and its quest for energy independence. With at least a 200- \nyear supply of natural gas located right here in the U.S., this versatile \nfuel can be used to not only heat homes, create electricity and meet \nAmerica’s transportation needs, but also to fuel the country’s future \nby creating jobs and stimulating local and national economies through \ninvestment and taxes. \n\nenergy development should be as small and temporary as possible. \nThese practices are continually evolving and further improving as \nChesapeake and the industry develop new innovative techniques and \napproaches to business. \n\n\n\n\n\n\n\n\n \n \n \n \n [html]\n
innovative internaogramTablecessesofTableTableandTableParameterTableTableTableTableTableTableTableTableTableBaselineTableComparisonTableNumberTableprogramTableAge, yearsTableThereofwateTablePaulicTablehighlyofTableTableolumTablen / if0n
\n\n**Environmentally Friendly Operations**\nAt Chesapeake, we realize that the way a great product is produced is \nas important as the product itself. For example, we have helped pioneer \nthe use of multiwell padsites to drill up to 16 wells from a single loca- \ntion, greatly reducing our land and road use and overall environmental \nfootprint. We use the latest horizontal and directional drilling technology \nto place wells at a safe distance from homes, schools and businesses. In \naddition, we build and maintain access roads and work to eliminate soil \nerosion near our sites, as well as restore local vegetation. \n\nWe implement advanced, modern protective measures known as Best \nManagement Practices (BMPs) to help ensure energy development is con- \nducted in an environmentally responsible manner. Procedures are imple- \nmented throughout our operations to protect freshwater aquifers and \nreduce environmental impacts. BMPs protect wildlife, air quality, water and \nlandscapes as we work to develop vitally needed domestic energy sources. \nImplemented throughout the entire life cycle of a well, BMPs can be \nas simple as strategically placing a berm, or land barrier, on locations \nto control surface water runoff. Others involve cutting-edge operational \ntechnologies such as utilizing the most advanced techniques offered in \ndrilling fluids, well casing and cement design. Regardless of complex- \nity, all BMPs are based on the idea that the environmental footprint of", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**Educational Impact**\nWe are also proud to help prepare tomorrow’s leaders today. In 2010 \nChesapeake supported universities, schools, academic chairs, scholarships \nand other educational programs with contributions totaling $5.4 million. \n\nChesapeake also makes contributions that help improve lives and \neconomies in cities where we operate: $25 million in 2010 alone. For ex- \nample, this past year we donated $200,000 to establish the Chesapeake \nEnvironmental and Recycling Center at Goodwill Industries of Central \nOklahoma. The center will provide an additional 80 jobs to disabled Okla- \nhomans, as well as help Goodwill recycle 10 million pounds a year, which \n\nInvesting in programs that promote technology and innovation is a \nkey to our country’s success. That’s why we gave $1.0 million to establish \nthe Chesapeake Energy dormitory for students at the Oklahoma School for \nScience and Mathematics (OSSM), a public, tuition-free, residential high \nschool located in Oklahoma City for juniors and seniors with exceptional \nabilities. The extremely competitive school is helping train the next gen- \neration of scientists and mathematicians. \n\n**Chesapeake’s $25 million**\n**of charitable giving in 2010**\n\n**15%**\n\n**7%**\n**54%**\n\nWe also established the Chesapeake Energy Presidential Scholars Pro- \ngram at the Oklahoma City University Meinders School of Business, making \na $5.0 million commitment to be distributed over the next five years. The \nChesapeake Scholars Program will provide up to $25,000 per year in tuition \n**24%**", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Chesapeake is the second-largest producer of U.S. natural gas and a Top 15 producer of U.S. oil and natural gas liquids. The company has \nbuilt a large resource base of high-quality U.S. assets in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays \nand in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, Niobrara and Utica \nunconventional liquids plays. In 2010 Chesapeake increased its focus on applying the geoscientific and horizontal drilling expertise \ngained from developing unconventional natural gas shale plays to unconventional liquids-rich plays. Our goal is to reach a balanced mix of \nnatural gas and liquids revenue as quickly as possible through organic drilling. We invested approximately $4.7 billion in 2010, net of \ndivestitures, primarily in liquids-rich acreage to provide the foundation for this shift toward more profitable plays. \n\nWe own interests in approximately 46,000 producing natural gas and oil wells, and in 2010 we produced approximately 1.035 trillion \ncubic feet of natural gas equivalent (tcfe) for an average of 2.8 billion cubic feet of natural gas equivalent (bcfe) per day. At year-end \n2010, our proved reserves were 17.1 trillion cubic feet of natural gas equivalent, of which 90% were natural gas and all were onshore in the \nU.S. We have also captured an inventory of up to 115,000 unrisked net future drilling opportunities — almost 50 years worth of drilling \nopportunities — on approximately 13.2 million net leasehold acres in the U.S. The following highlights Chesapeake’s ownership position \nin our key operating areas. \n\n\n\nRockies \n\n**8**", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**Strong Partners**\nOver the past few years, in addition to gathering the industry’s best \nassets, Chesapeake has also built the industry’s finest collection of global \nenergy partners and energy stock investors. We have now entered into \ntransactions with PXP, BP, Statoil, Total, CNOOC and BHP Billiton. Collec- \ntively, we have sold these companies certain assets for total consider- \nation of $20.5 billion in the form of cash and drilling and completion \ncarries for which our net cost was only $6.1 billion resulting in overall \nvalue creation of $14.4 billion. While these transactions have been very \n\nhappen to manage some of the world’s largest pools of capital and have \na very long-term investment horizon. Their support is an important \nvalidation of our strategy. \n\n**Short-Term Pain for Long-Term Gain**\nDespite this all-star lineup of global partners and investors, some other \ninvestors have not yet fully recognized the benefits of our industry \nleadership in acquiring unconventional natural gas and liquids assets. \nWhether it was our leveraged balance sheet during recent tough reces- \nsionary times, our heavy focus on natural gas during a time of persistent \nmarket pessimism about natural gas prices or our large capital invest- \nments in undeveloped liquids-rich leasehold undertaken to enable \nChesapeake to remain an industry leader in the years ahead, it is clear \n\n\n\nrewarding to our buyers, they have been truly outstanding for Chesapeake, \nproviding us an attractive source of capital, a reduction of risk, a quick \nrecovery of our leasehold investment in new plays and a much greater \nability to capture a large resource base with decades of highly profitable \ndrilling opportunities. \n\nthat we were less popular in the stock market in 2010 than we were in \n2009, when our stock price increased by 60%. \n\nWe anticipated that some market unpopularity in 2010 would \nlikely be the price we would pay as we positioned Chesapeake to be \nthe leader not only in unconventional U.S. natural gas, but also in \nunconventional U.S. liquids. However, now that we have largely com- \npleted the investments needed to accomplish this transition to a port- \nfolio balanced with liquids, the rebound in our stock price could be sharp \nas investors begin to focus more clearly on Chesapeake’s three-way \ntransition from an asset gatherer to an asset harvester, from less natural \ngas exposure to more liquids exposure and from a leveraged balance \nsheet to one worthy of an investment grade rating. \n\nIn addition, we are the only U.S. E&P company that has attracted \nto its stock ownership roster some of the world’s leading government- \nsponsored investors: Temasek Holdings (Singapore), China Investment \nCorporation, Korea Investment Corporation and Abu Dhabi Investment \nAuthority. Along with our largest shareholder, Memphis, Tennessee- \nbased Southeastern Asset Management (12%), these shareholders are \nsome of the world’s largest and most astute investors, and who also \n\nAccordingly, in early January 2011, we announced our “25/25 Plan,” \na two-year plan designed to reduce our long-term debt by 25% while \nstill growing the company’s production by 25%. We designed this plan \nto articulate very clearly the benefits of becoming an asset harvester", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**CORPORATE PROFILE**\n\nChesapeake Energy Corporation is the second-largest producer of \nnatural gas, a Top 15 producer of oil and natural gas liquids and \nthe most active driller of new wells in the U.S. \nHeadquartered in Oklahoma City, the company’s operations are focused on discovering and developing \n\nunconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in \n\nthe Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite \n\nWash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, \n\nNiobrara and Utica unconventional liquids-rich plays. \n\nThe company has also vertically integrated its oper- \n\nations and owns substantial midstream, compression, \n\ndrilling and oilfield service assets. Chesapeake’s stock \n\nis listed on the New York Stock Exchange under \n\nthe symbol CHK. Further information is available at \n\n**www.chk.com**where Chesapeake routinely posts \n\nannouncements, updates, events, investor informa- \n\ntion, presentations and press releases. \n\n\n\n**ON THE COVER**\n*Moving west, a Chesapeake rig*\n*drills toward the Niobrara Shale*\n*in the Powder River Basin of*\n*southeastern Wyoming, one of*\n*several new liquids-rich plays*\n*that are enabling the company*\n*to increase its profitability and*\n*return on capital.*", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "process is saving the company an average of $12 million per year in the \nMarcellus Shale alone. \n\ntopics covered includes Occupational Safety and Health Administra- \ntion (OSHA)-required safety training, such as hazard communica- \ntion, personal protective equipment, confined spaces and respiratory \nprotection. In addition to operations training, we also provide safe work \npractices, vehicle safety and specialized training for employees and \ncontractors who perform specific tasks such as emergency response. \nSpecialized environmental training is also provided to address topics \nsuch as air compliance, waste management and spill prevention. \n\n***Green Frac*®**\nChesapeake’s*Green Frac®*program was launched in October 2009 to \nevaluate the types of additives typically used in the fracking process. As \nan industry-leading program, \n*Green Frac*is a decisive move \ntoward an even greener fluid \nsystem. By reviewing all of the ingredients typically used in each fracking \noperation, the program identifies additives that can be removed and tests \nalternatives. To date, the company has eliminated 25% of the additives \nused in frack fluids in most of its shale plays. \n\nIn 2010 we conducted a total of 2,306 instructor-led training courses \nand 67 web-based training courses on safety and environmental pro- \ngrams for employees, contractors, vendors and visitors. \n\nTo further our training efforts and emphasize the importance \nof creating a safe work environment, the company established the \nChesapeake SAFE program in July 2010. Through workshop training \ncourses, the program focuses on developing safe behaviors, promot- \ning a safety-conscious culture and reducing risk in all operating areas. \nBy year-end 2010, more than 4,200 employees and consultants partici- \npated in 121 workshops in 18 cities across the country. \n\n*Green Frac*is also establishing simple guidelines for the company \nand its vendors to select fracking ingredients that present minimal risks \nto people and the environment. These guidelines will also be used to \n\nFrom state-of-the-art training facilities \n\nto extensive health and wellness programs, \n\nChesapeake provides employees with the skills \n\nthey need to succeed both in the field and at \n\nthe office while creating a well-rounded envi- \n\nronment for employees and their families. \n\n\n\n*Learning from the best — Our commitment to creating a safe work environ-*\n*ment continued to grow in 2010 with the founding of the Chesapeake SAFE*\n*program. Focused on developing safe behaviors, promoting a safety-conscious*\n*culture and eliminating risk in all operating areas, the program has trained*\n*more than 4,200 employees and consultants.*\n\nChesapeake’s commitment to employee health and wellness is also \nevident at our 72,000-square-foot fitness center, which provides Oklahoma \nCity headquarters employees and their families with on-site access to \nstate-of-the-art health equipment, recreation leagues and group exercise \nclasses. For employees who work outside of our headquarters, we subsi- \ndize family fitness memberships and recreational entry fees. \n\nincrease public understanding of the process and its necessity in the \nproduction of American natural gas. \n\nTo further promote healthy lifestyles, the company-wide Living Well \nprogram provides financial incentives for employees who participate in \nregular exercise, education, motivation and intervention. In 2010 more \nthan 6,900 employees participated in Chesapeake’s Living Well program \nwith more than 70% earning financial awards.", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**Employees**\nFrom state-of-the-art training facilities to extensive health and wellness \nprograms, Chesapeake provides employees with the skills they need to \nsucceed both in the field and at the office while creating a well-rounded \nenvironment for employees and their families. We are committed to the \nsafety and well-being of our employees, contractors and local populations. \nWe provide initial and refresher safety and environmental train- \ning to our employees and contractors. In addition to classroom and \nhands-on training, we utilize online environmental, health and \nsafety training focused on company policy and procedures for top- \nics pertinent to the management of our field assets. The range of \n\nIn addition, we provide discounted or free memberships to organiza- \ntions such as Weight Watchers and cover the cost of most registration \nfees for local races and fitness events. Throughout the year the company \nalso hosts a number of health-related classes and programs, including \nour award-winning Live Better Forever program, a dynamic new Your Life \nMatters mental health initiative and Lunch and Learn seminars.", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**What advantages does CHK’s unique vertical integration strategy provide?**\nChesapeake has built a large inventory of low-risk natural gas and liquids-rich plays that we plan to develop \naggressively over the next two decades. As a result, we know that our company will consistently utilize a tremen- \ndous (and growing) amount of oilfield services for this resource development. This high level of planned drilling \nactivity will create value for the provider of oilfield services, and Chesapeake’s strategy is to capture a portion \nof this value for our shareholders rather than transfer it to third-party vendors whose interests and investments \nare not always aligned with ours. To date, Chesapeake has invested in drilling rigs, rental tools, water manage- \nment equipment, trucking, compression equipment, midstream services, and most recently pressure pumping and \nfracture stimulation equipment. Chesapeake’s activities require a high level of planning and project coordination \nthat is best accomplished through vertical integration and ownership of the oilfield services we utilize. This approach \ncreates a multitude of cost savings, an alignment of interests, operational synergies, greater capacity of equipment, \nincreased safety and better coordinated logistics. In addition, Chesapeake’s control of a large portion of the oilfield \nservice equipment it utilizes provides a unique advantage to control the timing of leasehold development. Simply \nput, faster development of resources maximizes the present value of leasehold. This has been a key advantage for \nJeff Fisher \nSenior Vice President – Production \n\nChesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures.", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**4**| LETTER TO SHAREHOLDERS \n\nDEAR FELLOW \nSHAREHOLDERS » \n\n2010 was a very important year of transition and achievement for Chesapeake, a year in which we \n\ninitiated three very important strategic shifts: from asset gathering to asset harvesting, from focusing \n\nexclusively on natural gas to a balanced focus on natural gas and liquids and from having a leveraged \n\nbalance sheet to one worthy of an investment grade rating. \n\n\n\n2010 also marked a truly transformative year for our industry. We and \na handful of our peers enhanced our capabilities to find and produce sig- \nnificant new resources of oil and natural gas liquids (collectively, “liquids”) in \nunconventional formations. Chesapeake and these other companies combined \ncreativity, innovation and technology to reinvent the way that our industry \nexplores for and produces natural gas and liquids. \n\nFurthermore, 2010 was the year when global energy companies more \nfully recognized the importance of these developments and the tremendous \nopportunities that have emerged in the U.S. Through a wide variety of trans- \nactions, including several led by Chesapeake, the global energy industry made \nit clear that the assets owned by Chesapeake and some of its peers are the most \nattractive in the world. This realization has already increased the value of high- \nquality unconventional assets in the U.S. and, in time, should lead to higher \nstock prices for the leading U.S. onshore E&P companies, especially Chesapeake. Simply put, the global energy \nindustry is beating a path to our door, and we are welcoming it with open arms. \n\nBefore we move ahead, I want to emphasize that even though 2010 was a year of transition and achievement, \nour stock price was essentially unchanged. Nevertheless, it was still a very strong year for the company operation- \nally and financially. Here are the year’s highlights for your review: \n\n*Home to three distinct forms*\n*of hydrocarbons: dry natural*\n*gas, natural gas liquids and*\n*oil, the Eagle Ford Shale*\n*in South Texas epitomizes*\n*Chesapeake’s shift to a bal-*\n*anced focus on natural gas*\n*and liquids.*\n\n>> Average daily natural gas and oil production increased 14% from 2.5 billion cubic feet of natural gas \n\nequivalent (bcfe) in 2009 to 2.8 bcfe in 2010; \n\n>> Proved natural gas and oil reserves increased 20% in 2010, from 14.3 trillion cubic feet of natural gas \n\nequivalent (tcfe) to 17.1 tcfe; \n\n>> Reserve replacement for 2010 reached 375% at a drilling, completion and net acquisition cost of only \n\n$0.76 per thousand cubic feet of natural gas equivalent (mcfe)(1); \n\n>> Realized hedging gains were $2.1 billion; \n\n>> Revenues increased 22% to $9.4 billion; \n\n>> Adjusted ebitda(2) increased 15% to $5.1 billion; \n\n>> Operating cash flow(2) increased 5% to $4.5 billion; and \n\n>> Adjusted earnings per fully diluted share(2) increased 16% to $2.95.", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**What innovations and advancements have led to CHK’s ability to produce liquids from**\n**shales and other tight reservoirs?**\nDuring the past five years, Chesapeake and a few other leaders in the independent E&P industry have developed \nexpertise in exploiting shales and other tight reservoir formations targeting natural gas through the combination of \nhorizontal drilling and advanced fracture stimulation techniques. This has allowed the commercialization of plays that \nwere previously uneconomic, most notably in shale formations. Part of our success in producing liquids from tight \nreservoirs has come from the company’s ability to extend the technological advances gained in the development of \ntight natural gas formations to new formations known to contain substantial liquids. This led to our first liquids-rich \nplay discovery in the Colony Granite Wash in 2007. As we have increased our focus on liquids-rich plays, we have ben- \nefited from a growing understanding and mapping of petrophysical properties in unconventional formations as well \nas an enhanced understanding of the geochemical nature of liquids-rich reservoirs. This has allowed Chesapeake to \nbetter identify formations most likely to generate liquids-rich production, including more than a dozen new plays for \nthe company. We have subsequently improved the success of our liquids-rich plays through the use of optimal well- \nbore lateral lengths, better placement of well laterals though advanced wellbore steering techniques and customized \nfracture stimulation designs for liquids-rich plays that allow the company to achieve a greater stimulated rock volume \nin low permeability reservoirs. Finally, the advancements Chesapeake has made in developing liquids-rich plays have \nbeen made possible through the use of our proprietary Reservoir Technology Center that has become the industry’s most advanced shale core laboratory. \n\nSteve Dixon \nExecutive Vice President – \nOperations and Geosciences and \nChief Operating Officer \n\n\n\n**It is often said that the energy industry has an aging work force that is fast approaching**\n**retirement age. How is Chesapeake addressing this?**\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down- \nturn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong compe- \ntition from other industries lured away many of the best and brightest science and technology graduates, and today \nmany experienced professionals who stayed in the industry through the downturn are approaching retirement age. \nAs a result, one of our industry’s greatest challenges over the past 10 years has been to develop a new generation \nof natural gas and oil professionals who have the knowledge and experience required to meet the nation’s growing \nenergy needs. \n\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting \nand training a new generation of energy professionals would impact the company’s future success and its ability to \ncompete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs \nand decided to create a world-class college recruiting and intern program to recruit the most promising industry \ntalent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go \non to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive \nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads \nand career counselors at the more than 31 universities where we actively recruit. \n\nMartha Burger \nSenior Vice President – \nHuman and Corporate Resources", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_CHK_2010.pdf", - "query": "Has the CEO of Chesapeake Energy met with the US President about America's energy production?", - "target_page": 16, - "target_passage": "I am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "\n \n \n \n \n [html]\n
domestic oil production as two of its primary attributes, it is encouraging
to see our political leadership finally grasp that natural gas stands alone
as the only affordable, scalable and immediately available alternative to
foreign oil and that U. S. oil production can be increased significantly in
the years ahead.
The events of the past few months have unmistakably driven home
the fact that it is insanity to rely on the Middle East to provide our econ -
omy ' s lifeline of oil. This should be especially obvious when one realizes
that during the next 10 years, America will likely export at least another
\n\nThe combination of these vast new discoveries of unconventional \nnatural gas and liquids provides America with a unique future path- \nway toward greater energy independence, an industrial renaissance, \neconomic rejuvenation and greater national security. I remain fully con- \nfident that the marketplace understands this and that over time the U.S. \nwill more fully embrace and utilize clean, affordable, abundant American \nnatural gas and increased domestic oil production as the best alterna- \ntives to burning environmentally challenged coal and expensive and \ndangerous foreign oil. \n\nThere is now a clear road ahead toward a more sustainable, afford- \nable, dynamic and independent future if America embraces the remark- \nable gift of energy abundance that Chesapeake has helped discover in \nthe U.S. You have my commitment, and the commitment of more than \n\n\n\n\n\n10,000 other Chesapeake employees, that every day we are working \nhard to create shareholder value and a better future for our communi- \nties, our states and our country through the continued discovery and \ndevelopment of unconventional natural gas and liquids. \n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n*telemetry systems that provide pumpers with real-time information on oil and water*\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\nThe good news, however, is that America can now secure a new \nenergy future thanks to Chesapeake and a handful of other leading U.S. \nE&P companies that have reinvented the process of finding natural gas \nand oil during the past five years. In doing so, we have discovered twice \nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil. \nFurthermore, these same few companies that led the unconventional \nnatural gas revolution have in just the past two years also reinvented \nthe way in which we can find large new oil resources onshore in the U.S. \nIn fact, I believe the U.S. can possibly increase its production of oil from \nthe current 5.8 million barrels per day by 30–50% during the next 5–10 \nyears, thereby potentially reaching the President’s 2025 goal of reducing \nforeign oil imports by 33%, 5–10 years earlier than hoped. \n\nBest regards,", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**CORPORATE PROFILE**\n\nChesapeake Energy Corporation is the second-largest producer of \nnatural gas, a Top 15 producer of oil and natural gas liquids and \nthe most active driller of new wells in the U.S. \nHeadquartered in Oklahoma City, the company’s operations are focused on discovering and developing \n\nunconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in \n\nthe Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite \n\nWash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, \n\nNiobrara and Utica unconventional liquids-rich plays. \n\nThe company has also vertically integrated its oper- \n\nations and owns substantial midstream, compression, \n\ndrilling and oilfield service assets. Chesapeake’s stock \n\nis listed on the New York Stock Exchange under \n\nthe symbol CHK. Further information is available at \n\n**www.chk.com**where Chesapeake routinely posts \n\nannouncements, updates, events, investor informa- \n\ntion, presentations and press releases. \n\n\n\n**ON THE COVER**\n*Moving west, a Chesapeake rig*\n*drills toward the Niobrara Shale*\n*in the Powder River Basin of*\n*southeastern Wyoming, one of*\n*several new liquids-rich plays*\n*that are enabling the company*\n*to increase its profitability and*\n*return on capital.*", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**4**| LETTER TO SHAREHOLDERS \n\nDEAR FELLOW \nSHAREHOLDERS » \n\n2010 was a very important year of transition and achievement for Chesapeake, a year in which we \n\ninitiated three very important strategic shifts: from asset gathering to asset harvesting, from focusing \n\nexclusively on natural gas to a balanced focus on natural gas and liquids and from having a leveraged \n\nbalance sheet to one worthy of an investment grade rating. \n\n\n\n2010 also marked a truly transformative year for our industry. We and \na handful of our peers enhanced our capabilities to find and produce sig- \nnificant new resources of oil and natural gas liquids (collectively, “liquids”) in \nunconventional formations. Chesapeake and these other companies combined \ncreativity, innovation and technology to reinvent the way that our industry \nexplores for and produces natural gas and liquids. \n\nFurthermore, 2010 was the year when global energy companies more \nfully recognized the importance of these developments and the tremendous \nopportunities that have emerged in the U.S. Through a wide variety of trans- \nactions, including several led by Chesapeake, the global energy industry made \nit clear that the assets owned by Chesapeake and some of its peers are the most \nattractive in the world. This realization has already increased the value of high- \nquality unconventional assets in the U.S. and, in time, should lead to higher \nstock prices for the leading U.S. onshore E&P companies, especially Chesapeake. Simply put, the global energy \nindustry is beating a path to our door, and we are welcoming it with open arms. \n\nBefore we move ahead, I want to emphasize that even though 2010 was a year of transition and achievement, \nour stock price was essentially unchanged. Nevertheless, it was still a very strong year for the company operation- \nally and financially. Here are the year’s highlights for your review: \n\n*Home to three distinct forms*\n*of hydrocarbons: dry natural*\n*gas, natural gas liquids and*\n*oil, the Eagle Ford Shale*\n*in South Texas epitomizes*\n*Chesapeake’s shift to a bal-*\n*anced focus on natural gas*\n*and liquids.*\n\n>> Average daily natural gas and oil production increased 14% from 2.5 billion cubic feet of natural gas \n\nequivalent (bcfe) in 2009 to 2.8 bcfe in 2010; \n\n>> Proved natural gas and oil reserves increased 20% in 2010, from 14.3 trillion cubic feet of natural gas \n\nequivalent (tcfe) to 17.1 tcfe; \n\n>> Reserve replacement for 2010 reached 375% at a drilling, completion and net acquisition cost of only \n\n$0.76 per thousand cubic feet of natural gas equivalent (mcfe)(1); \n\n>> Realized hedging gains were $2.1 billion; \n\n>> Revenues increased 22% to $9.4 billion; \n\n>> Adjusted ebitda(2) increased 15% to $5.1 billion; \n\n>> Operating cash flow(2) increased 5% to $4.5 billion; and \n\n>> Adjusted earnings per fully diluted share(2) increased 16% to $2.95.", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Richard K Davidson (1 ) \nRetired Chairman and CEO \nUnion Pacific Corporation \nBonita Springs, Florida \nAubrey K. McClendon \nChairman of the Board \nand Chief Executive Officer \nChesapeake Energy Corporation \nOklahoma City, Oklahoma \n\nSTANDING (LEFT TO RIGHT) \n\nV. Burns Hargis (1) \nPresident \nOklahoma State University \nStillwater, Oklahoma \nMerrill A. \n “Pete” Miller, Jr. (1,2) \nChairman, President and CEO \nNational Oilwell Varco, Inc. \nHouston, Texas \n\nFrank Keating (3) \nFormer Governor, Oklahoma \nPresident and CEO \nAmerican Bankers Association \nWashington, D.C. (1) Audit Committee \n(2) Lead Independent Director \n Compensation Committee \n(3) \n Nominating and Corporate \n(4) \nGovernance Committee \n\nSEATED (LEFT TO RIGHT) \nDon Nickles (4) \nFormer U.S. Senator, Oklahoma \nFounder and President \nThe Nickles Group, LLC \nWashington, D.C. \nCharles T. Maxwell (3,4) \nSenior Energy Analyst \nWeeden & Co. \nGreenwich, Connecticut \n\n\n\nGovernance \nOur Board of Directors is responsible to our shareholders for the oversight of the company and for the imple- \nmentation and operation of an effective and sound corporate governance environment. We believe that effec- \ntive corporate governance contributes to long-term corporate performance. An effective governance structure \nshould reinforce a culture of corporate integrity, foster the company’s pursuit of long-term strategic goals of \ngrowth and profit and ensure quality and continuity of corporate leadership. Our directors will continue to be \ndiligent in their efforts to preserve the public trust while fostering the long-term success of the company.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**Strong Partners**\nOver the past few years, in addition to gathering the industry’s best \nassets, Chesapeake has also built the industry’s finest collection of global \nenergy partners and energy stock investors. We have now entered into \ntransactions with PXP, BP, Statoil, Total, CNOOC and BHP Billiton. Collec- \ntively, we have sold these companies certain assets for total consider- \nation of $20.5 billion in the form of cash and drilling and completion \ncarries for which our net cost was only $6.1 billion resulting in overall \nvalue creation of $14.4 billion. While these transactions have been very \n\nhappen to manage some of the world’s largest pools of capital and have \na very long-term investment horizon. Their support is an important \nvalidation of our strategy. \n\n**Short-Term Pain for Long-Term Gain**\nDespite this all-star lineup of global partners and investors, some other \ninvestors have not yet fully recognized the benefits of our industry \nleadership in acquiring unconventional natural gas and liquids assets. \nWhether it was our leveraged balance sheet during recent tough reces- \nsionary times, our heavy focus on natural gas during a time of persistent \nmarket pessimism about natural gas prices or our large capital invest- \nments in undeveloped liquids-rich leasehold undertaken to enable \nChesapeake to remain an industry leader in the years ahead, it is clear \n\n\n\nrewarding to our buyers, they have been truly outstanding for Chesapeake, \nproviding us an attractive source of capital, a reduction of risk, a quick \nrecovery of our leasehold investment in new plays and a much greater \nability to capture a large resource base with decades of highly profitable \ndrilling opportunities. \n\nthat we were less popular in the stock market in 2010 than we were in \n2009, when our stock price increased by 60%. \n\nWe anticipated that some market unpopularity in 2010 would \nlikely be the price we would pay as we positioned Chesapeake to be \nthe leader not only in unconventional U.S. natural gas, but also in \nunconventional U.S. liquids. However, now that we have largely com- \npleted the investments needed to accomplish this transition to a port- \nfolio balanced with liquids, the rebound in our stock price could be sharp \nas investors begin to focus more clearly on Chesapeake’s three-way \ntransition from an asset gatherer to an asset harvester, from less natural \ngas exposure to more liquids exposure and from a leveraged balance \nsheet to one worthy of an investment grade rating. \n\nIn addition, we are the only U.S. E&P company that has attracted \nto its stock ownership roster some of the world’s leading government- \nsponsored investors: Temasek Holdings (Singapore), China Investment \nCorporation, Korea Investment Corporation and Abu Dhabi Investment \nAuthority. Along with our largest shareholder, Memphis, Tennessee- \nbased Southeastern Asset Management (12%), these shareholders are \nsome of the world’s largest and most astute investors, and who also \n\nAccordingly, in early January 2011, we announced our “25/25 Plan,” \na two-year plan designed to reduce our long-term debt by 25% while \nstill growing the company’s production by 25%. We designed this plan \nto articulate very clearly the benefits of becoming an asset harvester", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Chesapeake is the second-largest producer of U.S. natural gas and a Top 15 producer of U.S. oil and natural gas liquids. The company has \nbuilt a large resource base of high-quality U.S. assets in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays \nand in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, Niobrara and Utica \nunconventional liquids plays. In 2010 Chesapeake increased its focus on applying the geoscientific and horizontal drilling expertise \ngained from developing unconventional natural gas shale plays to unconventional liquids-rich plays. Our goal is to reach a balanced mix of \nnatural gas and liquids revenue as quickly as possible through organic drilling. We invested approximately $4.7 billion in 2010, net of \ndivestitures, primarily in liquids-rich acreage to provide the foundation for this shift toward more profitable plays. \n\nWe own interests in approximately 46,000 producing natural gas and oil wells, and in 2010 we produced approximately 1.035 trillion \ncubic feet of natural gas equivalent (tcfe) for an average of 2.8 billion cubic feet of natural gas equivalent (bcfe) per day. At year-end \n2010, our proved reserves were 17.1 trillion cubic feet of natural gas equivalent, of which 90% were natural gas and all were onshore in the \nU.S. We have also captured an inventory of up to 115,000 unrisked net future drilling opportunities — almost 50 years worth of drilling \nopportunities — on approximately 13.2 million net leasehold acres in the U.S. The following highlights Chesapeake’s ownership position \nin our key operating areas. \n\n\n\nRockies \n\n**8**", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "As we explore for and produce clean, affordable, abundant, American \nnatural gas, we provide an important solution to our nation’s energy \nchallenges and its quest for energy independence. With at least a 200- \nyear supply of natural gas located right here in the U.S., this versatile \nfuel can be used to not only heat homes, create electricity and meet \nAmerica’s transportation needs, but also to fuel the country’s future \nby creating jobs and stimulating local and national economies through \ninvestment and taxes. \n\nenergy development should be as small and temporary as possible. \nThese practices are continually evolving and further improving as \nChesapeake and the industry develop new innovative techniques and \napproaches to business. \n\n\n\n\n\n\n\n\n \n \n \n \n [html]\n
innovative internaogramTablecessesofTableTableandTableParameterTableTableTableTableTableTableTableTableTableBaselineTableComparisonTableNumberTableprogramTableAge, yearsTableThereofwateTablePaulicTablehighlyofTableTableolumTablen / if0n
\n\n**Environmentally Friendly Operations**\nAt Chesapeake, we realize that the way a great product is produced is \nas important as the product itself. For example, we have helped pioneer \nthe use of multiwell padsites to drill up to 16 wells from a single loca- \ntion, greatly reducing our land and road use and overall environmental \nfootprint. We use the latest horizontal and directional drilling technology \nto place wells at a safe distance from homes, schools and businesses. In \naddition, we build and maintain access roads and work to eliminate soil \nerosion near our sites, as well as restore local vegetation. \n\nWe implement advanced, modern protective measures known as Best \nManagement Practices (BMPs) to help ensure energy development is con- \nducted in an environmentally responsible manner. Procedures are imple- \nmented throughout our operations to protect freshwater aquifers and \nreduce environmental impacts. BMPs protect wildlife, air quality, water and \nlandscapes as we work to develop vitally needed domestic energy sources. \nImplemented throughout the entire life cycle of a well, BMPs can be \nas simple as strategically placing a berm, or land barrier, on locations \nto control surface water runoff. Others involve cutting-edge operational \ntechnologies such as utilizing the most advanced techniques offered in \ndrilling fluids, well casing and cement design. Regardless of complex- \nity, all BMPs are based on the idea that the environmental footprint of", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**What innovations and advancements have led to CHK’s ability to produce liquids from**\n**shales and other tight reservoirs?**\nDuring the past five years, Chesapeake and a few other leaders in the independent E&P industry have developed \nexpertise in exploiting shales and other tight reservoir formations targeting natural gas through the combination of \nhorizontal drilling and advanced fracture stimulation techniques. This has allowed the commercialization of plays that \nwere previously uneconomic, most notably in shale formations. Part of our success in producing liquids from tight \nreservoirs has come from the company’s ability to extend the technological advances gained in the development of \ntight natural gas formations to new formations known to contain substantial liquids. This led to our first liquids-rich \nplay discovery in the Colony Granite Wash in 2007. As we have increased our focus on liquids-rich plays, we have ben- \nefited from a growing understanding and mapping of petrophysical properties in unconventional formations as well \nas an enhanced understanding of the geochemical nature of liquids-rich reservoirs. This has allowed Chesapeake to \nbetter identify formations most likely to generate liquids-rich production, including more than a dozen new plays for \nthe company. We have subsequently improved the success of our liquids-rich plays through the use of optimal well- \nbore lateral lengths, better placement of well laterals though advanced wellbore steering techniques and customized \nfracture stimulation designs for liquids-rich plays that allow the company to achieve a greater stimulated rock volume \nin low permeability reservoirs. Finally, the advancements Chesapeake has made in developing liquids-rich plays have \nbeen made possible through the use of our proprietary Reservoir Technology Center that has become the industry’s most advanced shale core laboratory. \n\nSteve Dixon \nExecutive Vice President – \nOperations and Geosciences and \nChief Operating Officer \n\n\n\n**It is often said that the energy industry has an aging work force that is fast approaching**\n**retirement age. How is Chesapeake addressing this?**\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down- \nturn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong compe- \ntition from other industries lured away many of the best and brightest science and technology graduates, and today \nmany experienced professionals who stayed in the industry through the downturn are approaching retirement age. \nAs a result, one of our industry’s greatest challenges over the past 10 years has been to develop a new generation \nof natural gas and oil professionals who have the knowledge and experience required to meet the nation’s growing \nenergy needs. \n\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting \nand training a new generation of energy professionals would impact the company’s future success and its ability to \ncompete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs \nand decided to create a world-class college recruiting and intern program to recruit the most promising industry \ntalent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go \non to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive \nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads \nand career counselors at the more than 31 universities where we actively recruit. \n\nMartha Burger \nSenior Vice President – \nHuman and Corporate Resources", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**12**| LETTER TO SHAREHOLDERS \n\nwet natural gas and dry natural gas), similar to the components of the \nEagle Ford Shale. We have made a large commitment to this play and \nhave acquired approximately 1.2 million net leasehold acres and expect \nto increase this total to as much as 1.5 million net leasehold acres in the \ncoming months. We are currently using three rigs to evaluate the play \nand believe our leasehold could support the drilling of up to 12,000 net \nwells. This is an area where we anticipate bringing in a joint venture \npartner late in 2011 or early in 2012. \n\n\n \n \n \n \n [html]\n
0.0000TableTableTableP ‐ CTable1.100Tabled1.TableTablePatientsTable
\n\n**Our People**\nGreat assets cannot exist without great people, so we take great pride \nin hiring, training, motivating, rewarding and retaining what we regard \n\nIn addition, we were honored in December 2010 at the 12th Annual \nPlatts Global Energy Awards as finalists for CEO of the Year, Community \n\nFrom our beginning 22 years ago with 10 \n\nemployees in Oklahoma City to employing \n\nmore than 10,000 people across 15 states \n\ntoday, Chesapeake has always focused on \n\nbuilding first-class human resources within \n\na distinctive corporate culture. \n\n\n\nDevelopment Program of the Year, Deal of the Year, Energy Producer \nof the Year and the Industry Leadership Award. Chesapeake was one \nof only two companies selected as a finalist in five or more categories. \nThe company was also honored in 2010 with a Certificate of Recognition \nfor our military reserve recruiting efforts, named a 2010 Best Diversity \nCompany by Engineering & Information Technology Magazine and rec- \nognized for Best Investor Relations in Energy Sector and Best Investor \nRelations Website at the 2010 IR Magazine U.S. Awards. \n\nas the best employees in the industry. From our beginning 22 years ago \nwith 10 employees in Oklahoma City to employing more than 10,000 \npeople across 15 states today, Chesapeake has always focused on build- \ning first-class human resources within a distinctive corporate culture. Talk \nto Chesapeake employees and you will note genuine pride and great \nenthusiasm about the company and the critical role that we play in deliv- \nering increasing quantities of clean and affordable American natural gas \nand valuable and reliable liquids to energy consumers across the country. \nChesapeake employees are distinctive in other ways as well. They \nare much younger than the industry average, with half of our almost \n4,000 Oklahoma City-based headquarters employees 33 years old \nor younger. Their enthusiasm and willingness to learn create an \n\n**Recent Events and a Better Way Forward**\nYou may be aware that I have been outspoken in attempting to persuade \nour country’s political leadership to recognize that the discovery of vast \nresources of unconventional natural gas and oil in the U.S. is a complete \ngame changer for our country from an economic, national security and \nenvironmental perspective. After two years of my best efforts and the \nefforts of many others in the industry, most notably T. Boone Pickens,", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Marcellus Shale Chesapeake is the industry’s leading leasehold owner, largest producer and \nmost active developer in the Marcellus Shale play that spans from northern West Virginia across \n\n**4**\nmuch of Pennsylvania into southern New York. The Marcellus is located in the highest gas- \nconsuming region of the U.S. and therefore receives the best natural gas prices in the nation. \nWe estimate we could drill up to 21,000 net wells on our Marcellus acreage in the future and plan \nto utilize an average of approximately 32 operated rigs in 2011 to further develop our \n1.7 million net acres of Marcellus Shale leasehold. During 2010 approximately $600 \nmillion of Chesapeake’s drilling costs in the Marcellus were paid by its joint ven- \nture partner, Oslo-based Statoil (NYSE:STO, OSE:STL). During 2011 and 2012, 75% \nof Chesapeake’s drilling and completion costs in the Marcellus, up to $1.4 billion, will \nbe paid by STO. We expect that over time, the Marcellus Shale will become the largest natural gas \nfield in the U.S. and the second-largest in the world.", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - } - ] -] \ No newline at end of file